Affected

CVEPackage:AffectednessSeverityCVSS v3.1References
CVE-2019-25162kernel-source-rt:Affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395206
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220409
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3137
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2020-12965kernel-source-rt:Affectedlow2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2020-12965
D:CVE-2020-12965
MISC:www.amd.com:CVE-2020-12965
OSS:2023/12/05/3
OSS:2023/Q4/260
SMASH Issue 308751
bnc#1190017
bnc#1217845
jsc#CAR-3278
rh#2254156
CVE-2020-36784kernel-source-rt:Affectedmoderate3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395421
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220570
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3152
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2266952
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2021-45078binutils:Affectedmoderate3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2021-45078
CVE-2021-45078
FEDORA:FEDORA-2021-3614c0b466
FEDORA:FEDORA-2021-f2c6802743
GLSA-202208-30
L3:64009
MISC:sourceware.org:CVE-2021-45078
SMASH Issue 317624
bnc#1193929
bnc#1202864
jsc#CAR-1348
rh#2033715
CVE-2021-45261patch:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2021-45261
L3:64561
L3:64562
L3:64674
MISC:savannah.gnu.org:CVE-2021-45261
SMASH Issue 318623
bnc#1194037
bnc#1205152
jsc#CAR-1353
rh#2035081
CVE-2021-46904kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46904
SMASH Issue 395119
bnc#1220416
https://git.kernel.org/stable/c/145c89c441d27696961752bf51b323f347601bee
https://git.kernel.org/stable/c/388d05f70f1ee0cac4a2068fd295072f1a44152a
https://git.kernel.org/stable/c/4a2933c88399c0ebc738db39bbce3ae89786d723
https://git.kernel.org/stable/c/8a12f8836145ffe37e9c8733dce18c22fb668b66
https://git.kernel.org/stable/c/92028d7a31e55d53e41cff679156b9432cffcb36
https://git.kernel.org/stable/c/a462067d7c8e6953a733bf5ade8db947b1bb5449
https://git.kernel.org/stable/c/caf5ac93b3b5d5fac032fc11fbea680e115421b4
https://git.kernel.org/stable/c/dc195928d7e4ec7b5cfc6cd10dc4c8d87a7c72ac
jsc#CAR-3140
rh#2266216
CVE-2021-46906kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395208
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220421
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2021-46915kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46915
SMASH Issue 395259
bnc#1220436
https://git.kernel.org/stable/c/01fb1626b620cb37a65ad08e0f626489e8f042ef
https://git.kernel.org/stable/c/1bb3ee4259936cc3b2d80a4a480bbb4868575071
https://git.kernel.org/stable/c/9065ccb9ec92c5120e7e97958397ebdb454f23d6
https://git.kernel.org/stable/c/b895bdf5d643b6feb7c60856326dd4feb6981560
https://git.kernel.org/stable/c/dc1732baa9da5b68621586bf8636ebbc27dc62d2
https://git.kernel.org/stable/c/fadd3c4afdf3d4c21f4d138502f8b76334987e26
jsc#CAR-3141
rh#2266423
CVE-2021-46921kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395276
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220468
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2021-46924kernel-source-rt:Affectedmoderate4.3 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2021-46924
SMASH Issue 395279
bnc#1220459
https://git.kernel.org/stable/c/1b9dadba502234eea7244879b8d5d126bfaf9f0c
https://git.kernel.org/stable/c/1cd4063dbc91cf7965d73a6a3855e2028cd4613b
https://git.kernel.org/stable/c/238920381b8925d070d32d73cd9ce52ab29896fe
https://git.kernel.org/stable/c/38c3e320e7ff46f2dc67bc5045333e63d9f8918d
https://git.kernel.org/stable/c/a1e0080a35a16ce3808f7040fe0c3a8fdb052349
https://git.kernel.org/stable/c/e553265ea56482da5700f56319fda9ff53e7dcb4
jsc#CAR-3146
rh#2266455
CVE-2021-46925kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46925
SMASH Issue 395280
bnc#1220466
https://git.kernel.org/stable/c/349d43127dac00c15231e8ffbcaabd70f7b0e544
https://git.kernel.org/stable/c/b85f751d71ae8e2a15e9bda98852ea9af35282eb
https://git.kernel.org/stable/c/e8a5988a85c719ce7205cb00dcf0716dcf611332
jsc#CAR-3147
rh#2266375
CVE-2021-46930kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2021-46930
SMASH Issue 395285
bnc#1220484
https://git.kernel.org/stable/c/249ddfbe00570d6dc76208e88017937d4d374c79
https://git.kernel.org/stable/c/3b6efe0b7ba03cc2acf0694b46d6ff33c5b4c295
https://git.kernel.org/stable/c/585e2b244dda7ea733274e4b8fa27853d625d3bf
https://git.kernel.org/stable/c/8c313e3bfd9adae8d5c4ba1cc696dcbc86fbf9bf
jsc#CAR-3149
rh#2266345
CVE-2021-46932kernel-source-rt:Affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-46932
SMASH Issue 395287
bnc#1220444
https://git.kernel.org/stable/c/292d2ac61fb0d9276a0f7b7ce4f50426f2a1c99f
https://git.kernel.org/stable/c/975774ea7528b489930b76a77ffc4d5379b95ff2
https://git.kernel.org/stable/c/9f329d0d6c91142cf0ad08d23c72dd195db2633c
https://git.kernel.org/stable/c/9f3ccdc3f6ef10084ceb3a47df0961bec6196fd0
https://git.kernel.org/stable/c/a02e1404e27855089d2b0a0acc4652c2ce65fe46
https://git.kernel.org/stable/c/d1962f263a176f493400b8f91bfbf2bfedce951e
https://git.kernel.org/stable/c/d2cb2bf39a6d17ef4bdc0e59c1a35cf5751ad8f4
https://git.kernel.org/stable/c/e79ff8c68acb1eddf709d3ac84716868f2a91012
jsc#CAR-3144
rh#2266318
CVE-2021-46934kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2021-46934
SMASH Issue 395289
bnc#1220469
https://git.kernel.org/stable/c/407c8708fb1bf2d4afc5337ef50635cf540c364b
https://git.kernel.org/stable/c/8d31cbab4c295d7010ebb729e9d02d0e9cece18f
https://git.kernel.org/stable/c/9e4a3f47eff476097e0c7faac04d1831fc70237d
https://git.kernel.org/stable/c/bb436283e25aaf1533ce061605d23a9564447bdf
https://git.kernel.org/stable/c/f68599581067e8a5a8901ba9eb270b4519690e26
jsc#CAR-3148
rh#2266446
CVE-2021-46936kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46936
SMASH Issue 395291
bnc#1220439
https://git.kernel.org/stable/c/08eacbd141e2495d2fcdde84358a06c4f95cbb13
https://git.kernel.org/stable/c/15579e1301f856ad9385d720c9267c11032a5022
https://git.kernel.org/stable/c/2386e81a1d277f540e1285565c9d41d531bb69d4
https://git.kernel.org/stable/c/5c2fe20ad37ff56070ae0acb34152333976929b4
https://git.kernel.org/stable/c/a8e1944b44f94f5c5f530e434c5eaee787254566
https://git.kernel.org/stable/c/e22e45fc9e41bf9fcc1e92cfb78eb92786728ef0
https://git.kernel.org/stable/c/e73164e89d1be561228a4534e1091369ee4ba41a
https://git.kernel.org/stable/c/fe5838c22b986c1190f1dce9aa09bf6a491c1a69
jsc#CAR-3142
rh#2266443
CVE-2021-46941kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395348
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220628
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3154
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266492
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2021-46955kernel-source-rt:Affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2021-46955
L3:68142
SMASH Issue 395362
bnc#1220513
bnc#1220537
https://git.kernel.org/stable/c/23e17ec1a5eb53fe39cc34fa5592686d5acd0dac
https://git.kernel.org/stable/c/490ad0a2390442d0a7b8c00972a83dbb09cab142
https://git.kernel.org/stable/c/5a52fa8ad45b5a593ed416adf326538638454ff1
https://git.kernel.org/stable/c/7c0ea5930c1c211931819d83cfb157bff1539a4c
https://git.kernel.org/stable/c/a1478374b0bda89b4277a8afd39208271faad4be
https://git.kernel.org/stable/c/b1d7280f9ba1bfdbc3af5bdb82e51f014854f26f
https://git.kernel.org/stable/c/b3502b04e84ac5349be95fc033c17bd701d2787a
https://git.kernel.org/stable/c/d841d3cf5297fde4ce6a41ff35451d0e82917f3e
https://git.kernel.org/stable/c/df9e900de24637be41879e2c50afb713ec4e8b2e
jsc#CAR-3150
rh#2266468
CVE-2021-46961kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46961
SMASH Issue 395367
bnc#1220529
https://git.kernel.org/stable/c/3f72d3709f53af72835af7dc8b15ba61611a0e36
https://git.kernel.org/stable/c/7be4db5c2b59fa77071c93ca4329876fb9777202
https://git.kernel.org/stable/c/a97709f563a078e259bf0861cd259aa60332890a
https://git.kernel.org/stable/c/e7ea8e46e3b777be26aa855fe07778c415f24926
https://git.kernel.org/stable/c/ea817ac1014c04f47885532b55f5d0898deadfba
jsc#CAR-3151
rh#2266820
CVE-2021-46963kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395369
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220536
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2021-46988kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395437
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220706
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3163
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2021-46989kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46989
SMASH Issue 395438
bnc#1220737
https://git.kernel.org/stable/c/52dde855663e5db824af51db39b5757d2ef3e28a
https://git.kernel.org/stable/c/97314e45aa1223a42d60256a62c5d9af54baf446
https://git.kernel.org/stable/c/adbd8a2a8cc05d9e501f93e5c95c59307874cc99
https://git.kernel.org/stable/c/c3187cf32216313fb316084efac4dab3a8459b1d
https://git.kernel.org/stable/c/c451a6bafb5f422197d31536f82116aed132b72c
https://git.kernel.org/stable/c/c477f62db1a0c0ecaa60a29713006ceeeb04b685
jsc#CAR-3206
rh#2266898
CVE-2021-46991kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395440
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220575
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2021-46992kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2021-46992
SMASH Issue 395441
bnc#1220638
https://git.kernel.org/stable/c/1e8ab479cfbe5751efccedb95afb9b112a5ba475
https://git.kernel.org/stable/c/2824cafc6a93792d9ad85939c499161214d84c4b
https://git.kernel.org/stable/c/72b49dd116ca00a46a11d5a4d8d7987f05ed9cd7
https://git.kernel.org/stable/c/a388d10961ff8578b1a6691945d406c0f33aa71b
https://git.kernel.org/stable/c/a54754ec9891830ba548e2010c889e3c8146e449
https://git.kernel.org/stable/c/c77e2ef18167ad334e27610ced9a7f6af5ec1787
https://git.kernel.org/stable/c/efcd730ddd6f25578bd31bfe703e593e2421d708
jsc#CAR-3157
rh#2266890
CVE-2021-47001kernel-source-rt:Affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47001
SMASH Issue 395450
bnc#1220670
https://git.kernel.org/stable/c/19b5fa9489b5706bc878c3a522a7f771079e2fa0
https://git.kernel.org/stable/c/35d8b10a25884050bb3b0149b62c3818ec59f77c
https://git.kernel.org/stable/c/8834ecb5df22b7ff3c9b0deba7726579bb613f95
https://git.kernel.org/stable/c/eddae8be7944096419c2ae29477a45f767d0fcd4
jsc#CAR-3161
rh#2266869
CVE-2021-47005kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47005
SMASH Issue 395454
bnc#1220660
https://git.kernel.org/stable/c/0169d4f0bee44fdfef908c13ed21fcb326c38695
https://git.kernel.org/stable/c/6613bc2301ba291a1c5a90e1dc24cf3edf223c03
https://git.kernel.org/stable/c/679ebad058b8168f10e63876d63b0877fd2fe784
https://git.kernel.org/stable/c/bbed83d7060e07a5d309104d25a00f0a24441428
jsc#CAR-3160
rh#2266861
CVE-2021-47012kernel-source-rt:Affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47012
SMASH Issue 395461
bnc#1220627
https://git.kernel.org/stable/c/3093ee182f01689b89e9f8797b321603e5de4f63
https://git.kernel.org/stable/c/30b9e92d0b5e5d5dc1101ab856c17009537cbca4
https://git.kernel.org/stable/c/3e22b88e02c194f6c80867abfef5cc09383461f4
https://git.kernel.org/stable/c/608a4b90ece039940e9425ee2b39c8beff27e00c
https://git.kernel.org/stable/c/ad9ce7188432650469a6c7625bf479f5ed0b6155
jsc#CAR-3155
rh#2266844
CVE-2021-47013kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395462
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220641
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3158
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2021-47024kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47024
SMASH Issue 395471
bnc#1220637
https://git.kernel.org/stable/c/27691665145e74a45034a9dccf1150cf1894763a
https://git.kernel.org/stable/c/37c38674ef2f8d7e8629e5d433c37d6c1273d16b
https://git.kernel.org/stable/c/8432b8114957235f42e070a16118a7f750de9d39
https://git.kernel.org/stable/c/b605673b523fe33abeafb2136759bcbc9c1e6ebf
jsc#CAR-3156
rh#2266967
CVE-2021-47041kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395488
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220755
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3168
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2021-47054kernel-source-rt:Affectedmoderate2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395865
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220767
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2021-47060kernel-source-rt:Affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47060
SMASH Issue 395871
bnc#1220742
https://git.kernel.org/stable/c/168e82f640ed1891a700bdb43e37da354b2ab63c
https://git.kernel.org/stable/c/2a20592baff59c5351c5200ec667e1a2aa22af85
https://git.kernel.org/stable/c/50cbad42bfea8c052b7ca590bd4126cdc898713c
https://git.kernel.org/stable/c/5d3c4c79384af06e3c8e25b7770b6247496b4417
https://git.kernel.org/stable/c/7d1bc32d6477ff96a32695ea4be8144e4513ab2d
jsc#CAR-3165
rh#2267175
CVE-2021-47061kernel-source-rt:Affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47061
SMASH Issue 395872
bnc#1220745
https://git.kernel.org/stable/c/03c6cccedd3913006744faa252a4da5145299343
https://git.kernel.org/stable/c/2ee3757424be7c1cd1d0bbfa6db29a7edd82a250
https://git.kernel.org/stable/c/30f46c6993731efb2a690c9197c0fd9ed425da2d
https://git.kernel.org/stable/c/4e899ca848636b37e9ac124bc1723862a7d7d927
jsc#CAR-3166
rh#2267173
CVE-2021-47074kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47074
SMASH Issue 396012
bnc#1220854
https://git.kernel.org/stable/c/03504e3b54cc8118cc26c064e60a0b00c2308708
https://git.kernel.org/stable/c/551ba08d4b7eb26f75758cdb9f15105b276517ad
https://git.kernel.org/stable/c/9c980795ccd77e8abec33dd6fe28dfe1c4083e65
jsc#CAR-3177
rh#2267521
CVE-2021-47076kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47076
SMASH Issue 396014
bnc#1220860
https://git.kernel.org/stable/c/abe31d25facdb9109fe2cf69890748295291570c
https://git.kernel.org/stable/c/dc07628bd2bbc1da768e265192c28ebd301f509d
jsc#CAR-3179
rh#2267525
CVE-2021-47078kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 396016
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220863
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3180
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2021-47082kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 396228
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220969
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3207
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2021-47083kernel-source-rt:Affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L)CVE-2021-47083
SMASH Issue 396229
bnc#1220917
https://git.kernel.org/stable/c/2d5446da5acecf9c67db1c9d55ae2c3e5de01f8d
https://git.kernel.org/stable/c/441d3873664d170982922c5d2fc01fa89d9439ed
https://git.kernel.org/stable/c/f373298e1bf0c6ea097c0bcc558dc43ad53e421f
https://git.kernel.org/stable/c/fb563baa3eb8e7a15f2cff3c2695e2cca0493e69
jsc#CAR-3186
rh#2267942
CVE-2021-47100kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 396246
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220985
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3198
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267918
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2021-47101kernel-source-rt:Affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2021-47101
SMASH Issue 396247
bnc#1220987
https://git.kernel.org/stable/c/8035b1a2a37a29d8c717ef84fca8fe7278bc9f03
https://git.kernel.org/stable/c/d259f621c85949f30cc578cac813b82bb5169f56
jsc#CAR-3199
rh#2267916
CVE-2021-47103kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 396249
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1221010
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3208
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2021-47109kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47109
SMASH Issue 397843
bnc#1221534
https://git.kernel.org/stable/c/7a6b1ab7475fd6478eeaf5c9d1163e7a18125c8f
https://git.kernel.org/stable/c/d17d47da59f726dc4c87caebda3a50333d7e2fd3
https://git.kernel.org/stable/c/d99029e6aab62aef0a0251588b2867e77e83b137
https://git.kernel.org/stable/c/ddf088d7aaaaacfc836104f2e632b29b1d383cfc
jsc#CAR-3229
rh#2269875
CVE-2021-47113kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47113
SMASH Issue 397847
bnc#1221543
https://git.kernel.org/stable/c/0df50d47d17401f9f140dfbe752a65e5d72f9932
https://git.kernel.org/stable/c/dc09ef3562726cd520c8338c1640872a60187af5
https://git.kernel.org/stable/c/ff8de2cec65a8c8521faade12a31b39c80e49f5b
jsc#CAR-3244
rh#2269867
CVE-2021-47126kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47126
SMASH Issue 397860
bnc#1221539
https://git.kernel.org/stable/c/09870235827451409ff546b073d754a19fd17e2e
https://git.kernel.org/stable/c/0a462e25ef0f7ab305081a08d435bbd1f13c0a94
https://git.kernel.org/stable/c/7ba7fa78a92dc410b6f93ed73075ab669c3a0b59
https://git.kernel.org/stable/c/821bbf79fe46a8b1d18aa456e8ed0a3c208c3754
jsc#CAR-3230
rh#2269836
CVE-2021-47129kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47129
SMASH Issue 397863
bnc#1221569
https://git.kernel.org/stable/c/1710eb913bdcda3917f44d383c32de6bdabfc836
https://git.kernel.org/stable/c/2c0e6b35b88a961127066a1028bce9c727cbc3e5
https://git.kernel.org/stable/c/5f3429c05e4028a0e241afdad856dd15dec2ffb9
https://git.kernel.org/stable/c/da8d31e80ff425f5a65dab7060d5c4aba749e562
jsc#CAR-3232
rh#2269829
CVE-2021-47131kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47131
SMASH Issue 397865
bnc#1221545
bnc#1222402
https://git.kernel.org/stable/c/0f1e6fe66977a864fe850522316f713d7b926fd9
https://git.kernel.org/stable/c/c55dcdd435aa6c6ad6ccac0a4c636d010ee367a4
https://git.kernel.org/stable/c/f1d4184f128dede82a59a841658ed40d4e6d3aa2
jsc#CAR-3231
rh#2269820
CVE-2021-47143kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47143
SMASH Issue 398790
bnc#1221988
https://git.kernel.org/stable/c/40588782f1016c655ae1d302892f61d35af96842
https://git.kernel.org/stable/c/444d7be9532dcfda8e0385226c862fd7e986f607
https://git.kernel.org/stable/c/8b2cdc004d21a7255f219706dca64411108f7897
jsc#CAR-3254
rh#2271479
CVE-2021-47145kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47145
SMASH Issue 398792
bnc#1222005
https://git.kernel.org/stable/c/0eaf383c6a4a83c09f60fd07a1bea9f1a9181611
https://git.kernel.org/stable/c/0ed102453aa1cd12fefde8f6b60b9519b0b1f003
https://git.kernel.org/stable/c/6eccfb28f8dca70c9b1b3bb3194ca54cbe73a9fa
https://git.kernel.org/stable/c/76bfd8ac20bebeae599452a03dfc5724c0475dcf
https://git.kernel.org/stable/c/7e13db503918820e6333811cdc6f151dcea5090a
https://git.kernel.org/stable/c/91df99a6eb50d5a1bc70fff4a09a0b7ae6aab96d
https://git.kernel.org/stable/c/b545442133580dcb2f2496133bf850824d41255c
https://git.kernel.org/stable/c/e934c4ee17b33bafb0444f2f9766cda7166d3c40
jsc#CAR-3257
rh#2271477
CVE-2021-47146kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47146
SMASH Issue 398793
bnc#1221979
https://git.kernel.org/stable/c/020ef930b826d21c5446fdc9db80fd72a791bc21
https://git.kernel.org/stable/c/0e35b7457b7b6e73ffeaaca1a577fdf1af0feca1
https://git.kernel.org/stable/c/17728616a4c85baf0edc975c60ba4e4157684d9a
https://git.kernel.org/stable/c/221142038f36d9f28b64e83e954774da4d4ccd17
https://git.kernel.org/stable/c/37d697759958d111439080bab7e14d2b0e7b39f5
https://git.kernel.org/stable/c/4b77ad9097067b31237eeeee0bf70f80849680a0
https://git.kernel.org/stable/c/a76fb9ba545289379acf409653ad5f74417be59c
https://git.kernel.org/stable/c/beb39adb150f8f3b516ddf7c39835a9788704d23
jsc#CAR-3249
rh#2271497
CVE-2021-47150kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47150
SMASH Issue 398797
bnc#1221973
https://git.kernel.org/stable/c/15102886bc8f5f29daaadf2d925591d564c17e9f
https://git.kernel.org/stable/c/20255d41ac560397b6a07d8d87dcc5e2efc7672a
https://git.kernel.org/stable/c/32a1777fd113335c3f70dc445dffee0ad1c6870f
https://git.kernel.org/stable/c/619fee9eb13b5d29e4267cb394645608088c28a8
https://git.kernel.org/stable/c/8ee7ef4a57a9e1228b6f345aaa70aa8951c7e9cd
jsc#CAR-3250
rh#2271487
CVE-2021-47158kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47158
SMASH Issue 398812
bnc#1221970
https://git.kernel.org/stable/c/987e4ab8b8a4fcbf783069e03e7524cd39ffd563
https://git.kernel.org/stable/c/cec279a898a3b004411682f212215ccaea1cd0fb
https://git.kernel.org/stable/c/dd8609f203448ca6d58ae71461208b3f6b0329b0
jsc#CAR-3253
rh#2271474
CVE-2021-47159kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47159
SMASH Issue 398810
bnc#1221967
https://git.kernel.org/stable/c/0f2cb08c57edefb0e7b5045e0e3e9980a3d3aa37
https://git.kernel.org/stable/c/7b22466648a4f8e3e94f57ca428d1531866d1373
https://git.kernel.org/stable/c/a269333fa5c0c8e53c92b5a28a6076a28cde3e83
https://git.kernel.org/stable/c/caff86f85512b8e0d9830e8b8b0dfe13c68ce5b6
https://git.kernel.org/stable/c/ce5355f140a7987011388c7e30c4f8fbe180d3e8
jsc#CAR-3252
rh#2271473
CVE-2021-47160kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47160
SMASH Issue 398813
bnc#1221974
https://git.kernel.org/stable/c/474a2ddaa192777522a7499784f1d60691cd831a
https://git.kernel.org/stable/c/4fe4e1f48ba119bdbc7c897c83b04ba0d08f5488
https://git.kernel.org/stable/c/82ae35b6c14feae5f216913d5b433e143c756d4e
https://git.kernel.org/stable/c/ae389812733b1b1e8e07fcc238e41db166b5c78d
https://git.kernel.org/stable/c/b91117b66fe875723a4e79ec6263526fffdb44d2
jsc#CAR-3255
rh#2271472
CVE-2021-47162kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47162
SMASH Issue 398815
bnc#1221977
https://git.kernel.org/stable/c/436d650d374329a591c30339a91fa5078052ed1e
https://git.kernel.org/stable/c/4b1761898861117c97066aea6c58f68a7787f0bf
https://git.kernel.org/stable/c/5489f30bb78ff0dafb4229a69632afc2ba20765c
https://git.kernel.org/stable/c/64d17ec9f1ded042c4b188d15734f33486ed9966
https://git.kernel.org/stable/c/6da24cfc83ba4f97ea44fc7ae9999a006101755c
https://git.kernel.org/stable/c/ace300eecbccaa698e2b472843c74a5f33f7dce8
https://git.kernel.org/stable/c/b2c8d28c34b3070407cb1741f9ba3f15d0284b8b
https://git.kernel.org/stable/c/b7df21cf1b79ab7026f545e7bf837bd5750ac026
jsc#CAR-3256
rh#2271455
CVE-2021-47163kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47163
SMASH Issue 398807
bnc#1221980
https://git.kernel.org/stable/c/04c26faa51d1e2fe71cf13c45791f5174c37f986
https://git.kernel.org/stable/c/5195ec5e365a2a9331bfeb585b613a6e94f98dba
https://git.kernel.org/stable/c/b9f5b7ad4ac3af006443f535b1ce7bff1d130d7d
https://git.kernel.org/stable/c/d1f76dfadaf8f47ed1753f97dbcbd41c16215ffa
jsc#CAR-3251
rh#2271452
CVE-2021-47182kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47182
SMASH Issue 401330
bnc#1222662
https://git.kernel.org/stable/c/17b49bcbf8351d3dbe57204468ac34f033ed60bc
https://git.kernel.org/stable/c/e15de347faf4a9f494cbd4e9a623d343dc1b5851
jsc#CAR-3307
rh#2274627
CVE-2021-47188kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47188
SMASH Issue 401353
bnc#1222671
https://git.kernel.org/stable/c/3ff1f6b6ba6f97f50862aa50e79959cc8ddc2566
https://git.kernel.org/stable/c/c36baca06efa833adaefba61f45fefdc49b6d070
jsc#CAR-3297
rh#2274621
CVE-2021-47190kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47190
SMASH Issue 401334
bnc#1222708
https://git.kernel.org/stable/c/11589d3144bc4e272e0aae46ce8156162e99babc
https://git.kernel.org/stable/c/4924b1f7c46711762fd0e65c135ccfbcfd6ded1f
https://git.kernel.org/stable/c/642fc22210a5e59d40b1e4d56d21ec3effd401f2
https://git.kernel.org/stable/c/ab7c3d8d81c511ddfb27823fb07081c96422b56e
jsc#CAR-3308
rh#2274619
CVE-2021-47191kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47191
SMASH Issue 401338
bnc#1222866
https://git.kernel.org/stable/c/3e20cb072679bdb47747ccc8bee3233a4cf0765a
https://git.kernel.org/stable/c/4e3ace0051e7e504b55d239daab8789dd89b863c
https://git.kernel.org/stable/c/5b8bed6464ad6653586e30df046185fd816ad999
jsc#CAR-3318
rh#2274618
CVE-2021-47201kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47201
SMASH Issue 401372
bnc#1222792
https://git.kernel.org/stable/c/78638b47132244e3934dc5dc79f6372d5ce8e98c
https://git.kernel.org/stable/c/89f22f129696ab53cfbc608e0a2184d0fea46ac1
https://git.kernel.org/stable/c/926e8c83d4c1c2dac0026637eb0d492df876489e
https://git.kernel.org/stable/c/9ef6589cac9a8c47f5544ccdf4c498093733bb3f
jsc#CAR-3303
rh#2274608
CVE-2021-47204kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47204
SMASH Issue 401355
bnc#1222787
https://git.kernel.org/stable/c/1c4099dc0d6a01e76e4f7dd98e4b3e0d55d80ad9
https://git.kernel.org/stable/c/32d4686224744819ddcae58b666c21d2a4ef4c88
https://git.kernel.org/stable/c/9b5a333272a48c2f8b30add7a874e46e8b26129c
https://git.kernel.org/stable/c/d74ff10ed2d93dc9b67e99a74b36fb9a83273d8a
jsc#CAR-3302
rh#2274633
CVE-2021-47211kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47211
SMASH Issue 401335
bnc#1222869
https://git.kernel.org/stable/c/58fa50de595f152900594c28ec9915c169643739
https://git.kernel.org/stable/c/b97053df0f04747c3c1e021ecbe99db675342954
jsc#CAR-3362
rh#2274575
CVE-2021-47216kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2021-47216
SMASH Issue 401357
bnc#1222876
https://git.kernel.org/stable/c/055eced3edf5b675d12189081303f6285ef26511
https://git.kernel.org/stable/c/06d7d12efb5c62db9dea15141ae2b322c2719515
https://git.kernel.org/stable/c/27490ae6a85a70242d80615ca74d0362a820d6a7
https://git.kernel.org/stable/c/5612287991debe310c914600599bd59511ababfb
https://git.kernel.org/stable/c/ad19f7046c24f95c674fbea21870479b2b9f5bab
https://git.kernel.org/stable/c/cc248790bfdcf879e3094fa248c85bf92cdf9dae
https://git.kernel.org/stable/c/d4996c6eac4c81b8872043e9391563f67f13e406
https://git.kernel.org/stable/c/f5a0ba4a9b5e70e7b2f767636d26523f9d1ac59d
jsc#CAR-3317
rh#2274569
CVE-2021-47217kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47217
SMASH Issue 401325
bnc#1222836
https://git.kernel.org/stable/c/8823ea27fff6084bbb4bc71d15378fae0220b1d8
https://git.kernel.org/stable/c/9c177eee116cf888276d3748cb176e72562cfd5c
https://git.kernel.org/stable/c/b0e44dfb4e4c699cca33ede431b8d127e6e8d661
https://git.kernel.org/stable/c/b20ec58f8a6f4fef32cc71480ddf824584e24743
https://git.kernel.org/stable/c/daf972118c517b91f74ff1731417feb4270625a4
jsc#CAR-3316
rh#2274604
CVE-2021-47219kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2021-47219
SMASH Issue 401345
bnc#1222824
https://git.kernel.org/stable/c/66523553fa62c7878fc5441dc4e82be71934eb77
https://git.kernel.org/stable/c/8440377e1a5644779b4c8d013aa2a917f5fc83c3
https://git.kernel.org/stable/c/f347c26836c270199de1599c3cd466bb7747caa9
jsc#CAR-3314
rh#2274567
CVE-2021-47222kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47222
SMASH Issue 406848
bnc#1224857
https://git.kernel.org/stable/c/25053a8404ba17ca48f5553d487afc1882e9f56c
https://git.kernel.org/stable/c/42020f7f37a90d24b9551f5f7eba3f7c7c102968
https://git.kernel.org/stable/c/79855be6445b6592bddb7bd7167083ec8cdbd73f
https://git.kernel.org/stable/c/84fc1c944e45ab317e2e70a0e7f76fa2a5e43b6e
https://git.kernel.org/stable/c/cfc579f9d89af4ada58c69b03bcaa4887840f3b3
https://git.kernel.org/stable/c/fc7fdd8c5c2ad2fe3e297698be9d4dbe4a4e0579
jsc#CAR-3536
rh#2282596
CVE-2021-47223kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47223
SMASH Issue 406849
bnc#1224856
https://git.kernel.org/stable/c/24a6e55f17aa123bc1fc54b7d3c410b41bc16530
https://git.kernel.org/stable/c/58e2071742e38f29f051b709a5cca014ba51166f
https://git.kernel.org/stable/c/a2241e62f6b4a774d8a92048fdf59c45f6c2fe5c
https://git.kernel.org/stable/c/abb02e05cb1c0a30dd873a29f33bc092067dc35d
https://git.kernel.org/stable/c/ad7feefe7164892db424c45687472db803d87f79
https://git.kernel.org/stable/c/fe0448a3fad365a747283a00a1d1ad5e8d6675b7
jsc#CAR-3537
rh#2282594
CVE-2021-47224kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47224
SMASH Issue 406850
bnc#1224855
https://git.kernel.org/stable/c/019ab7d044d0ebf97e1236bb8935b7809be92358
https://git.kernel.org/stable/c/6aa32217a9a446275440ee8724b1ecaf1838df47
https://git.kernel.org/stable/c/6d120ab4dc39a543c6b63361e1d0541c382900a3
https://git.kernel.org/stable/c/e8afe05bd359ebe12a61dbdc94c06c00ea3e8d4b
jsc#CAR-3554
rh#2282593
CVE-2021-47226kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47226
SMASH Issue 406852
bnc#1224851
https://git.kernel.org/stable/c/002665dcba4bbec8c82f0aeb4bd3f44334ed2c14
https://git.kernel.org/stable/c/a7748e021b9fb7739e3cb88449296539de0b6817
https://git.kernel.org/stable/c/d8778e393afa421f1f117471144f8ce6deb6953a
jsc#CAR-3540
rh#2282591
CVE-2021-47230kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47230
SMASH Issue 406856
bnc#1224853
https://git.kernel.org/stable/c/669a8866e468fd020d34eb00e08cb41d3774b71b
https://git.kernel.org/stable/c/78fcb2c91adfec8ce3a2ba6b4d0dda89f2f4a7c6
https://git.kernel.org/stable/c/cbb425f62df9df7abee4b3f068f7ed6ffc3561e2
https://git.kernel.org/stable/c/df9a40cfb3be2cbeb1c17bb67c59251ba16630f3
jsc#CAR-3541
rh#2282587
CVE-2021-47234kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47234
SMASH Issue 406861
bnc#1224840
https://git.kernel.org/stable/c/6472955af5e88b5489b6d78316082ad56ea3e489
https://git.kernel.org/stable/c/9a17907946232d01aa2ec109da5f93b8d31dd425
https://git.kernel.org/stable/c/aaac9a1bd370338ce372669eb9a6059d16b929aa
jsc#CAR-3560
rh#2282583
CVE-2021-47235kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47235
SMASH Issue 406862
bnc#1224844
https://git.kernel.org/stable/c/0260916843cc74f3906acf8b6f256693e01530a2
https://git.kernel.org/stable/c/19f88ca68ccf8771276a606765239b167654f84a
https://git.kernel.org/stable/c/1cafc540b7bf1b6a5a77dc000205fe337ef6eba6
https://git.kernel.org/stable/c/95deeb29d831e2fae608439e243e7a520611e7ea
https://git.kernel.org/stable/c/9cca0c2d70149160407bda9a9446ce0c29b6e6c6
https://git.kernel.org/stable/c/b1ad283755095a4b9d1431aeb357d7df1a33d3bb
https://git.kernel.org/stable/c/d11d79e52ba080ee567cb7d7eb42a5ade60a8130
https://git.kernel.org/stable/c/db2bc3cfd2bc01621014d4f17cdfc74611f339c8
jsc#CAR-3535
rh#2282582
CVE-2021-47237kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47237
SMASH Issue 406864
bnc#1224830
https://git.kernel.org/stable/c/290b0b6432e2599021db0b8d6046f756d931c29f
https://git.kernel.org/stable/c/3942d0f9ace1a95a74930b5b4fc0e5005c62b37b
https://git.kernel.org/stable/c/765a8a04f828db7222b36a42b1031f576bfe95c3
https://git.kernel.org/stable/c/7edcc682301492380fbdd604b4516af5ae667a13
https://git.kernel.org/stable/c/a49cbb762ef20655f5c91abdc13658b0af5e159d
https://git.kernel.org/stable/c/c16c4716a1b5ba4f83c7e00da457cba06761f119
https://git.kernel.org/stable/c/c634ba0b4159838ff45a60d3a0ace3b4118077a5
https://git.kernel.org/stable/c/f4de2b43d13b7cf3ced9310e371b90c836dbd7cd
jsc#CAR-3718
rh#2282580
CVE-2021-47238kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47238
SMASH Issue 406865
bnc#1224847
https://git.kernel.org/stable/c/0dc13e75507faa17ac9f7562b4ef7bf8fcd78422
https://git.kernel.org/stable/c/1e28018b5c83d5073f74a6fb72eabe8370b2f501
https://git.kernel.org/stable/c/3dd2aeac2e9624cff9fa634710837e4f2e352758
https://git.kernel.org/stable/c/6cff57eea3347f79f1867cc53e1093b6614138d8
https://git.kernel.org/stable/c/77de6ee73f54a9a89c0afa0bf4c53b239aa9953a
https://git.kernel.org/stable/c/ac31cc837cafb57a271babad8ccffbf733caa076
https://git.kernel.org/stable/c/d8e2973029b8b2ce477b564824431f3385c77083
jsc#CAR-3534
rh#2282579
CVE-2021-47243kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47243
SMASH Issue 406871
bnc#1224845
https://git.kernel.org/stable/c/3371392c60e2685af30bd4547badd880f5df2b3f
https://git.kernel.org/stable/c/3b491dd593d582ceeb27aa617600712a6bd14246
https://git.kernel.org/stable/c/4cefa061fc63f4d2dff5ab4083f43857cd7a2335
https://git.kernel.org/stable/c/595897ef118d6fe66690c4fc5b572028c9da95b7
https://git.kernel.org/stable/c/ba91c49dedbde758ba0b72f57ac90b06ddf8e548
jsc#CAR-3532
rh#2282570
CVE-2021-47245kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47245
SMASH Issue 406874
bnc#1224838
https://git.kernel.org/stable/c/576c1526b4d83c44ad7b673cb841f36cbc6cb6c4
https://git.kernel.org/stable/c/5fc177ab759418c9537433e63301096e733fb915
https://git.kernel.org/stable/c/674b5f0c6a4fc5d3abce877048290cea6091fcb1
https://git.kernel.org/stable/c/6defc77d48eff74075b80ad5925061b2fc010d98
https://git.kernel.org/stable/c/7d9a9a1a88a3da574e019b4de756bc73337b3b0b
https://git.kernel.org/stable/c/9cdf299ba4e153b5e56187648420de22c6216f02
https://git.kernel.org/stable/c/e1eb98cfeafdd85537e7e3cefe93ca9bfbcc3ea8
https://git.kernel.org/stable/c/f648089337cb8ed40b2bb96e244f72b9d97dc96b
jsc#CAR-3533
rh#2282568
CVE-2021-47247kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47247
SMASH Issue 406876
bnc#1224865
https://git.kernel.org/stable/c/b6447b72aca571632e71bb73a797118d5ce46a93
https://git.kernel.org/stable/c/fb1a3132ee1ac968316e45d21a48703a6db0b6c3
jsc#CAR-3538
rh#2282566
CVE-2021-47248kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47248
SMASH Issue 406877
bnc#1224867
https://git.kernel.org/stable/c/2f73448041bd0682d4b552cfd314ace66107f1ad
https://git.kernel.org/stable/c/5a88477c1c85e4baa51e91f2d40f2166235daa56
https://git.kernel.org/stable/c/65310b0aff86980a011c7c7bfa487a333d4ca241
https://git.kernel.org/stable/c/8729ec8a2238152a4afc212a331a6cd2c61aeeac
https://git.kernel.org/stable/c/a0882f68f54f7a8b6308261acee9bd4faab5a69e
https://git.kernel.org/stable/c/a8b897c7bcd47f4147d066e22cc01d1026d7640e
https://git.kernel.org/stable/c/e3c36c773aed0fef8b1d3d555b43393ec564400f
jsc#CAR-3539
rh#2282564
CVE-2021-47249kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47249
SMASH Issue 406878
bnc#1224880
https://git.kernel.org/stable/c/06b7cb0194bd1ede0dd27f3a946e7c0279fba44a
https://git.kernel.org/stable/c/1f79bc8ae81c05eb112a53f981cb2c244ee50d02
https://git.kernel.org/stable/c/2038cd15eacdf7512755c27686822e0052eb9042
https://git.kernel.org/stable/c/423c6939758fb3b9cf5abbd1e7792068a5c4ae8c
https://git.kernel.org/stable/c/49bfcbfd989a8f1f23e705759a6bb099de2cff9f
https://git.kernel.org/stable/c/5946fbf48355f5a8caeff72580c7658da5966b86
https://git.kernel.org/stable/c/8c3ec88b03e9e4ca117dcdc4204fd3edcd02084f
https://git.kernel.org/stable/c/b25b60d076164edb3025e85aabd2cf50a5215b91
jsc#CAR-3542
rh#2282563
CVE-2021-47250kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47250
SMASH Issue 406879
bnc#1224827
https://git.kernel.org/stable/c/086e92b1d68c6338535f715aad173f8cf4bfbc8c
https://git.kernel.org/stable/c/0ffb460be3abac86f884a8c548bb02724ec370f4
https://git.kernel.org/stable/c/212166510582631994be4f4b3fe15e10a03c1dd4
https://git.kernel.org/stable/c/398a24447eb60f060c8994221cb5ae6caf355fa1
https://git.kernel.org/stable/c/5340858147e3dc60913fb3dd0cbb758ec4a26e66
https://git.kernel.org/stable/c/6dcea66d3bb519b426282588f38e884e07893c1f
https://git.kernel.org/stable/c/d612c3f3fae221e7ea736d196581c2217304bbbc
https://git.kernel.org/stable/c/deeeb65c6ee404f2d1fb80b38b2730645c0f4663
jsc#CAR-3531
rh#2282562
CVE-2021-47256kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47256
SMASH Issue 406885
bnc#1224894
https://git.kernel.org/stable/c/28788dc5c70597395b6b451dae4549bbaa8e2c56
https://git.kernel.org/stable/c/566345aaabac853aa866f53a219c4b02a6beb527
https://git.kernel.org/stable/c/6d210d547adc2218ef8b5bcf23518c5f2f1fd872
https://git.kernel.org/stable/c/9e379da727a7a031be9b877cde7b9c34a0fb8306
https://git.kernel.org/stable/c/d05267fd27a5c4f54e06daefa3035995d765ca0c
https://git.kernel.org/stable/c/e8675d291ac007e1c636870db880f837a9ea112a
jsc#CAR-3543
rh#2282554
CVE-2021-47257kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47257
SMASH Issue 406886
bnc#1224896
https://git.kernel.org/stable/c/1f95741981c899c4724647291fec5faa3c777185
https://git.kernel.org/stable/c/5f728ec65485625e30f46e5b4917ff023ad29ea0
https://git.kernel.org/stable/c/9fdd04918a452980631ecc499317881c1d120b70
https://git.kernel.org/stable/c/c6998ccfefa652bac3f9b236821e392af43efa1e
https://git.kernel.org/stable/c/c7836de2cadd88bc2f20f2c5a3d4ef4c73aef627
https://git.kernel.org/stable/c/d0f47648b87b6d5f204cb7f3cbce6d36dab85a67
https://git.kernel.org/stable/c/fdd51e34f45311ab6e48d2147cbc2904731b9993
jsc#CAR-3544
rh#2282553
CVE-2021-47258kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47258
SMASH Issue 406887
bnc#1224899
https://git.kernel.org/stable/c/2dc85045ae65b9302a1d2e2ddd7ce4c030153a6a
https://git.kernel.org/stable/c/45d83db4728127944b237c0c8248987df9d478e7
https://git.kernel.org/stable/c/66a834d092930cf41d809c0e989b13cd6f9ca006
https://git.kernel.org/stable/c/79296e292d67fa7b5fb8d8c27343683e823872c8
https://git.kernel.org/stable/c/7a696ce1d5d16a33a6cd6400bbcc0339b2460e11
https://git.kernel.org/stable/c/8958181c1663e24a13434448e7d6b96b5d04900a
https://git.kernel.org/stable/c/db08ce595dd64ea9859f7d088b51cbfc8e685c66
jsc#CAR-3545
rh#2282549
CVE-2021-47261kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47261
SMASH Issue 406891
bnc#1224954
https://git.kernel.org/stable/c/1ec2dcd680c71d0d36fa25638b327a468babd5c9
https://git.kernel.org/stable/c/2ba0aa2feebda680ecfc3c552e867cf4d1b05a3a
https://git.kernel.org/stable/c/3e670c54eda238cb8a1ea93538a79ae89285c1c4
https://git.kernel.org/stable/c/91f7fdc4cc10542ca1045c06aad23365f0d067e0
https://git.kernel.org/stable/c/e3ecd9c09fcc10cf6b2bc67e2990c397c40a8c26
jsc#CAR-3568
rh#2282546
CVE-2021-47266kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47266
SMASH Issue 406896
bnc#1224958
https://git.kernel.org/stable/c/0a672f7d89db2da17ae02733ccc08458be72a6f8
https://git.kernel.org/stable/c/64f1fb6acc2ab95982fc4334f351d7576c26f313
https://git.kernel.org/stable/c/67cf4e447b5e5e9e94996cb6812ae2828e0e0e27
https://git.kernel.org/stable/c/a3e74fb9247cd530dca246699d5eb5a691884d32
jsc#CAR-3571
rh#2282539
CVE-2021-47277kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47277
SMASH Issue 406908
bnc#1224960
https://git.kernel.org/stable/c/22b87fb17a28d37331bb9c1110737627b17f6781
https://git.kernel.org/stable/c/3098b86390a6b9ea52657689f08410baf130ceff
https://git.kernel.org/stable/c/361ce3b917aff93123e9e966d8608655c967f438
https://git.kernel.org/stable/c/740621309b25bbf619b8a0ba5fd50a8e58989441
https://git.kernel.org/stable/c/7af299b97734c7e7f465b42a2139ce4d77246975
https://git.kernel.org/stable/c/bff1fbf0cf0712686f1df59a83fba6e31d2746a0
https://git.kernel.org/stable/c/da27a83fd6cc7780fea190e1f5c19e87019da65c
https://git.kernel.org/stable/c/ed0e2a893092c7fcb4ff7ba74e5efce53a6f5940
jsc#CAR-3594
rh#2282520
CVE-2021-47281kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47281
SMASH Issue 406913
bnc#1224983
https://git.kernel.org/stable/c/536a7646c00a0f14fee49e5e313109e5da2f6031
https://git.kernel.org/stable/c/83e197a8414c0ba545e7e3916ce05f836f349273
https://git.kernel.org/stable/c/bd7d88b0874f82f7b29d1a53e574cedaf23166ba
jsc#CAR-3614
rh#2282516
CVE-2021-47283kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47283
SMASH Issue 406915
bnc#1224980
https://git.kernel.org/stable/c/81c4d1d83f88e15b26f4522a35cba6ffd8c5dfdd
https://git.kernel.org/stable/c/8d717c9135a3340ae62d1699484850bfb4112b0c
https://git.kernel.org/stable/c/8f03eeb6e0a0a0b8d617ee0a4bce729e47130036
jsc#CAR-3616
rh#2282514
CVE-2021-47291kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47291
SMASH Issue 406924
bnc#1224918
https://git.kernel.org/stable/c/115784bcccf135c3a3548098153413d76f16aae0
https://git.kernel.org/stable/c/830251361425c5be044db4d826aaf304ea3d14c6
https://git.kernel.org/stable/c/8fb4792f091e608a0a1d353dfdf07ef55a719db5
https://git.kernel.org/stable/c/ce8fafb68051fba52546f8bbe8621f7641683680
jsc#CAR-3553
rh#2282506
CVE-2021-47293kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47293
SMASH Issue 406926
bnc#1224978
https://git.kernel.org/stable/c/071729150be9e1d1b851b70efb6d91ee9269d57b
https://git.kernel.org/stable/c/34f1e1f657fae2891b485a3b2b95fe4d2aef9f0d
https://git.kernel.org/stable/c/727d6a8b7ef3d25080fad228b2c4a1d4da5999c6
https://git.kernel.org/stable/c/a88414fb1117f2fe65fb88e45ba694e1d09d5024
https://git.kernel.org/stable/c/e4fdca366806f6bab374d1a95e626a10a3854b0c
jsc#CAR-3605
rh#2282504
CVE-2021-47294kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47294
SMASH Issue 406927
bnc#1224977
https://git.kernel.org/stable/c/25df44e90ff5959b5c24ad361b648504a7e39ef3
https://git.kernel.org/stable/c/48866fd5c361ea417ed24b43fc2a7dc2f5b060ef
https://git.kernel.org/stable/c/517a16b1a88bdb6b530f48d5d153478b2552d9a8
https://git.kernel.org/stable/c/6811744bd0efb9e472cb15d066cdb460beb8cb8a
https://git.kernel.org/stable/c/853262355518cd1247515b74e83fabf038aa6c29
https://git.kernel.org/stable/c/9619cc7d97c3aa8ed3cfd2b8678b74fb6d6c7950
https://git.kernel.org/stable/c/a01634bf91f2b6c42583770eb6815fb6d1e251cf
https://git.kernel.org/stable/c/bc1660206c3723c37ed4d622ad81781f1e987250
jsc#CAR-3612
rh#2282502
CVE-2021-47295kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47295
SMASH Issue 406929
bnc#1224975
https://git.kernel.org/stable/c/8d7924ce85bae64e7a67c366c7c50840f49f3a62
https://git.kernel.org/stable/c/8e9662fde6d63c78eb1350f6167f64c9d71a865b
https://git.kernel.org/stable/c/cac71d27745f92ee13f0ecc668ffe151a4a9c9b1
https://git.kernel.org/stable/c/f5051bcece50140abd1a11a2d36dc3ec5484fc32
jsc#CAR-3611
rh#2282492
CVE-2021-47297kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47297
SMASH Issue 406931
bnc#1224976
https://git.kernel.org/stable/c/1582a02fecffcee306663035a295e28e1c4aaaff
https://git.kernel.org/stable/c/452c3ed7bf63721b07bc2238ed1261bb26027e85
https://git.kernel.org/stable/c/5c6d8e2f7187b8e45a18c27acb7a3885f03ee3db
https://git.kernel.org/stable/c/9413c0abb57f70a953b1116318d6aa478013c35d
https://git.kernel.org/stable/c/991e634360f2622a683b48dfe44fe6d9cb765a09
https://git.kernel.org/stable/c/d4c7797ab1517515f0d08b3bc1c6b48883889c54
https://git.kernel.org/stable/c/d9d646acad2c3590e189bb5d5c86ab8bd8a2dfc3
https://git.kernel.org/stable/c/ffe31dd70b70a40cd6b21b78c1713a23e021843a
jsc#CAR-3610
rh#2282487
CVE-2021-47306kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47306
SMASH Issue 406940
bnc#1224969
https://git.kernel.org/stable/c/04b06716838bfc26742dbed3ae1d3697fe5317ee
https://git.kernel.org/stable/c/bdfbb51f7a437ae8ea91317a5c133ec13adf3c47
https://git.kernel.org/stable/c/deb7178eb940e2c5caca1b1db084a69b2e59b4c9
https://git.kernel.org/stable/c/f33605908a9b6063525e9f68e62d739948c5fccf
jsc#CAR-3608
CVE-2021-47309kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47309
SMASH Issue 406944
bnc#1224967
https://git.kernel.org/stable/c/2179d96ec702cc33ead02a9ce40ece599b8538c5
https://git.kernel.org/stable/c/67a9c94317402b826fc3db32afc8f39336803d97
https://git.kernel.org/stable/c/83bdcfbd968bcc91a0632b7b625e4a9b0cba5e0d
https://git.kernel.org/stable/c/8aa13a86964cdec4fd969ef677c6614ff068641a
https://git.kernel.org/stable/c/8bb1589c89e61e3b182dd546f1021928ebb5c2a6
https://git.kernel.org/stable/c/a915379594f1e045421635c6316d8f3ffa018c58
https://git.kernel.org/stable/c/b61d327cd3cc5ea591f3bf751dd11e034f388bb5
https://git.kernel.org/stable/c/e7f3c9df40515a6c6b46f36c4c94cf48a043f887
jsc#CAR-3607
CVE-2021-47310kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47310
SMASH Issue 406945
bnc#1224959
https://git.kernel.org/stable/c/0336f8ffece62f882ab3012820965a786a983f70
https://git.kernel.org/stable/c/0538b0ab7d2c396e385694228c7cdcd2d2c514e9
https://git.kernel.org/stable/c/93efab0ef2a607fff9166d447c4035f98b5db342
https://git.kernel.org/stable/c/a0a817b2d308fac090a05cbbe80988e073ac5193
https://git.kernel.org/stable/c/a18a8d9cfbb112ad72e625372849adc3986fd6bf
https://git.kernel.org/stable/c/b7e5563f2a7862a9e4796abb9908b092f677e3c1
https://git.kernel.org/stable/c/c263ae8c7e4c482387de5e6c89e213f8173fe8b6
https://git.kernel.org/stable/c/f2a062fcfe1d6f1b0a86fa76ae21c277d65f4405
jsc#CAR-3606
rh#2282472
CVE-2021-47311kernel-source-rt:Affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47311
SMASH Issue 406946
bnc#1225010
https://git.kernel.org/stable/c/11e9d163d631198bb3eb41a677a61b499516c0f7
https://git.kernel.org/stable/c/2b70ca92847c619d6264c7372ef74fcbfd1e048c
https://git.kernel.org/stable/c/4d04a42b926e682140776e54188f4a44f1f01a81
https://git.kernel.org/stable/c/8a225a6e07a57a1538d53637cb3d82bd3e477839
https://git.kernel.org/stable/c/ad297cd2db8953e2202970e9504cab247b6c7cb4
https://git.kernel.org/stable/c/b1e091331920f8fbfc747dcbd16263fcd71abb2d
https://git.kernel.org/stable/c/b560521eca03d0a2db6093a5a632cbdd0a0cf833
jsc#CAR-3578
rh#2282471
CVE-2021-47325kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47325
SMASH Issue 406961
bnc#1225043
https://git.kernel.org/stable/c/0f0c5ea09139777d90729d408b807021f2ea6492
https://git.kernel.org/stable/c/43d1aaa1965f9b58035196dac49b1e1e6c9c25eb
https://git.kernel.org/stable/c/5f9741a9a91f25c89e04b408cd61e3ab050ce24b
https://git.kernel.org/stable/c/7c8f176d6a3fa18aa0f8875da6f7c672ed2a8554
https://git.kernel.org/stable/c/b11220803ad14a2a880cc06d8e01fe2548cc85b0
jsc#CAR-3583
rh#2282436
CVE-2021-47327kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47327
SMASH Issue 406963
bnc#1225046
https://git.kernel.org/stable/c/1adf30f198c26539a62d761e45af72cde570413d
https://git.kernel.org/stable/c/3761ae0d0e549f2acdaf11f49df4ed06d256b20f
https://git.kernel.org/stable/c/c4007596fbdabc29f858dc2e1990858a146b60b2
https://git.kernel.org/stable/c/fbf4daa6f4105e01fbd3868006f65c163365c1e3
https://git.kernel.org/stable/c/fe92c058199067ae90cf2a901ddf3c271893557a
jsc#CAR-3584
rh#2282434
CVE-2021-47328kernel-source-rt:Affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47328
SMASH Issue 406964
bnc#1225047
bnc#1225080
https://git.kernel.org/stable/c/89812e7957ab0746eab66ed6fc49d52bb4dca250
https://git.kernel.org/stable/c/bf20d85a88384574fabb3d53ad62a8af57e7ab11
https://git.kernel.org/stable/c/d04958a348e560938410e04a12fb99da9c7e6a00
https://git.kernel.org/stable/c/ec29d0ac29be366450a7faffbcf8cba3a6a3b506
https://git.kernel.org/stable/c/f0a031f7c55ffd944fead1ddaf2aa94df9a158c1
https://git.kernel.org/stable/c/fa9542b35ceb4202e8f8d65f440529a63524dca9
jsc#CAR-3588
rh#2282433
CVE-2021-47343kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2021-47343
SMASH Issue 406980
bnc#1225155
https://git.kernel.org/stable/c/4c84b3e0728ffe10d89c633694c35a02b5c477dc
https://git.kernel.org/stable/c/73f27adaa73e3057a9ec464e33c4f54d34ea5de3
https://git.kernel.org/stable/c/89bf942314b78d454db92427201421b5dec132d9
https://git.kernel.org/stable/c/8fbae4a1bdb5b889490cdee929e68540151536e5
https://git.kernel.org/stable/c/964d57d1962d7e68f0f578f05d9ae4a104d74851
https://git.kernel.org/stable/c/ad365e9351ac2b450e7e79932ff6abf59342d91a
https://git.kernel.org/stable/c/b6e58b5466b2959f83034bead2e2e1395cca8aeb
https://git.kernel.org/stable/c/ba47e65a5de3e0e8270301a409fc63d3129fdb9e
https://git.kernel.org/stable/c/c154775619186781aaf8a99333ac07437a1768d5
jsc#CAR-3615
rh#2282413
CVE-2021-47357kernel-source-rt:Affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47357
SMASH Issue 406996
bnc#1225144
https://git.kernel.org/stable/c/1c72e6ab66b9598cac741ed397438a52065a8f1f
https://git.kernel.org/stable/c/89ce0b0747f319eb70f85bc820dcc43cebbd5417
https://git.kernel.org/stable/c/9e161687855175334ca93c6c3ccb221731194479
https://git.kernel.org/stable/c/a832ee2f2145f57443b2d565f8cb5490e8339f42
https://git.kernel.org/stable/c/b58d246a058ae88484758cd4ab27b3180fd5ecf8
https://git.kernel.org/stable/c/bcdd2be48edd8c6867fb44112cb8d18086beae29
https://git.kernel.org/stable/c/c9172498d4d62c9b64e5fb37c1ee0343e65fe51b
https://git.kernel.org/stable/c/d1fb12412874c94ad037e11d0ecdd1140a439297
https://git.kernel.org/stable/c/e759ff76ebbbfcdcf83b6634c54dc47828573d8b
jsc#CAR-3602
rh#2282393
CVE-2021-47361kernel-source-rt:Affectedmoderate5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2021-47361
SMASH Issue 407000
bnc#1225151
https://git.kernel.org/stable/c/115b07d9f47e3996430b8f2007edd9768e1f807f
https://git.kernel.org/stable/c/25a1433216489de4abc889910f744e952cb6dbae
https://git.kernel.org/stable/c/66f74ba9be9daf9c47fface6af3677f602774f6b
https://git.kernel.org/stable/c/7751f609eadf36b1f53712bae430019c53a16eb0
https://git.kernel.org/stable/c/8a558261fa57a6deefb0925ab1829f698b194aea
https://git.kernel.org/stable/c/91e4ad05bf18322b5921d1a6c9b603f6eb1694f0
https://git.kernel.org/stable/c/9fc198f415dee070a1de957bb5bf5921d8df3499
jsc#CAR-3604
rh#2282388
CVE-2021-47368kernel-source-rt:Affectedmoderate5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2021-47368
SMASH Issue 407006
bnc#1225161
https://git.kernel.org/stable/c/4c4c3052911b577920353a7646e4883d5da40c28
https://git.kernel.org/stable/c/6c3f1b741c6c2914ea120e3a5790d3e900152f7b
https://git.kernel.org/stable/c/6f329d9da2a5ae032fcde800a99b118124ed5270
https://git.kernel.org/stable/c/7237a494decfa17d0b9d0076e6cee3235719de90
jsc#CAR-3619
rh#2282378
CVE-2021-47372kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47372
SMASH Issue 407011
bnc#1225184
https://git.kernel.org/stable/c/1da750d1e2140ef43d64d17f301ff6f41b45541e
https://git.kernel.org/stable/c/46670fb832ee80943715df618632ca13c2e96f2b
https://git.kernel.org/stable/c/4ad6f2d23b0f6ac0d3e5f3102a4256d1c86c90f5
https://git.kernel.org/stable/c/7721221e87d25c9840d9ca6b986dbdc410d5ce2b
https://git.kernel.org/stable/c/a7d521cc726f30b8e679a6f36d04b18a8ab3c536
https://git.kernel.org/stable/c/d82d5303c4c539db86588ffb5dc5b26c3f1513e8
jsc#CAR-3626
rh#2282374
CVE-2021-47376kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47376
SMASH Issue 407015
bnc#1225195
https://git.kernel.org/stable/c/0e6491b559704da720f6da09dd0a52c4df44c514
https://git.kernel.org/stable/c/6345a0bee80139ea00a341c4202ebfd1534b5eb0
https://git.kernel.org/stable/c/93937596e0652d50973f9dc944fea1694ac8cdfd
https://git.kernel.org/stable/c/b5fe7cdfee5901ce5513c30e554d51536e003bde
jsc#CAR-3629
rh#2282368
CVE-2021-47378kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47378
SMASH Issue 407017
bnc#1225201
bnc#1225202
https://git.kernel.org/stable/c/9817d763dbe15327b9b3ff4404fa6f27f927e744
https://git.kernel.org/stable/c/d268a182c56e8361e19fb781137411643312b994
https://git.kernel.org/stable/c/ecf0dc5a904830c926a64feffd8e01141f89822f
jsc#CAR-3631
rh#2282362
CVE-2021-47379kernel-source-rt:Affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47379
SMASH Issue 407018
bnc#1225203
bnc#1225204
https://git.kernel.org/stable/c/7c2c69e010431b0157c9454adcdd2305809bf9fb
https://git.kernel.org/stable/c/858560b27645e7e97aca37ee8f232cccd658fbd2
https://git.kernel.org/stable/c/d12ddd843f1877de1f7dd2aeea4907cf9ff3ac08
https://git.kernel.org/stable/c/f58d305887ad7b24986d58e881f6806bb81b2bdf
jsc#CAR-3632
rh#2282361
CVE-2021-47383kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47383
SMASH Issue 407022
bnc#1225208
bnc#1225211
https://git.kernel.org/stable/c/067c694d06040db6f0c65281bb358452ca6d85b9
https://git.kernel.org/stable/c/3b0c406124719b625b1aba431659f5cdc24a982c
https://git.kernel.org/stable/c/699d926585daa6ec44be556cdc1ab89e5d54557b
https://git.kernel.org/stable/c/70aed03b1d5a5df974f456cdc8eedb213c94bb8b
https://git.kernel.org/stable/c/7e71fcedfda6f7de18f850a6b36e78d78b04476f
https://git.kernel.org/stable/c/883f7897a25e3ce14a7f274ca4c73f49ac84002a
https://git.kernel.org/stable/c/8a6a240f52e14356386030d8958ae8b1761d2325
https://git.kernel.org/stable/c/d570c48dd37dbe8fc6875d4461d01a9554ae2560
jsc#CAR-3633
rh#2282357
CVE-2021-47387kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47387
SMASH Issue 407027
bnc#1225316
https://git.kernel.org/stable/c/30d57cf2c4116ca6d34ecd1cac94ad84f8bc446c
https://git.kernel.org/stable/c/463c46705f321201090b69c4ad5da0cd2ce614c9
https://git.kernel.org/stable/c/67c98e023135ff81b8d52998a6fdb8ca0c518d82
https://git.kernel.org/stable/c/8d62aec52a8c5b1d25a2364b243fcc5098a2ede9
https://git.kernel.org/stable/c/a7d4fc84404d45d72f4490417e8cc3efa4af93f1
https://git.kernel.org/stable/c/cb4a53ba37532c861a5f3f22803391018a41849a
https://git.kernel.org/stable/c/e5c6b312ce3cc97e90ea159446e6bfa06645364d
jsc#CAR-3653
rh#2282353
CVE-2021-47397kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47397
SMASH Issue 407038
bnc#1225082
https://git.kernel.org/stable/c/77bc7dcf0fcc1519341a91788d7a2914fcfddf6d
https://git.kernel.org/stable/c/8180611c238e11676612eb2a9828b1c7a3a4d77b
https://git.kernel.org/stable/c/8c630a7b4f9dec63f08bd881ab77984a724a5124
https://git.kernel.org/stable/c/9c6591ae8e63f93c895ad5e2703c36c548aac997
https://git.kernel.org/stable/c/ec018021cf445abbe8e2f3e2a7f1dcc813cb8ea1
https://git.kernel.org/stable/c/f7e745f8e94492a8ac0b0a26e25f2b19d342918f
jsc#CAR-3589
rh#2282340
CVE-2021-47400kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47400
SMASH Issue 407041
bnc#1225329
https://git.kernel.org/stable/c/3dac38bdce7932901b9f0b71c62331852c809e61
https://git.kernel.org/stable/c/5a31d4e73ada8022427b69b10fd1f01a6a8d4b3d
https://git.kernel.org/stable/c/5b09e88e1bf7fe86540fab4b5f3eece8abead39e
https://git.kernel.org/stable/c/f8ba689cb69523144d10606096ef686002dd7285
jsc#CAR-3655
rh#2282336
CVE-2021-47401kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47401
SMASH Issue 407043
bnc#1225242
https://git.kernel.org/stable/c/0a9c36a2e06a249acbed64e8e0b84637c2ad7575
https://git.kernel.org/stable/c/2725925982dc96a78069cd118ea3d66759bfdad7
https://git.kernel.org/stable/c/5f6a309a699675680df15d9b6d389114515b4426
https://git.kernel.org/stable/c/741ea2670e021350e54f491106bdaa22dc50e6a0
https://git.kernel.org/stable/c/829f13d6079cf7a2465522f39acb43033e9b320d
https://git.kernel.org/stable/c/8657158a3b68c85234e6da3d8eae33d6183588b7
https://git.kernel.org/stable/c/a89936cce87d60766a75732a9e7e25c51164f47c
https://git.kernel.org/stable/c/acb96e782bad427ca4bb1bd94af660acd1462380
jsc#CAR-3666
rh#2282335
CVE-2021-47402kernel-source-rt:Affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47402
SMASH Issue 407044
bnc#1225301
bnc#1225302
https://git.kernel.org/stable/c/694b0cee7f8546b69a80996a29cb3cf4149c0453
https://git.kernel.org/stable/c/d0d520c19e7ea19ed38dc5797b12397b6ccf9f88
https://git.kernel.org/stable/c/d5ef190693a7d76c5c192d108e8dec48307b46ee
https://git.kernel.org/stable/c/dab4677bdbffa5c8270e79e34e51c89efa0728a0
jsc#CAR-3649
rh#2282334
CVE-2021-47403kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47403
SMASH Issue 407045
bnc#1225241
https://git.kernel.org/stable/c/31398849b84ebae0d43a1cf379cb9895597f221a
https://git.kernel.org/stable/c/3253c87e1e5bc0107aab773af2f135ebccf38666
https://git.kernel.org/stable/c/7cea848678470daadbfdaa6a112b823c290f900c
https://git.kernel.org/stable/c/811178f296b16af30264def74c8d2179a72d5562
https://git.kernel.org/stable/c/9c5b77a7ffc983b2429ce158b50497c5d3c86a69
https://git.kernel.org/stable/c/bb8a4fcb2136508224c596a7e665bdba1d7c3c27
https://git.kernel.org/stable/c/c0adb5a947dec6cff7050ec56d78ecd3916f9ce6
https://git.kernel.org/stable/c/dde4c1429b97383689f755ce92b4ed1e84a9c92b
jsc#CAR-3667
rh#2282333
CVE-2021-47407kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47407
SMASH Issue 407049
bnc#1225306
https://git.kernel.org/stable/c/4664318f73e496cd22c71b10888e75434a123e23
https://git.kernel.org/stable/c/deb2949417677649e2413266d7ce8c2ff73952b4
https://git.kernel.org/stable/c/eb7511bf9182292ef1df1082d23039e856d1ddfb
jsc#CAR-3651
rh#2282329
CVE-2021-47408kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47408
SMASH Issue 407050
bnc#1225236
https://git.kernel.org/stable/c/7ea6f5848281182ce0cff6cafdcf3fbdeb8ca7e1
https://git.kernel.org/stable/c/e2d192301a0df8160d1555b66ae8611e8050e424
https://git.kernel.org/stable/c/e9edc188fc76499b0b9bd60364084037f6d03773
jsc#CAR-3668
jsc#CAR-3669
rh#2282328
CVE-2021-47409kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47409
SMASH Issue 407051
bnc#1225330
https://git.kernel.org/stable/c/2754fa3b73df7d0ae042f3ed6cfd9df9042f6262
https://git.kernel.org/stable/c/337f00a0bc62d7cb7d10ec0b872c79009a1641df
https://git.kernel.org/stable/c/4b7f4a0eb92bf37bea4cd838c7f83ea42823ca8b
https://git.kernel.org/stable/c/856e6e8e0f9300befa87dde09edb578555c99a82
https://git.kernel.org/stable/c/8b9c1c33e51d0959f2aec573dfbac0ffd3f5c0b7
https://git.kernel.org/stable/c/a7182993dd8e09f96839ddc3ac54f9b37370d282
jsc#CAR-3656
rh#2282327
CVE-2021-47412kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47412
SMASH Issue 407055
bnc#1225332
https://git.kernel.org/stable/c/004b8f8a691205a93d9e80d98b786b2b97424d6e
https://git.kernel.org/stable/c/a647a524a46736786c95cdb553a070322ca096e3
jsc#CAR-3657
rh#2282324
CVE-2021-47418kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47418
SMASH Issue 407060
bnc#1225337
https://git.kernel.org/stable/c/08d7056e8e250fd2e67dbea5be5fdecdd75bf6b4
https://git.kernel.org/stable/c/0dd7ddc462b9c2d31eb5a9926a2cc63eaa3e9f52
https://git.kernel.org/stable/c/26af64d71b6277841285fa40e3f7164a378dfda9
https://git.kernel.org/stable/c/560ee196fe9e5037e5015e2cdb14b3aecb1cd7dc
https://git.kernel.org/stable/c/acff2d182c0768a713cee77442caeb07668bd68f
https://git.kernel.org/stable/c/c951a3be5e8803e93bb49a0aca0d30457d3c1b67
https://git.kernel.org/stable/c/d07098f45be868a9cdce6c616563c36c64dbbd87
https://git.kernel.org/stable/c/fb58cd7991747b5e0b110c98c922d7b0e47a1f14
jsc#CAR-3659
rh#2282316
CVE-2021-47428kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47428
SMASH Issue 407070
bnc#1225387
https://git.kernel.org/stable/c/3e607dc4df180b72a38e75030cb0f94d12808712
https://git.kernel.org/stable/c/411b38fe68ba20a8bbe724b0939762c3f16e16ca
https://git.kernel.org/stable/c/c835b3d1d6362b4a4ebb192da7e7fd27a0a45d01
jsc#CAR-3677
rh#2282304
CVE-2021-47432kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47432
SMASH Issue 407174
bnc#1225391
https://git.kernel.org/stable/c/784d01f9bbc282abb0c5ade5beb98a87f50343ac
https://git.kernel.org/stable/c/9492261ff2460252cf2d8de89cdf854c7e2b28a0
https://git.kernel.org/stable/c/aa7f1827953100cdde0795289a80c6c077bfe437
https://git.kernel.org/stable/c/ec298b958cb0c40d70c68079da933c8f31c5134c
jsc#CAR-3680
rh#2282366
CVE-2021-47433kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2021-47433
SMASH Issue 407287
bnc#1225392
https://git.kernel.org/stable/c/0e309e1152fc34ef75991d9d69b165dbf75bf26c
https://git.kernel.org/stable/c/0e32a2b85c7d92ece86c17dfef390c5ed79c6378
https://git.kernel.org/stable/c/4afb912f439c4bc4e6a4f3e7547f2e69e354108f
jsc#CAR-3681
jsc#CAR-3682
rh#2282881
CVE-2021-47435kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47435
SMASH Issue 407289
bnc#1225247
https://git.kernel.org/stable/c/6e506f07c5b561d673dd0b0d8f7f420cc48024fb
https://git.kernel.org/stable/c/9e07272cca2ed76f7f6073f4444b1143828c8d87
https://git.kernel.org/stable/c/9fb7cd5c7fef0f1c982e3cd27745a0dec260eaed
https://git.kernel.org/stable/c/ad1393b92e5059218d055bfec8f4946d85ad04c4
https://git.kernel.org/stable/c/d208b89401e073de986dc891037c5a668f5d5d95
https://git.kernel.org/stable/c/d29c78d3f9c5d2604548c1065bf1ec212728ea61
https://git.kernel.org/stable/c/d35aef9c60d310eff3eaddacce301efe877e2b7c
jsc#CAR-3665
rh#2282879
CVE-2021-47438kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47438
SMASH Issue 407292
bnc#1225229
https://git.kernel.org/stable/c/4f7bddf8c5c01cac74373443b13a68e1c6723a94
https://git.kernel.org/stable/c/94b960b9deffc02fc0747afc01f72cc62ab099e3
https://git.kernel.org/stable/c/ed8aafea4fec9c654e63445236e0b505e27ed3a7
jsc#CAR-3650
rh#2282875
CVE-2021-47440kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47440
SMASH Issue 407294
bnc#1225248
https://git.kernel.org/stable/c/322c0e53496309e634d9db7349678eaad1d25b55
https://git.kernel.org/stable/c/4c2eb80fc90b05559ce6ed1b8dfb2348420b5644
https://git.kernel.org/stable/c/5e5494e6fc8a29c927e0478bec4a078a40da8901
https://git.kernel.org/stable/c/66358471fa75a713fd76bc8a4bd74cb14cd50a4f
https://git.kernel.org/stable/c/e19c10d6e07c59c96e90fe053a72683ad8b0397e
https://git.kernel.org/stable/c/f03dca0c9e2297c84a018e306f8a9cd534ee4287
https://git.kernel.org/stable/c/f043fac1133a6c5ef960a8422c0f6dd711dee462
https://git.kernel.org/stable/c/fddc7f678d7fb93caa0d7bc512f968ff1e2bddbc
jsc#CAR-3664
rh#2282871
CVE-2021-47455kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47455
SMASH Issue 407309
bnc#1225254
https://git.kernel.org/stable/c/4225fea1cb28370086e17e82c0f69bec2779dca0
https://git.kernel.org/stable/c/95c0a0c5ec8839f8f21672be786e87a100319ca8
jsc#CAR-3662
rh#2282903
CVE-2021-47458kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47458
SMASH Issue 407312
bnc#1225252
https://git.kernel.org/stable/c/0e677ea5b7396f715a76b6b0ef441430e4c4b57f
https://git.kernel.org/stable/c/232ed9752510de4436468b653d145565669c8498
https://git.kernel.org/stable/c/4b74ddcc22ee6455946e80a9c4808801f8f8561e
https://git.kernel.org/stable/c/7623b1035ca2d17bde0f6a086ad6844a34648df1
https://git.kernel.org/stable/c/93be0eeea14cf39235e585c8f56df3b3859deaad
https://git.kernel.org/stable/c/ac011cb3ff7a76b3e0e6e77158ee4ba2f929e1fb
https://git.kernel.org/stable/c/b15fa9224e6e1239414525d8d556d824701849fc
https://git.kernel.org/stable/c/d3a83576378b4c904f711598dde2c5e881c4295c
jsc#CAR-3663
rh#2282900
CVE-2021-47478kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2021-47478
SMASH Issue 407356
bnc#1225198
https://git.kernel.org/stable/c/156ce5bb6cc43a80a743810199defb1dc3f55b7f
https://git.kernel.org/stable/c/6e80e9314f8bb52d9eabe1907698718ff01120f5
https://git.kernel.org/stable/c/86d4aedcbc69c0f84551fb70f953c24e396de2d7
https://git.kernel.org/stable/c/9ec33a9b8790c212cc926a88c5e2105f97f3f57e
https://git.kernel.org/stable/c/afbd40f425227e661d991757e11cc4db024e761f
https://git.kernel.org/stable/c/b0ddff8d68f2e43857a84dce54c3deab181c8ae1
https://git.kernel.org/stable/c/b2fa1f52d22c5455217b294629346ad23a744945
https://git.kernel.org/stable/c/e7fb722586a2936b37bdff096c095c30ca06404d
https://git.kernel.org/stable/c/e96a1866b40570b5950cda8602c2819189c62a48
jsc#CAR-3628
rh#2282945
CVE-2021-47480kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47480
SMASH Issue 407358
bnc#1225322
https://git.kernel.org/stable/c/1105573d964f7b78734348466b01f5f6ba8a1813
https://git.kernel.org/stable/c/1ce287eff9f23181d5644db787f472463a61f68b
https://git.kernel.org/stable/c/61a0faa89f21861d1f8d059123b5c285a5d9ffee
https://git.kernel.org/stable/c/7b57c38d12aed1b5d92f74748bed25e0d041729f
https://git.kernel.org/stable/c/8e4814a461787e15a31d322d9efbe0d4f6822428
https://git.kernel.org/stable/c/c2df161f69fb1c67f63adbd193368b47f511edc0
https://git.kernel.org/stable/c/f2b85040acec9a928b4eb1b57a989324e8e38d3f
https://git.kernel.org/stable/c/f30822c0b4c35ec86187ab055263943dc71a6836
jsc#CAR-3654
rh#2282943
CVE-2021-47485kernel-source-rt:Affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47485
SMASH Issue 407363
bnc#1224904
https://git.kernel.org/stable/c/0d4395477741608d123dad51def9fe50b7ebe952
https://git.kernel.org/stable/c/0f8cdfff06829a0b0348b6debc29ff6a61967724
https://git.kernel.org/stable/c/3f57c3f67fd93b4da86aeffea1ca32c484d054ad
https://git.kernel.org/stable/c/60833707b968d5ae02a75edb7886dcd4a957cf0d
https://git.kernel.org/stable/c/73d2892148aa4397a885b4f4afcfc5b27a325c42
https://git.kernel.org/stable/c/bda41654b6e0c125a624ca35d6d20beb8015b5d0
https://git.kernel.org/stable/c/c3e17e58f571f34c51aeb17274ed02c2ed5cf780
https://git.kernel.org/stable/c/d39bf40e55e666b5905fdbd46a0dced030ce87be
jsc#CAR-3546
rh#2282937
CVE-2021-47490kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47490
SMASH Issue 407368
bnc#1225436
https://git.kernel.org/stable/c/0db55f9a1bafbe3dac750ea669de9134922389b5
https://git.kernel.org/stable/c/132a3d998d6753047f22152731fba2b0d6b463dd
https://git.kernel.org/stable/c/960b1fdfc39aba8f41e9e27b2de0c925c74182d9
https://git.kernel.org/stable/c/bbc920fb320f1c241cc34ac85edaa0058922246a
https://git.kernel.org/stable/c/bd99782f3ca491879e8524c89b1c0f40071903bd
https://git.kernel.org/stable/c/c21b4002214c1c7e7b627b9b53375612f7aab6db
jsc#CAR-3689
rh#2282926
CVE-2021-47496kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47496
SMASH Issue 407374
bnc#1225354
https://git.kernel.org/stable/c/da353fac65fede6b8b4cfe207f0d9408e3121105
https://git.kernel.org/stable/c/e0cfd5159f314d6b304d030363650b06a2299cbb
https://git.kernel.org/stable/c/e41473543f75f7dbc5d605007e6f883f1bd13b9a
https://git.kernel.org/stable/c/f3dec7e7ace38224f82cf83f0049159d067c2e19
jsc#CAR-3671
rh#2282919
CVE-2021-47497kernel-source-rt:Affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47497
SMASH Issue 407375
bnc#1225355
https://git.kernel.org/stable/c/0594f1d048d8dc338eb9a240021b1d00ae1eb082
https://git.kernel.org/stable/c/0e822e5413da1af28cca350cb1cb42b6133bdcae
https://git.kernel.org/stable/c/2df6c023050205c4d04ffc121bc549f65cb8d1df
https://git.kernel.org/stable/c/57e48886401b14cd351423fabfec2cfd18df4f66
https://git.kernel.org/stable/c/5d388fa01fa6eb310ac023a363a6cb216d9d8fe9
https://git.kernel.org/stable/c/60df06bbdf497e37ed25ad40572c362e5b0998df
https://git.kernel.org/stable/c/abcb8d33e4d2215ccde5ab5ccf9f730a59d79d97
https://git.kernel.org/stable/c/eb0fc8e7170e61eaf65d28dee4a8baf4e86b19ca
jsc#CAR-3672
rh#2282918
CVE-2021-47498kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47498
SMASH Issue 407376
bnc#1225357
https://git.kernel.org/stable/c/8ca9745efe3528feb06ca4e117188038eea2d351
https://git.kernel.org/stable/c/b4459b11e84092658fa195a2587aff3b9637f0e7
jsc#CAR-3673
rh#2282917
CVE-2021-47499kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2021-47499
SMASH Issue 407660
bnc#1225358
https://git.kernel.org/stable/c/14508fe13b1c578b3d2ba574f1d48b351975860c
https://git.kernel.org/stable/c/3899700ddacbf7aaafadf44464fff3ff0d4e3307
https://git.kernel.org/stable/c/60a55b9d91ba99eb8cf015bc46dc2de05e168a15
https://git.kernel.org/stable/c/70c9774e180d151abaab358108e3510a8e615215
https://git.kernel.org/stable/c/8c163a14277115ca962103910ab4cce55e862ffb
https://git.kernel.org/stable/c/8c1d43f3a3fc7184c42d7398bdf59a2a2903e4fc
https://git.kernel.org/stable/c/a3730f74159ad00a28960c0efe2a931fe6fe6b45
https://git.kernel.org/stable/c/ee86d0bad80bdcd11a87e188a596727f41b62320
jsc#CAR-3674
rh#2283455
CVE-2021-47500kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47500
SMASH Issue 407661
bnc#1225360
https://git.kernel.org/stable/c/094d513b78b1714113bc016684b8142382e071ba
https://git.kernel.org/stable/c/794c0898f6bf39a458655d5fb4af70ec43a5cfcb
https://git.kernel.org/stable/c/acf0088ac073ca6e7f4cad6acac112177e08df5e
https://git.kernel.org/stable/c/c43517071dfc9fce34f8f69dbb98a86017f6b739
https://git.kernel.org/stable/c/cd0082235783f814241a1c9483fb89e405f4f892
https://git.kernel.org/stable/c/db12d95085367de8b0223929d1332731024441f1
https://git.kernel.org/stable/c/f5deab10ced368c807866283f8b79144c4823be8
https://git.kernel.org/stable/c/fb75cc4740d81264cd5bcb0e17d961d018a8be96
jsc#CAR-3675
rh#2283454
CVE-2021-47501kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47501
SMASH Issue 407662
bnc#1225361
https://git.kernel.org/stable/c/16431e442db248ecd8aa9457cf0a656f1885f56e
https://git.kernel.org/stable/c/23ec111bf3549aae37140330c31a16abfc172421
https://git.kernel.org/stable/c/e5b7fb2198abc50058f1a29c395b004f76ab1c83
jsc#CAR-3676
rh#2283453
CVE-2021-47509kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47509
SMASH Issue 407670
bnc#1225409
https://git.kernel.org/stable/c/2e54cf6794bf82a54aaefc78da13819aea9cd28a
https://git.kernel.org/stable/c/35a3e511032146941085f87dd9fb5b82ea5c00a2
https://git.kernel.org/stable/c/76f19e4cbb548e28547f8c328aa0bfb3a10222d3
https://git.kernel.org/stable/c/8839c8c0f77ab8fc0463f4ab8b37fca3f70677c2
https://git.kernel.org/stable/c/ad45babf7886e7a212ee1d5eda9ef49f696db43c
https://git.kernel.org/stable/c/b02a41eebcc36d4f07196780f2e165ca2c499257
https://git.kernel.org/stable/c/be55f306396cd62c6889286a7194fd8b53363aeb
https://git.kernel.org/stable/c/d1bb703ad050de9095f10b2d3416c32921ac6bcc
jsc#CAR-3685
rh#2283443
CVE-2021-47511kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47511
SMASH Issue 407672
bnc#1225411
https://git.kernel.org/stable/c/00a860678098fcd9fa8db2b5fb9d2ddf4776d4cc
https://git.kernel.org/stable/c/02b2b691b77cd7b951fa7b6c9d44d4e472cdc823
https://git.kernel.org/stable/c/502e1146873d870f87da3b8f93d6bf2de5f38d0c
https://git.kernel.org/stable/c/8af815ab052eaf74addbbfb556d63ce2137c0e1b
https://git.kernel.org/stable/c/9d2479c960875ca1239bcb899f386970c13d9cfe
https://git.kernel.org/stable/c/be8869d388593e57223ad39297c8e54be632f2f2
https://git.kernel.org/stable/c/f12c8a7515f641885677960af450082569a87243
https://git.kernel.org/stable/c/f96c0959c1ee92adc911c10d6ec209af50105049
jsc#CAR-3686
rh#2283441
CVE-2021-47515kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47515
SMASH Issue 407658
bnc#1225426
https://git.kernel.org/stable/c/6431e71093f3da586a00c6d931481ffb0dc2db0e
https://git.kernel.org/stable/c/666521b3852d2b2f52d570f9122b1e4b50d96831
https://git.kernel.org/stable/c/98adb2bbfa407c9290bda299d4c6f7a1c4ebd5e1
https://git.kernel.org/stable/c/ae68d93354e5bf5191ee673982251864ea24dd5c
https://git.kernel.org/stable/c/b16d412e5f79734033df04e97d7ea2f50a8e9fe3
https://git.kernel.org/stable/c/ef8804e47c0a44ae106ead1740408af5ea6c6ee9
jsc#CAR-3687
rh#2283436
CVE-2021-47518kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47518
SMASH Issue 407679
bnc#1225372
https://git.kernel.org/stable/c/3b861a40325eac9c4c13b6c53874ad90617e944d
https://git.kernel.org/stable/c/48fcd08fdbe05e35b650a252ec2a2d96057a1c7a
https://git.kernel.org/stable/c/4cd8371a234d051f9c9557fcbb1f8c523b1c0d10
https://git.kernel.org/stable/c/69bb79a8f5bb9f436b6f1434ca9742591b7bbe18
https://git.kernel.org/stable/c/811a7576747760bcaf60502f096d1e6e91d566fa
https://git.kernel.org/stable/c/83ea620a1be840bf05089a5061fb8323ca42f38c
https://git.kernel.org/stable/c/87cdb8789c38e44ae5454aafe277997c950d00ed
https://git.kernel.org/stable/c/fae9705d281091254d4a81fa2da9d22346097dca
jsc#CAR-3719
rh#2283433
CVE-2021-47523kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47523
SMASH Issue 407684
bnc#1225438
https://git.kernel.org/stable/c/2c08271f4ed0e24633b3f81ceff61052b9d45efc
https://git.kernel.org/stable/c/60a8b5a1611b4a26de4839ab9c1fc2a9cf3e17c1
https://git.kernel.org/stable/c/834d0fb978643eaf09da425de197cc16a7c2761b
jsc#CAR-3690
rh#2283428
CVE-2021-47536kernel-source-rt:Affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2021-47536
SMASH Issue 407667
bnc#1225447
https://git.kernel.org/stable/c/77731fede297a23d26f2d169b4269466b2c82529
https://git.kernel.org/stable/c/789b6cc2a5f9123b9c549b886fdc47c865cfe0ba
https://git.kernel.org/stable/c/95518fe354d712dca6f431cf2a11b8f63bc9a66c
jsc#CAR-3691
rh#2283415
CVE-2021-47544kernel-source-rt:Affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L)CVE-2021-47544
SMASH Issue 407704
bnc#1225463
https://git.kernel.org/stable/c/5a9afcd827cafe14a95c9fcbded2c2d104f18dfc
https://git.kernel.org/stable/c/c6f340a331fb72e5ac23a083de9c780e132ca3ae
https://git.kernel.org/stable/c/dacb5d8875cc6cd3a553363b4d6f06760fcbe70c
jsc#CAR-3696
rh#2283406
CVE-2021-47546kernel-source-rt:Affectedlow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47546
SMASH Issue 407706
bnc#1225504
https://git.kernel.org/stable/c/209d35ee34e25f9668c404350a1c86d914c54ffa
https://git.kernel.org/stable/c/8ef8a76a340ebdb2c2eea3f6fb0ebbed09a16383
https://git.kernel.org/stable/c/cdef485217d30382f3bf6448c54b4401648fe3f1
https://git.kernel.org/stable/c/ee38eb8cf9a7323884c2b8e0adbbeb2192d31e29
jsc#CAR-3701
rh#2283403
CVE-2021-47548kernel-source-rt:Affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L)CVE-2021-47548
SMASH Issue 407708
bnc#1225506
https://git.kernel.org/stable/c/22519eff7df2d88adcc2568d86046ce1e2b52803
https://git.kernel.org/stable/c/948968f8747650447c8f21c9fdba0e1973be040b
https://git.kernel.org/stable/c/99bb25cb6753beaf2c2bc37927c2ecc0ceff3f6d
https://git.kernel.org/stable/c/a66998e0fbf213d47d02813b9679426129d0d114
https://git.kernel.org/stable/c/abbd5faa0748d0aa95d5191d56ff7a17a6275bd1
https://git.kernel.org/stable/c/dd07f8971b81ad98cc754b179b331b57f35aa1ff
https://git.kernel.org/stable/c/fc7ffa7f10b9454a86369405d9814bf141b30627
jsc#CAR-3702
rh#2283401
CVE-2021-47551kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47551
SMASH Issue 407652
bnc#1225510
https://git.kernel.org/stable/c/06c6f8f86ec243b89e52f0c3dc7062bcb9de74df
https://git.kernel.org/stable/c/2cf49e00d40d5132e3d067b5aa6d84791929ab15
https://git.kernel.org/stable/c/74aafe99efb68f15e50be9f7032c2168512f98a8
jsc#CAR-3703
rh#2283398
CVE-2021-47552kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47552
SMASH Issue 407711
bnc#1225513
https://git.kernel.org/stable/c/2a19b28f7929866e1cec92a3619f4de9f2d20005
https://git.kernel.org/stable/c/e03513f58919d9e2bc6df765ca2c9da863d03d90
jsc#CAR-3726
rh#2283397
CVE-2021-47559kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47559
SMASH Issue 407717
bnc#1225396
https://git.kernel.org/stable/c/587acad41f1bc48e16f42bb2aca63bf323380be8
https://git.kernel.org/stable/c/bb851d0fb02547d03cd40106b5f2391c4fed6ed1
https://git.kernel.org/stable/c/c94cbd262b6aa3b54d73a1ed1f9c0d19df57f4ff
jsc#CAR-3679
rh#2283390
CVE-2021-47566kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2021-47566
SMASH Issue 407722
bnc#1225514
https://git.kernel.org/stable/c/33a7d698f30fa0b99d50569e9909d3baa65d8f6a
https://git.kernel.org/stable/c/7b3a34f08d11e7f05cd00b8e09adaa15192f0ad1
https://git.kernel.org/stable/c/99d348b82bcb36171f24411d3f1a15706a2a937a
https://git.kernel.org/stable/c/9ef384ed300d1bcfb23d0ab0b487d544444d4b52
https://git.kernel.org/stable/c/a8a917058faf4abaec9fb614bb6d5f8fe3529ec6
https://git.kernel.org/stable/c/a9e164bd160be8cbee1df70acb379129e3cd2e7c
https://git.kernel.org/stable/c/c1e63117711977cc4295b2ce73de29dd17066c82
https://git.kernel.org/stable/c/fd7974c547abfb03072a4ee706d3a6f182266f89
jsc#CAR-3704
rh#2283463
CVE-2021-47571kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47571
SMASH Issue 407726
bnc#1225518
https://git.kernel.org/stable/c/2e1ec01af2c7139c6a600bbfaea1a018b35094b6
https://git.kernel.org/stable/c/8d0163cec7de995f9eb9c3128c83fb84f0cb1c64
https://git.kernel.org/stable/c/9186680382934b0e7529d3d70dcc0a21d087683b
https://git.kernel.org/stable/c/b535917c51acc97fb0761b1edec85f1f3d02bda4
https://git.kernel.org/stable/c/bca19bb2dc2d89ce60c4a4a6e59609d4cf2e13ef
https://git.kernel.org/stable/c/c0ef0e75a858cbd8618b473f22fbca36106dcf82
https://git.kernel.org/stable/c/d43aecb694b10db9a4228ce2d38b5ae8de374443
https://git.kernel.org/stable/c/e27ee2f607fe6a9b923ef1fc65461c0613c97594
jsc#CAR-3705
rh#2283458
CVE-2021-47572kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47572
SMASH Issue 407727
bnc#1225389
https://git.kernel.org/stable/c/1c743127cc54b112b155f434756bd4b5fa565a99
https://git.kernel.org/stable/c/39509d76a9a3d02f379d52cb4b1449469c56c0e0
https://git.kernel.org/stable/c/7b6f44856da5ba0b1aa61403eb9fddd272156503
https://git.kernel.org/stable/c/b70ff391deeec35cdd8a05f5f63f5fe28bc4f225
jsc#CAR-3678
rh#2283457
CVE-2021-47576kernel-source-rt:Affectedlow3.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L)CVE-2021-47576
SMASH Issue 411430
bnc#1226537
https://git.kernel.org/stable/c/04181973c38f3d6a353f9246dcf7fee08024fd9e
https://git.kernel.org/stable/c/90491283b4064220682e4b0687d07b05df01e3bf
https://git.kernel.org/stable/c/a9078e791426c2cbbdf28a320c3670f6e0a611e6
https://git.kernel.org/stable/c/adcecd50da6cab7b4957cba0606771dcc846c5a9
https://git.kernel.org/stable/c/b847ecff850719c46c95acd25a0d555dfd16e10d
https://git.kernel.org/stable/c/dfc3fff63793c571147930b13c0f8c689c4281ac
https://git.kernel.org/stable/c/e0a2c28da11e2c2b963fc01d50acbf03045ac732
jsc#CAR-3788
rh#2293253
CVE-2021-47587kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47587
SMASH Issue 411344
bnc#1226567
https://git.kernel.org/stable/c/595a684fa6f23b21958379a18cfa83862c73c2e1
https://git.kernel.org/stable/c/6e1011cd183faae8daff275c72444edcdfe0d473
https://git.kernel.org/stable/c/8b8e6e782456f1ce02a7ae914bbd5b1053f0b034
https://git.kernel.org/stable/c/8ed2f5d08d6e59f8c78b2869bfb95d0be32c094c
https://git.kernel.org/stable/c/c675256a7f131f5ba3f331efb715e8f31ea0e392
https://git.kernel.org/stable/c/de57f62f76450b934de8203711bdc4f7953c3421
https://git.kernel.org/stable/c/eb4687c7442942e115420a30185f8d83faf37696
https://git.kernel.org/stable/c/f3fde37d3f0d429f0fcce214cb52588a9e21260e
jsc#CAR-3820
rh#2293241
CVE-2021-47588kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47588
SMASH Issue 411349
bnc#1226568
https://git.kernel.org/stable/c/44a6c846bc3a7efe7d394bab8b2ae3b7f580e190
https://git.kernel.org/stable/c/4e1797914d8f223726ff6ae5ece4f97d73f21bab
https://git.kernel.org/stable/c/6f46c59e60b64620d5d386c8ee2eaa11ebe3b595
https://git.kernel.org/stable/c/ad0ed314d6167b212939e3839428ba0c8bb16adb
https://git.kernel.org/stable/c/e28587cc491ef0f3c51258fdc87fbc386b1d4c59
https://git.kernel.org/stable/c/e56b65c1e74d7f706d74b51baba15187be2fb4b5
jsc#CAR-3818
rh#2293240
CVE-2021-47589kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47589
SMASH Issue 411454
bnc#1226557
https://git.kernel.org/stable/c/74a16e062b23332d8db017ff4a41e16279c44411
https://git.kernel.org/stable/c/79d9b092035dcdbe636b70433149df9cc6db1e49
https://git.kernel.org/stable/c/8addba6cab94ce01686ea2e80ed1530f9dc33a9a
https://git.kernel.org/stable/c/8d0c927a9fb2b4065230936b77b54f857a3754fc
https://git.kernel.org/stable/c/944b8be08131f5faf2cd2440aa1c24a39a163a54
https://git.kernel.org/stable/c/b6d335a60dc624c0d279333b22c737faa765b028
https://git.kernel.org/stable/c/cc9b655bb84f1be283293dfea94dff9a31b106ac
https://git.kernel.org/stable/c/ffe1695b678729edec04037e691007900a2b2beb
jsc#CAR-3819
rh#2293239
CVE-2021-47597kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2021-47597
SMASH Issue 411442
bnc#1226553
https://git.kernel.org/stable/c/3a4f6dba1eb98101abc012ef968a8b10dac1ce50
https://git.kernel.org/stable/c/71ddeac8cd1d217744a0e060ff520e147c9328d1
https://git.kernel.org/stable/c/7b5596e531253ce84213d9daa7120b71c9d83198
https://git.kernel.org/stable/c/e5d28205bf1de7082d904ed277ceb2db2879e302
jsc#CAR-3791
rh#2293229
CVE-2021-47598kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47598
SMASH Issue 411381
bnc#1226574
https://git.kernel.org/stable/c/0d80462fbdcafd536dcad7569e65d3d14a7e9f2f
https://git.kernel.org/stable/c/20ad1ef02f9ad5e1dda9eeb113e4c158b4806986
https://git.kernel.org/stable/c/4e388232e630ebe4f94b4a0715ec98c0e2b314a3
https://git.kernel.org/stable/c/ab443c53916730862cec202078d36fd4008bea79
https://git.kernel.org/stable/c/f6deae2e2d83bd267e1986f5d71d8c458e18fd99
jsc#CAR-3792
rh#2293228
CVE-2021-47599kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47599
SMASH Issue 411365
bnc#1226571
https://git.kernel.org/stable/c/6605fd2f394bba0a0059df2b6cfc87b0b6d393a2
https://git.kernel.org/stable/c/e342c2558016ead462f376b6c6c2ac5efc17f3b1
jsc#CAR-3858
rh#2293227
CVE-2021-47600kernel-source-rt:Affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47600
SMASH Issue 411392
bnc#1226575
https://git.kernel.org/stable/c/0e21e6cd5eebfc929ac5fa3b97ca2d4ace3cb6a3
https://git.kernel.org/stable/c/1b8d2789dad0005fd5e7d35dab26a8e1203fb6da
https://git.kernel.org/stable/c/293f957be5e39720778fb1851ced7f5fba6d51c3
https://git.kernel.org/stable/c/501ecd90efdc9b2edc6c28852ecd098a4adf8f00
https://git.kernel.org/stable/c/607beb420b3fe23b948a9bf447d993521a02fbbb
https://git.kernel.org/stable/c/66ea642af6fd4eacb5d0271a922130fcf8700424
https://git.kernel.org/stable/c/a48f6a2bf33734ec5669ee03067dfb6c5b4818d6
https://git.kernel.org/stable/c/b03abd0aa09c05099f537cb05b8460c4298f0861
jsc#CAR-3793
rh#2293226
CVE-2021-47602kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47602
SMASH Issue 411455
bnc#1226554
https://git.kernel.org/stable/c/42d08e97b196479f593499e887a9ab81446a34b9
https://git.kernel.org/stable/c/46b9e29db2012a4d2a40a26101862e002ccf387b
https://git.kernel.org/stable/c/69f054d6642c8f6173724ce17e7ee3ff66b8f682
https://git.kernel.org/stable/c/d5e568c3a4ec2ddd23e7dc5ad5b0c64e4f22981a
https://git.kernel.org/stable/c/eed897a22230e3231a740eddd7d6d95ba476625f
jsc#CAR-3816
rh#2293224
CVE-2021-47603kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47603
SMASH Issue 411382
bnc#1226577
https://git.kernel.org/stable/c/0d3277eabd542fb662be23696e5ec9f390d688e1
https://git.kernel.org/stable/c/4cc6badff97f74d0fce65f9784b5df3b64e4250b
https://git.kernel.org/stable/c/75fdb751f84727d614deea0571a1490c3225d83a
https://git.kernel.org/stable/c/8389f50ceb854cb437fefb9330d5024ed3c7c1f5
https://git.kernel.org/stable/c/a5f4d17daf2e6cd7c1d9676b476147f6b4ac53f2
https://git.kernel.org/stable/c/f4b3ee3c85551d2d343a3ba159304066523f730f
jsc#CAR-3794
rh#2293223
CVE-2021-47606kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47606
SMASH Issue 411354
bnc#1226555
https://git.kernel.org/stable/c/40cf2e058832d9cfaae98dfd77334926275598b6
https://git.kernel.org/stable/c/4c986072a8c9249b9398c7a18f216dc26a9f0e35
https://git.kernel.org/stable/c/54e785f7d5c197bc06dbb8053700df7e2a093ced
https://git.kernel.org/stable/c/c0315e93552e0d840e9edc6abd71c7db82ec8f51
https://git.kernel.org/stable/c/c54a60c8fbaa774f828e26df79f66229a8a0e010
https://git.kernel.org/stable/c/dadce61247c6230489527cc5e343b6002d1114c5
https://git.kernel.org/stable/c/f123cffdd8fe8ea6c7fded4b88516a42798797d0
https://git.kernel.org/stable/c/ff3f517bf7138e01a17369042908a3f345c0ee41
jsc#CAR-3857
rh#2293208
CVE-2021-47609kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47609
SMASH Issue 411397
bnc#1226562
https://git.kernel.org/stable/c/4694b1ec425a2d20d6f8ca3db594829fdf5f2672
https://git.kernel.org/stable/c/639901b9429a3195e0fead981ed74b51f5f31538
https://git.kernel.org/stable/c/7e8645ca2c0046f7cd2f0f7d569fc036c8abaedb
https://git.kernel.org/stable/c/802a1a8501563714a5fe8824f4ed27fec04a0719
https://git.kernel.org/stable/c/865ed67ab955428b9aa771d8b4f1e4fb7fd08945
https://git.kernel.org/stable/c/976389cbb16cee46847e5d06250a3a0b5506781e
https://git.kernel.org/stable/c/f0f484714f35d24ffa0ecb4afe3df1c5b225411d
jsc#CAR-3821
rh#2293270
CVE-2021-47611kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47611
SMASH Issue 411370
bnc#1226583
https://git.kernel.org/stable/c/03029bb044ccee60adbc93e70713f3ae58abc3a1
https://git.kernel.org/stable/c/768c0b19b50665e337c96858aa2b7928d6dcf756
https://git.kernel.org/stable/c/7fd214fc7f2ee3a89f91e717e3cfad55f5a27045
https://git.kernel.org/stable/c/a19cf6844b509d44ecbd536f33d314d91ecdd2b5
https://git.kernel.org/stable/c/c62b16f98688ae7bc0ab23a6490481f4ce9b3a49
jsc#CAR-3795
rh#2293268
CVE-2021-47612kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47612
SMASH Issue 411428
bnc#1226585
https://git.kernel.org/stable/c/214af18abbe39db05beb305b2d11e87d09a6529c
https://git.kernel.org/stable/c/2a8845b9603c545fddd17862282dc4c4ce0971e3
https://git.kernel.org/stable/c/6644989642844de830f9b072cd65c553cb55946c
https://git.kernel.org/stable/c/c602863ad28ec86794cb4ab4edea5324f555f181
https://git.kernel.org/stable/c/d731ecc6f2eaec68f4ad1542283bbc7d07bd0112
https://git.kernel.org/stable/c/d89e4211b51752daf063d638af50abed2fd5f96d
https://git.kernel.org/stable/c/ea55b3797878752aa076b118afb727dcf79cac34
https://git.kernel.org/stable/c/fd79a0cbf0b2e34bcc45b13acf962e2032a82203
jsc#CAR-3796
rh#2293267
CVE-2021-47617kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47617
SMASH Issue 411540
bnc#1226614
https://git.kernel.org/stable/c/1db58c6584a72102e98af2e600ea184ddaf2b8af
https://git.kernel.org/stable/c/23584c1ed3e15a6f4bfab8dc5a88d94ab929ee12
https://git.kernel.org/stable/c/3b4c966fb156ff3e70b2526d964952ff7c1574d9
https://git.kernel.org/stable/c/464da38ba827f670deac6500a1de9a4f0f44c41d
https://git.kernel.org/stable/c/6d6f1f0dac3e3441ecdb1103d4efb11b9ed24dd5
https://git.kernel.org/stable/c/ff27f7d0333cff89ec85c419f431aca1b38fb16a
jsc#CAR-3805
rh#2293292
CVE-2021-47619kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47619
SMASH Issue 411542
bnc#1226645
https://git.kernel.org/stable/c/00eddb0e4ea115154581d1049507a996acfc2d3e
https://git.kernel.org/stable/c/4b3aa858268b7b9aeef02e5f9c4cd8f8fac101c8
https://git.kernel.org/stable/c/768eb705e6381f0c70ca29d4e66f19790d5d19a1
https://git.kernel.org/stable/c/92947844b8beee988c0ce17082b705c2f75f0742
https://git.kernel.org/stable/c/be6998f232b8e4ca8225029e305b8329d89bfd59
https://git.kernel.org/stable/c/d46fa4ea9756ef6cbcf9752d0832cc66e2d7121b
jsc#CAR-3812
rh#2293294
CVE-2021-47620kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2021-47620
SMASH Issue 411543
bnc#1226669
https://git.kernel.org/stable/c/305e92f525450f3e1b5f5c9dc7eadb152d66a082
https://git.kernel.org/stable/c/5a539c08d743d9910631448da78af5e961664c0e
https://git.kernel.org/stable/c/5c968affa804ba98c3c603f37ffea6fba618025e
https://git.kernel.org/stable/c/7889b38a7f21ed19314f83194622b195d328465c
https://git.kernel.org/stable/c/835d3706852537bf92eb23eb8635b8dee0c0aa67
https://git.kernel.org/stable/c/83d5196b65d1b29e27d7dd16a3b9b439fb1d2dba
https://git.kernel.org/stable/c/8819f93cd4a443dfe547aa622b21f723757df3fb
https://git.kernel.org/stable/c/899663be5e75dc0174dc8bda0b5e6826edf0b29a
https://git.kernel.org/stable/c/bcea886771c3f22a590c8c8b9139a107bd7f1e1c
jsc#CAR-3815
rh#2293293
CVE-2022-40540kernel-source-rt:Affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-40540
SMASH Issue 359755
bnc#1209597
https://security.netapp.com/advisory/ntap-20230616-0001/
https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin
jsc#CAR-2470
rh#2180513
CVE-2022-4285binutils:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2022-4285
L3:66717
L3:66796
MISC:sourceware.org:/bugzilla/show_bug.cgi
MISC:sourceware.org:/git/gitweb.cgi
RHSA-2023:2873
RHSA-2023:3269
SMASH Issue 349762
bnc#1206080
bnc#1215091
bnc#1215395
https://security.gentoo.org/glsa/202309-15
jsc#CAR-2217
rh#2150768
CVE-2022-48619kernel-source-rt:Affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48619
L3:67844
SMASH Issue 388650
SMASH Issue 390986
bnc#1218220
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17.10
https://github.com/torvalds/linux/commit/409353cbe9fe48f6bc196114c442b1cff05a39bc
jsc#CAR-3064
rh#2258012
CVE-2022-48627kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 396046
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220845
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/815be99d934e3292906536275f2b8d5131cdf52c
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c8686c014b5e872ba7e334f33ca553f14446fc29
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3209
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2022-48629kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-48629
SMASH Issue 396331
bnc#1220989
https://git.kernel.org/stable/c/0f9b7b8df17525e464294c916acc8194ce38446b
https://git.kernel.org/stable/c/184f7bd08ce56f003530fc19f160d54e75bf5c9d
https://git.kernel.org/stable/c/485995cbc98a4f77cfd4f8ed4dd7ff8ab262964d
https://git.kernel.org/stable/c/a680b1832ced3b5fa7c93484248fd221ea0d614b
https://git.kernel.org/stable/c/a8e32bbb96c25b7ab29b1894dcd45e0b3b08fd9d
https://git.kernel.org/stable/c/ab9337c7cb6f875b6286440b1adfbeeef2b2b2bd
jsc#CAR-3200
rh#2267958
CVE-2022-48638kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48638
SMASH Issue 403395
bnc#1223522
https://git.kernel.org/stable/c/1e9571887f97b17cf3ffe9aa4da89090ea60988b
https://git.kernel.org/stable/c/8484a356cee8ce3d6a8e6266ff99be326e9273ad
https://git.kernel.org/stable/c/df02452f3df069a59bc9e69c84435bf115cb6e37
jsc#CAR-3380
rh#2277829
CVE-2022-48639kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48639
SMASH Issue 403396
bnc#1223490
https://git.kernel.org/stable/c/0559d91ee3a2cd81b15ad5cd507539d6da867f88
https://git.kernel.org/stable/c/8844c750eeb03452e2b3319c27a526f447b82596
https://git.kernel.org/stable/c/903f7d322c17d8e306d766404b4604e81653902a
https://git.kernel.org/stable/c/c2e1cfefcac35e0eea229e148c8284088ce437b5
https://git.kernel.org/stable/c/f8162aed962be8fa07445b2b5928e84ab40dd8d7
jsc#CAR-3373
rh#2277828
CVE-2022-48642kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2022-48642
SMASH Issue 403399
bnc#1223478
https://git.kernel.org/stable/c/08d7524f366a886b99b1630a24a27dd6e0d7f852
https://git.kernel.org/stable/c/985b031667c3177b9e7fb9787b989628e4271714
https://git.kernel.org/stable/c/9a4d6dd554b86e65581ef6b6638a39ae079b17ac
https://git.kernel.org/stable/c/b043a525a3f5520abb676a7cd8f6328fdf959e88
jsc#CAR-3372
rh#2277822
CVE-2022-48644kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48644
SMASH Issue 403401
bnc#1223511
https://git.kernel.org/stable/c/586def6ebed195f3594a4884f7c5334d0e1ad1bb
https://git.kernel.org/stable/c/c7c9c7eb305ab8b4e93e4e4e1b78d8cfcbc26323
https://git.kernel.org/stable/c/d12a1eb07003e597077329767c6aa86a7e972c76
https://git.kernel.org/stable/c/db46e3a88a09c5cf7e505664d01da7238cd56c92
https://git.kernel.org/stable/c/f58e43184226e5e9662088ccf1389e424a3a4cbd
jsc#CAR-3376
rh#2277819
CVE-2022-48645kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48645
SMASH Issue 403402
bnc#1223508
https://git.kernel.org/stable/c/23022b74b1a23bed044f6bc96cf92f6ca5f3e75f
https://git.kernel.org/stable/c/510e703e4ed0e011db860bc21228aff48fc9eea7
https://git.kernel.org/stable/c/5641c751fe2f92d3d9e8a8e03c1263ac8caa0b42
jsc#CAR-3375
rh#2277818
CVE-2022-48651kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-48651
L3:68142
SMASH Issue 403408
bnc#1223513
bnc#1223514
https://git.kernel.org/stable/c/25efdbe5fe542c3063d1948cc4e98abcb57621ca
https://git.kernel.org/stable/c/346e94aa4a99378592c46d6a34c72703a32bd5be
https://git.kernel.org/stable/c/81225b2ea161af48e093f58e8dfee6d705b16af4
https://git.kernel.org/stable/c/8d06006c7eb75587d986da46c48ba9274f94e8e7
https://git.kernel.org/stable/c/ab4a733874ead120691e8038272d22f8444d3638
https://git.kernel.org/stable/c/b583e6b25bf9321c91154f6c78d2173ef12c4241
https://git.kernel.org/stable/c/bffcdade259c05ab3436b5fab711612093c275ef
https://git.kernel.org/stable/c/e2b46cd5796f083e452fbc624f65b80328b0c1a4
jsc#CAR-3377
rh#2277811
CVE-2022-48659kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48659
SMASH Issue 403416
bnc#1223498
https://git.kernel.org/stable/c/016b150992eebc32c4a18f783cf2bb6e2545a3d9
https://git.kernel.org/stable/c/02bcd951aa3c2cea95fb241c20802e9501940296
https://git.kernel.org/stable/c/2d6e55e0c03804e1e227b80a5746e086d6c6696c
https://git.kernel.org/stable/c/379ac7905ff3f0a6a4e507d3e9f710ec4fab9124
https://git.kernel.org/stable/c/7e9c323c52b379d261a72dc7bd38120a761a93cd
https://git.kernel.org/stable/c/a1d83a19cec3bfeb2b3547a1f7631e432a766d1c
https://git.kernel.org/stable/c/e9219fa63c5c25804af82c7aa54d1ec770ebe457
https://git.kernel.org/stable/c/e996821717c5cf8aa1e1abdb6b3d900a231e3755
jsc#CAR-3374
rh#2277801
CVE-2022-48664kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48664
SMASH Issue 403421
bnc#1223524
https://git.kernel.org/stable/c/6ac5b52e3f352f9cb270c89e6e1d4dadb564ddb8
https://git.kernel.org/stable/c/a362bb864b8db4861977d00bd2c3222503ccc34b
https://git.kernel.org/stable/c/c338bea1fec5504290dc0acf026c9e7dba25004b
https://git.kernel.org/stable/c/d8a76a2e514fbbb315a6dfff2d342de2de833994
jsc#CAR-3381
rh#2277795
CVE-2022-48667kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2022-48667
SMASH Issue 403424
bnc#1223518
https://git.kernel.org/stable/c/0cdde8460c304283d4ebe3f767a70215d1ab9d4e
https://git.kernel.org/stable/c/9c8b7a293f50253e694f19161c045817a938e551
jsc#CAR-3379
rh#2277791
CVE-2022-48668kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2022-48668
SMASH Issue 403425
bnc#1223516
https://git.kernel.org/stable/c/49523a4732204bdacbf3941a016503ddb4ddb3b9
https://git.kernel.org/stable/c/fa30a81f255a56cccd89552cd6ce7ea6e8d8acc4
jsc#CAR-3378
rh#2277790
CVE-2022-48670kernel-source-rt:Affectedmoderate5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2022-48670
SMASH Issue 404288
bnc#1223893
https://git.kernel.org/stable/c/1c11289b34ab67ed080bbe0f1855c4938362d9cf
https://git.kernel.org/stable/c/c87f1f99e26ea4ae08cabe753ae98e5626bdba89
jsc#CAR-3441
rh#2278942
CVE-2022-48672kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2022-48672
SMASH Issue 404290
bnc#1223931
https://git.kernel.org/stable/c/2133f451311671c7c42b5640d2b999326b39aa0e
https://git.kernel.org/stable/c/2566706ac6393386a4e7c4ce23fe17f4c98d9aa0
https://git.kernel.org/stable/c/2f945a792f67815abca26fa8a5e863ccf3fa1181
https://git.kernel.org/stable/c/ba6b9f7cc1108bad6e2c53b1d6e0156379188db7
https://git.kernel.org/stable/c/cbdda20ce363356698835185801a58a28f644853
https://git.kernel.org/stable/c/e0e88c25f88b9805572263c9ed20f1d88742feaf
https://git.kernel.org/stable/c/ee4369260e77821602102dcc7d792de39a56365c
jsc#CAR-3444
rh#2278939
CVE-2022-48673kernel-source-rt:Affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-48673
SMASH Issue 404292
bnc#1223934
bnc#1223940
https://git.kernel.org/stable/c/89fcb70f1acd6b0bbf2f7bfbf45d7aa75a9bdcde
https://git.kernel.org/stable/c/e9b1a4f867ae9c1dbd1d71cd09cbdb3239fb4968
jsc#CAR-3445
rh#2278938
CVE-2022-48693kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48693
SMASH Issue 404299
bnc#1223963
https://git.kernel.org/stable/c/0284b4e6dec6088a41607aa3f42bf51edff01883
https://git.kernel.org/stable/c/1085f5080647f0c9f357c270a537869191f7f2a1
https://git.kernel.org/stable/c/43245c77d9efd8c9eb91bf225d07954dcf32204d
https://git.kernel.org/stable/c/57b2897ec3ffe4cbe018446be6d04432919dca6b
https://git.kernel.org/stable/c/653500b400d5576940b7429690f7197199ddcc82
https://git.kernel.org/stable/c/6dc0251638a4a1a998506dbd4627f8317e907558
jsc#CAR-3451
rh#2278944
CVE-2022-48695kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48695
SMASH Issue 404336
bnc#1223941
https://git.kernel.org/stable/c/41acb064c4e013808bc7d5fc1b506fa449425b0b
https://git.kernel.org/stable/c/5682c94644fde72f72bded6580c38189ffc856b5
https://git.kernel.org/stable/c/6229fa494a5949be209bc73afbc5d0a749c2e3c7
https://git.kernel.org/stable/c/82efb917eeb27454dc4c6fe26432fc8f6c75bc16
https://git.kernel.org/stable/c/991df3dd5144f2e6b1c38b8d20ed3d4d21e20b34
https://git.kernel.org/stable/c/b8fc9e91b931215110ba824d1a2983c5f60b6f82
https://git.kernel.org/stable/c/d4959d09b76eb7a4146f5133962b88d3bddb63d6
https://git.kernel.org/stable/c/ea10a652ad2ae2cf3eced6f632a5c98f26727057
jsc#CAR-3446
rh#2278999
CVE-2022-48697kernel-source-rt:Affectedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2022-48697
SMASH Issue 404313
bnc#1223922
https://git.kernel.org/stable/c/17f121ca3ec6be0fb32d77c7f65362934a38cc8e
https://git.kernel.org/stable/c/4484ce97a78171668c402e0c45db7f760aea8060
https://git.kernel.org/stable/c/6a02a61e81c231cc5c680c5dbf8665275147ac52
https://git.kernel.org/stable/c/8d66989b5f7bb28bba2f8e1e2ffc8bfef4a10717
https://git.kernel.org/stable/c/be01f1c988757b95f11f090a9f491365670a522b
https://git.kernel.org/stable/c/ebf46da50beb78066674354ad650606a467e33fa
jsc#CAR-3443
rh#2278958
CVE-2022-48698kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2022-48698
SMASH Issue 404314
bnc#1223956
https://git.kernel.org/stable/c/3a6279d243cb035eaaff1450980b40cf19748f05
https://git.kernel.org/stable/c/58acd2ebae034db3bacf38708f508fbd12ae2e54
https://git.kernel.org/stable/c/cbfac7fa491651c57926c99edeb7495c6c1aeac2
jsc#CAR-3449
rh#2278956
CVE-2022-48701kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2022-48701
SMASH Issue 404317
bnc#1223921
https://git.kernel.org/stable/c/0492798bf8dfcc09c9337a1ba065da1d1ca68712
https://git.kernel.org/stable/c/2a308e415d247a23d4d64c964c02e782eede2936
https://git.kernel.org/stable/c/6123bec8480d23369e2ee0b2208611619f269faf
https://git.kernel.org/stable/c/8293e61bbf908b18ff9935238d4fc2ad359e3fe0
https://git.kernel.org/stable/c/91904870370fd986c29719846ed76d559de43251
https://git.kernel.org/stable/c/98e8e67395cc6d0cdf3a771f86ea42d0ee6e59dd
https://git.kernel.org/stable/c/b970518014f2f0f6c493fb86c1e092b936899061
https://git.kernel.org/stable/c/e53f47f6c1a56d2af728909f1cb894da6b43d9bf
jsc#CAR-3693
rh#2278950
CVE-2022-48702kernel-source-rt:Affectedmoderate5.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2022-48702
SMASH Issue 404318
bnc#1223923
https://git.kernel.org/stable/c/39a90720f3abe96625d1224e7a7463410875de4c
https://git.kernel.org/stable/c/4204a01ffce97cae1d59edc5848f02be5b2b9178
https://git.kernel.org/stable/c/45321a7d02b7cf9b3f97e3987fc1e4d649b82da2
https://git.kernel.org/stable/c/45814a53514e10a8014906c882e0d0d38df39cc1
https://git.kernel.org/stable/c/637c5310acb48fffcc5657568db3f3e9bc719bfa
https://git.kernel.org/stable/c/6b0e260ac3cf289e38446552461caa65e6dab275
https://git.kernel.org/stable/c/88aac6684cf8bc885cca15463cb4407e91f28ff7
https://git.kernel.org/stable/c/d29f59051d3a07b81281b2df2b8c9dfe4716067f
jsc#CAR-3694
rh#2278964
CVE-2022-48704kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48704
SMASH Issue 404337
bnc#1223932
https://git.kernel.org/stable/c/16cb367daa446923d82e332537f446a4cc784b40
https://git.kernel.org/stable/c/4e25e8f27fdbdc6fd55cc572a9939bf24500b9e8
https://git.kernel.org/stable/c/5a7a5b2edac4b05abd744eeaebda46d9dacd952d
https://git.kernel.org/stable/c/826b46fd5974113515abe9e4fc8178009a8ce18c
https://git.kernel.org/stable/c/b878da58df2c40b08914d3960e2224040fd1fbfe
https://git.kernel.org/stable/c/c0a45f41fde4a0f2c900f719817493ee5c4a5aa3
https://git.kernel.org/stable/c/c72d97146fc5a4dff381b1737f6167e89860430d
https://git.kernel.org/stable/c/f461950fdc374a3ada5a63c669d997de4600dffe
jsc#CAR-3520
rh#2278995
CVE-2022-48708kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48708
SMASH Issue 407169
bnc#1224942
https://git.kernel.org/stable/c/1177bdafe87cbe543a2dc48a9bbac265aa5864db
https://git.kernel.org/stable/c/2b763f7de108cb1a5ad5ed08e617d677341947cb
https://git.kernel.org/stable/c/6e2a0521e4e84a2698f2da3950fb5c5496a4d208
https://git.kernel.org/stable/c/71668706fbe7d20e6f172fa3287fa8aac1b56c26
https://git.kernel.org/stable/c/bcc487001a15f71f103d102cba4ac8145d7a68f2
https://git.kernel.org/stable/c/d2d73e6d4822140445ad4a7b1c6091e0f5fe703b
https://git.kernel.org/stable/c/e671e63587c92b3fd767cf82e73129f6d5feeb33
jsc#CAR-3562
rh#2282604
CVE-2022-48710kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48710
SMASH Issue 407109
bnc#1225230
https://git.kernel.org/stable/c/140d9807b96e1303f6f2675a7ae8710a2094bd17
https://git.kernel.org/stable/c/16a0f0b63c4c7eb46fc4c3f00bf2836e6ee46a9f
https://git.kernel.org/stable/c/28fd384c78d7d8ed8af0d086d778c3e438ba7f60
https://git.kernel.org/stable/c/7b7fba107b2c4ec7673d0f45bdbb9d1af697d9b9
https://git.kernel.org/stable/c/8a89bfeef9abe93371e3ea8796377f2d132eee29
https://git.kernel.org/stable/c/a2b28708b645c5632dc93669ab06e97874c8244f
https://git.kernel.org/stable/c/b33f7d99c9226892c7794dc2500fae35966020c9
https://git.kernel.org/stable/c/e938d24f0b7392e142b8aa434f18590d99dbe479
https://git.kernel.org/stable/c/fee8ae0a0bb66eb7730c22f44fbd7203f63c2eab
jsc#CAR-3752
rh#2282600
CVE-2022-48715kernel-source-rt:Affectedlow3.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2022-48715
SMASH Issue 411549
bnc#1226621
https://git.kernel.org/stable/c/003bcee66a8f0e76157eb3af369c173151901d97
https://git.kernel.org/stable/c/2d24336c7214b281b51860e54783dfc65f1248df
https://git.kernel.org/stable/c/2f5a1ac68bdf2899ce822ab845081922ea8c588e
https://git.kernel.org/stable/c/3a345198a7c2d1db2526dc60b77052f75de019d3
https://git.kernel.org/stable/c/471085571f926a1fe6b1bed095638994dbf23990
https://git.kernel.org/stable/c/53e4f71763c61a557283eb43301efd671922d1e8
https://git.kernel.org/stable/c/936bd03405fc83ba039d42bc93ffd4b88418f1d3
https://git.kernel.org/stable/c/ec4334152dae175dbd8fd5bde1d2139bbe7b42d0
jsc#CAR-3807
rh#2293287
CVE-2022-48717kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-48717
SMASH Issue 411552
bnc#1226679
https://git.kernel.org/stable/c/4c907bcd9dcd233da6707059d777ab389dcbd964
https://git.kernel.org/stable/c/5a45448ac95b715173edb1cd090ff24b6586d921
https://git.kernel.org/stable/c/71e60c170105d153e34d01766c1e4db26a4b24cc
https://git.kernel.org/stable/c/a0f49d12547d45ea8b0f356a96632dd503941c1e
https://git.kernel.org/stable/c/baead410e5db49e962a67fffc17ac30e44b50b7c
https://git.kernel.org/stable/c/f114fd6165dfb52520755cc4d1c1dfbd447b88b6
jsc#CAR-3817
rh#2293285
CVE-2022-48722kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48722
SMASH Issue 411557
bnc#1226619
https://git.kernel.org/stable/c/21feb6df3967541931242c427fe0958276af81cc
https://git.kernel.org/stable/c/621b24b09eb61c63f262da0c9c5f0e93348897e5
https://git.kernel.org/stable/c/6f38d3a6ec11c2733b1c641a46a2a2ecec57be08
https://git.kernel.org/stable/c/78b3f20c17cbcb7645bfa63f2ca0e11b53c09d56
https://git.kernel.org/stable/c/94cd597e20ed4acedb8f15f029d92998b011cb1a
https://git.kernel.org/stable/c/a1c277b0ed2a13e7de923b5f03bc23586eceb851
https://git.kernel.org/stable/c/d6a44feb2f28d71a7e725f72d09c97c81561cd9a
jsc#CAR-3806
rh#2293280
CVE-2022-48724kernel-source-rt:Affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48724
SMASH Issue 411575
bnc#1226624
https://git.kernel.org/stable/c/336d096b62bdc673e852b6b80d5072d7888ce85d
https://git.kernel.org/stable/c/5c43d46daa0d2928234dd2792ebebc35d29ee2d1
https://git.kernel.org/stable/c/99e675d473eb8cf2deac1376a0f840222fc1adcf
https://git.kernel.org/stable/c/9d9995b0371e4e8c18d4f955479e5d47efe7b2d4
https://git.kernel.org/stable/c/a0c685ba99961b1dd894b2e470e692a539770f6d
https://git.kernel.org/stable/c/a31cb1f0fb6caf46ffe88c41252b6b7a4ee062d9
https://git.kernel.org/stable/c/b62eceb5f8f08815fe3f945fc55bbf997c344ecd
jsc#CAR-3808
rh#2293336
CVE-2022-48732kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48732
SMASH Issue 411570
bnc#1226716
https://git.kernel.org/stable/c/1b777d4d9e383d2744fc9b3a09af6ec1893c8b1a
https://git.kernel.org/stable/c/909d3ec1bf9f0ec534bfc081b77c0836fea7b0e2
https://git.kernel.org/stable/c/acc887ba88333f5fec49631f12d8cc7ebd95781c
https://git.kernel.org/stable/c/b2a21669ee98aafc41c6d42ef15af4dab9e6e882
https://git.kernel.org/stable/c/d4b746e60fd8eaa8016e144223abe91158edcdad
https://git.kernel.org/stable/c/d877e814a62b7de9069aeff8bc1d979dfc996e06
https://git.kernel.org/stable/c/e7c36fa8a1e63b08312162179c78a0c7795ea369
https://git.kernel.org/stable/c/f071d9fa857582d7bd77f4906691f73d3edeab73
jsc#CAR-3831
rh#2293327
CVE-2022-48733kernel-source-rt:Affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-48733
SMASH Issue 411574
bnc#1226718
https://git.kernel.org/stable/c/28b21c558a3753171097193b6f6602a94169093a
https://git.kernel.org/stable/c/9372fa1d73da5f1673921e365d0cd2c27ec7adc2
https://git.kernel.org/stable/c/a7b717fa15165d3d9245614680bebc48a52ac05d
jsc#CAR-3832
rh#2293326
CVE-2022-48734kernel-source-rt:Affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48734
SMASH Issue 411576
bnc#1226626
https://git.kernel.org/stable/c/26b3901d20bf9da2c6a00cb1fb48932166f80a45
https://git.kernel.org/stable/c/31198e58c09e21d4f65c49d2361f76b87aca4c3f
https://git.kernel.org/stable/c/32747e01436aac8ef93fe85b5b523b4f3b52f040
https://git.kernel.org/stable/c/89d4cca583fc9594ee7d1a0bc986886d6fb587e6
https://git.kernel.org/stable/c/e804861bd4e69cc5fe1053eedcb024982dde8e48
jsc#CAR-3879
rh#2293325
CVE-2022-48736kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2022-48736
SMASH Issue 411551
bnc#1226721
https://git.kernel.org/stable/c/17e16a66b4f9a310713d8599e6e1ca4a0c9fd28c
https://git.kernel.org/stable/c/4cf28e9ae6e2e11a044be1bcbcfa1b0d8675fe4d
https://git.kernel.org/stable/c/54abca038e287d3746dd40016514670a7f654c5c
https://git.kernel.org/stable/c/6877f87579ed830f9ff6d478539074f035d04bfb
https://git.kernel.org/stable/c/7659f25a80e6affb784b690df8994b79b4212fd4
https://git.kernel.org/stable/c/b0a7836ecf1345814a7d8ef748fb797c520dad18
https://git.kernel.org/stable/c/e09cf398e8c6db69c620b6d8073abc4377a07af5
https://git.kernel.org/stable/c/fd9a23319f16e7031f0d8c98eed6e093c2927229
jsc#CAR-3842
rh#2293323
CVE-2022-48737kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2022-48737
SMASH Issue 411565
bnc#1226762
https://git.kernel.org/stable/c/038f8b7caa74d29e020949a43ca368c93f6b29b9
https://git.kernel.org/stable/c/4977491e4b3aad8567f57e2a9992d251410c1db3
https://git.kernel.org/stable/c/4f1e50d6a9cf9c1b8c859d449b5031cacfa8404e
https://git.kernel.org/stable/c/9a12fcbf3c622f9bf6b110a873d62b0cba93972e
https://git.kernel.org/stable/c/9e5c40b5706d8aae2cf70bd7e01f0b4575a642d0
https://git.kernel.org/stable/c/c33402b056de61104b6146dedbe138ca8d7ec62b
https://git.kernel.org/stable/c/e8e07c5e25a29e2a6f119fd947f55d7a55eb8a13
https://git.kernel.org/stable/c/ef6cd9eeb38062a145802b7b56be7ae1090e165e
jsc#CAR-3844
rh#2293322
CVE-2022-48742kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48742
SMASH Issue 411592
bnc#1226694
https://git.kernel.org/stable/c/2cf180360d66bd657e606c1217e0e668e6faa303
https://git.kernel.org/stable/c/36a9a0aee881940476b254e0352581401b23f210
https://git.kernel.org/stable/c/3bbe2019dd12b8d13671ee6cda055d49637b4c39
https://git.kernel.org/stable/c/7d9211678c0f0624f74cdff36117ab8316697bb8
https://git.kernel.org/stable/c/a01e60a1ec6bef9be471fb7182a33c6d6f124e93
https://git.kernel.org/stable/c/bd43771ee9759dd9dfae946bff190e2c5a120de5
https://git.kernel.org/stable/c/c6f6f2444bdbe0079e41914a35081530d0409963
https://git.kernel.org/stable/c/def5e7070079b2a214b3b1a2fbec623e6fbfe34a
jsc#CAR-3823
rh#2293317
CVE-2022-48743kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48743
SMASH Issue 411579
bnc#1226705
https://git.kernel.org/stable/c/34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26
https://git.kernel.org/stable/c/4d3fcfe8464838b3920bc2b939d888e0b792934e
https://git.kernel.org/stable/c/5aac9108a180fc06e28d4e7fb00247ce603b72ee
https://git.kernel.org/stable/c/617f9934bb37993b9813832516f318ba874bcb7d
https://git.kernel.org/stable/c/9892742f035f7aa7dcd2bb0750effa486db89576
https://git.kernel.org/stable/c/9924c80bd484340191e586110ca22bff23a49f2e
https://git.kernel.org/stable/c/db6fd92316a254be2097556f01bccecf560e53ce
https://git.kernel.org/stable/c/e8f73f620fee5f52653ed2da360121e4446575c5
jsc#CAR-3827
rh#2293316
CVE-2022-48744kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48744
SMASH Issue 411606
bnc#1226696
https://git.kernel.org/stable/c/8fbdf8c8b8ab82beab882175157650452c46493e
https://git.kernel.org/stable/c/ad5185735f7dab342fdd0dd41044da4c9ccfef67
jsc#CAR-3825
rh#2293315
CVE-2022-48751kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48751
SMASH Issue 411588
bnc#1226653
https://git.kernel.org/stable/c/38f0bdd548fd2ef5d481b88d8a2bfef968452e34
https://git.kernel.org/stable/c/4284225cd8001e134f5cf533a7cd244bbb654d0f
https://git.kernel.org/stable/c/c0bf3d8a943b6f2e912b7c1de03e2ef28e76f760
jsc#CAR-3813
rh#2293308
CVE-2022-48754kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48754
SMASH Issue 411596
bnc#1226692
https://git.kernel.org/stable/c/67d271760b037ce0806d687ee6057edc8afd4205
https://git.kernel.org/stable/c/aefaccd19379d6c4620269a162bfb88ff687f289
https://git.kernel.org/stable/c/bd024e36f68174b1793906c39ca16cee0c9295c2
https://git.kernel.org/stable/c/cb2fab10fc5e7a3aa1bb0a68a3abdcf3e37852af
https://git.kernel.org/stable/c/cbda1b16687580d5beee38273f6241ae3725960c
https://git.kernel.org/stable/c/f39027cbada43b33566c312e6be3db654ca3ad17
jsc#CAR-3822
rh#2293304
CVE-2022-48755kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48755
SMASH Issue 411577
bnc#1226706
https://git.kernel.org/stable/c/129c71829d7f46423d95c19e8d87ce956d4c6e1c
https://git.kernel.org/stable/c/3bfbc00587dc883eaed383558ae512a351c2cd09
https://git.kernel.org/stable/c/3f5f766d5f7f95a69a630da3544a1a0cee1cdddf
https://git.kernel.org/stable/c/aaccfeeee1630b155e8ff0d6c449d3de1ef86e73
jsc#CAR-3828
rh#2293303
CVE-2022-48756kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48756
SMASH Issue 411609
bnc#1226698
https://git.kernel.org/stable/c/2b7e7df1eacd280e561ede3e977853606871c951
https://git.kernel.org/stable/c/56480fb10b976581a363fd168dc2e4fbee87a1a7
https://git.kernel.org/stable/c/581317b1f001b7509041544d7019b75571daa100
https://git.kernel.org/stable/c/5e761a2287234bc402ba7ef07129f5103bcd775c
https://git.kernel.org/stable/c/6d9f8ba28f3747ca0f910a363e46f1114856dbbe
https://git.kernel.org/stable/c/79c0b5287ded74f4eacde4dfd8aa0a76cbd853b5
https://git.kernel.org/stable/c/ca63eeb70fcb53c42e1fe54e1735a54d8e7759fd
jsc#CAR-3826
rh#2293398
CVE-2022-48757kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48757
SMASH Issue 411597
bnc#1226695
https://git.kernel.org/stable/c/47934e06b65637c88a762d9c98329ae6e3238888
https://git.kernel.org/stable/c/839ec7039513a4f84bfbaff953a9393471176bee
https://git.kernel.org/stable/c/8f88c78d24f6f346919007cd459fd7e51a8c7779
https://git.kernel.org/stable/c/b67ad6170c0ea87391bb253f35d1f78857736e54
https://git.kernel.org/stable/c/be1ca30331c7923c6f376610c1bd6059be9b1908
https://git.kernel.org/stable/c/c38023032a598ec6263e008d62c7f02def72d5c7
https://git.kernel.org/stable/c/db044d97460ea792110eb8b971e82569ded536c6
https://git.kernel.org/stable/c/e372ecd455b6ebc7720f52bf4b5f5d44d02f2092
https://git.kernel.org/stable/c/e43669c77cb3a742b7d84ecdc7c68c4167a7709b
jsc#CAR-3824
rh#2293383
CVE-2022-48758kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48758
SMASH Issue 411569
bnc#1226708
https://git.kernel.org/stable/c/00849de10f798a9538242824a51b1756e7110754
https://git.kernel.org/stable/c/262550f29c750f7876b6ed1244281e72b64ebffb
https://git.kernel.org/stable/c/2a12fe8248a38437b95b942bbe85aced72e6e2eb
https://git.kernel.org/stable/c/847f9ea4c5186fdb7b84297e3eeed9e340e83fce
https://git.kernel.org/stable/c/ace7b6ef41251c5fe47f629a9a922382fb7b0a6b
https://git.kernel.org/stable/c/b11e34f7bab21df36f02a5e54fb69e858c09a65d
https://git.kernel.org/stable/c/bf2bd892a0cb14dd2d21f2c658f4b747813be311
https://git.kernel.org/stable/c/c93a290c862ccfa404e42d7420565730d67cbff9
https://git.kernel.org/stable/c/de6336b17a1376db1c0f7a528cce8783db0881c0
jsc#CAR-3829
rh#2293381
CVE-2022-48759kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48759
SMASH Issue 411568
bnc#1226711
https://git.kernel.org/stable/c/1dbb206730f3e5ce90014ad569ddf8167ec4124a
https://git.kernel.org/stable/c/70cb4295ec806b663665e1d2ed15caab6159880e
https://git.kernel.org/stable/c/74d85e9fbc7022a4011102c7474a9c7aeb704a35
https://git.kernel.org/stable/c/85aba11a8ea92a8eef2de95ebbe063086fd62d9c
https://git.kernel.org/stable/c/b7fb2dad571d1e21173c06cef0bced77b323990a
https://git.kernel.org/stable/c/d6cdc6ae542845d4d0ac8b6d99362bde7042a3c7
https://git.kernel.org/stable/c/da27b834c1e0222e149e06caddf7718478086d1b
jsc#CAR-3830
rh#2293379
CVE-2022-48760kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48760
SMASH Issue 411539
bnc#1226712
https://git.kernel.org/stable/c/26fbe9772b8c459687930511444ce443011f86bf
https://git.kernel.org/stable/c/546ba238535d925254e0b3f12012a5c55801e2f3
https://git.kernel.org/stable/c/5904dfd3ddaff3bf4a41c3baf0a8e8f31ed4599b
https://git.kernel.org/stable/c/5f138ef224dffd15d5e5c5b095859719e0038427
https://git.kernel.org/stable/c/9340226388c66a7e090ebb00e91ed64a753b6c26
https://git.kernel.org/stable/c/9c61fce322ac2ef7fecf025285353570d60e41d6
https://git.kernel.org/stable/c/b50f5ca60475710bbc9a3af32fbfc17b1e69c2f0
https://git.kernel.org/stable/c/c9a18f7c5b071dce5e6939568829d40994866ab0
https://git.kernel.org/stable/c/e3b131e30e612ff0e32de6c1cb4f69f89db29193
jsc#CAR-3861
rh#2293377
CVE-2022-48769kernel-source-rt:Affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48769
SMASH Issue 411586
bnc#1226629
https://git.kernel.org/stable/c/3df52448978802ae15dcebf66beba1029df957b4
https://git.kernel.org/stable/c/a4085859411c825c321c9b55b8a9dc5a128a6684
https://git.kernel.org/stable/c/b0f1cc093bc2493ac259c53766fd2b800e085807
https://git.kernel.org/stable/c/f5390cd0b43c2e54c7cf5506c7da4a37c5cef746
jsc#CAR-3881
rh#2293339
CVE-2022-48772kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48772
SMASH Issue 412077
bnc#1226976
https://git.kernel.org/stable/c/526238d32c3acc3d597fd8c9a34652bfe9086cea
https://git.kernel.org/stable/c/7d12e918f2994c883f41f22552a61b9310fa1e87
https://git.kernel.org/stable/c/8915dcd29a82096acacf54364a8425363782aea0
https://git.kernel.org/stable/c/8e1e00718d0d9dd83337300572561e30b9c0d115
https://git.kernel.org/stable/c/b479fd59a1f4a342b69fce34f222d93bf791dca4
https://git.kernel.org/stable/c/c1115ddbda9c930fba0fdd062e7a8873ebaf898d
https://git.kernel.org/stable/c/d082757b8359201c3864323cea4b91ea30a1e676
jsc#CAR-3886
rh#2294287
CVE-2023-0160kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-0160
L3:67844
SMASH Issue 361028
bnc#1209657
https://access.redhat.com/security/cve/CVE-2023-0160
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ed17aa92dc56
https://lore.kernel.org/all/CABcoxUayum5oOqFMMqAeWuS8+EzojquSOSyDA3J_2omY=2EeAg@mail.gmail.com/
jsc#CAR-3167
rh#2159764
CVE-2023-25585binutils:Affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2023-25585
L3:66735
SMASH Issue 356372
bnc#1208040
https://access.redhat.com/security/cve/CVE-2023-25585
https://security.netapp.com/advisory/ntap-20231103-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=29892
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=65cf035b8dc1df5d8020e0b1449514a3c42933e7
jsc#CAR-2345
rh#2167498
CVE-2023-25587binutils:Affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2023-25587
L3:66735
SMASH Issue 356374
bnc#1208038
bnc#1215193
jsc#CAR-2344
rh#2167498
rh#2167504
rh#2167505
rh#2180905
CVE-2023-25588binutils:Affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2023-25588
L3:66735
SMASH Issue 356375
bnc#1208037
https://access.redhat.com/security/cve/CVE-2023-25588
https://security.netapp.com/advisory/ntap-20231103-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=29677
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d12f8998d2d086f0a6606589e5aedb7147e6f2f1
jsc#CAR-2343
rh#2167505
CVE-2023-2609vim:Affectedimportant5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2023-2609
CVE-2023-2610
D:CVE-2023-2610
L3:66144
L3:66478
L3:66704
L3:67060
L3:67166
L3:67353
SMASH Issue 365787
SMASH Issue 365823
bnc#1211256
bnc#1211257
bnc#1212616
bnc#1213998
bnc#1215012
bnc#1216906
https://github.com/vim/vim/commit/ab9a2d884b3a4abe319606ea95a5a6d6b01cd73a
https://github.com/vim/vim/commit/d1ae8366aff286d41e7f5bc513cc0a1af5130aad
https://huntr.dev/bounties/1679be5a-565f-4a44-a430-836412a0b622
https://huntr.dev/bounties/31e67340-935b-4f6c-a923-f7246bc29c7d
https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
jsc#CAR-2657
jsc#CAR-2659
rh#2209048
rh#2209050
CVE-2023-2610vim:Affectedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H)CVE-2023-2609
CVE-2023-2610
D:CVE-2023-2610
L3:66144
L3:66478
L3:66704
L3:67060
L3:67166
L3:67353
SMASH Issue 365823
bnc#1211256
bnc#1211257
bnc#1212616
bnc#1213998
bnc#1215012
bnc#1216906
https://github.com/vim/vim/commit/ab9a2d884b3a4abe319606ea95a5a6d6b01cd73a
https://github.com/vim/vim/commit/d1ae8366aff286d41e7f5bc513cc0a1af5130aad
https://huntr.dev/bounties/1679be5a-565f-4a44-a430-836412a0b622
https://huntr.dev/bounties/31e67340-935b-4f6c-a923-f7246bc29c7d
https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
jsc#CAR-2657
jsc#CAR-2659
rh#2209048
rh#2209050
CVE-2023-27533curl:Affectedmoderate4.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2023-27533
D:CVE-2023-27533
OSS:2023/Q1/174
RHSA-2023:3354
RHSA-2023:3355
SMASH Issue 359850
SMASH Issue 359851
bnc#1209209
https://hackerone.com/reports/1891474
https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230420-0011/
jsc#CAR-2457
rh#2179062
CVE-2023-27535curl:Affectedmoderate5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2023-27535
D:CVE-2023-27535
L3:66794
OSS:2023/Q1/176
RHSA-2023:2650
RHSA-2023:3106
SMASH Issue 359854
SMASH Issue 359855
bnc#1209211
bnc#1215394
https://hackerone.com/reports/1892780
https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230420-0010/
jsc#CAR-2459
rh#2152652
rh#2179073
rh#2179092
rh#2179103
CVE-2023-28320curl:Affectedlow3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2023-28320
L3:67324
OSS:2023/Q2/166
SMASH Issue 365639
SMASH Issue 365640
bnc#1211231
http://seclists.org/fulldisclosure/2023/Jul/47
http://seclists.org/fulldisclosure/2023/Jul/48
http://seclists.org/fulldisclosure/2023/Jul/52
https://hackerone.com/reports/1929597
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230609-0009/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
jsc#CAR-2661
rh#2196783
CVE-2023-28321curl:Affectedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)CVE-2023-28321
L3:67177
L3:67324
OSS:2023/Q2/167
RHSA-2023:4354
RHSA-2023:4523
RHSA-2023:4628
RHSA-2023:4629
RHSA-2023:5598
SMASH Issue 365641
SMASH Issue 365642
bnc#1211232
bnc#1217454
http://seclists.org/fulldisclosure/2023/Jul/47
http://seclists.org/fulldisclosure/2023/Jul/48
http://seclists.org/fulldisclosure/2023/Jul/52
https://hackerone.com/reports/1950627
https://lists.debian.org/debian-lts-announce/2023/10/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230609-0009/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
jsc#CAR-2662
rh#2196786
rh#2196793
CVE-2023-28746kernel-source-rt:Affectedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)CVE-2023-22655
CVE-2023-28746
CVE-2023-38575
CVE-2023-39368
CVE-2023-43490
L3:67840
L3:67844
MISC:www.intel.com:OSS:2024/Q1/219
OSS:2024/03/12/13
OSS:2024/Q1/219
SMASH Issue 372961
SMASH Issue 397408
Xen Security Advisory XSA-452
bnc#1213456
bnc#1213457
bnc#1221323
bnc#1221332
bnc#1221529
https://lists.debian.org/debian-lts-announce/2024/05/msg00003.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
https://security.netapp.com/advisory/ntap-20240405-0006/
https://security.netapp.com/advisory/ntap-20240405-0007/
https://security.netapp.com/advisory/ntap-20240405-0008/
https://security.netapp.com/advisory/ntap-20240405-0009/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00898.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00960.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00972.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00982.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01045.html
jsc#CAR-3227
rh#2270698
rh#2270700
rh#2270701
rh#2270703
rh#2270704
xf#285375
CVE-2023-31124c-ares:Affectedlow3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)CVE-2023-31124
D:CVE-2023-31124
OSS:2023/Q2/188
RHSA-2023:3577
RHSA-2023:3586
RHSA-2023:4033
RHSA-2023:4034
RHSA-2023:4035
RHSA-2023:4036
RHSA-2023:4039
SMASH Issue 367130
SMASH Issue 367131
bnc#1211607
https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
https://security.gentoo.org/glsa/202310-09
jsc#CAR-2666
rh#2209494
CVE-2023-31130c-ares:Affectedmoderate ()CVE-2023-31130
D:CVE-2023-31130
DSA-5419
OSS:2023/Q2/188
RHSA-2023:3577
RHSA-2023:3586
RHSA-2023:4033
RHSA-2023:4034
RHSA-2023:4035
RHSA-2023:4036
RHSA-2023:4039
SMASH Issue 367128
SMASH Issue 367129
bnc#1211606
https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v
https://lists.debian.org/debian-lts-announce/2023/06/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
https://security.gentoo.org/glsa/202310-09
https://security.netapp.com/advisory/ntap-20240605-0005/
https://www.debian.org/security/2023/dsa-5419
jsc#CAR-2667
rh#2209497
CVE-2023-31147c-ares:Affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)CVE-2023-31147
D:CVE-2023-31147
OSS:2023/Q2/188
RHSA-2023:3577
RHSA-2023:3586
RHSA-2023:4033
RHSA-2023:4034
RHSA-2023:4035
RHSA-2023:4036
RHSA-2023:4039
SMASH Issue 367126
SMASH Issue 367127
bnc#1211605
https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
https://security.gentoo.org/glsa/202310-09
jsc#CAR-2668
rh#2209501
CVE-2023-32067c-ares:Affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-32067
D:CVE-2023-32067
DSA-5419
L3:66461
L3:66661
OSS:2023/Q2/188
RHSA-2023:3559
RHSA-2023:3577
RHSA-2023:3583
RHSA-2023:3584
RHSA-2023:3586
RHSA-2023:3660
RHSA-2023:3662
RHSA-2023:3665
RHSA-2023:3677
RHSA-2023:3741
RHSA-2023:4033
RHSA-2023:4034
RHSA-2023:4035
RHSA-2023:4036
RHSA-2023:4039
SMASH Issue 367124
SMASH Issue 367125
bnc#1211604
bnc#1213930
bnc#1214750
https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc
https://lists.debian.org/debian-lts-announce/2023/06/msg00034.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
https://security.gentoo.org/glsa/202310-09
https://security.netapp.com/advisory/ntap-20240605-0004/
https://www.debian.org/security/2023/dsa-5419
jsc#CAR-2679
rh#2209502
CVE-2023-4244kernel-source-rt:Affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-42755kernel-source-rt:Affectedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)CVE-2023-42755
L3:68163
OSS:2023/Q3/229
SMASH Issue 379822
ZDI-24-591
bnc#1215702
bnc#1225265
https://access.redhat.com/errata/RHSA-2024:2950
https://access.redhat.com/errata/RHSA-2024:3138
https://access.redhat.com/security/cve/CVE-2023-42755
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-2917
rh#2226790
rh#2239847
rh#2258514
rh#2265285
CVE-2023-45918ncurses:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2023-45918
SMASH Issue 394401
bnc#1220061
https://lists.gnu.org/archive/html/bug-ncurses/2023-06/msg00005.html
https://security.netapp.com/advisory/ntap-20240315-0006/
jsc#CAR-3130
CVE-2023-46218curl:Affectedmoderate4.2 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N)CVE-2023-46218
DSA-5587
OSS:2023/Q4/261
SMASH Issue 386278
SMASH Issue 386279
bnc#1217573
https://hackerone.com/reports/2212193
https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3ZX3VW67N4ACRAPMV2QS2LVYGD7H2MVE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/
https://security.netapp.com/advisory/ntap-20240125-0007/
https://www.debian.org/security/2023/dsa-5587
jsc#CAR-3021
rh#2252030
CVE-2023-46343kernel-source-rt:Affectedmoderate6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-46343
L3:67844
SMASH Issue 391984
bnc#1219125
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7937609cd387246aed994e81aa4fa951358fba41
https://github.com/torvalds/linux/commit/7937609cd387246aed994e81aa4fa951358fba41
https://lore.kernel.org/netdev/20231013184129.18738-1-krzysztof.kozlowski%40linaro.org/T/#r38bdbaf8ae15305b77f6c5bc8e15d38f405623c7
jsc#CAR-3078
rh#2259858
CVE-2023-46838kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-46838
OSS:2024/Q1/38
SMASH Issue 391283
SMASH Issue 391284
bnc#1218836
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGEKT4DKSDXDS34EL7M4UVJMMPH7Z3ZZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZFYW6R64GPLUOXSQBJI3JBUX3HGLAYPP/
https://xenbits.xenproject.org/xsa/advisory-448.html
jsc#CAR-3082
linux.git:commit:c7ec4f2d684e17d69bbdd7c4324db0ef5daac26a
rh#2259701
CVE-2023-48795openssh:Affectedimportant5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)CONFIRM:matt.ucc.asn.au:CVE-2016-3116
CONFIRM:www.vandyke.com:CVE-2020-12651
CVE-2023-48795
DSA-5586
DSA-5588
L3:67346
L3:67368
L3:67372
L3:67376
L3:67419
L3:67478
L3:67575
L3:67646
L3:67647
MISC:github.com:CVE-2019-18217
MISC:github.com:OSS:2023/12/19/5
MISC:groups.google.com:MLIST:[oss-security] 20211112 Multiple vulnerabilities in Jenkins plugins
MISC:lists.tartarus.org:OSS:2023/12/19/5
MISC:pijul.org:OSS:2023/12/19/5
MISC:www.chiark.greenend.org.uk:CVE-2019-9894
MISC:www.jenkins.io:OSS:2024/Q1/190
MISC:www.jenkins.io:OSS:2024/Q2/136
MISC:www.netsarang.com:CVE-2021-37326
MISC:www.paramiko.org:CVE-2022-24302
OSS:2023/12/18/2
OSS:2023/12/18/3
OSS:2023/12/19/5
OSS:2023/12/20/3
OSS:2023/Q4/292
OSS:2024/03/06/3
OSS:2024/04/17/8
OSS:2024/Q1/190
OSS:2024/Q2/136
SMASH Issue 387549
bdo#1033166
bdo#990901
bdo#995130
bnc#1217950
bnc#1218126
bnc#1218127
bnc#1218128
bnc#1218134
bnc#1218144
bnc#1218150
bnc#1218165
bnc#1218168
bnc#1218183
bnc#1218189
bnc#1218192
bnc#1218194
bnc#1218197
bnc#1218198
bnc#1218206
bnc#1218207
bnc#1218208
bnc#1218218
bnc#1218227
bnc#1218264
bnc#1218265
bnc#1218266
bnc#1218267
bnc#1218268
bnc#1218269
bnc#1218270
bnc#1218325
bnc#1218426
bnc#1218441
bnc#1218472
bnc#1218971
bnc#1219570
bnc#1219948
http://packetstormsecurity.com/files/176280/Terrapin-SSH-Connection-Weakening.html
http://seclists.org/fulldisclosure/2024/Mar/21
https://access.redhat.com/security/cve/cve-2023-48795
https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/
https://bugs.gentoo.org/920280
https://crates.io/crates/thrussh/versions
https://filezilla-project.org/versions.php
https://forum.netgate.com/topic/184941/terrapin-ssh-attack
https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.10&id=10e09e273f69e149389b3e0e5d44b8c221c2e7f6
https://github.com/NixOS/nixpkgs/pull/275249
https://github.com/PowerShell/Win32-OpenSSH/issues/2189
https://github.com/PowerShell/Win32-OpenSSH/releases/tag/v9.5.0.0p1-Beta
https://github.com/TeraTermProject/teraterm/commit/7279fbd6ef4d0c8bdd6a90af4ada2899d786eec0
https://github.com/TeraTermProject/teraterm/releases/tag/v5.1
https://github.com/advisories/GHSA-45x7-px36-x8w8
https://github.com/apache/mina-sshd/issues/445
https://github.com/connectbot/sshlib/commit/5c8b534f6e97db7ac0e0e579331213aa25c173ab
https://github.com/connectbot/sshlib/compare/2.2.21...2.2.22
https://github.com/cyd01/KiTTY/issues/520
https://github.com/drakkan/sftpgo/releases/tag/v2.5.6
https://github.com/erlang/otp/blob/d1b43dc0f1361d2ad67601169e90a7fc50bb0369/lib/ssh/doc/src/notes.xml#L39-L42
https://github.com/erlang/otp/releases/tag/OTP-26.2.1
https://github.com/golang/crypto/commit/9d2ee975ef9fe627bf0a6f01c1f69e8ef1d4f05d
https://github.com/hierynomus/sshj/issues/916
https://github.com/janmojzis/tinyssh/issues/81
https://github.com/jtesta/ssh-audit/commit/8e972c5e94b460379fe0c7d20209c16df81538a5
https://github.com/libssh2/libssh2/pull/1291
https://github.com/mkj/dropbear/blob/17657c36cce6df7716d5ff151ec09a665382d5dd/CHANGES#L25
https://github.com/mscdex/ssh2/commit/97b223f8891b96d6fc054df5ab1d5a1a545da2a3
https://github.com/mwiede/jsch/compare/jsch-0.2.14...jsch-0.2.15
https://github.com/mwiede/jsch/issues/457
https://github.com/mwiede/jsch/pull/461
https://github.com/net-ssh/net-ssh/blob/2e65064a52d73396bfc3806c9196fc8108f33cd8/CHANGES.txt#L14-L16
https://github.com/openssh/openssh-portable/commits/master
https://github.com/paramiko/paramiko/issues/2337
https://github.com/proftpd/proftpd/blob/0a7ea9b0ba9fcdf368374a226370d08f10397d99/RELEASE_NOTES
https://github.com/proftpd/proftpd/blob/d21e7a2e47e9b38f709bec58e3fa711f759ad0e1/RELEASE_NOTES
https://github.com/proftpd/proftpd/issues/456
https://github.com/rapier1/hpn-ssh/releases
https://github.com/ronf/asyncssh/blob/develop/docs/changes.rst
https://github.com/ronf/asyncssh/tags
https://github.com/ssh-mitm/ssh-mitm/issues/165
https://github.com/warp-tech/russh/releases/tag/v0.40.2
https://gitlab.com/libssh/libssh-mirror/-/tags
https://groups.google.com/g/golang-announce/c/-n5WqVC18LQ
https://groups.google.com/g/golang-announce/c/qA3XtxvMUyg
https://help.panic.com/releasenotes/transmit5/
https://jadaptive.com/important-java-ssh-security-update-new-ssh-vulnerability-discovered-cve-2023-48795/
https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00013.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00014.html
https://lists.debian.org/debian-lts-announce/2024/04/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33XHJUB6ROFUOH2OQNENFROTVH6MHSHA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3CAYYW35MUTNO65RVAELICTNZZFMT2XS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3JIMLVBDWOP4FUPXPTB4PGHHIOMGFLQE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3YQLUQWLIHDB5QCXQEX7HXHAWMOKPP5O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6Y74KVCPEPT4MVU3LHDWCNNOXOE5ZLUR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APYIXIQOVDCRWLHTGB4VYMAUIAQLKYJ3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BL5KTLOSLH2KHRN4HCXJPK3JUVLDGEL6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3AFMZ6MH2UHHOPIWT5YLSFV3D2VB3AC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CHHITS4PUOZAKFIUBQAQZC7JWXMOYE4B/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F7EYCFQCTSGJXWO3ZZ44MGKFC5HA7G3Y/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYEDEXIKFKTUJIN43RG4B7T5ZS6MHUSP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I724O3LSRCPO4WNVIXTZCT4VVRMXMMSG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KEOTKBUPZXHE3F352JBYNTSNRXYLWD6P/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KMZCVGUGJZZVDPCVDA7TEB22VUCNEXDD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L5Y6MNNVAPIJSXJERQ6PKZVCIUXSNJK7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LZQVUHWVWRH73YBXUQJOD6CKHDQBU3DM/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MKQRBF3DWMWPH36LBCOBUTSIZRTPEZXB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QI3EHAHABFQK7OABNCSF5GMYP6TONTI7/
https://nest.pijul.com/pijul/thrussh/changes/D6H7OWTTMHHX6BTB3B6MNBOBX2L66CBL4LGSEUSAI2MCRCJDQFRQC
https://news.ycombinator.com/item?id=38684904
https://news.ycombinator.com/item?id=38685286
https://news.ycombinator.com/item?id=38732005
https://nova.app/releases/#v11.8
https://oryx-embedded.com/download/#changelog
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0002
https://roumenpetrov.info/secsh/#news20231220
https://security-tracker.debian.org/tracker/CVE-2023-48795
https://security-tracker.debian.org/tracker/source-package/libssh2
https://security-tracker.debian.org/tracker/source-package/proftpd-dfsg
https://security-tracker.debian.org/tracker/source-package/trilead-ssh2
https://security.gentoo.org/glsa/202312-16
https://security.gentoo.org/glsa/202312-17
https://security.netapp.com/advisory/ntap-20240105-0004/
https://support.apple.com/kb/HT214084
https://thorntech.com/cve-2023-48795-and-sftp-gateway/
https://twitter.com/TrueSkrillor/status/1736774389725565005
https://ubuntu.com/security/CVE-2023-48795
https://winscp.net/eng/docs/history#6.2.2
https://www.bitvise.com/ssh-client-version-history#933
https://www.bitvise.com/ssh-server-version-history
https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update
https://www.debian.org/security/2023/dsa-5586
https://www.debian.org/security/2023/dsa-5588
https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc
https://www.lancom-systems.de/service-support/allgemeine-sicherheitshinweise#c243508
https://www.openssh.com/openbsd.html
https://www.openssh.com/txt/release-9.6
https://www.reddit.com/r/sysadmin/comments/18idv52/cve202348795_why_is_this_cve_still_undisclosed/
https://www.suse.com/c/suse-addresses-the-ssh-v2-protocol-terrapin-attack-aka-cve-2023-48795/
https://www.terrapin-attack.com
https://www.theregister.com/2023/12/20/terrapin_attack_ssh
jsc#CAR-3031
rh#2254210
rh#2254997
CVE-2023-50495ncurses:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2023-50495
L3:67315
SMASH Issue 387747
bnc#1218014
bnc#1218140
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00020.html
https://lists.gnu.org/archive/html/bug-ncurses/2023-04/msg00029.html
https://security.netapp.com/advisory/ntap-20240119-0008/
jsc#CAR-3023
rh#2254244
CVE-2023-51385openssh:Affectedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)CVE-2023-51385
DSA-5586
L3:67385
L3:67419
L3:67494
L3:67582
L3:67647
L3:67648
L3:68231
OSS:2023/12/18/2
OSS:2023/12/26/4
OSS:2023/Q4/338
SMASH Issue 388573
bdo#1033166
bdo#995130
bnc#1218215
bnc#1218493
bnc#1219066
bnc#1219625
bnc#1219947
bnc#1226018
http://seclists.org/fulldisclosure/2024/Mar/21
https://github.com/openssh/openssh-portable/commit/7ef3787c84b6b524501211b11a26c742f829af1a
https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
https://security.gentoo.org/glsa/202312-17
https://security.netapp.com/advisory/ntap-20240105-0005/
https://support.apple.com/kb/HT214084
https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html
https://www.debian.org/security/2023/dsa-5586
https://www.openssh.com/txt/release-9.6
jsc#CAR-3055
rh#2255271
rh#2255850
CVE-2023-51780kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-51780
CVE-2023-52433
CVE-2023-52445
L3:67681
L3:67695
L3:67846
L3:67866
L3:68095
L3:68137
MISC:git.kernel.org:OSS:2024/Q2/86
MISC:jonathanspw.com:OSS:2024/Q2/86
OSS:2024/04/10/22
OSS:2024/04/10/23
OSS:2024/04/14/1
OSS:2024/04/15/2
OSS:2024/04/17/5
OSS:2024/Q2/116
OSS:2024/Q2/86
SMASH Issue 390670
bnc#1218730
bnc#1218733
bnc#1220294
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660
https://git.kernel.org/stable/c/2cf0005d315549b8d2b940ff96a66c2a889aa795
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/30773ea47d41773f9611ffb4ebc9bda9d19a9e7e
https://git.kernel.org/stable/c/3233d8bf7893550045682192cb227af7fa3defeb
https://git.kernel.org/stable/c/437b5f57732bb4cc32cc9f8895d2010ee9ff521c
https://git.kernel.org/stable/c/47aa8fcd5e8b5563af4042a00f25ba89bef8f33d
https://git.kernel.org/stable/c/ded85b0c0edd8f45fec88783d7555a5b982449c1
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/ec3634ebe23fc3c44ebc67c6d25917300bc68c08
https://git.kernel.org/stable/c/ec36c134dd020d28e312c2f1766f85525e747aab
https://github.com/Notselwyn/CVE-2024-1086
https://github.com/torvalds/linux/commit/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
https://security.netapp.com/advisory/ntap-20240419-0001/
jsc#CAR-3060
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2239843
rh#2256786
rh#2256822
rh#2257682
rh#2261903
rh#2262126
rh#2265184
rh#2265654
rh#2267705
rh#2269217
CVE-2023-51782kernel-source-rt:Affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-51782
SMASH Issue 390911
bnc#1218757
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8
https://github.com/torvalds/linux/commit/810c38a369a0a0ce625b5c12169abce1dd9ccd53
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
jsc#CAR-3061
CVE-2023-52340kernel-source-rt:Affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52340
L3:68095
L3:68137
SMASH Issue 392381
bnc#1219295
bnc#1219296
jsc#CAR-3085
rh#2257979
CVE-2023-52425expat:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52425
CVE-2023-6597
CVE-2024-0450
L3:67739
L3:67841
L3:67843
MISC:github.com:OSS:2024/Q1/231
MISC:mail.python.org:OSS:2024/Q1/240
OSS:2024/03/15/1
OSS:2024/03/20/5
OSS:2024/Q1/231
OSS:2024/Q1/240
SMASH Issue 392985
bnc#1219559
bnc#1220664
bnc#1221563
bnc#1222075
https://github.com/libexpat/libexpat/pull/789
https://lists.debian.org/debian-lts-announce/2024/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/
https://mail.python.org/archives/list/security-announce@python.org/thread/Q5C6ATFC67K53XFV4KE45325S7NS62LD/
https://mail.python.org/archives/list/security-announce@python.org/thread/XELNUX2L3IOHBTFU7RQHCY6OUVEWZ2FG/
https://security.netapp.com/advisory/ntap-20240614-0003/
jsc#CAR-3096
rh#2262877
rh#2268766
rh#2276518
rh#2276525
CVE-2023-52426expat:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-52426
SMASH Issue 392986
bnc#1219561
https://cwe.mitre.org/data/definitions/776.html
https://github.com/libexpat/libexpat/commit/0f075ec8ecb5e43f8fdca5182f8cca4703da0404
https://github.com/libexpat/libexpat/pull/777
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/
https://security.netapp.com/advisory/ntap-20240307-0005/
jsc#CAR-3097
rh#2262879
CVE-2023-52429kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52429
L3:67844
SMASH Issue 393674
bnc#1219827
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bd504bcfec41a503b32054da5472904b404341a4
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3LZROQAX7Q7LEP4F7WQ3KUZKWCZGFFP2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GS7S3XLTLOUKBXV67LLFZWB3YVFJZHRK/
https://www.spinics.net/lists/dm-devel/msg56625.html
jsc#CAR-3104
rh#2260046
rh#2263856
rh#2275620
CVE-2023-52434kernel-source-rt:Affectedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2023-52434
L3:68163
SMASH Issue 394630
bnc#1220148
https://git.kernel.org/stable/c/13fb0fc4917621f3dfa285a27eaf7151d770b5e5
https://git.kernel.org/stable/c/17a0f64cc02d4972e21c733d9f21d1c512963afa
https://git.kernel.org/stable/c/1ae3c59355dc9882e09c020afe8ffbd895ad0f29
https://git.kernel.org/stable/c/6726429c18c62dbf5e96ebbd522f262e016553fb
https://git.kernel.org/stable/c/890bc4fac3c0973a49cac35f634579bebba7fe48
https://git.kernel.org/stable/c/af1689a9b7701d9907dfc84d2a4b57c4bc907144
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3118
rh#2265285
CVE-2023-52435kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52435
SMASH Issue 394643
bnc#1220138
https://git.kernel.org/stable/c/23d05d563b7e7b0314e65c8e882bc27eac2da8e7
https://git.kernel.org/stable/c/6c53e8547687d9c767c139cd4b50af566f58c29a
https://git.kernel.org/stable/c/8f8f185643747fbb448de6aab0efa51c679909a3
https://git.kernel.org/stable/c/95b3904a261a9f810205da560e802cc326f50d77
https://git.kernel.org/stable/c/989b0ff35fe5fc9652ee5bafbe8483db6f27b137
https://git.kernel.org/stable/c/cd1022eaf87be8e6151435bd4df4c242c347e083
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3116
rh#2265292
CVE-2023-52439kernel-source-rt:Affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52439
SMASH Issue 394650
bnc#1220140
https://git.kernel.org/stable/c/0c9ae0b8605078eafc3bea053cc78791e97ba2e2
https://git.kernel.org/stable/c/17a8519cb359c3b483fb5c7367efa9a8a508bdea
https://git.kernel.org/stable/c/3174e0f7de1ba392dc191625da83df02d695b60c
https://git.kernel.org/stable/c/35f102607054faafe78d2a6994b18d5d9d6e92ad
https://git.kernel.org/stable/c/5cf604ee538ed0c467abe3b4cda5308a6398f0f7
https://git.kernel.org/stable/c/5e0be1229ae199ebb90b33102f74a0f22d152570
https://git.kernel.org/stable/c/913205930da6213305616ac539447702eaa85e41
https://git.kernel.org/stable/c/e93da893d52d82d57fc0db2ca566024e0f26ff50
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3115
rh#2265271
CVE-2023-52443kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52443
SMASH Issue 394898
bnc#1220240
https://git.kernel.org/stable/c/0a12db736edbb4933e4274932aeea594b5876fa4
https://git.kernel.org/stable/c/1d8e62b5569cc1466ceb8a7e4872cf10160a9dcf
https://git.kernel.org/stable/c/55a8210c9e7d21ff2644809699765796d4bfb200
https://git.kernel.org/stable/c/5c0392fdafb0a2321311900be83ffa572bef8203
https://git.kernel.org/stable/c/5ff00408e5029d3550ee77f62dc15f1e15c47f87
https://git.kernel.org/stable/c/77ab09b92f16c8439a948d1af489196953dc4a0e
https://git.kernel.org/stable/c/9286ee97aa4803d99185768735011d0d65827c9e
https://git.kernel.org/stable/c/9d4fa5fe2b1d56662afd14915a73b4d0783ffa45
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3121
jsc#CAR-3122
CVE-2023-52445kernel-source-rt:Affectedimportant6.3 (CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-51780
CVE-2023-52433
CVE-2023-52445
L3:67681
L3:67695
L3:67846
L3:67866
L3:68095
L3:68137
MISC:git.kernel.org:OSS:2024/Q2/86
MISC:jonathanspw.com:OSS:2024/Q2/86
OSS:2024/04/10/22
OSS:2024/04/10/23
OSS:2024/04/14/1
OSS:2024/04/15/2
OSS:2024/04/17/5
OSS:2024/Q2/116
OSS:2024/Q2/86
SMASH Issue 390670
SMASH Issue 394900
bnc#1218730
bnc#1218733
bnc#1220241
bnc#1220244
bnc#1220294
bnc#1220315
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660
https://git.kernel.org/stable/c/2cf0005d315549b8d2b940ff96a66c2a889aa795
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/30773ea47d41773f9611ffb4ebc9bda9d19a9e7e
https://git.kernel.org/stable/c/3233d8bf7893550045682192cb227af7fa3defeb
https://git.kernel.org/stable/c/437b5f57732bb4cc32cc9f8895d2010ee9ff521c
https://git.kernel.org/stable/c/47aa8fcd5e8b5563af4042a00f25ba89bef8f33d
https://git.kernel.org/stable/c/ded85b0c0edd8f45fec88783d7555a5b982449c1
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/ec3634ebe23fc3c44ebc67c6d25917300bc68c08
https://git.kernel.org/stable/c/ec36c134dd020d28e312c2f1766f85525e747aab
https://github.com/Notselwyn/CVE-2024-1086
https://github.com/torvalds/linux/commit/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
https://security.netapp.com/advisory/ntap-20240419-0001/
jsc#CAR-3060
jsc#CAR-3123
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2239843
rh#2256786
rh#2256822
rh#2257682
rh#2261903
rh#2262126
rh#2265184
rh#2265654
rh#2267705
rh#2269217
CVE-2023-52448kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52448
SMASH Issue 394903
bnc#1220253
https://git.kernel.org/stable/c/067a7c48c2c70f05f9460d6f0e8423e234729f05
https://git.kernel.org/stable/c/5c28478af371a1c3fdb570ca67f110e1ae60fc37
https://git.kernel.org/stable/c/8877243beafa7c6bfc42022cbfdf9e39b25bd4fa
https://git.kernel.org/stable/c/c323efd620c741168c8e0cc6fc0be04ab57e331a
https://git.kernel.org/stable/c/d69d7804cf9e2ba171a27e5f98bc266f13d0414a
https://git.kernel.org/stable/c/ee0586d73cbaf0e7058bc640d62a9daf2dfa9178
https://git.kernel.org/stable/c/efc8ef87ab9185a23d5676f2f7d986022d91bcde
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3125
rh#2265653
CVE-2023-52449kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52449
SMASH Issue 394904
bnc#1220238
https://git.kernel.org/stable/c/001a3f59d8c914ef8273461d4bf495df384cc5f8
https://git.kernel.org/stable/c/1bf4fe14e97cda621522eb2f28b0a4e87c5b0745
https://git.kernel.org/stable/c/5389407bba1eab1266c6d83e226fb0840cb98dd5
https://git.kernel.org/stable/c/a43bdc376deab5fff1ceb93dca55bcab8dbdc1d6
https://git.kernel.org/stable/c/aeba358bcc8ffddf9b4a9bd0e5ec9eb338d46022
https://git.kernel.org/stable/c/b36aaa64d58aaa2f2cbc8275e89bae76a2b6c3dc
https://git.kernel.org/stable/c/cfd7c9d260dc0a3baaea05a122a19ab91e193c65
https://git.kernel.org/stable/c/d8ac2537763b54d278b80b2b080e1652523c7d4c
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3132
rh#2265651
CVE-2023-52451kernel-source-rt:Affectedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H)CVE-2023-52451
SMASH Issue 394906
bnc#1220250
https://git.kernel.org/stable/c/026fd977dc50ff4a5e09bfb0603557f104d3f3a0
https://git.kernel.org/stable/c/708a4b59baad96c4718dc0bd3a3427d3ab22fedc
https://git.kernel.org/stable/c/999a27b3ce9a69d54ccd5db000ec3a447bc43e6d
https://git.kernel.org/stable/c/9b5f03500bc5b083c0df696d7dd169d7ef3dd0c7
https://git.kernel.org/stable/c/b582aa1f66411d4adcc1aa55b8c575683fb4687e
https://git.kernel.org/stable/c/bb79613a9a704469ddb8d6c6029d532a5cea384c
https://git.kernel.org/stable/c/bd68ffce69f6cf8ddd3a3c32549d1d2275e49fc5
https://git.kernel.org/stable/c/df16afba2378d985359812c865a15c05c70a967e
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3127
rh#2265650
CVE-2023-52464kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 394977
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220330
bnc#1220354
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3056
jsc#CAR-3131
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52469kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2023-52469
SMASH Issue 395133
bnc#1220411
https://git.kernel.org/stable/c/28dd788382c43b330480f57cd34cde0840896743
https://git.kernel.org/stable/c/3426f059eacc33ecc676b0d66539297e1cfafd02
https://git.kernel.org/stable/c/35fa2394d26e919f63600ce631e6aefc95ec2706
https://git.kernel.org/stable/c/520e213a0b97b64735a13950e9371e0a5d7a5dc3
https://git.kernel.org/stable/c/8a27d9d9fc9b5564b8904c3a77a7dea482bfa34e
https://git.kernel.org/stable/c/8b55b06e737feb2a645b0293ea27e38418876d63
https://git.kernel.org/stable/c/95084632a65d5c0d682a83b55935560bdcd2a1e3
https://git.kernel.org/stable/c/b6dcba02ee178282e0d28684d241e0b8462dea6a
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3138
rh#2266341
CVE-2023-52470kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395134
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220413
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3056
jsc#CAR-3139
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52474kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)CVE-2023-52474
SMASH Issue 395209
bnc#1220445
https://git.kernel.org/stable/c/00cbce5cbf88459cd1aa1d60d0f1df15477df127
https://git.kernel.org/stable/c/7e6010f79b58f45b204cf18aa58f4b73c3f30adc
https://git.kernel.org/stable/c/9c4c6512d7330b743c4ffd18bd999a86ca26db0d
https://git.kernel.org/stable/c/a2bd706ab63509793b5cd5065e685b7ef5cba678
https://git.kernel.org/stable/c/c76cb8f4bdf26d04cfa5485a93ce297dba5e6a80
https://git.kernel.org/stable/c/dce59b5443700fbd0d2433ec6e4d4cf063448844
jsc#CAR-3145
rh#2266278
CVE-2023-52475kernel-source-rt:Affectedmoderate6.3 (CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395792
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220649
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3159
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52476kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395793
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220703
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3172
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52477kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52477
SMASH Issue 395794
bnc#1220790
https://git.kernel.org/stable/c/136f69a04e71ba3458d137aec3bb2ce1232c0289
https://git.kernel.org/stable/c/241f230324337ed5eae3846a554fb6d15169872c
https://git.kernel.org/stable/c/528f0ba9f7a4bc1b61c9b6eb591ff97ca37cac6b
https://git.kernel.org/stable/c/6ad3e9fd3632106696692232bf7ff88b9f7e1bc3
https://git.kernel.org/stable/c/8e7346bfea56453e31b7421c1c17ca2fb9ed613d
https://git.kernel.org/stable/c/c64e4dca9aefd232b17ac4c779b608b286654e81
https://git.kernel.org/stable/c/f74a7afc224acd5e922c7a2e52244d891bbe44ee
https://git.kernel.org/stable/c/fb9895ab9533534335fa83d70344b397ac862c81
jsc#CAR-3170
rh#2267038
CVE-2023-52478kernel-source-rt:Affectedmoderate5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395795
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220796
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3171
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52482kernel-source-rt:Affectedmoderate5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395799
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220735
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e7ea043bc3f19473561c08565047b3f1671bf35d
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3056
jsc#CAR-3173
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52486kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 397128
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1221277
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3056
jsc#CAR-3228
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52488kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 396606
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1221162
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4e37416e4ee1b1bc17364a68973e0c63be89e611
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e635f652696ef6f1230621cfd89c350cb5ec6169
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3056
jsc#CAR-3221
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2268455
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52489kernel-source-rt:Affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52489
SMASH Issue 397130
bnc#1221326
https://git.kernel.org/stable/c/3a01daace71b521563c38bbbf874e14c3e58adb7
https://git.kernel.org/stable/c/5ec8e8ea8b7783fab150cf86404fc38cb4db8800
https://git.kernel.org/stable/c/68ed9e33324021e9d6b798e9db00ca3093d2012a
https://git.kernel.org/stable/c/70064241f2229f7ba7b9599a98f68d9142e81a97
https://git.kernel.org/stable/c/90ad17575d26874287271127d43ef3c2af876cea
https://git.kernel.org/stable/c/b448de2459b6d62a53892487ab18b7d823ff0529
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3226
rh#2269189
CVE-2023-52500kernel-source-rt:Affectedmoderate3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 396049
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220883
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3184
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267783
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52502kernel-source-rt:Affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52502
CVE-2023-52591
L3:67920
L3:68095
L3:68137
SMASH Issue 396051
bnc#1220831
bnc#1220832
bnc#1222094
https://git.kernel.org/stable/c/17e1361cb91dc1325834da95d2ab532959d2debc
https://git.kernel.org/stable/c/31c07dffafce914c1d1543c135382a11ff058d93
https://git.kernel.org/stable/c/49db9b1b86a82448dfaf3fcfefcf678dee56c8ed
https://git.kernel.org/stable/c/6ac22ecdaad2ecc662048f8c6b0ceb1ca0699ef9
https://git.kernel.org/stable/c/7adcf014bda16cdbf804af5c164d94d5d025db2d
https://git.kernel.org/stable/c/c04c162f82ac403917780eb6d1654694455d4e7c
https://git.kernel.org/stable/c/d1af8a39cf839d93c8967fdd858f6bbdc3e4a15c
https://git.kernel.org/stable/c/d888d3f70b0de32b4f51534175f039ddab15eef8
https://git.kernel.org/stable/c/e4f2611f07c87b3ddb57c4b9e8efcd1e330fc3dc
https://git.kernel.org/stable/c/e863f5720a5680e50c4cecf12424d7cc31b3eb0a
jsc#CAR-3174
rh#2267781
CVE-2023-52507kernel-source-rt:Affectedmoderate5.7 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 396056
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220833
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3175
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267776
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52510kernel-source-rt:Affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52510
SMASH Issue 396059
bnc#1220898
https://git.kernel.org/stable/c/217efe32a45249eb07dcd7197e8403de98345e66
https://git.kernel.org/stable/c/28b68cba378e3e50a4082b65f262bc4f2c7c2add
https://git.kernel.org/stable/c/55e06850c7894f00d41b767c5f5665459f83f58f
https://git.kernel.org/stable/c/84c6aa0ae5c4dc121f9996bb8fed46c80909d80e
https://git.kernel.org/stable/c/85c2857ef90041f567ce98722c1c342c4d31f4bc
https://git.kernel.org/stable/c/becf5c147198f4345243c5df0c4f035415491640
https://git.kernel.org/stable/c/cdb46be93c1f7bbf2c4649e9fc5fb147cfb5245d
https://git.kernel.org/stable/c/f990874b1c98fe8e57ee9385669f501822979258
jsc#CAR-3185
rh#2267773
CVE-2023-52513kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52513
SMASH Issue 396062
bnc#1221022
https://git.kernel.org/stable/c/0d520cdb0cd095eac5d00078dfd318408c9b5eed
https://git.kernel.org/stable/c/53a3f777049771496f791504e7dc8ef017cba590
https://git.kernel.org/stable/c/5cf38e638e5d01b68f9133968a85e8b3fd1ecf2f
https://git.kernel.org/stable/c/6e26812e289b374c17677d238164a5a8f5770594
https://git.kernel.org/stable/c/81b7bf367eea795d259d0261710c6a89f548844d
https://git.kernel.org/stable/c/eeafc50a77f6a783c2c44e7ec3674a7b693e06f8
jsc#CAR-3202
rh#2267804
CVE-2023-52515kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 396064
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1221048
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3205
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267802
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52522kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52522
SMASH Issue 396071
bnc#1220924
https://git.kernel.org/stable/c/147d89ee41434b97043c2dcb17a97dc151859baa
https://git.kernel.org/stable/c/25563b581ba3a1f263a00e8c9a97f5e7363be6fd
https://git.kernel.org/stable/c/2ea52a2fb8e87067e26bbab4efb8872639240eb0
https://git.kernel.org/stable/c/95eabb075a5902f4c0834ab1fb12dc35730c05af
https://git.kernel.org/stable/c/a75152d233370362eebedb2643592e7c883cc9fc
https://git.kernel.org/stable/c/f82aac8162871e87027692b36af335a2375d4580
jsc#CAR-3189
rh#2267795
CVE-2023-52524kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52524
SMASH Issue 396073
bnc#1220927
https://git.kernel.org/stable/c/191d87a19cf1005ecf41e1ae08d74e17379e8391
https://git.kernel.org/stable/c/29c16c2bf5866326d5fbc4a537b3997fcac23391
https://git.kernel.org/stable/c/4837a192f6d06d5bb2f3f47d6ce5353ab69bf86b
https://git.kernel.org/stable/c/7562780e32b84196731d57dd24563546fcf6d082
https://git.kernel.org/stable/c/dba849cc98113b145c6e720122942c00b8012bdb
https://git.kernel.org/stable/c/dfc7f7a988dad34c3bf4c053124fb26aa6c5f916
jsc#CAR-3211
rh#2267793
CVE-2023-52527kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52527
SMASH Issue 396076
bnc#1220928
https://git.kernel.org/stable/c/1fc793d68d50dee4782ef2e808913d5dd880bcc6
https://git.kernel.org/stable/c/559d697c5d072593d22b3e0bd8b8081108aeaf59
https://git.kernel.org/stable/c/7626b9fed53092aa2147978070e610ecb61af844
https://git.kernel.org/stable/c/96b2e1090397217839fcd6c9b6d8f5d439e705ed
https://git.kernel.org/stable/c/9d4c75800f61e5d75c1659ba201b6c0c7ead3070
https://git.kernel.org/stable/c/cd1189956393bf850b2e275e37411855d3bd86bb
https://git.kernel.org/stable/c/f6a7182179c0ed788e3755ee2ed18c888ddcc33f
https://git.kernel.org/stable/c/fe80658c08e3001c80c5533cd41abfbb0e0e28fd
jsc#CAR-3190
rh#2267790
CVE-2023-52528kernel-source-rt:Affectedlow3.5 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)CVE-2023-52528
SMASH Issue 396077
bnc#1220843
https://git.kernel.org/stable/c/2a36d9e2995c8c3c3f179aab1215a69cff06cbed
https://git.kernel.org/stable/c/30bc4d7aebe33904b0f2d3aad4b4a9c6029ad0c5
https://git.kernel.org/stable/c/310f1c92f65ad905b7e81fe14de82d979ebbd825
https://git.kernel.org/stable/c/3e0af6eec1789fd11934164a7f4dbcad979855a4
https://git.kernel.org/stable/c/4931e80da9463b03bfe42be54a9a19f213b0f76d
https://git.kernel.org/stable/c/9ffc5018020fe646795a8dc1203224b8f776dc09
https://git.kernel.org/stable/c/cda10784a176d7192f08ecb518f777a4e9575812
https://git.kernel.org/stable/c/e9c65989920f7c28775ec4e0c11b483910fb67b8
jsc#CAR-3176
rh#2267789
CVE-2023-52530kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 396079
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220930
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3191
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52531kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52531
SMASH Issue 396080
bnc#1220931
https://git.kernel.org/stable/c/6b3223449c959a8be94a1f042288059e40fcccb0
https://git.kernel.org/stable/c/7c8faa31080342aec4903c9acb20caf82fcca1ef
https://git.kernel.org/stable/c/8ba438ef3cacc4808a63ed0ce24d4f0942cfe55d
https://git.kernel.org/stable/c/f06cdd8d4ba5252986f51f80cc30263636397128
jsc#CAR-3192
rh#2267786
CVE-2023-52532kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 396081
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220932
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3194
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267785
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52561kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52561
SMASH Issue 396084
bnc#1220935
https://git.kernel.org/stable/c/110e70fccce4f22b53986ae797d665ffb1950aa6
https://git.kernel.org/stable/c/82dacd0ca0d9640723824026d6fdf773c02de1d2
https://git.kernel.org/stable/c/dc1ab6577475b0460ba4261cd9caec37bd62ca0b
jsc#CAR-3195
rh#2267736
CVE-2023-52569kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52569
SMASH Issue 396092
bnc#1220918
https://git.kernel.org/stable/c/2c58c3931ede7cd08cbecf1f1a4acaf0a04a41a9
https://git.kernel.org/stable/c/39c4a9522db0072570d602e9b365119e17fb9f4f
https://git.kernel.org/stable/c/d10fd53393cc5de4b9cf1a4b8f9984f0a037aa51
jsc#CAR-3187
rh#2267741
CVE-2023-52573kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52573
SMASH Issue 396096
bnc#1220869
https://git.kernel.org/stable/c/069ac51c37a6f07a51f7134d8c34289075786a35
https://git.kernel.org/stable/c/51fa66024a5eabf270164f2dc82a48ffb35a12e9
https://git.kernel.org/stable/c/812da2a08dc5cc75fb71e29083ea20904510ac7a
https://git.kernel.org/stable/c/ea82139e6e3561100d38d14401d57c0ea93fc07e
https://git.kernel.org/stable/c/f1d95df0f31048f1c59092648997686e3f7d9478
https://git.kernel.org/stable/c/f515112e833791001aaa8ab886af3ca78503617f
jsc#CAR-3181
rh#2267748
CVE-2023-52574kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52574
SMASH Issue 396097
bnc#1220870
https://git.kernel.org/stable/c/1779eb51b9cc628cee551f252701a85a2a50a457
https://git.kernel.org/stable/c/2f0acb0736ecc3eb85dc80ad2790d634dcb10b58
https://git.kernel.org/stable/c/492032760127251e5540a5716a70996bacf2a3fd
https://git.kernel.org/stable/c/a7fb47b9711101d2405b0eb1276fb1f9b9b270c7
https://git.kernel.org/stable/c/b44dd92e2afd89eb6e9d27616858e72a67bdc1a7
https://git.kernel.org/stable/c/c5f6478686bb45f453031594ae19b6c9723a780d
https://git.kernel.org/stable/c/cac50d9f5d876be32cb9aa21c74018468900284d
https://git.kernel.org/stable/c/cd05eec2ee0cc396813a32ef675634e403748255
jsc#CAR-3182
rh#2267750
CVE-2023-52578kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 396101
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1220874
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3183
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52583kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52583
SMASH Issue 396440
bnc#1221058
https://git.kernel.org/stable/c/196b87e5c00ce021e164a5de0f0d04f4116a9160
https://git.kernel.org/stable/c/6ab4fd508fad942f1f1ba940492f2735e078e980
https://git.kernel.org/stable/c/76cb2aa3421fee4fde706dec41b1344bc0a9ad67
https://git.kernel.org/stable/c/7f2649c94264d00df6b6ac27161e9f4372a3450e
https://git.kernel.org/stable/c/a9c15d6e8aee074fae66c04d114f20b84274fcca
https://git.kernel.org/stable/c/b493ad718b1f0357394d2cdecbf00a44a36fa085
https://git.kernel.org/stable/c/e016e358461b89b231626fcf78c5c38e35c44fd3
https://git.kernel.org/stable/c/eb55ba8aa7fb7aad54f40fbf4d8dcdfdba0bebf6
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3225
rh#2268339
CVE-2023-52587kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52587
SMASH Issue 396444
bnc#1221082
https://git.kernel.org/stable/c/342258fb46d66c1b4c7e2c3717ac01e10c03cf18
https://git.kernel.org/stable/c/4c8922ae8eb8dcc1e4b7d1059d97a8334288d825
https://git.kernel.org/stable/c/4f973e211b3b1c6d36f7c6a19239d258856749f9
https://git.kernel.org/stable/c/5108a2dc2db5630fb6cd58b8be80a0c134bc310a
https://git.kernel.org/stable/c/615e3adc2042b7be4ad122a043fc9135e6342c90
https://git.kernel.org/stable/c/7c7bd4d561e9dc6f5b7df9e184974915f6701a89
https://git.kernel.org/stable/c/ac2630fd3c90ffec34a0bfc4d413668538b0e8f2
https://git.kernel.org/stable/c/ed790bd0903ed3352ebf7f650d910f49b7319b34
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3217
rh#2268331
CVE-2023-52591kernel-source-rt:Affectedmoderate7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H)CVE-2023-52502
CVE-2023-52591
L3:67846
L3:67866
L3:67920
L3:68095
L3:68137
SMASH Issue 396051
SMASH Issue 396448
SMASH Issue 398001
SMASH Issue 398021
bnc#1220831
bnc#1220832
bnc#1221044
bnc#1221578
bnc#1221598
bnc#1222094
https://git.kernel.org/stable/c/17e1361cb91dc1325834da95d2ab532959d2debc
https://git.kernel.org/stable/c/31c07dffafce914c1d1543c135382a11ff058d93
https://git.kernel.org/stable/c/49db9b1b86a82448dfaf3fcfefcf678dee56c8ed
https://git.kernel.org/stable/c/6ac22ecdaad2ecc662048f8c6b0ceb1ca0699ef9
https://git.kernel.org/stable/c/7adcf014bda16cdbf804af5c164d94d5d025db2d
https://git.kernel.org/stable/c/c04c162f82ac403917780eb6d1654694455d4e7c
https://git.kernel.org/stable/c/d1af8a39cf839d93c8967fdd858f6bbdc3e4a15c
https://git.kernel.org/stable/c/d888d3f70b0de32b4f51534175f039ddab15eef8
https://git.kernel.org/stable/c/e4f2611f07c87b3ddb57c4b9e8efcd1e330fc3dc
https://git.kernel.org/stable/c/e863f5720a5680e50c4cecf12424d7cc31b3eb0a
jsc#CAR-3174
jsc#CAR-3245
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2225097
rh#2237757
rh#2256786
rh#2256822
rh#2261903
rh#2267781
rh#2268323
CVE-2023-52594kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52594
SMASH Issue 396451
bnc#1221045
https://git.kernel.org/stable/c/25c6f49ef59b7a9b80a3f7ab9e95268a1b01a234
https://git.kernel.org/stable/c/2adc886244dff60f948497b59affb6c6ebb3c348
https://git.kernel.org/stable/c/84770a996ad8d7f121ff2fb5a8d149aad52d64c1
https://git.kernel.org/stable/c/9003fa9a0198ce004b30738766c67eb7373479c9
https://git.kernel.org/stable/c/be609c7002dd4504b15b069cb7582f4c778548d1
https://git.kernel.org/stable/c/e4f4bac7d3b64eb75f70cd3345712de6f68a215d
https://git.kernel.org/stable/c/f11f0fd1ad6c11ae7856d4325fe9d05059767225
https://git.kernel.org/stable/c/f44f073c78112ff921a220d01b86d09f2ace59bc
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3214
rh#2268317
CVE-2023-52595kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 396452
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1221046
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3056
jsc#CAR-3215
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52597kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 396454
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1221040
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3056
jsc#CAR-3204
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52598kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52598
SMASH Issue 396455
bnc#1221060
https://git.kernel.org/stable/c/02c6bbfb08bad78dd014e24c7b893723c15ec7a1
https://git.kernel.org/stable/c/28a1f492cb527f64593457a0a0f0d809b3f36c25
https://git.kernel.org/stable/c/6ccf904aac0292e1f6b1a1be6c407c414f7cf713
https://git.kernel.org/stable/c/6d0822f2cc9b153bf2df49a84599195a2e0d21a8
https://git.kernel.org/stable/c/7a4d6481fbdd661f9e40e95febb95e3dee82bad3
https://git.kernel.org/stable/c/856caf2730ea18cb39e95833719c02a02447dc0a
https://git.kernel.org/stable/c/8b13601d19c541158a6e18b278c00ba69ae37829
https://git.kernel.org/stable/c/bdce67df7f12fb0409fbc604ce7c4254703f56d4
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3216
rh#2268309
CVE-2023-52607kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 396464
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1221061
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3056
jsc#CAR-3213
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2023-52610kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-52610
SMASH Issue 398026
bnc#1221610
https://git.kernel.org/stable/c/0b5b831122fc3789fff75be433ba3e4dd7b779d4
https://git.kernel.org/stable/c/172ba7d46c202e679f3ccb10264c67416aaeb1c4
https://git.kernel.org/stable/c/3f14b377d01d8357eba032b4cabc8c1149b458b6
https://git.kernel.org/stable/c/73f7da5fd124f2cda9161e2e46114915e6e82e97
https://git.kernel.org/stable/c/f5346df0591d10bc948761ca854b1fae6d2ef441
jsc#CAR-3233
rh#2270080
CVE-2023-52612kernel-source-rt:Affectedmoderate6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H)CVE-2023-52612
SMASH Issue 398028
bnc#1221616
https://git.kernel.org/stable/c/1142d65c5b881590962ad763f94505b6dd67d2fe
https://git.kernel.org/stable/c/4518dc468cdd796757190515a9be7408adc8911e
https://git.kernel.org/stable/c/4df0c942d04a67df174195ad8082f6e30e7f71a5
https://git.kernel.org/stable/c/71c6670f9f032ec67d8f4e3f8db4646bf5a62883
https://git.kernel.org/stable/c/744e1885922a9943458954cfea917b31064b4131
https://git.kernel.org/stable/c/7d9e5bed036a7f9e2062a137e97e3c1e77fb8759
https://git.kernel.org/stable/c/a5f2f91b3fd7387e5102060809316a0f8f0bc625
https://git.kernel.org/stable/c/e0e3f4a18784182cfe34e20c00eca11e78d53e76
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3240
rh#2270075
CVE-2023-52614kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)CVE-2023-52614
SMASH Issue 398030
bnc#1221617
https://git.kernel.org/stable/c/087de000e4f8c878c81d9dd3725f00a1d292980c
https://git.kernel.org/stable/c/08e23d05fa6dc4fc13da0ccf09defdd4bbc92ff4
https://git.kernel.org/stable/c/796d3fad8c35ee9df9027899fb90ceaeb41b958f
https://git.kernel.org/stable/c/8a7729cda2dd276d7a3994638038fb89035b6f2c
https://git.kernel.org/stable/c/a979f56aa4b93579cf0e4265ae04d7e9300fd3e8
https://git.kernel.org/stable/c/eaef4650fa2050147ca25fd7ee43bc0082e03c87
jsc#CAR-3243
rh#2270071
CVE-2023-52615kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52615
SMASH Issue 398031
bnc#1221614
https://git.kernel.org/stable/c/26cc6d7006f922df6cc4389248032d955750b2a0
https://git.kernel.org/stable/c/5030d4c798863ccb266563201b341a099e8cdd48
https://git.kernel.org/stable/c/6822a14271786150e178869f1495cc03e74c5029
https://git.kernel.org/stable/c/78aafb3884f6bc6636efcc1760c891c8500b9922
https://git.kernel.org/stable/c/aa8aa16ed9adf1df05bb339d588cf485a011839e
https://git.kernel.org/stable/c/c6a8111aacbfe7a8a70f46cc0de8eed00561693c
https://git.kernel.org/stable/c/eafd83b92f6c044007a3591cbd476bcf90455990
https://git.kernel.org/stable/c/ecabe8cd456d3bf81e92c53b074732f3140f170d
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3234
rh#2270093
CVE-2023-52619kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52619
SMASH Issue 398035
bnc#1221618
https://git.kernel.org/stable/c/0593cfd321df9001142a9d2c58d4144917dff7ee
https://git.kernel.org/stable/c/2a37905d47bffec61e95d99f0c1cc5dc6377956c
https://git.kernel.org/stable/c/75b0f71b26b3ad833c5c0670109c0af6e021e86a
https://git.kernel.org/stable/c/8b69c30f4e8b69131d92096cb296dc1f217101e4
https://git.kernel.org/stable/c/a63e48cd835c34c38ef671d344cc029b1ea5bf10
https://git.kernel.org/stable/c/cd40e43f870cf21726b22487a95ed223790b3542
https://git.kernel.org/stable/c/d49270a04623ce3c0afddbf3e984cb245aa48e9c
https://git.kernel.org/stable/c/e9f6ac50890104fdf8194f2865680689239d30fb
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3241
rh#2270084
CVE-2023-52620kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52620
SMASH Issue 398534
bnc#1221825
https://git.kernel.org/stable/c/00b19ee0dcc1aef06294471ab489bae26d94524e
https://git.kernel.org/stable/c/116b0e8e4673a5faa8a739a19b467010c4d3058c
https://git.kernel.org/stable/c/49ce99ae43314d887153e07cec8bb6a647a19268
https://git.kernel.org/stable/c/6f3ae02bbb62f151b19162d5fdc9fe3d48450323
https://git.kernel.org/stable/c/b7be6c737a179a76901c872f6b4c1d00552d9a1b
https://git.kernel.org/stable/c/e26d3009efda338f19016df4175f354a9bd0a4ab
jsc#CAR-3246
rh#2270883
CVE-2023-52622kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52622
SMASH Issue 399004
bnc#1222080
https://git.kernel.org/stable/c/5d1935ac02ca5aee364a449a35e2977ea84509b0
https://git.kernel.org/stable/c/6d2cbf517dcabc093159cf138ad5712c9c7fa954
https://git.kernel.org/stable/c/8b1413dbfe49646eda2c00c0f1144ee9d3368e0c
https://git.kernel.org/stable/c/b183fe8702e78bba3dcef8e7193cab6898abee07
https://git.kernel.org/stable/c/cd1f93ca97a9136989f3bd2bf90696732a2ed644
https://git.kernel.org/stable/c/cfbbb3199e71b63fc26cee0ebff327c47128a1e8
https://git.kernel.org/stable/c/d76c8d7ffe163c6bf2f1ef680b0539c2b3902b90
https://git.kernel.org/stable/c/dc3e0f55bec4410f3d74352c4a7c79f518088ee2
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3260
rh#2271688
CVE-2023-52623kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52623
SMASH Issue 399007
bnc#1222060
https://git.kernel.org/stable/c/31b62908693c90d4d07db597e685d9f25a120073
https://git.kernel.org/stable/c/69c7eeb4f622c2a28da965f970f982db171f3dc6
https://git.kernel.org/stable/c/7a96d85bf196c170dcf1b47a82e9bb97cca69aa6
https://git.kernel.org/stable/c/8f860c8407470baff2beb9982ad6b172c94f1d0a
https://git.kernel.org/stable/c/c430e6bb43955c6bf573665fcebf31694925b9f7
https://git.kernel.org/stable/c/e8ca3e73301e23e8c0ac0ce2e6bac4545cd776e0
https://git.kernel.org/stable/c/f8cf4dabbdcb8bef85335b0ed7ad5b25fd82ff56
https://git.kernel.org/stable/c/fece80a2a6718ed58487ce397285bb1b83a3e54e
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3259
rh#2271686
CVE-2023-52635kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52635
SMASH Issue 399958
bnc#1222294
https://git.kernel.org/stable/c/099f6a9edbe30b142c1d97fe9a4748601d995675
https://git.kernel.org/stable/c/0aedb319ef3ed39e9e5a7b7726c8264ca627bbd9
https://git.kernel.org/stable/c/31569995fc65007b73a3fff605ec2b3401b435e9
https://git.kernel.org/stable/c/3399cc7013e761fee9d6eec795e9b31ab0cbe475
https://git.kernel.org/stable/c/ae815e2fdc284ab31651d52460698bd89c0fce22
https://git.kernel.org/stable/c/aed5ed595960c6d301dcd4ed31aeaa7a8054c0c6
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3263
rh#2272808
CVE-2023-52642kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52642
SMASH Issue 402302
bnc#1223031
https://git.kernel.org/stable/c/6a9d552483d50953320b9d3b57abdee8d436f23f
https://git.kernel.org/stable/c/93136132d1b5792bf44151e3494ae3691cd738e8
https://git.kernel.org/stable/c/93d8109bf182510629bbefc8cd45296d2393987f
https://git.kernel.org/stable/c/9f6087851ec6dce5b15f694aeaf3e8ec8243224e
https://git.kernel.org/stable/c/caf2da1d4562de4e35eedec0be2b7f1ee25d83be
https://git.kernel.org/stable/c/d98210108e7b2ff64b332b0a3541c8ad6a0617b0
jsc#CAR-3350
rh#2275626
CVE-2023-52644kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52644
SMASH Issue 402352
bnc#1222961
https://git.kernel.org/stable/c/04a2b6eff2ae1c19cb7f41e803bcbfaf94c06455
https://git.kernel.org/stable/c/1824f942527f784a19e01eac2d9679a21623d010
https://git.kernel.org/stable/c/31aaf17200c336fe258b70d39c40645ae19d0240
https://git.kernel.org/stable/c/4049a9f80513a6739c5677736a4c88f96df1b436
https://git.kernel.org/stable/c/49f067726ab01c87cf57566797a8a719badbbf08
https://git.kernel.org/stable/c/9636951e4468f02c72cc75a82dc65d003077edbc
https://git.kernel.org/stable/c/bc845e2e42cae95172c04bf29807c480f51a2a83
https://git.kernel.org/stable/c/c67698325c68f8768db858f5c87c34823421746d
https://git.kernel.org/stable/c/f1cf77bb870046a6111a604f7f7fe83d1c8c9610
jsc#CAR-3323
rh#2275810
CVE-2023-52646kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52646
SMASH Issue 403285
bnc#1223432
https://git.kernel.org/stable/c/178993157e8c50aef7f35d7d6d3b44bb428199e1
https://git.kernel.org/stable/c/4326d0080f7e84fba775da41d158f46cf9d3f1c2
https://git.kernel.org/stable/c/808f1e4b5723ae4eda724d2ad6f6638905eefd95
https://git.kernel.org/stable/c/81e9d6f8647650a7bead74c5f926e29970e834d1
https://git.kernel.org/stable/c/af126acf01a12bdb04986fd26fc2eb3b40249e0d
https://git.kernel.org/stable/c/c261f798f7baa8080cf0214081d43d5f86bb073f
https://git.kernel.org/stable/c/d8dca1bfe9adcae38b35add64977818c0c13dd22
jsc#CAR-3371
rh#2277789
CVE-2023-52650kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52650
SMASH Issue 403807
bnc#1223770
https://git.kernel.org/stable/c/3169eaf1365541fd8e521091010c44fbe14691fc
https://git.kernel.org/stable/c/47a13d0b9d8527518639ab5c39667f69d6203e80
https://git.kernel.org/stable/c/50c0ad785a780c72a2fdaba10b38c645ffb4eae6
https://git.kernel.org/stable/c/52aa507148c4aad41436e2005d742ffcafad9976
https://git.kernel.org/stable/c/92003981a6df5dc84af8a5904f8ee112fa324129
https://git.kernel.org/stable/c/93128052bf832359531c3c0a9e3567b2b8682a2d
https://git.kernel.org/stable/c/afe6fcb9775882230cd29b529203eabd5d2a638d
https://git.kernel.org/stable/c/c5d2342d24ef6e08fc90a529fe3dc59de421a2b9
https://git.kernel.org/stable/c/f05631a8525c3b5e5994ecb1304d2d878956c0f5
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3420
rh#2278522
CVE-2023-52652kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2023-52652
SMASH Issue 403809
bnc#1223686
https://git.kernel.org/stable/c/6632a54ac8057cc0b0d789c6f73883e871bcd25c
https://git.kernel.org/stable/c/913421f9f7fd8324dcc41753d0f28b52e177ef04
https://git.kernel.org/stable/c/a039690d323221eb5865f1f31db3ec264e7a14b6
https://git.kernel.org/stable/c/a62b9f3d7bbfac874cc0c638bc1776dcf1f8ec06
https://git.kernel.org/stable/c/aebfdfe39b9327a3077d0df8db3beb3160c9bdd0
https://git.kernel.org/stable/c/e8025439ef8e16029dc313d78a351ef192469b7b
jsc#CAR-3403
rh#2278517
CVE-2023-52653kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2023-52653
SMASH Issue 403810
bnc#1223712
https://git.kernel.org/stable/c/47ac11db93e74ac49cd6c3fc69bcbc5964c4a8b4
https://git.kernel.org/stable/c/99044c01ed5329e73651c054d8a4baacdbb1a27c
https://git.kernel.org/stable/c/d111e30d9cd846bb368faf3637dc0f71fcbcf822
https://git.kernel.org/stable/c/e67b652d8e8591d3b1e569dbcdfcee15993e91fa
jsc#CAR-3406
rh#2278515
CVE-2023-52656kernel-source-rt:Affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2023-52656
SMASH Issue 405001
bnc#1224187
https://git.kernel.org/stable/c/6e5e6d274956305f1fc0340522b38f5f5be74bdb
https://git.kernel.org/stable/c/88c49d9c896143cdc0f77197c4dcf24140375e89
https://git.kernel.org/stable/c/a3812a47a32022ca76bf46ddacdd823dc2aabf8b
https://git.kernel.org/stable/c/a6771f343af90a25f3a14911634562bb5621df02
https://git.kernel.org/stable/c/cfb24022bb2c31f1f555dc6bc3cc5e2547446fb3
https://git.kernel.org/stable/c/d909d381c3152393421403be4b6435f17a2378b4
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3457
rh#2280444
CVE-2023-52664kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52664
SMASH Issue 406401
bnc#1224747
https://git.kernel.org/stable/c/0edb3ae8bfa31cd544b0c195bdec00e036002b5d
https://git.kernel.org/stable/c/b3cb7a830a24527877b0bc900b9bd74a96aea928
https://git.kernel.org/stable/c/c11a870a73a3bc4cc7df6dd877a45b181795fcbf
https://git.kernel.org/stable/c/d1fde4a7e1dcc4d49cce285107a7a43c3030878d
jsc#CAR-3547
rh#2281356
CVE-2023-52669kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52669
SMASH Issue 406404
bnc#1224637
https://git.kernel.org/stable/c/a7f580cdb42ec3d53bbb7c4e4335a98423703285
https://git.kernel.org/stable/c/cd51e26a3b89706beec64f2d8296cfb1c34e0c79
https://git.kernel.org/stable/c/d07f951903fa9922c375b8ab1ce81b18a0034e3b
https://git.kernel.org/stable/c/d68ac38895e84446848b7647ab9458d54cacba3e
https://git.kernel.org/stable/c/dbc9a791a70ea47be9f2acf251700fe254a2ab23
https://git.kernel.org/stable/c/e78f1a43e72daf77705ad5b9946de66fc708b874
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3486
rh#2281346
CVE-2023-52670kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52670
SMASH Issue 406381
bnc#1224696
https://git.kernel.org/stable/c/229ce47cbfdc7d3a9415eb676abbfb77d676cb08
https://git.kernel.org/stable/c/2d27a7b19cb354c6d04bcdc9239e261ff29858d6
https://git.kernel.org/stable/c/4e6cef3fae5c164968118a13f3fe293700adc81a
https://git.kernel.org/stable/c/69ca89d80f2c8a1f5af429b955637beea7eead30
https://git.kernel.org/stable/c/9a416d624e5fb7246ea97c11fbfea7e0e27abf43
https://git.kernel.org/stable/c/d5362c37e1f8a40096452fc201c30e705750e687
https://git.kernel.org/stable/c/dd50fe18c234bd5ff22f658f4d414e8fa8cd6a5d
https://git.kernel.org/stable/c/f4bb1d5daf77b1a95a43277268adf0d1430c2346
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3501
rh#2281344
CVE-2023-52674kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52674
SMASH Issue 406400
bnc#1224727
https://git.kernel.org/stable/c/03035872e17897ba89866940bbc9cefca601e572
https://git.kernel.org/stable/c/04f8f053252b86c7583895c962d66747ecdc61b7
https://git.kernel.org/stable/c/ad945ea8d47dd4454c271510bea24850119847c2
https://git.kernel.org/stable/c/d8d8897d65061cbe36bf2909057338303a904810
https://git.kernel.org/stable/c/e517645ead5ea22c69d2a44694baa23fe1ce7c2b
jsc#CAR-3504
rh#2281336
CVE-2023-52675kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52675
SMASH Issue 406470
bnc#1224504
https://git.kernel.org/stable/c/024352f7928b28f53609660663329d8c0f4ad032
https://git.kernel.org/stable/c/0a233867a39078ebb0f575e2948593bbff5826b3
https://git.kernel.org/stable/c/1e80aa25d186a7aa212df5acd8c75f55ac8dae34
https://git.kernel.org/stable/c/5a669f3511d273c8c1ab1c1d268fbcdf53fc7a05
https://git.kernel.org/stable/c/75fc599bcdcb1de093c9ced2e3cccc832f3787f3
https://git.kernel.org/stable/c/a2da3f9b1a1019c887ee1d164475a8fcdb0a3fec
https://git.kernel.org/stable/c/c7d828e12b326ea50fb80c369d7aa87519ed14c6
https://git.kernel.org/stable/c/f105c263009839d80fad6998324a4e1b3511cba0
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3480
rh#2281334
CVE-2023-52679kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52679
SMASH Issue 406474
bnc#1224508
https://git.kernel.org/stable/c/26b4d702c44f9e5cf3c5c001ae619a4a001889db
https://git.kernel.org/stable/c/4541004084527ce9e95a818ebbc4e6b293ffca21
https://git.kernel.org/stable/c/4dde83569832f9377362e50f7748463340c5db6b
https://git.kernel.org/stable/c/a0a061151a6200c13149dbcdb6c065203c8425d2
https://git.kernel.org/stable/c/b64d09a4e8596f76d27f4b4a90a1cf6baf6a82f8
https://git.kernel.org/stable/c/b9d760dae5b10e73369b769073525acd7b3be2bd
https://git.kernel.org/stable/c/cafa992134124e785609a406da4ff2b54052aff7
https://git.kernel.org/stable/c/d5f490343c77e6708b6c4aa7dbbfbcbb9546adea
jsc#CAR-3477
rh#2281326
CVE-2023-52680kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52680
SMASH Issue 406443
bnc#1224608
https://git.kernel.org/stable/c/3a09488f4f67f7ade59b8ac62a6c7fb29439cf51
https://git.kernel.org/stable/c/50603a67daef161c78c814580d57f7f0be57167e
https://git.kernel.org/stable/c/773e38f73461ef2134a0d33a08f1668edde9b7c3
https://git.kernel.org/stable/c/821fbaeaaae23d483d3df799fe91ec8045973ec3
https://git.kernel.org/stable/c/cda7762bea857e6951315a2f7d0632ea1850ed43
jsc#CAR-3494
rh#2281324
CVE-2023-52683kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52683
SMASH Issue 406422
bnc#1224627
https://git.kernel.org/stable/c/56d2eeda87995245300836ee4dbd13b002311782
https://git.kernel.org/stable/c/647d1d50c31e60ef9ccb9756a8fdf863329f7aee
https://git.kernel.org/stable/c/6c38e791bde07d6ca2a0a619ff9b6837e0d5f9ad
https://git.kernel.org/stable/c/72222dfd76a79d9666ab3117fcdd44ca8cd0c4de
https://git.kernel.org/stable/c/b7aab9d906e2e252a7783f872406033ec49b6dae
https://git.kernel.org/stable/c/c1814a4ffd016ce5392c6767d22ef3aa2f0d4bd1
https://git.kernel.org/stable/c/d1ac288b2742aa4af746c5613bac71760fadd1c4
https://git.kernel.org/stable/c/f39c3d578c7d09a18ceaf56750fc7f20b02ada63
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3489
rh#2281317
CVE-2023-52686kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52686
SMASH Issue 406391
bnc#1224682
https://git.kernel.org/stable/c/8422d179cf46889c15ceff9ede48c5bfa4e7f0b4
https://git.kernel.org/stable/c/8649829a1dd25199bbf557b2621cedb4bf9b3050
https://git.kernel.org/stable/c/9a523e1da6d88c2034f946adfa4f74b236c95ca9
https://git.kernel.org/stable/c/a14c55eb461d630b836f80591d8caf1f74e62877
https://git.kernel.org/stable/c/c0b111ea786ddcc8be0682612830796ece9436c7
https://git.kernel.org/stable/c/e08c2e275fa1874de945b87093f925997722ee42
https://git.kernel.org/stable/c/e6ad05e3ae9c84c5a71d7bb2d44dc845ae7990cf
https://git.kernel.org/stable/c/e93d7cf4c1ddbcd846739e7ad849f955a4f18031
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3496
rh#2281311
CVE-2023-52691kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52691
SMASH Issue 406445
bnc#1224607
https://git.kernel.org/stable/c/06d95c99d5a4f5accdb79464076efe62e668c706
https://git.kernel.org/stable/c/2bf47c89bbaca2bae16581ef1b28aaec0ade0334
https://git.kernel.org/stable/c/ac16667237a82e2597e329eb9bc520d1cf9dff30
https://git.kernel.org/stable/c/aeed2b4e4a70c7568d4a5eecd6a109713c0dfbf4
https://git.kernel.org/stable/c/afe9f5b871f86d58ecdc45b217b662227d7890d0
https://git.kernel.org/stable/c/ca8e2e251c65e5a712f6025e27bd9b26d16e6f4a
https://git.kernel.org/stable/c/f957a1be647f7fc65926cbf572992ec2747a93f2
https://git.kernel.org/stable/c/fb1936cb587262cd539e84b34541abb06e42b2f9
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3485
rh#2281301
CVE-2023-52693kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52693
SMASH Issue 406392
bnc#1224686
https://git.kernel.org/stable/c/1e3a2b9b4039bb4d136dca59fb31e06465e056f3
https://git.kernel.org/stable/c/2124c5bc22948fc4d09a23db4a8acdccc7d21e95
https://git.kernel.org/stable/c/39af144b6d01d9b40f52e5d773e653957e6c379c
https://git.kernel.org/stable/c/3a370502a5681986f9828e43be75ce26c6ab24af
https://git.kernel.org/stable/c/556f02699d33c1f40b1b31bd25828ce08fa165d8
https://git.kernel.org/stable/c/72884ce4e10417b1233b614bf134da852df0f15f
https://git.kernel.org/stable/c/c4e1a0ef0b4782854c9b77a333ca912b392bed2f
https://git.kernel.org/stable/c/ccd45faf4973746c4f30ea41eec864e5cf191099
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3498
rh#2281296
CVE-2023-52696kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52696
SMASH Issue 406452
bnc#1224601
https://git.kernel.org/stable/c/69f95c5e9220f77ce7c540686b056c2b49e9a664
https://git.kernel.org/stable/c/6b58d16037217d0c64a2a09b655f370403ec7219
https://git.kernel.org/stable/c/9da4a56dd3772570512ca58aa8832b052ae910dc
https://git.kernel.org/stable/c/a67a04ad05acb56640798625e73fa54d6d41cce1
https://git.kernel.org/stable/c/b02ecc35d01a76b4235e008d2dd292895b28ecab
https://git.kernel.org/stable/c/e123015c0ba859cf48aa7f89c5016cc6e98e018d
https://git.kernel.org/stable/c/f152a6bfd187f67afeffc9fd68cbe46f51439be0
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3482
rh#2281290
CVE-2023-52698kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52698
SMASH Issue 406423
bnc#1224621
https://git.kernel.org/stable/c/321b3a5592c8a9d6b654c7c64833ea67dbb33149
https://git.kernel.org/stable/c/36e19f84634aaa94f543fedc0a07588949638d53
https://git.kernel.org/stable/c/408bbd1e1746fe33e51f4c81c2febd7d3841d031
https://git.kernel.org/stable/c/44a88650ba55e6a7f2ec485d2c2413ba7e216f01
https://git.kernel.org/stable/c/9a8f811a146aa2a0230f8edb2e9f4b6609aab8da
https://git.kernel.org/stable/c/a4529a08d3704c17ea9c7277d180e46b99250ded
https://git.kernel.org/stable/c/ec4e9d630a64df500641892f4e259e8149594a99
https://git.kernel.org/stable/c/f14d36e6e97fe935a20e0ceb159c100f90b6627c
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3492
rh#2281286
CVE-2023-52699kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52699
SMASH Issue 406607
bnc#1224659
https://git.kernel.org/stable/c/13b33feb2ebddc2b1aa607f553566b18a4af1d76
https://git.kernel.org/stable/c/1b4fe801b5bedec2b622ddb18e5c9bf26c63d79f
https://git.kernel.org/stable/c/53cb1e52c9db618c08335984d1ca80db220ccf09
https://git.kernel.org/stable/c/674c1c4229e743070e09db63a23442950ff000d1
https://git.kernel.org/stable/c/89e8524135a3902e7563a5a59b7b5ec1bf4904ac
https://git.kernel.org/stable/c/a69224223746ab96d43e5db9d22d136827b7e2d3
https://git.kernel.org/stable/c/f123dc86388cb669c3d6322702dc441abc35c31e
https://git.kernel.org/stable/c/fd203d2c671bdee9ab77090ff394d3b71b627927
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3525
rh#2281512
CVE-2023-52700kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2023-52700
SMASH Issue 407172
bnc#1224938
https://git.kernel.org/stable/c/11a4d6f67cf55883dc78e31c247d1903ed7feccc
https://git.kernel.org/stable/c/54b6082aec178f16ad6d193b4ecdc9c4823d9a32
jsc#CAR-3561
rh#2282609
CVE-2023-52705kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52705
SMASH Issue 407217
bnc#1225480
https://git.kernel.org/stable/c/0ee5ed0126a2211f7174492da2ca2c29f43755c5
https://git.kernel.org/stable/c/2f7a1135b202977b82457adde7db6c390056863b
https://git.kernel.org/stable/c/52844d8382cd9166d708032def8905ffc3ae550f
https://git.kernel.org/stable/c/99b9402a36f0799f25feee4465bfa4b8dfa74b4d
https://git.kernel.org/stable/c/a158782b56b070485d54d25fc9aaf2c8f3752205
https://git.kernel.org/stable/c/a8ef5109f93cea9933bbac0455d8c18757b3fcb4
https://git.kernel.org/stable/c/b96591e2c35c8b47db0ec816b5fc6cb8868000ff
jsc#CAR-3739
rh#2282613
CVE-2023-52707kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52707
SMASH Issue 407089
bnc#1225109
bnc#1225110
https://git.kernel.org/stable/c/7caeb5457bd01ccba0df1d6f4872f20d28e50b38
https://git.kernel.org/stable/c/c2dbe32d5db5c4ead121cf86dabd5ab691fb47fe
https://git.kernel.org/stable/c/c6879a4dcefe92d870ab68cabaa9caeda4f2af5a
https://git.kernel.org/stable/c/cca2b3feb70170ef6f0fbc4b4d91eea235a2b73a
https://git.kernel.org/stable/c/ec9c7aa08819f976b2492fa63c41b5712d2924b5
jsc#CAR-3596
rh#2282615
CVE-2023-52708kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52708
SMASH Issue 407200
bnc#1225483
https://git.kernel.org/stable/c/0b3edcb24bd81b3b2e3dac89f4733bfd47d283be
https://git.kernel.org/stable/c/82645bf4ed02abe930a659c5fe16d593a6dbd93f
https://git.kernel.org/stable/c/cf4c9d2ac1e42c7d18b921bec39486896645b714
https://git.kernel.org/stable/c/e9b488d60f51ae312006e224e03a30a151c28bdd
https://git.kernel.org/stable/c/ecad2fafd424ffdc203b2748ded0b37e4bbecef3
jsc#CAR-3698
rh#2282607
CVE-2023-52730kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52730
SMASH Issue 407152
bnc#1224956
https://git.kernel.org/stable/c/1e06cf04239e202248c8fa356bf11449dc73cfbd
https://git.kernel.org/stable/c/30716d9f0fa1766e522cf24c8a456244e4fc9931
https://git.kernel.org/stable/c/5c7858adada31dbed042448cff6997dd6efc472a
https://git.kernel.org/stable/c/605d9fb9556f8f5fb4566f4df1480f280f308ded
https://git.kernel.org/stable/c/761db46b29b496946046d8cb33c7ea6de6bef36e
https://git.kernel.org/stable/c/92ff03c2563c9b57a027c744750f3b7d2f261c58
https://git.kernel.org/stable/c/f855d31bb38d663c3ba672345d7cce9324ba3b72
jsc#CAR-3572
rh#2282640
CVE-2023-52732kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52732
SMASH Issue 407082
bnc#1225222
https://git.kernel.org/stable/c/66ec619e4591f8350f99c5269a7ce160cccc7a7c
https://git.kernel.org/stable/c/a68e564adcaa69b0930809fb64d9d5f7d9c32ba9
jsc#CAR-3733
rh#2282621
CVE-2023-52733kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52733
SMASH Issue 407189
bnc#1225488
https://git.kernel.org/stable/c/16409f7d9ca5bb8220e1049ea9aae0d3c94d2dfb
https://git.kernel.org/stable/c/55dbd6f4ea954751340f4f73d5dcd7c8f12208b2
https://git.kernel.org/stable/c/7ab41c2c08a32132ba8c14624910e2fe8ce4ba4b
https://git.kernel.org/stable/c/9ed522143f959630f8b7782ddc212900d8f609a9
https://git.kernel.org/stable/c/f1eb22d0ff064ad458b3b1a1eaa84ac3996206c2
jsc#CAR-3737
rh#2282738
CVE-2023-52736kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52736
SMASH Issue 407191
bnc#1225486
https://git.kernel.org/stable/c/427ca2530da8dc61a42620d7113b05e187b6c2c0
https://git.kernel.org/stable/c/7fc4e7191eae9d9325511e03deadfdb2224914f8
https://git.kernel.org/stable/c/87978e6ad45a16835cc58234451111091be3c59a
https://git.kernel.org/stable/c/e909f5f2aa55a8f9aa6919cce08015cb0e8d4668
jsc#CAR-3738
rh#2282714
CVE-2023-52741kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52741
SMASH Issue 407117
bnc#1225479
https://git.kernel.org/stable/c/2b693fe3f760c87fd9768e759f6297f743a1b3b0
https://git.kernel.org/stable/c/3684a2f6affa1ca52a5d4a12f04d0652efdee65e
https://git.kernel.org/stable/c/aa5465aeca3c66fecdf7efcf554aed79b4c4b211
https://git.kernel.org/stable/c/d1fba1e096ffc7ec11df863a97c50203c47315b9
jsc#CAR-3741
rh#2282674
CVE-2023-52742kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52742
SMASH Issue 407215
bnc#1225482
https://git.kernel.org/stable/c/0d2cf3fae701646061e295815bb7588d2f3671cc
https://git.kernel.org/stable/c/1be271c52bf3554edcb8d124d1f8c7f777ee5727
https://git.kernel.org/stable/c/25141fb4119112f4ebf8f00cf52014abbc8020b1
https://git.kernel.org/stable/c/43379fcacea2dcee35d02efc9c8fe97807a503c9
https://git.kernel.org/stable/c/6f69307f625904feed189008381fd83bd1a35b63
https://git.kernel.org/stable/c/811d581194f7412eda97acc03d17fc77824b561f
https://git.kernel.org/stable/c/f0ad46ef772438c0596df370450d8bdc8a12dbfb
jsc#CAR-3697
rh#2282715
CVE-2023-52743kernel-source-rt:Affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2023-52743
SMASH Issue 407139
bnc#1225003
https://git.kernel.org/stable/c/1ad4112c9fcf0bc08222b2b1614fba52ffd12255
https://git.kernel.org/stable/c/4d159f7884f78b1aacb99b4fc37d1e3cb1194e39
https://git.kernel.org/stable/c/87a5e3fc8416106e290c448fc8a6dd50ab24c634
https://git.kernel.org/stable/c/ca834a017851c50464c25a85f3cb2daefff7bede
https://git.kernel.org/stable/c/df59e05401450973c8c7e96fd74b49e24442dc1f
jsc#CAR-3575
rh#2282788
CVE-2023-52747kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52747
SMASH Issue 407183
bnc#1224931
https://git.kernel.org/stable/c/00d9e212b8a39e6ffcf31b9d2e503d2bf6009d45
https://git.kernel.org/stable/c/0a4f811f2e5d07bbd0c9226f4afb0a1270a831ae
https://git.kernel.org/stable/c/6601fc0d15ffc20654e39486f9bef35567106d68
https://git.kernel.org/stable/c/7896accedf5bf1277d2f305718e36dc8bac7e321
https://git.kernel.org/stable/c/79b595d9591426156a9e0635a5b5115508a36fef
https://git.kernel.org/stable/c/9bae58d58b6bb73b572356b31a62d2afc7378d12
jsc#CAR-3559
rh#2282706
CVE-2023-52749kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52749
SMASH Issue 407096
bnc#1225476
https://git.kernel.org/stable/c/4ec4508db97502a12daee88c74782e8d35ced068
https://git.kernel.org/stable/c/96474ea47dc67b0704392d59192b233c8197db0e
https://git.kernel.org/stable/c/bef4a48f4ef798c4feddf045d49e53c8a97d5e37
jsc#CAR-3754
rh#2282679
CVE-2023-52752kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52752
SMASH Issue 407192
bnc#1225487
bnc#1225819
https://git.kernel.org/stable/c/0ab6f842452ce2cae04209d4671ac6289d0aef8a
https://git.kernel.org/stable/c/558817597d5fbd7af31f891b67b0fd20f0d047b7
https://git.kernel.org/stable/c/89929ea46f9cc11ba66d2c64713aa5d5dc723b09
https://git.kernel.org/stable/c/d328c09ee9f15ee5a26431f5aad7c9239fa85e62
jsc#CAR-3782
CVE-2023-52753kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52753
SMASH Issue 407123
bnc#1225478
https://git.kernel.org/stable/c/09909f515032fa80b921fd3118efe66b185d10fd
https://git.kernel.org/stable/c/4e497f1acd99075b13605b2e7fa0cba721a2cfd9
https://git.kernel.org/stable/c/6d8653b1a7a8dc938b566ae8c4f373b36e792c68
https://git.kernel.org/stable/c/79b6a90f4f2433312154cd68452b0ba501fa74db
https://git.kernel.org/stable/c/8a06894666e0b462c9316b26ab615cefdd0d676c
https://git.kernel.org/stable/c/b1904ed480cee3f9f4036ea0e36d139cb5fee2d6
https://git.kernel.org/stable/c/df8bc953eed72371e43ca407bd063507f760cf89
https://git.kernel.org/stable/c/eac3e4760aa12159f7f5475d55a67b7933abc195
jsc#CAR-3742
rh#2282638
CVE-2023-52754kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52754
SMASH Issue 407188
bnc#1225490
https://git.kernel.org/stable/c/0f5068519f89d928d6c51100e4b274479123829f
https://git.kernel.org/stable/c/10ec5a97f8f5a772a1a42b4eb27196b447cd3aa9
https://git.kernel.org/stable/c/2a493a34bd6e496c55fabedd82b957193ace178f
https://git.kernel.org/stable/c/5e0b788fb96be36d1baf1a5c88d09c7c82a0452a
https://git.kernel.org/stable/c/a1766a4fd83befa0b34d932d532e7ebb7fab1fa7
https://git.kernel.org/stable/c/b083aaf5db2eeca9e362723258e5d8698f7dd84e
jsc#CAR-3736
CVE-2023-52757kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52757
SMASH Issue 407220
bnc#1225548
https://git.kernel.org/stable/c/9eb44db68c5b7f5aa22b8fc7de74a3e2e08d1f29
https://git.kernel.org/stable/c/b9bb9607b1fc12fca51f5632da25b36975f599bf
https://git.kernel.org/stable/c/c1a5962f1462b64fe7b69f20a4b6af8067bc2d26
https://git.kernel.org/stable/c/e6322fd177c6885a21dd4609dc5e5c973d1a2eb7
jsc#CAR-3715
CVE-2023-52762kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52762
SMASH Issue 407107
bnc#1225573
https://git.kernel.org/stable/c/017278f141141367f7d14b203e930b45b6ffffb9
https://git.kernel.org/stable/c/472bd4787406bef2e8b41ee4c74d960a06a49a48
https://git.kernel.org/stable/c/72775cad7f572bb2501f9ea609e1d20e68f0b38b
https://git.kernel.org/stable/c/d667fe301dcbcb12d1d6494fc4b8abee2cb75d90
https://git.kernel.org/stable/c/fafb51a67fb883eb2dde352539df939a251851be
jsc#CAR-3725
CVE-2023-52764kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52764
SMASH Issue 407184
bnc#1225571
https://git.kernel.org/stable/c/099be1822d1f095433f4b08af9cc9d6308ec1953
https://git.kernel.org/stable/c/09cd8b561aa9796903710a1046957f2b112c8f26
https://git.kernel.org/stable/c/2eee8edfff90e22980a6b22079d238c3c9d323bb
https://git.kernel.org/stable/c/69bba62600bd91d6b7c1e8ca181faf8ac64f7060
https://git.kernel.org/stable/c/8f83c85ee88225319c52680792320c02158c2a9b
https://git.kernel.org/stable/c/93bddd6529f187f510eec759f37d0569243c9809
https://git.kernel.org/stable/c/a647f27a7426d2fe1b40da7c8fa2b81354a51177
https://git.kernel.org/stable/c/c6b6b8692218da73b33b310d7c1df90f115bdd9a
https://git.kernel.org/stable/c/e2d7149b913d14352c82624e723ce1c211ca06d3
jsc#CAR-3723
CVE-2023-52774kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52774
SMASH Issue 407219
bnc#1225572
https://git.kernel.org/stable/c/6062c527d0403cef27c54b91ac8390c3a497b250
https://git.kernel.org/stable/c/9372aab5d0ff621ea203c8c603e7e5f75e888240
https://git.kernel.org/stable/c/c841de6247e94e07566d57163d3c0d8b29278f7a
https://git.kernel.org/stable/c/db46cd1e0426f52999d50fa72cfa97fa39952885
https://git.kernel.org/stable/c/dc96fde8fcb2b896fd6c64802a7f4ece2e69b0be
https://git.kernel.org/stable/c/ebdc569a07a3e8dbe66b4184922ad6f88ac0b96f
https://git.kernel.org/stable/c/f1ac7789406e2ca9ac51c41ad2daa597f47bdd4d
https://git.kernel.org/stable/c/f75617cc8df4155374132f0b500b0b3ebb967458
jsc#CAR-3724
rh#2282673
CVE-2023-52784kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52784
SMASH Issue 407161
bnc#1224946
https://git.kernel.org/stable/c/19554aa901b5833787df4417a05ccdebf351b7f4
https://git.kernel.org/stable/c/396baca6683f415b5bc2b380289387bef1406edc
https://git.kernel.org/stable/c/3cffa2ddc4d3fcf70cde361236f5a614f81a09b2
https://git.kernel.org/stable/c/53064e8239dd2ecfefc5634e991f1025abc2ee0c
https://git.kernel.org/stable/c/87c49806a37f88eddde3f537c162fd0c2834170c
https://git.kernel.org/stable/c/b4f0e605a508f6d7cda6df2f03a0c676b778b1fe
https://git.kernel.org/stable/c/d98c91215a5748a0f536e7ccea26027005196859
jsc#CAR-3564
rh#2282772
CVE-2023-52791kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52791
SMASH Issue 407088
bnc#1225108
https://git.kernel.org/stable/c/185f3617adc8fe45e40489b458f03911f0dec46c
https://git.kernel.org/stable/c/25284c46b657f48c0f3880a2e0706c70d81182c0
https://git.kernel.org/stable/c/25eb381a736e7ae39a4245ef5c96484eb1073809
https://git.kernel.org/stable/c/3473cf43b9068b9dfef2f545f833f33c6a544b91
https://git.kernel.org/stable/c/8c3fa52a46ff4d208cefb1a462ec94e0043a91e1
https://git.kernel.org/stable/c/aa49c90894d06e18a1ee7c095edbd2f37c232d02
https://git.kernel.org/stable/c/f6237afabc349c1c7909db00e15d2816519e0d2b
jsc#CAR-3595
rh#2282763
CVE-2023-52796kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52796
SMASH Issue 407185
bnc#1224930
https://git.kernel.org/stable/c/03cddc4df8c6be47fd27c8f8b87e5f9a989e1458
https://git.kernel.org/stable/c/18f039428c7df183b09c69ebf10ffd4e521035d2
https://git.kernel.org/stable/c/1f64cad3ac38ac5978b53c40e6c5e6fd3477c68f
https://git.kernel.org/stable/c/43b781e7cb5cd0b435de276111953bf2bacd1f02
https://git.kernel.org/stable/c/4d2d30f0792b47908af64c4d02ed1ee25ff50542
https://git.kernel.org/stable/c/4f7f850611aa27aaaf1bf5687702ad2240ae442a
https://git.kernel.org/stable/c/732a67ca436887b594ebc43bb5a04ffb0971a760
https://git.kernel.org/stable/c/8872dc638c24bb774cd2224a69d72a7f661a4d56
jsc#CAR-3558
rh#2282766
CVE-2023-52799kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52799
SMASH Issue 407160
bnc#1225472
https://git.kernel.org/stable/c/20f9310a18e3e99fc031e036fcbed67105ae1859
https://git.kernel.org/stable/c/22cad8bc1d36547cdae0eef316c47d917ce3147c
https://git.kernel.org/stable/c/81aa58cd8495b8c3b527f58ccbe19478d8087f61
https://git.kernel.org/stable/c/86df90f3fea7c5591f05c8a0010871d435e83046
https://git.kernel.org/stable/c/87c681ab49e99039ff2dd3e71852417381b13878
https://git.kernel.org/stable/c/88b7894a8f8705bf4e7ea90b10229376abf14514
https://git.kernel.org/stable/c/a50b796d36719757526ee094c703378895ab5e67
https://git.kernel.org/stable/c/da3da5e1e6f71c21d8e6149d7076d936ef5d4cb9
https://git.kernel.org/stable/c/ecfb47f13b08b02cf28b7b50d4941eefa21954d2
jsc#CAR-3753
rh#2282785
CVE-2023-52804kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2023-52804
SMASH Issue 407155
bnc#1225550
https://git.kernel.org/stable/c/1f74d336990f37703a8eee77153463d65b67f70e
https://git.kernel.org/stable/c/2323de34a3ae61a9f9b544c18583f71cea86721f
https://git.kernel.org/stable/c/32bd8f1cbcf8b663e29dd1f908ba3a129541a11b
https://git.kernel.org/stable/c/5013f8269887642cca784adc8db9b5f0b771533f
https://git.kernel.org/stable/c/64933ab7b04881c6c18b21ff206c12278341c72e
https://git.kernel.org/stable/c/a0649e2dd4a3595b5595a29d0064d047c2fae2fb
https://git.kernel.org/stable/c/c6c8863fb3f57700ab583d875adda04caaf2278a
https://git.kernel.org/stable/c/ce15b0f1a431168f07b1cc6c9f71206a2db5c809
https://git.kernel.org/stable/c/dca403bb035a565bb98ecc1dda5d30f676feda40
jsc#CAR-3712
rh#2282731
CVE-2023-52805kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2023-52805
SMASH Issue 406935
bnc#1225553
https://git.kernel.org/stable/c/05d9ea1ceb62a55af6727a69269a4fd310edf483
https://git.kernel.org/stable/c/1708d0a9917fea579cc9da3d87b154285abd2cd8
https://git.kernel.org/stable/c/1ba7df5457dc1c1071c5f92ac11323533a6430e1
https://git.kernel.org/stable/c/2308d0fb0dc32446b4e6ca37cd09c30374bb64e9
https://git.kernel.org/stable/c/64f062baf202b82f54987a3f614a6c8f3e466641
https://git.kernel.org/stable/c/665b44e55c2767a4f899c3b18f49e9e1c9983777
https://git.kernel.org/stable/c/7467ca10a5ff09b0e87edf6c4d2a4bfdee69cf2c
https://git.kernel.org/stable/c/8c68af2af697ba2ba3b138be0c6d72e2ce3a3d6d
https://git.kernel.org/stable/c/cf7e3e84df36a9953796c737f080712f631d7083
jsc#CAR-3713
rh#2282647
CVE-2023-52809kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52809
SMASH Issue 407092
bnc#1225556
https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba
https://git.kernel.org/stable/c/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f
https://git.kernel.org/stable/c/56d78b5495ebecbb9395101f3be177cd0a52450b
https://git.kernel.org/stable/c/6b9ecf4e1032e645873933e5b43cbb84cac19106
https://git.kernel.org/stable/c/77072ec41d6ab3718c3fc639bc149b8037caedfa
https://git.kernel.org/stable/c/930f0aaba4820d6362de4e6ed569eaf444f1ea4e
https://git.kernel.org/stable/c/b549acf999824d4f751ca57965700372f2f3ad00
https://git.kernel.org/stable/c/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01
https://git.kernel.org/stable/c/f6fe7261b92b21109678747f36df9fdab1e30c34
jsc#CAR-3716
rh#2282669
CVE-2023-52810kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52810
SMASH Issue 407042
bnc#1225557
https://git.kernel.org/stable/c/0cb567e727339a192f9fd0db00781d73a91d15a6
https://git.kernel.org/stable/c/1a7c53fdea1d189087544d9a606d249e93c4934b
https://git.kernel.org/stable/c/491085258185ffc4fb91555b0dba895fe7656a45
https://git.kernel.org/stable/c/524b4f203afcf87accfe387e846f33f916f0c907
https://git.kernel.org/stable/c/525b861a008143048535011f3816d407940f4bfa
https://git.kernel.org/stable/c/5f148b16972e5f4592629b244d5109b15135f53f
https://git.kernel.org/stable/c/8f2964df6bfce9d92d81ca552010b8677af8d9dc
https://git.kernel.org/stable/c/a81a56b4cbe3142cc99f6b98e8f9b3a631c768e1
https://git.kernel.org/stable/c/cc61fcf7d1c99f148fe8ddfb5c6ed0bb75861f01
jsc#CAR-3717
rh#2282707
CVE-2023-52811kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52811
SMASH Issue 407105
bnc#1225559
https://git.kernel.org/stable/c/88984ec4792766df5a9de7a2ff2b5f281f94c7d4
https://git.kernel.org/stable/c/8bbe784c2ff28d56ca0c548aaf3e584edc77052d
https://git.kernel.org/stable/c/b39f2d10b86d0af353ea339e5815820026bca48f
https://git.kernel.org/stable/c/d2af4ef80601224b90630c1ddc7cd2c7c8ab4dd8
https://git.kernel.org/stable/c/e1d1f79b1929dce470a5dc9281c574cd58e8c6c0
jsc#CAR-3722
rh#2282743
CVE-2023-52813kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52813
SMASH Issue 407223
bnc#1225527
https://git.kernel.org/stable/c/039fec48e062504f14845124a1a25eb199b2ddc0
https://git.kernel.org/stable/c/372636debe852913529b1716f44addd94fff2d28
https://git.kernel.org/stable/c/546c1796ad1ed0d87dab3c4b5156d75819be2316
https://git.kernel.org/stable/c/8f4f68e788c3a7a696546291258bfa5fdb215523
https://git.kernel.org/stable/c/c55fc098fd9d2dca475b82d00ffbcaf97879d77e
https://git.kernel.org/stable/c/c9c1334697301c10e6918d747ed38abfbc0c96e7
https://git.kernel.org/stable/c/e134f3aba98e6c801a693f540912c2d493718ddf
https://git.kernel.org/stable/c/e97bf4ada7dddacd184c3e196bd063b0dc71b41d
https://git.kernel.org/stable/c/fb2d3a50a8f29a3c66682bb426144f40e32ab818
jsc#CAR-3706
rh#2282653
CVE-2023-52817kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52817
SMASH Issue 407224
bnc#1225569
https://git.kernel.org/stable/c/174f62a0aa15c211e60208b41ee9e7cdfb73d455
https://git.kernel.org/stable/c/437e0fa907ba39b4d7eda863c03ea9cf48bd93a9
https://git.kernel.org/stable/c/5104fdf50d326db2c1a994f8b35dcd46e63ae4ad
https://git.kernel.org/stable/c/6c1b3d89a2dda79881726bb6e37af19c0936d736
https://git.kernel.org/stable/c/820daf9ffe2b0afb804567b10983fb38bc5ae288
https://git.kernel.org/stable/c/ba3c0796d292de84f2932cc5bbb0f771fc720996
https://git.kernel.org/stable/c/bf2d51eedf03bd61e3556e35d74d49e2e6112398
https://git.kernel.org/stable/c/f475d5502f33a6c5b149b0afe96316ad1962a64a
jsc#CAR-3727
rh#2282676
CVE-2023-52818kernel-source-rt:Affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2023-52818
SMASH Issue 407115
bnc#1225530
https://git.kernel.org/stable/c/6dffdddfca818c02a42b6caa1d9845995f0a1f94
https://git.kernel.org/stable/c/760efbca74a405dc439a013a5efaa9fadc95a8c3
https://git.kernel.org/stable/c/8af28ae3acb736ada4ce3457662fa446cc913bb4
https://git.kernel.org/stable/c/92a775e7c9707aed28782bafe636bf87675f5a97
https://git.kernel.org/stable/c/acdb6830de02cf2873aeaccdf2d9bca4aee50e47
https://git.kernel.org/stable/c/c847379a5d00078ad6fcb1c24230e72c5609342f
https://git.kernel.org/stable/c/cfd8cd907fd94538561479a43aea455f5cf16928
https://git.kernel.org/stable/c/e52e324a21341c97350d5f11de14721c1c609498
https://git.kernel.org/stable/c/fc9ac0e8e0bcb3740c6eaad3a1a50c20016d422b
jsc#CAR-3707
rh#2282664
CVE-2023-52819kernel-source-rt:Affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2023-52819
SMASH Issue 407148
bnc#1225532
https://git.kernel.org/stable/c/0f0e59075b5c22f1e871fbd508d6e4f495048356
https://git.kernel.org/stable/c/60a00dfc7c5deafd1dd393beaf53224f7256dad6
https://git.kernel.org/stable/c/7c68283f3166221af3df5791f0e13d3137a72216
https://git.kernel.org/stable/c/8c1dbddbfcb051e82cea0c197c620f9dcdc38e92
https://git.kernel.org/stable/c/a237675aa1e62bbfaa341c535331c8656a508fa1
https://git.kernel.org/stable/c/a63fd579e7b1c3a9ebd6e6c494d49b1b6cf5515e
https://git.kernel.org/stable/c/b3b8b7c040cf069da7afe11c5bd73b870b8f3d18
https://git.kernel.org/stable/c/d0725232da777840703f5f1e22f2e3081d712aa4
https://git.kernel.org/stable/c/d50a56749e5afdc63491b88f5153c1aae00d4679
jsc#CAR-3708
rh#2282646
CVE-2023-52821kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52821
SMASH Issue 407113
bnc#1225022
https://git.kernel.org/stable/c/2381f6b628b3214f07375e0adf5ce17093c31190
https://git.kernel.org/stable/c/4fa930ba046d20fc1899770396ee11e905fa96e4
https://git.kernel.org/stable/c/79813cd59398015867d51e6d7dcc14d287d4c402
https://git.kernel.org/stable/c/8a9dd36fcb4f3906982b82593393578db4479992
https://git.kernel.org/stable/c/924e5814d1f84e6fa5cb19c6eceb69f066225229
https://git.kernel.org/stable/c/c7dc0aca5962fb37dbea9769dd26ec37813faae1
jsc#CAR-3579
rh#2282678
CVE-2023-52826kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52826
SMASH Issue 407146
bnc#1225077
https://git.kernel.org/stable/c/84c923d898905187ebfd4c0ef38cd1450af7e0ea
https://git.kernel.org/stable/c/9268bfd76bebc85ff221691b61498cc16d75451c
https://git.kernel.org/stable/c/9acc2bc00135e9ecd13a70ce1140e2673e504cdc
https://git.kernel.org/stable/c/d0bc9ab0a161a9745273f5bf723733a8e6c57aca
https://git.kernel.org/stable/c/eaede6900c0961b072669d6bd97fe8f90ed1900f
https://git.kernel.org/stable/c/f22def5970c423ea7f87d5247bd0ef91416b0658
jsc#CAR-3587
rh#2282789
CVE-2023-52832kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52832
SMASH Issue 407221
bnc#1225577
https://git.kernel.org/stable/c/1571120c44dbe5757aee1612c5b6097cdc42710f
https://git.kernel.org/stable/c/21a0f310a9f3bfd2b4cf4f382430e638607db846
https://git.kernel.org/stable/c/298e767362cade639b7121ecb3cc5345b6529f62
https://git.kernel.org/stable/c/2be24c47ac19bf639c48c082486c08888bd603c6
https://git.kernel.org/stable/c/5a94cffe90e20e8fade0b9abd4370bd671fe87c7
https://git.kernel.org/stable/c/717de20abdcd1d4993fa450e28b8086a352620ea
https://git.kernel.org/stable/c/adc2474d823fe81d8da759207f4f1d3691aa775a
https://git.kernel.org/stable/c/e160ab85166e77347d0cbe5149045cb25e83937f
https://git.kernel.org/stable/c/efeae5f4972f75d50002bc50eb112ab9e7069b18
jsc#CAR-3728
rh#2282645
CVE-2023-52833kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52833
SMASH Issue 407197
bnc#1225595
https://git.kernel.org/stable/c/0048ddf045bddc4dacb3e783fd869a2f8fb5be30
https://git.kernel.org/stable/c/13b1ebad4c175e6a9b0748acbf133c21a15d282a
https://git.kernel.org/stable/c/624820f7c8826dd010e8b1963303c145f99816e9
https://git.kernel.org/stable/c/9f8e4d1a4ca1179aaeb43f91f3e2a386e7e616b3
https://git.kernel.org/stable/c/a556f2ef556a04790f67f2fa272f1a77336d15a0
https://git.kernel.org/stable/c/f9de14bde56dcbb0765284c6dfc35842b021733c
jsc#CAR-3729
rh#2282762
CVE-2023-52834kernel-source-rt:Affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2023-52834
SMASH Issue 407140
bnc#1225599
https://git.kernel.org/stable/c/32f08b7b430ee01ec47d730f961a3306c1c7b6fb
https://git.kernel.org/stable/c/54a6152da4993ec8e4b53dc3cf577f5a2c829afa
https://git.kernel.org/stable/c/57e44ff9c2c9747b2b1a53556810b0e5192655d6
https://git.kernel.org/stable/c/86565682e9053e5deb128193ea9e88531bbae9cf
https://git.kernel.org/stable/c/c29a89b23f67ee592f4dee61f9d7efbf86d60315
jsc#CAR-3730
rh#2282744
CVE-2023-52835kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2023-52835
SMASH Issue 407163
bnc#1225602
https://git.kernel.org/stable/c/1a2a4202c60fcdffbf04f259002ce9bff39edece
https://git.kernel.org/stable/c/2424410f94a94d91230ced094062d859714c984a
https://git.kernel.org/stable/c/2e905e608e38cf7f8dcddcf8a6036e91a78444cb
https://git.kernel.org/stable/c/54aee5f15b83437f23b2b2469bcf21bdd9823916
https://git.kernel.org/stable/c/788c0b3442ead737008934947730a6d1ff703734
https://git.kernel.org/stable/c/8c504f615d7ed60ae035c51d0c789137ced6797f
https://git.kernel.org/stable/c/9ce4e87a8efd37c85766ec08b15e885cab08553a
https://git.kernel.org/stable/c/fd0df3f8719201dbe61a4d39083d5aecd705399a
jsc#CAR-3731
rh#2282735
CVE-2023-52840kernel-source-rt:Affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52840
SMASH Issue 407190
bnc#1224928
https://git.kernel.org/stable/c/2f236d8638f5b43e0c72919a6a27fe286c32053f
https://git.kernel.org/stable/c/303766bb92c5c225cf40f9bbbe7e29749406e2f2
https://git.kernel.org/stable/c/50d12253666195a14c6cd2b81c376e2dbeedbdff
https://git.kernel.org/stable/c/6c71e065befb2fae8f1461559b940c04e1071bd5
https://git.kernel.org/stable/c/7082b1fb5321037bc11ba1cf2d7ed23c6b2b521f
https://git.kernel.org/stable/c/c8e639f5743cf4b01f8c65e0df075fe4d782b585
https://git.kernel.org/stable/c/cc56c4d17721dcb10ad4e9c9266e449be1462683
https://git.kernel.org/stable/c/eb988e46da2e4eae89f5337e047ce372fe33d5b1
jsc#CAR-3557
rh#2282757
CVE-2023-52843kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52843
SMASH Issue 407154
bnc#1224951
https://git.kernel.org/stable/c/0a720d0259ad3521ec6c9e4199f9f6fc75bac77a
https://git.kernel.org/stable/c/352887b3edd007cf9b0abc30fe9d98622acd859b
https://git.kernel.org/stable/c/3a2653828ffc6101aef80bf58d5b77484239f779
https://git.kernel.org/stable/c/7b3ba18703a63f6fd487183b9262b08e5632da1b
https://git.kernel.org/stable/c/900a4418e3f66a32db6baaf23f92b99c20ae6535
https://git.kernel.org/stable/c/9a3f9054a5227d7567cba1fb821df48ccecad10c
https://git.kernel.org/stable/c/cbdcdf42d15dac74c7287679fb2a9d955f8feb1f
https://git.kernel.org/stable/c/f980e9a57dfb9530f1f4ee41a2420f2a256d7b29
https://git.kernel.org/stable/c/ff5cb6a4f0c6d7fbdc84858323fb4b7af32cfd79
jsc#CAR-3567
rh#2282662
CVE-2023-52853kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52853
SMASH Issue 407151
bnc#1224988
https://git.kernel.org/stable/c/012d0c66f9392a99232ac28217229f32dd3a70cf
https://git.kernel.org/stable/c/3d959406c8fff2334d83d0c352d54fd6f5b2e7cd
https://git.kernel.org/stable/c/727203e6e7e7020e1246fc1628cbdb8d90177819
https://git.kernel.org/stable/c/bafb12b629b7c3ad59812dd1ac1b0618062e0e38
https://git.kernel.org/stable/c/df0daac2709473531d6a3472997cc65301ac06d6
https://git.kernel.org/stable/c/e3c2d2d144c082dd71596953193adf9891491f42
https://git.kernel.org/stable/c/eb1121fac7986b30915ba20c5a04cc01fdcf160c
https://git.kernel.org/stable/c/fb5718bc67337dde1528661f419ffcf275757592
jsc#CAR-3573
rh#2282624
CVE-2023-52864kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52864
SMASH Issue 407218
bnc#1225132
https://git.kernel.org/stable/c/36d85fa7ae0d6be651c1a745191fa7ef055db43e
https://git.kernel.org/stable/c/44a96796d25809502c75771d40ee693c2e44724e
https://git.kernel.org/stable/c/9fb0eed09e1470cd4021ff52b2b9dfcbcee4c203
https://git.kernel.org/stable/c/cf098e937dd125c0317a0d6f261ac2a950a233d6
https://git.kernel.org/stable/c/d426a2955e45a95b2282764105fcfb110a540453
https://git.kernel.org/stable/c/e0bf076b734a2fab92d8fddc2b8b03462eee7097
https://git.kernel.org/stable/c/eba9ac7abab91c8f6d351460239108bef5e7a0b6
https://git.kernel.org/stable/c/fb7b06b59c6887659c6ed0ecd3110835eecbb6a3
jsc#CAR-3600
rh#2282719
CVE-2023-52868kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52868
SMASH Issue 407108
bnc#1225044
https://git.kernel.org/stable/c/0f6b3be28c4d62ef6498133959c72266629bea97
https://git.kernel.org/stable/c/3091ab943dfc7b2578599b0fe203350286fab5bb
https://git.kernel.org/stable/c/3a8f4e58e1ee707b4f46a1000b40b86ea3dd509c
https://git.kernel.org/stable/c/3f795fb35c2d8a637efe76b4518216c9319b998c
https://git.kernel.org/stable/c/6ad1bf47fbe5750c4d5d8e41337665e193e2c521
https://git.kernel.org/stable/c/77ff34a56b695e228e6daf30ee30be747973d6e8
https://git.kernel.org/stable/c/b55f0a9f865be75ca1019aad331f3225f7b50ce8
https://git.kernel.org/stable/c/c99626092efca3061b387043d4a7399bf75fbdd5
https://git.kernel.org/stable/c/edbd6bbe40ac524a8f2273ffacc53edf14f3c686
jsc#CAR-3582
rh#2282628
CVE-2023-52871kernel-source-rt:Affectedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2023-52871
SMASH Issue 407202
bnc#1225534
https://git.kernel.org/stable/c/1143bfb9b055897975aeaea254da148e19524493
https://git.kernel.org/stable/c/3565684309e54fa998ea27f37028d67cc3e1dff2
https://git.kernel.org/stable/c/5e5b85ea0f4bc484bfe4cc73ead51fa48d2366a0
https://git.kernel.org/stable/c/995ee1e84e8db7fa5dcdde7dfe0bd7bb6f9bbb8c
https://git.kernel.org/stable/c/cc1a1dcb411fe224f48553cfdcdfe6e61395b69c
https://git.kernel.org/stable/c/f0ef883cae309bc5e8cdfcdbc1b4822732ce20a8
https://git.kernel.org/stable/c/f1a1bc8775b26345aba2be278118999e7f661d3d
jsc#CAR-3709
rh#2282760
CVE-2023-52876kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52876
SMASH Issue 407111
bnc#1225036
https://git.kernel.org/stable/c/0884393c63cc9a1772f7121a6645ba7bd76feeb9
https://git.kernel.org/stable/c/1639072f6260babd017556e9f236ca2ad589d1e7
https://git.kernel.org/stable/c/96e9544a0c4faca616b3f9f4034dcd83a14e7f22
https://git.kernel.org/stable/c/a540ca0aeae83c2f3964bcb4e383f64ce2ec1783
https://git.kernel.org/stable/c/b20cfe007a46f8c165d42a05c50a8d3d893e6592
https://git.kernel.org/stable/c/c4070ada5d5155c8d4d17ea64bd246949889f25b
https://git.kernel.org/stable/c/cfa68e0ac5dcde43577adadf6f0f26f3b365ad68
jsc#CAR-3581
rh#2282689
CVE-2023-52878kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52878
SMASH Issue 407142
bnc#1225000
https://git.kernel.org/stable/c/0d30931f1fa0fb893fb7d5dc32b6b7edfb775be4
https://git.kernel.org/stable/c/53c468008a7c9ca3f5fc985951f35ec2acae85bc
https://git.kernel.org/stable/c/6411959c10fe917288cbb1038886999148560057
https://git.kernel.org/stable/c/826120c9ba68f2d0dbae58e99013929c883d1444
https://git.kernel.org/stable/c/8ab67da060157362b2e0926692c659808784708f
jsc#CAR-3574
rh#2282680
CVE-2023-52880kernel-source-rt:Affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52880
SMASH Issue 401229
SMASH Issue 407735
bnc#1222619
https://git.kernel.org/stable/c/2b85977977cbd120591b23c2450e90a5806a7167
https://git.kernel.org/stable/c/2d154a54c58f9c8375bfbea9f7e51ba3bfb2e43a
https://git.kernel.org/stable/c/67c37756898a5a6b2941a13ae7260c89b54e0d88
https://git.kernel.org/stable/c/7a529c9023a197ab3bf09bb95df32a3813f7ba58
https://git.kernel.org/stable/c/7d303dee473ba3529d75b63491e9963342107bed
https://git.kernel.org/stable/c/ada28eb4b9561aab93942f3224a2e41d76fe57fa
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3298
rh#2283468
CVE-2023-52881kernel-source-rt:Affectedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L)CVE-2023-52881
SMASH Issue 408052
bnc#1225611
bnc#1226152
https://git.kernel.org/stable/c/008b807fe487e0b15a3a6c39add4eb477f73e440
https://git.kernel.org/stable/c/0d4e0afdd6658cd21dd5be61880411a2553fd1fc
https://git.kernel.org/stable/c/2087d53a66e97a5eb5d1bf558d5bef9e5f891757
https://git.kernel.org/stable/c/3d501dd326fb1c73f1b8206d4c6e1d7b15c07e27
https://git.kernel.org/stable/c/458f07ffeccd17f99942311e09ef574ddf4a414a
https://git.kernel.org/stable/c/69eae75ca5255e876628ac5cee9eaab31f644b57
https://git.kernel.org/stable/c/7ffff0cc929fdfc62a74b384c4903d6496c910f0
https://git.kernel.org/stable/c/b17a886ed29f3b70b78ccf632dad03e0c69e3c1a
jsc#CAR-3734
rh#2258875
CVE-2023-52882kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52882
SMASH Issue 408204
bnc#1225692
https://git.kernel.org/stable/c/0b82eb134d2942ecc669e2ab2be3f0a58d79428a
https://git.kernel.org/stable/c/70f64cb29014e4c4f1fabd3265feebd80590d069
https://git.kernel.org/stable/c/7e91ed763dc07437777bd012af7a2bd4493731ff
https://git.kernel.org/stable/c/9708e5081cfc4f085690294163389bcf82655f90
https://git.kernel.org/stable/c/bfc78b4628497eb6df09a6b5bba9dd31616ee175
https://git.kernel.org/stable/c/f1fa9a9816204ac4b118b2e613d3a7c981355019
https://git.kernel.org/stable/c/fe11826ffa200e1a7a826e745163cb2f47875f66
jsc#CAR-3743
rh#2284282
CVE-2023-6536kernel-source-rt:Affectedmoderate6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-6536
SMASH Issue 387554
bnc#1217989
https://access.redhat.com/errata/RHSA-2024:0723
https://access.redhat.com/errata/RHSA-2024:0724
https://access.redhat.com/errata/RHSA-2024:0725
https://access.redhat.com/errata/RHSA-2024:0881
https://access.redhat.com/errata/RHSA-2024:0897
https://access.redhat.com/errata/RHSA-2024:1248
https://access.redhat.com/errata/RHSA-2024:3810
https://access.redhat.com/security/cve/CVE-2023-6536
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
https://security.netapp.com/advisory/ntap-20240415-0001/
jsc#CAR-3027
rh#2254052
CVE-2023-6597expat:Affectedmoderate8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52425
CVE-2023-6597
CVE-2024-0450
CVE-2024-6597
L3:67697
L3:67729
L3:67739
L3:67841
L3:67843
L3:68138
L3:68158
L3:68235
MISC:github.com:OSS:2024/Q1/231
MISC:mail.python.org:OSS:2024/Q1/240
MISC:www.bamsoftware.com:CVE-2019-13232
OSS:2024/03/15/1
OSS:2024/03/20/5
OSS:2024/Q1/231
OSS:2024/Q1/240
SMASH Issue 392985
SMASH Issue 393333
SMASH Issue 398291
bnc#1219559
bnc#1219666
bnc#1220296
bnc#1220515
bnc#1220664
bnc#1221563
bnc#1221854
bnc#1222075
bnc#1226028
https://github.com/libexpat/libexpat/pull/789
https://github.com/python/cpython/commit/02a9259c717738dfe6b463c44d7e17f2b6d2cb3a
https://github.com/python/cpython/commit/30fe5d853b56138dbec62432d370a1f99409fc85
https://github.com/python/cpython/commit/5585334d772b253a01a6730e8202ffb1607c3d25
https://github.com/python/cpython/commit/66363b9a7b9fe7c99eba3a185b74c5fdbf842eba
https://github.com/python/cpython/commit/6ceb8aeda504b079fef7a57b8d81472f15cdd9a5
https://github.com/python/cpython/commit/70497218351ba44bffc8b571201ecb5652d84675
https://github.com/python/cpython/commit/81c16cd94ec38d61aa478b9a452436dc3b1b524d
https://github.com/python/cpython/commit/8eaeefe49d179ca4908d052745e3bb8b6f238f82
https://github.com/python/cpython/commit/a2c59992e9e8d35baba9695eb186ad6c6ff85c51
https://github.com/python/cpython/commit/a956e510f6336d5ae111ba429a61c3ade30a7549
https://github.com/python/cpython/commit/d05bac0b74153beb541b88b4fca33bf053990183
https://github.com/python/cpython/commit/d54e22a669ae6e987199bb5d2c69bb5a46b0083b
https://github.com/python/cpython/commit/fa181fcf2156f703347b03a3b1966ce47be8ab3b
https://github.com/python/cpython/issues/109858
https://github.com/python/cpython/issues/91133
https://lists.debian.org/debian-lts-announce/2024/03/msg00024.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
https://lists.debian.org/debian-lts-announce/2024/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/
https://mail.python.org/archives/list/security-announce@python.org/thread/Q5C6ATFC67K53XFV4KE45325S7NS62LD/
https://mail.python.org/archives/list/security-announce@python.org/thread/XELNUX2L3IOHBTFU7RQHCY6OUVEWZ2FG/
https://security.netapp.com/advisory/ntap-20240614-0003/
jsc#CAR-3096
rh#2262877
rh#2268766
rh#2276518
rh#2276525
CVE-2023-6915kernel-source-rt:Affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-6915
SMASH Issue 391203
bnc#1218804
https://access.redhat.com/errata/RHSA-2024:2394
https://access.redhat.com/errata/RHSA-2024:2950
https://access.redhat.com/errata/RHSA-2024:3138
https://access.redhat.com/security/cve/CVE-2023-6915
https://github.com/torvalds/linux/commit/af73483f4e8b6f5c68c9aa63257bdd929a9c194a
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3063
rh#2254982
CVE-2023-7042kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-7042
L3:67844
SMASH Issue 388988
bnc#1218336
https://access.redhat.com/security/cve/CVE-2023-7042
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/54PLF5J33IRSLSR4UU6LQSMXX6FI5AOQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C25BK2YH5MZ6VNQXKF2NAJBTGXVEPKGC/
https://patchwork.kernel.org/project/linux-wireless/patch/20231208043433.271449-1-hdthky0@gmail.com/
jsc#CAR-3039
rh#2255497
CVE-2023-7192kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-7192
L3:67844
SMASH Issue 389728
bnc#1218479
https://access.redhat.com/errata/RHSA-2024:0723
https://access.redhat.com/errata/RHSA-2024:0725
https://access.redhat.com/errata/RHSA-2024:1188
https://access.redhat.com/errata/RHSA-2024:1250
https://access.redhat.com/errata/RHSA-2024:1306
https://access.redhat.com/errata/RHSA-2024:1367
https://access.redhat.com/errata/RHSA-2024:1382
https://access.redhat.com/errata/RHSA-2024:1404
https://access.redhat.com/errata/RHSA-2024:2006
https://access.redhat.com/errata/RHSA-2024:2008
https://access.redhat.com/security/cve/CVE-2023-7192
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=ac4893980bbe79ce383daf9a0885666a30fe4c83
jsc#CAR-3043
rh#2256279
CVE-2024-0340kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2024-0340
SMASH Issue 390479
bnc#1218689
https://access.redhat.com/errata/RHSA-2024:3618
https://access.redhat.com/errata/RHSA-2024:3627
https://access.redhat.com/security/cve/CVE-2024-0340
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lore.kernel.org/lkml/5kn47peabxjrptkqa6dwtyus35ahf4pcj4qm4pumse33kxqpjw@mec4se5relrc/T/
jsc#CAR-3057
rh#2257406
CVE-2024-0450expat:Affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52425
CVE-2023-6597
CVE-2024-0450
CVE-2024-6597
L3:67697
L3:67729
L3:67739
L3:67841
L3:67843
L3:68138
L3:68158
L3:68235
MISC:github.com:OSS:2024/Q1/231
MISC:mail.python.org:OSS:2024/Q1/240
MISC:www.bamsoftware.com:CVE-2019-13232
OSS:2024/03/15/1
OSS:2024/03/20/5
OSS:2024/Q1/231
OSS:2024/Q1/240
SMASH Issue 392985
SMASH Issue 393333
SMASH Issue 398291
bnc#1219559
bnc#1219666
bnc#1220296
bnc#1220515
bnc#1220664
bnc#1221563
bnc#1221854
bnc#1222075
bnc#1226028
https://github.com/libexpat/libexpat/pull/789
https://github.com/python/cpython/commit/02a9259c717738dfe6b463c44d7e17f2b6d2cb3a
https://github.com/python/cpython/commit/30fe5d853b56138dbec62432d370a1f99409fc85
https://github.com/python/cpython/commit/5585334d772b253a01a6730e8202ffb1607c3d25
https://github.com/python/cpython/commit/66363b9a7b9fe7c99eba3a185b74c5fdbf842eba
https://github.com/python/cpython/commit/6ceb8aeda504b079fef7a57b8d81472f15cdd9a5
https://github.com/python/cpython/commit/70497218351ba44bffc8b571201ecb5652d84675
https://github.com/python/cpython/commit/81c16cd94ec38d61aa478b9a452436dc3b1b524d
https://github.com/python/cpython/commit/8eaeefe49d179ca4908d052745e3bb8b6f238f82
https://github.com/python/cpython/commit/a2c59992e9e8d35baba9695eb186ad6c6ff85c51
https://github.com/python/cpython/commit/a956e510f6336d5ae111ba429a61c3ade30a7549
https://github.com/python/cpython/commit/d05bac0b74153beb541b88b4fca33bf053990183
https://github.com/python/cpython/commit/d54e22a669ae6e987199bb5d2c69bb5a46b0083b
https://github.com/python/cpython/commit/fa181fcf2156f703347b03a3b1966ce47be8ab3b
https://github.com/python/cpython/issues/109858
https://github.com/python/cpython/issues/91133
https://lists.debian.org/debian-lts-announce/2024/03/msg00024.html
https://lists.debian.org/debian-lts-announce/2024/03/msg00025.html
https://lists.debian.org/debian-lts-announce/2024/04/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PNRIHC7DVVRAIWFRGV23Y6UZXFBXSQDB/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNUBSGZFEZOBHJFTAD42SAN4ATW2VEMV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T3IGRX54M7RNCQOXVQO5KQKTGWCOABIM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U5VHWS52HGD743C47UMCSAK2A773M2YE/
https://mail.python.org/archives/list/security-announce@python.org/thread/Q5C6ATFC67K53XFV4KE45325S7NS62LD/
https://mail.python.org/archives/list/security-announce@python.org/thread/XELNUX2L3IOHBTFU7RQHCY6OUVEWZ2FG/
https://security.netapp.com/advisory/ntap-20240614-0003/
jsc#CAR-3096
rh#2262877
rh#2268766
rh#2276518
rh#2276525
CVE-2024-0565kernel-source-rt:Affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2024-0565
L3:68010
SMASH Issue 391242
bnc#1218832
bnc#1219078
bnc#1223299
https://access.redhat.com/errata/RHSA-2024:1188
https://access.redhat.com/errata/RHSA-2024:1404
https://access.redhat.com/errata/RHSA-2024:1532
https://access.redhat.com/errata/RHSA-2024:1533
https://access.redhat.com/errata/RHSA-2024:1607
https://access.redhat.com/errata/RHSA-2024:1614
https://access.redhat.com/errata/RHSA-2024:2394
https://access.redhat.com/security/cve/CVE-2024-0565
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://security.netapp.com/advisory/ntap-20240223-0002/
https://www.spinics.net/lists/stable-commits/msg328851.html
jsc#CAR-3067
rh#2258518
CVE-2024-0607kernel-source-rt:Affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L)CVE-2024-0607
L3:67844
SMASH Issue 391346
bnc#1218915
https://access.redhat.com/security/cve/CVE-2024-0607
https://github.com/torvalds/linux/commit/c301f0981fdd3fd1ffac6836b423c4d7a8e0eb63
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3107
rh#2258635
CVE-2024-0639kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-0639
SMASH Issue 391543
bnc#1218917
https://access.redhat.com/security/cve/CVE-2024-0639
https://github.com/torvalds/linux/commit/6feb37b3b06e9049e20dcf7e23998f92c9c5be9a
jsc#CAR-3066
rh#2258754
CVE-2024-1151kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-1151
L3:67844
SMASH Issue 393668
bnc#1219835
https://access.redhat.com/security/cve/CVE-2024-1151
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3LZROQAX7Q7LEP4F7WQ3KUZKWCZGFFP2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GS7S3XLTLOUKBXV67LLFZWB3YVFJZHRK/
https://lore.kernel.org/all/20240207132416.1488485-1-aconole@redhat.com/
jsc#CAR-3106
rh#2262241
CVE-2024-20696libarchive:Affectedimportant7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)CVE-2024-20696
SMASH Issue 390527
bnc#1225971
https://clearbluejar.github.io/posts/patch-tuesday-diffing-cve-2024-20696-windows-libarchive-rce/
https://github.com/clearbluejar/CVE-2024-20696
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20696
jsc#CAR-3780
rh#2290448
CVE-2024-20697libarchive:Affectedimportant7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)CVE-2024-20697
MISC:www.zerodayinitiative.com:OSS:2024/Q2/269
OSS:2024/06/04/2
OSS:2024/06/05/1
OSS:2024/Q2/269
SMASH Issue 390528
bnc#1225972
https://github.com/advisories/GHSA-w6xv-37jv-7cjr
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20697
jsc#CAR-3781
rh#2290445
CVE-2024-2201kernel-source-rt:Affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2024-2201
MISC:xenbits.xen.org:OSS:2024/Q2/62
OSS:2024/Q2/221
OSS:2024/Q2/62
SMASH Issue 368751
SMASH Issue 396812
bnc#1212111
bnc#1217339
bnc#1222453
jsc#CAR-3309
rh#2268118
CVE-2024-22099kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2024-22099
SMASH Issue 392170
bnc#1219170
https://bugzilla.openanolis.cn/show_bug.cgi?id=7956
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSXNF4RLEFLH35BFUQGYXRRVHHUIVBAE/
jsc#CAR-3094
rh#2267701
CVE-2024-2236libgcrypt:Affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2024-2236
SMASH Issue 396532
bnc#1221107
https://access.redhat.com/security/cve/CVE-2024-2236
jsc#CAR-3222
rh#2245218
rh#2268268
CVE-2024-23196kernel-source-rt:Affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2024-23196
SMASH Issue 393021
bnc#1219622
https://bugzilla.openanolis.cn/show_bug.cgi?id=8148
jsc#CAR-3110
rh#2262988
CVE-2024-23307kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-23307
L3:67695
L3:67844
SMASH Issue 392171
bnc#1219169
bnc#1220145
https://bugzilla.openanolis.cn/show_bug.cgi?id=7975
jsc#CAR-3117
rh#2267705
CVE-2024-23848kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2024-23848
SMASH Issue 391979
bnc#1219104
https://lore.kernel.org/lkml/e9f42704-2f99-4f2c-ade5-f952e5fd53e5%40xs4all.nl/
jsc#CAR-3076
rh#2260038
CVE-2024-23849kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2024-23849
SMASH Issue 391980
bnc#1219127
bnc#1221292
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=13e788deb7348cc88df34bed736c3b3b9927ea52
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBVHM4LGMFIHBN4UBESYRFMYX3WUICV5/
https://lore.kernel.org/netdev/1705715319-19199-1-git-send-email-sharath.srinivasan%40oracle.com/
https://lore.kernel.org/netdev/CALGdzuoVdq-wtQ4Az9iottBqC5cv9ZhcE5q8N7LfYFvkRsOVcw%40mail.gmail.com
jsc#CAR-3079
rh#2260041
rh#2269199
CVE-2024-23851kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-23851
L3:67844
SMASH Issue 391982
bnc#1219146
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/
https://www.spinics.net/lists/dm-devel/msg56574.html
https://www.spinics.net/lists/dm-devel/msg56694.html
jsc#CAR-3095
rh#2260046
rh#2263856
rh#2275620
CVE-2024-24855kernel-source-rt:Affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2024-24855
L3:67844
SMASH Issue 393022
bnc#1219618
https://bugzilla.openanolis.cn/show_bug.cgi?id=8149
jsc#CAR-3109
rh#2262983
CVE-2024-24861kernel-source-rt:Affectedmoderate6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2024-24861
L3:67844
SMASH Issue 393027
bnc#1219623
https://bugzilla.openanolis.cn/show_bug.cgi?id=8150
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3111
CVE-2024-2511openssl:Not affected, openssl-1_1:Affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2024-2511
OSS:2024/04/08/5
OSS:2024/Q2/44
SMASH Issue 400736
bnc#1222548
https://github.com/openssl/openssl/commit/7e4d731b1c07201ad9374c1cd9ac5263bdf35bce
https://github.com/openssl/openssl/commit/b52867a9f618bb955bed2a3ce3db4d4f97ed8e5d
https://github.com/openssl/openssl/commit/e9d7083e241670332e0443da0f0d4ffb52829f08
https://github.openssl.org/openssl/extended-releases/commit/5f8d25770ae6437db119dfc951e207271a326640
https://security.netapp.com/advisory/ntap-20240503-0013/
https://www.openssl.org/news/secadv/20240408.txt
jsc#CAR-3288
openssl.git:commit:03c4b0eab6dcbb59e3f58baad634be8fc798c103
openssl.git:commit:0447cd690f86ce52ff760d55d6064ea0d08656bf
openssl.git:commit:21df7f04f6c4a560b4de56d10e1e58958c7e566d
openssl.git:commit:4a3e8f08306c64366318e26162ae0a0eb7b1a006
openssl.git:commit:7984fa683e9dfac0cad50ef2a9d5a13330222044
openssl.git:commit:cfeaf33a26c53c526128df96db2d2ec105b43aec
rh#2274020
CVE-2024-26584kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 394738
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220186
bnc#1220354
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3ade391adc584f17b5570fd205de3ad029090368
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/
jsc#CAR-3056
jsc#CAR-3126
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2024-26585kernel-source-rt:Affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26585
L3:68095
L3:68137
SMASH Issue 394739
bnc#1220187
bnc#1220211
https://git.kernel.org/stable/c/196f198ca6fce04ba6ce262f5a0e4d567d7d219d
https://git.kernel.org/stable/c/6db22d6c7a6dc914b12c0469b94eb639b6a8a146
https://git.kernel.org/stable/c/e01e3934a1b2d122919f73bc6ddbe1cdafc4bbdb
https://git.kernel.org/stable/c/e327ed60bff4a991cd7a709c47c4f0c5b4a4fd57
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/
jsc#CAR-3119
rh#2265517
CVE-2024-26586kernel-source-rt:Affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26586
SMASH Issue 394908
bnc#1220243
https://git.kernel.org/stable/c/2f5e1565740490706332c06f36211d4ce0f88e62
https://git.kernel.org/stable/c/348112522a35527c5bcba933b9fefb40a4f44f15
https://git.kernel.org/stable/c/483ae90d8f976f8339cf81066312e1329f2d3706
https://git.kernel.org/stable/c/56750ea5d15426b5f307554e7699e8b5f76c3182
https://git.kernel.org/stable/c/6fd24675188d354b1cad47462969afa2ab09d819
https://git.kernel.org/stable/c/a361c2c1da5dbb13ca67601cf961ab3ad68af383
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3124
rh#2265645
CVE-2024-26589kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)CVE-2024-26589
SMASH Issue 394911
bnc#1220255
https://git.kernel.org/stable/c/1b500d5d6cecf98dd6ca88bc9e7ae1783c83e6d3
https://git.kernel.org/stable/c/22c7fa171a02d310e3a3f6ed46a698ca8a0060ed
https://git.kernel.org/stable/c/29ffa63f21bcdcef3e36b03cccf9d0cd031f6ab0
https://git.kernel.org/stable/c/4108b86e324da42f7ed425bd71632fd844300dc8
https://git.kernel.org/stable/c/e8d3872b617c21100c5ee4f64e513997a68c2e3d
jsc#CAR-3128
rh#2265657
CVE-2024-26593kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2024-26593
SMASH Issue 394366
bnc#1220009
https://git.kernel.org/stable/c/1f8d0691c50581ba6043f009ec9e8b9f78f09d5a
https://git.kernel.org/stable/c/491528935c9c48bf341d8b40eabc6c4fc5df6f2c
https://git.kernel.org/stable/c/609c7c1cc976e740d0fed4dbeec688b3ecb5dce2
https://git.kernel.org/stable/c/6be99c51829b24c914cef5bff6164877178e84d9
https://git.kernel.org/stable/c/7a14b8a477b88607d157c24aeb23e7389ec3319f
https://git.kernel.org/stable/c/c1c9d0f6f7f1dbf29db996bd8e166242843a5f21
https://git.kernel.org/stable/c/d074d5ff5ae77b18300e5079c6bda6342a4d44b7
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/
jsc#CAR-3113
rh#2265646
CVE-2024-26595kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 394981
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220344
bnc#1220354
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3056
jsc#CAR-3134
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2024-26597kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2024-26597
SMASH Issue 394983
bnc#1220363
https://git.kernel.org/stable/c/02467ab8b404d80429107588e0f3425cf5fcd2e5
https://git.kernel.org/stable/c/093dab655808207f7a9f54cf156240aeafc70590
https://git.kernel.org/stable/c/17d06a5c44d8fd2e8e61bac295b09153496f87e1
https://git.kernel.org/stable/c/2295c22348faf795e1ccdf618f6eb7afdb2f7447
https://git.kernel.org/stable/c/3b5254862258b595662a0ccca6e9eeb88d6e7468
https://git.kernel.org/stable/c/b33fb5b801c6db408b774a68e7c8722796b59ecc
https://git.kernel.org/stable/c/c4734535034672f59f2652e1e0058c490da62a5c
https://git.kernel.org/stable/c/ee1dc3bf86f2df777038506b139371a9add02534
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3135
CVE-2024-26600kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 395096
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220340
bnc#1220354
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3056
jsc#CAR-3133
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2024-26602kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2024-26602
SMASH Issue 395188
bnc#1220398
https://git.kernel.org/stable/c/2441a64070b85c14eecc3728cc87e883f953f265
https://git.kernel.org/stable/c/24ec7504a08a67247fbe798d1de995208a8c128a
https://git.kernel.org/stable/c/3cd139875e9a7688b3fc715264032620812a5fa3
https://git.kernel.org/stable/c/50fb4e17df319bb33be6f14e2a856950c1577dee
https://git.kernel.org/stable/c/944d5fe50f3f03daacfea16300e656a1691c4a23
https://git.kernel.org/stable/c/b6a2a9cbb67545c825ec95f06adb7ff300a2ad71
https://git.kernel.org/stable/c/c5b2063c65d05e79fad8029324581d86cfba7eea
https://git.kernel.org/stable/c/db896bbe4a9c67cee377e5f6a743350d3ae4acf6
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3136
rh#2267695
CVE-2024-26607kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26607
SMASH Issue 395838
bnc#1220736
https://git.kernel.org/stable/c/08ac6f132dd77e40f786d8af51140c96c6d739c9
https://git.kernel.org/stable/c/2a4c6af7934a7b4c304542c38fee35e09cc1770c
https://git.kernel.org/stable/c/56f96cf6eb11a1c2d594367c3becbfb06a855ec1
https://git.kernel.org/stable/c/e0f83c234ea7a3dec1f84e5d02caa1c51664a076
jsc#CAR-3164
rh#2267080
CVE-2024-26614kernel-source-rt:Affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 397153
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1221293
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3056
jsc#CAR-3224
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2024-26615kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26615
SMASH Issue 396004
bnc#1220942
https://git.kernel.org/stable/c/1fea9969b81c67d0cb1611d1b8b7d19049d937be
https://git.kernel.org/stable/c/27aea64838914c6122db5b8bd4bed865c9736f22
https://git.kernel.org/stable/c/5fed92ca32eafbfae8b6bee8ca34cca71c6a8b6d
https://git.kernel.org/stable/c/68b888d51ac82f2b96bf5e077a31d76afcdef25a
https://git.kernel.org/stable/c/6994dba06321e3c48fdad0ba796a063d9d82183a
https://git.kernel.org/stable/c/8f3f9186e5bb96a9c9654c41653210e3ea7e48a6
https://git.kernel.org/stable/c/a164c2922675d7051805cdaf2b07daffe44f20d9
https://git.kernel.org/stable/c/dbc153fd3c142909e564bb256da087e13fbf239c
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3197
rh#2267355
CVE-2024-26625kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-52433
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67604
L3:67695
L3:67706
L3:67844
SMASH Issue 377517
SMASH Issue 396467
bnc#1215420
bnc#1215424
bnc#1219700
bnc#1220354
bnc#1221086
bnc#1221570
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3056
jsc#CAR-3223
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2235306
rh#2237755
rh#2255497
rh#2256279
rh#2256786
rh#2260046
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2270703
rh#2275620
CVE-2024-26627kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26627
SMASH Issue 396469
bnc#1221090
https://git.kernel.org/stable/c/07e3ca0f17f579491b5f54e9ed05173d6c1d6fcb
https://git.kernel.org/stable/c/4373534a9850627a2695317944898eb1283a2db0
https://git.kernel.org/stable/c/65ead8468c21c2676d4d06f50b46beffdea69df1
https://git.kernel.org/stable/c/d37c1c81419fdef66ebd0747cf76fb8b7d979059
https://git.kernel.org/stable/c/db6338f45971b4285ea368432a84033690eaf53c
https://git.kernel.org/stable/c/f5944853f7a961fedc1227dc8f60393f8936d37c
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3220
rh#2268214
CVE-2024-26633kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26633
SMASH Issue 398039
bnc#1221647
https://git.kernel.org/stable/c/135414f300c5db995e2a2f3bf0f455de9d014aee
https://git.kernel.org/stable/c/3f15ba3dc14e6ee002ea01b4faddc3d49200377c
https://git.kernel.org/stable/c/4329426cf6b8e22b798db2331c7ef1dd2a9c748d
https://git.kernel.org/stable/c/62a1fedeb14c7ac0947ef33fadbabd35ed2400a2
https://git.kernel.org/stable/c/687c5d52fe53e602e76826dbd4d7af412747e183
https://git.kernel.org/stable/c/ba8d904c274268b18ef3dc11d3ca7b24a96cb087
https://git.kernel.org/stable/c/d375b98e0248980681e5e56b712026174d617198
https://git.kernel.org/stable/c/da23bd709b46168f7dfc36055801011222b076cd
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3235
rh#2270118
CVE-2024-26635kernel-source-rt:Affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2024-26635
SMASH Issue 398041
bnc#1221656
https://git.kernel.org/stable/c/165ad1e22779685c3ed3dd349c6c4c632309cc62
https://git.kernel.org/stable/c/660c3053d992b68fee893a0e9ec9159228cffdc6
https://git.kernel.org/stable/c/9ccdef19cf9497c2803b005369668feb91cacdfd
https://git.kernel.org/stable/c/b8e8838f82f332ae80c643dbb1ca4418d0628097
https://git.kernel.org/stable/c/c0fe2fe7a5a291dfcf6dc64301732c8d3dc6a828
https://git.kernel.org/stable/c/df57fc2f2abf548aa889a36ab0bdcc94a75399dc
https://git.kernel.org/stable/c/e3f9bed9bee261e3347131764e42aeedf1ffea61
https://git.kernel.org/stable/c/f1f34a515fb1e25e85dee94f781e7869ae351fb8
jsc#CAR-3238
rh#2270113
CVE-2024-26636kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26636
SMASH Issue 398042
bnc#1221659
https://git.kernel.org/stable/c/04f2a74b562f3a7498be0399309669f342793d8c
https://git.kernel.org/stable/c/6d53b813ff8b177f86f149c2f744442681f720e4
https://git.kernel.org/stable/c/84e9d10419f6f4f3f3cd8f9aaf44a48719aa4b1b
https://git.kernel.org/stable/c/b643d0defcbacd7fe548bc65c3e4e6f17dc5eb2d
https://git.kernel.org/stable/c/c22044270da68881074fda81a7d34812726cb249
https://git.kernel.org/stable/c/c451c008f563d56d5e676c9dcafae565fcad84bb
https://git.kernel.org/stable/c/cafd3ad3fe03ef4d6632747be9ee15dc0029db4b
https://git.kernel.org/stable/c/dad555c816a50c6a6a8a86be1f9177673918c647
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3239
rh#2270110
CVE-2024-26640kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26640
SMASH Issue 398046
bnc#1221650
https://git.kernel.org/stable/c/1b8adcc0e2c584fec778add7777fe28e20781e60
https://git.kernel.org/stable/c/577e4432f3ac810049cb7e6b71f4d96ec7c6e894
https://git.kernel.org/stable/c/718f446e60316bf606946f7f42367d691d21541e
https://git.kernel.org/stable/c/b383d4ea272fe5795877506dcce5aad1f6330e5e
https://git.kernel.org/stable/c/d15cc0f66884ef2bed28c7ccbb11c102aa3a0760
https://git.kernel.org/stable/c/f48bf9a83b1666d934247cb58a9887d7b3127b6f
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3236
rh#2270100
CVE-2024-26641kernel-source-rt:Affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2024-26641
SMASH Issue 398047
bnc#1221654
https://git.kernel.org/stable/c/350a6640fac4b53564ec20aa3f4a0922cb0ba5e6
https://git.kernel.org/stable/c/8d975c15c0cd744000ca386247432d57b21f9df0
https://git.kernel.org/stable/c/a9bc32879a08f23cdb80a48c738017e39aea1080
https://git.kernel.org/stable/c/af6b5c50d47ab43e5272ad61935d0ed2e264d3f0
https://git.kernel.org/stable/c/c835df3bcc14858ae9b27315dd7de76370b94f3a
https://git.kernel.org/stable/c/d54e4da98bbfa8c257bdca94c49652d81d18a4d8
jsc#CAR-3237
rh#2270097
CVE-2024-26642kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26642
SMASH Issue 398535
bnc#1221830
https://git.kernel.org/stable/c/16603605b667b70da974bea8216c93e7db043bf1
https://git.kernel.org/stable/c/72c1efe3f247a581667b7d368fff3bd9a03cd57a
https://git.kernel.org/stable/c/7cdc1be24cc1bcd56a3e89ac4aef20e31ad09199
https://git.kernel.org/stable/c/8e07c16695583a66e81f67ce4c46e94dece47ba7
https://git.kernel.org/stable/c/c0c2176d1814b92ea4c8e7eb7c9cd94cd99c1b12
https://git.kernel.org/stable/c/e4988d8415bd0294d6f9f4a1e7095f8b50a97ca9
https://git.kernel.org/stable/c/e9a0d3f376eb356d54ffce36e7cc37514cbfbd6f
https://git.kernel.org/stable/c/fe40ffbca19dc70d7c6b1e3c77b9ccb404c57351
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3247
rh#2270881
CVE-2024-26645kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26645
SMASH Issue 398988
bnc#1222056
https://git.kernel.org/stable/c/2b44760609e9eaafc9d234a6883d042fc21132a7
https://git.kernel.org/stable/c/5022b331c041e8c54b9a6a3251579bd1e8c0fc0b
https://git.kernel.org/stable/c/a1eebe76e187dbe11ca299f8dbb6e45d5b1889e7
https://git.kernel.org/stable/c/aef1cb00856ccfd614467cfb50b791278992e177
https://git.kernel.org/stable/c/bf4aeff7da85c3becd39fb73bac94122331c30fb
https://git.kernel.org/stable/c/dad9b28f675ed99b4dec261db2a397efeb80b74c
https://git.kernel.org/stable/c/ef70dfa0b1e5084f32635156c9a5c795352ad860
https://git.kernel.org/stable/c/f4f7e696db0274ff560482cc52eddbf0551d4b7a
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3258
rh#2271648
CVE-2024-26651kernel-source-rt:Affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26651
SMASH Issue 397412
bnc#1221337
https://git.kernel.org/stable/c/07161b2416f740a2cb87faa5566873f401440a61
https://git.kernel.org/stable/c/276873ae26c8d75b00747c1dadb9561d6ef20581
https://git.kernel.org/stable/c/424eba06ed405d557077339edb19ce0ebe39e7c7
https://git.kernel.org/stable/c/6b4a39acafaf0186ed8e97c16e0aa6fca0e52009
https://git.kernel.org/stable/c/8a8b6a24684bc278036c3f159f7b3a31ad89546a
https://git.kernel.org/stable/c/9c402819620a842cbfe39359a3ddfaac9adc8384
https://git.kernel.org/stable/c/e39a3a14eafcf17f03c037290b78c8f483529028
https://git.kernel.org/stable/c/efba65777f98457773c5b65e3135c6132d3b015f
https://git.kernel.org/stable/c/f546cc19f9b82975238d0ba413adc27714750774
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AXURWFKAKFEIUBN7RTCXI7GZYAHXNBX5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SI2D7K2T6QCWALKLYEWZ22P4UXMEBCGB/
jsc#CAR-3262
rh#2271873
CVE-2024-26654kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26654
SMASH Issue 399863
bnc#1222304
https://git.kernel.org/stable/c/051e0840ffa8ab25554d6b14b62c9ab9e4901457
https://git.kernel.org/stable/c/3c907bf56905de7d27b329afaf59c2fb35d17b04
https://git.kernel.org/stable/c/4206ad65a0ee76920041a755bd3c17c6ba59bba2
https://git.kernel.org/stable/c/61d4787692c1fccdc268ffa7a891f9c149f50901
https://git.kernel.org/stable/c/8c990221681688da34295d6d76cc2f5b963e83f5
https://git.kernel.org/stable/c/9d66ae0e7bb78b54e1e0525456c6b54e1d132046
https://git.kernel.org/stable/c/aa39e6878f61f50892ee2dd9d2176f72020be845
https://git.kernel.org/stable/c/e955e8a7f38a856fc6534ba4e6bffd4d5cc80ac3
https://git.kernel.org/stable/c/eeb2a2ca0b8de7e1c66afaf719529154e7dc60b2
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3264
rh#2272446
CVE-2024-26656kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26656
SMASH Issue 399966
bnc#1222307
https://git.kernel.org/stable/c/22207fd5c80177b860279653d017474b2812af5e
https://git.kernel.org/stable/c/22f665ecfd1225afa1309ace623157d12bb9bb0c
https://git.kernel.org/stable/c/af054a5fb24a144f99895afce9519d709891894c
https://git.kernel.org/stable/c/e87e08c94c9541b4e18c4c13f2f605935f512605
jsc#CAR-3265
rh#2272692
CVE-2024-26659kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26659
SMASH Issue 399969
bnc#1222317
https://git.kernel.org/stable/c/2aa7bcfdbb46241c701811bbc0d64d7884e3346c
https://git.kernel.org/stable/c/2e3ec80ea7ba58bbb210e83b5a0afefee7c171d3
https://git.kernel.org/stable/c/418456c0ce56209610523f21734c5612ee634134
https://git.kernel.org/stable/c/696e4112e5c1ee61996198f0ebb6ca3fab55166e
https://git.kernel.org/stable/c/7c4650ded49e5b88929ecbbb631efb8b0838e811
https://git.kernel.org/stable/c/f5e7ffa9269a448a720e21f1ed1384d118298c97
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3266
jsc#CAR-3267
rh#2272780
CVE-2024-26663kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26663
SMASH Issue 399971
bnc#1222326
https://git.kernel.org/stable/c/0cd331dfd6023640c9669d0592bc0fd491205f87
https://git.kernel.org/stable/c/19d7314f2fb9515bdaac9829d4d8eb34edd1fe95
https://git.kernel.org/stable/c/24ec8f0da93b8a9fba11600be8a90f0d73fb46f1
https://git.kernel.org/stable/c/3871aa01e1a779d866fa9dfdd5a836f342f4eb87
https://git.kernel.org/stable/c/3d3a5b31b43515b5752ff282702ca546ec3e48b6
https://git.kernel.org/stable/c/6f70f0b412458c622a12d4292782c8e92e210c2f
https://git.kernel.org/stable/c/888e3524be87f3df9fa3c083484e4b62b3e3bb59
https://git.kernel.org/stable/c/c1701ea85ef0ec7be6a1b36c7da69f572ed2fd12
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3268
rh#2272788
CVE-2024-26668kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26668
SMASH Issue 399976
bnc#1222335
https://git.kernel.org/stable/c/00c2c29aa36d1d1827c51a3720e9f893a22c7c6a
https://git.kernel.org/stable/c/79d4efd75e7dbecd855a3b8a63e65f7265f466e1
https://git.kernel.org/stable/c/9882495d02ecc490604f747437a40626dc9160d0
https://git.kernel.org/stable/c/bc6e242bb74e2ae616bfd2b250682b738e781c9b
https://git.kernel.org/stable/c/c9d9eb9c53d37cdebbad56b91e40baf42d5a97aa
jsc#CAR-3269
rh#2272797
CVE-2024-26669kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26669
SMASH Issue 399977
bnc#1222350
https://git.kernel.org/stable/c/32f2a0afa95fae0d1ceec2ff06e0e816939964b8
https://git.kernel.org/stable/c/9ed46144cff3598a5cf79955630e795ff9af5b97
https://git.kernel.org/stable/c/c04709b2cc99ae31c346f79f0211752d7b74df01
jsc#CAR-3270
rh#2272795
CVE-2024-26671kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26671
SMASH Issue 399979
bnc#1222357
https://git.kernel.org/stable/c/1d9c777d3e70bdc57dddf7a14a80059d65919e56
https://git.kernel.org/stable/c/5266caaf5660529e3da53004b8b7174cab6374ed
https://git.kernel.org/stable/c/6d8b01624a2540336a32be91f25187a433af53a0
https://git.kernel.org/stable/c/7610ba1319253225a9ba8a9d28d472fc883b4e2f
https://git.kernel.org/stable/c/89e0e66682e1538aeeaa3109503473663cd24c8b
https://git.kernel.org/stable/c/9525b38180e2753f0daa1a522b7767a2aa969676
https://git.kernel.org/stable/c/ecd7744a1446eb02ccc63e493e2eb6ede4ef1e10
https://git.kernel.org/stable/c/f1bc0d8163f8ee84a8d5affdf624cfad657df1d2
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3277
rh#2272811
CVE-2024-26673kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26673
SMASH Issue 399947
bnc#1222368
https://git.kernel.org/stable/c/0f501dae16b7099e69ee9b0d5c70b8f40fd30e98
https://git.kernel.org/stable/c/38cc1605338d99205a263707f4dde76408d3e0e8
https://git.kernel.org/stable/c/65ee90efc928410c6f73b3d2e0afdd762652c09d
https://git.kernel.org/stable/c/8059918a1377f2f1fff06af4f5a4ed3d5acd6bc4
https://git.kernel.org/stable/c/b775ced05489f4b77a35fe203e9aeb22f428e38f
https://git.kernel.org/stable/c/cfe3550ea5df292c9e2d608e8c4560032391847e
https://git.kernel.org/stable/c/f549f340c91f08b938d60266e792ff7748dae483
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3273
rh#2272816
CVE-2024-26675kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26675
SMASH Issue 399982
bnc#1222379
https://git.kernel.org/stable/c/210d938f963dddc543b07e66a79b7d8d4bd00bd8
https://git.kernel.org/stable/c/4e2c4846b2507f6dfc9bea72b7567c2693a82a16
https://git.kernel.org/stable/c/4fdb14ba89faff6e6969a4dffdc8e54235d6e5ed
https://git.kernel.org/stable/c/56fae81633ccee307cfcb032f706bf1863a56982
https://git.kernel.org/stable/c/58fbe665b097bf7b3144da7e7b91fb27aa8d0ae3
https://git.kernel.org/stable/c/7e5ef49670766c9742ffcd9cead7cdb018268719
https://git.kernel.org/stable/c/b06e067e93fa4b98acfd3a9f38a398ab91bbc58b
https://git.kernel.org/stable/c/cb88cb53badb8aeb3955ad6ce80b07b598e310b8
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3274
rh#2272829
CVE-2024-26677kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26677
SMASH Issue 399984
bnc#1222387
https://git.kernel.org/stable/c/200cb50b9e154434470c8969d32474d38475acc2
https://git.kernel.org/stable/c/63719f490e6a89896e9a463d2b45e8203eab23ae
https://git.kernel.org/stable/c/e7870cf13d20f56bfc19f9c3e89707c69cf104ef
jsc#CAR-3275
rh#2272834
CVE-2024-26679kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26679
SMASH Issue 399986
bnc#1222385
https://git.kernel.org/stable/c/307fa8a75ab7423fa5c73573ec3d192de5027830
https://git.kernel.org/stable/c/3266e638ba5cc1165f5e6989eb8c0720f1cc4b41
https://git.kernel.org/stable/c/4a5e31bdd3c1702b520506d9cf8c41085f75c7f2
https://git.kernel.org/stable/c/54538752216bf89ee88d47ad07802063a498c299
https://git.kernel.org/stable/c/5993f121fbc01dc2d734f0ff2628009b258fb1dd
https://git.kernel.org/stable/c/88081ba415224cf413101def4343d660f56d082b
https://git.kernel.org/stable/c/caa064c3c2394d03e289ebd6b0be5102eb8a5b40
https://git.kernel.org/stable/c/eef00a82c568944f113f2de738156ac591bbd5cd
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3276
rh#2272839
CVE-2024-26687kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26687
SMASH Issue 400159
bnc#1222435
https://git.kernel.org/stable/c/0fc88aeb2e32b76db3fe6a624b8333dbe621b8fd
https://git.kernel.org/stable/c/20980195ec8d2e41653800c45c8c367fa1b1f2b4
https://git.kernel.org/stable/c/585a344af6bcac222608a158fc2830ff02712af5
https://git.kernel.org/stable/c/9470f5b2503cae994098dea9682aee15b313fa44
https://git.kernel.org/stable/c/9be71aa12afa91dfe457b3fb4a444c42b1ee036b
https://git.kernel.org/stable/c/ea592baf9e41779fe9a0424c03dd2f324feca3b3
https://git.kernel.org/stable/c/fa765c4b4aed2d64266b694520ecb025c862c5a9
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3282
rh#2273107
CVE-2024-26688kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26688
SMASH Issue 400160
bnc#1222482
https://git.kernel.org/stable/c/13c5a9fb07105557a1fa9efdb4f23d7ef30b7274
https://git.kernel.org/stable/c/1dde8ef4b7a749ae1bc73617c91775631d167557
https://git.kernel.org/stable/c/22850c9950a4e43a67299755d11498f3292d02ff
https://git.kernel.org/stable/c/2e2c07104b4904aed1389a59b25799b95a85b5b9
https://git.kernel.org/stable/c/79d72c68c58784a3e1cd2378669d51bfd0cb7498
https://git.kernel.org/stable/c/80d852299987a8037be145a94f41874228f1a773
https://git.kernel.org/stable/c/ec78418801ef7b0c22cd6a30145ec480dd48db39
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3284
rh#2273105
CVE-2024-26689kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26689
SMASH Issue 400162
bnc#1222503
https://git.kernel.org/stable/c/70e329b440762390258a6fe8c0de93c9fdd56c77
https://git.kernel.org/stable/c/7958c1bf5b03c6f1f58e724dbdec93f8f60b96fc
https://git.kernel.org/stable/c/8180d0c27b93a6eb60da1b08ea079e3926328214
https://git.kernel.org/stable/c/ae20db45e482303a20e56f2db667a9d9c54ac7e7
https://git.kernel.org/stable/c/cda4672da1c26835dcbd7aec2bfed954eda9b5ef
https://git.kernel.org/stable/c/f3f98d7d84b31828004545e29fd7262b9f444139
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3351
rh#2273102
CVE-2024-26702kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26702
SMASH Issue 400174
bnc#1222424
https://git.kernel.org/stable/c/176256ff8abff29335ecff905a09fb49e8dcf513
https://git.kernel.org/stable/c/1d8c67e94e9e977603473a543d4f322cf2c4aa01
https://git.kernel.org/stable/c/36a49290d7e6d554020057a409747a092b1d3b56
https://git.kernel.org/stable/c/57d05dbbcd0b3dc0c252103b43012eef5d6430d1
https://git.kernel.org/stable/c/7200170e88e3ec54d9e9c63f07514c3cead11481
https://git.kernel.org/stable/c/792595bab4925aa06532a14dd256db523eb4fa5e
https://git.kernel.org/stable/c/8d5838a473e8e6d812257c69745f5920e4924a60
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3281
rh#2273178
CVE-2024-26704kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26704
SMASH Issue 400161
bnc#1222422
https://git.kernel.org/stable/c/185eab30486ba3e7bf8b9c2e049c79a06ffd2bc1
https://git.kernel.org/stable/c/2883940b19c38d5884c8626483811acf4d7e148f
https://git.kernel.org/stable/c/55583e899a5357308274601364741a83e78d6ac4
https://git.kernel.org/stable/c/559ddacb90da1d8786dd8ec4fd76bbfa404eaef6
https://git.kernel.org/stable/c/afba9d11320dad5ce222ac8964caf64b7b4bedb1
https://git.kernel.org/stable/c/afbcad9ae7d6d11608399188f03a837451b6b3a1
https://git.kernel.org/stable/c/b4fbb89d722cbb16beaaea234b7230faaaf68c71
https://git.kernel.org/stable/c/d033a555d9a1cf53dbf3301af7199cc4a4c8f537
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3280
rh#2273174
CVE-2024-26715kernel-source-rt:Affectedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26715
SMASH Issue 400185
bnc#1222561
https://git.kernel.org/stable/c/36695d5eeeefe5a64b47d0336e7c8fc144e78182
https://git.kernel.org/stable/c/57e2e42ccd3cd6183228269715ed032f44536751
https://git.kernel.org/stable/c/61a348857e869432e6a920ad8ea9132e8d44c316
https://git.kernel.org/stable/c/88936ceab6b426f1312327e9ef849c215c6007a7
https://git.kernel.org/stable/c/c7ebd8149ee519d27232e6e4940e9c02071b568b
jsc#CAR-3290
rh#2273152
CVE-2024-26720kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26720
SMASH Issue 400190
bnc#1222364
https://git.kernel.org/stable/c/16b1025eaa8fc223ab4273ece20d1c3a4211a95d
https://git.kernel.org/stable/c/1f12e4b3284d6c863f272eb2de0d4248ed211cf4
https://git.kernel.org/stable/c/5099871b370335809c0fd1abad74d9c7c205d43f
https://git.kernel.org/stable/c/65977bed167a92e87085e757fffa5798f7314c9f
https://git.kernel.org/stable/c/81e7d2530d458548b90a5c5e76b77ad5e5d1c0df
https://git.kernel.org/stable/c/9319b647902cbd5cc884ac08a8a6d54ce111fc78
https://git.kernel.org/stable/c/c593d26fb5d577ef31b6e49a31e08ae3ebc1bc1e
https://git.kernel.org/stable/c/ec18ec230301583395576915d274b407743d8f6c
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3271
rh#2273141
CVE-2024-26722kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26722
SMASH Issue 400192
bnc#1222520
https://git.kernel.org/stable/c/050ad2ca0ac169dd9e552075d2c6af1bbb46534c
https://git.kernel.org/stable/c/1f0d7792e9023e8658e901b7b76a555f6aa052ec
https://git.kernel.org/stable/c/3dd2d99e2352903d0e0b8769e6c9b8293c7454b2
https://git.kernel.org/stable/c/422d5243b9f780abd3d39da2b746e3915677b07d
https://git.kernel.org/stable/c/4a98bc739d0753a5810ce5630943cd7614c7717e
https://git.kernel.org/stable/c/6ef5d5b92f7117b324efaac72b3db27ae8bb3082
https://git.kernel.org/stable/c/d14b8e2005f36319df9412d42037416d64827f6b
https://git.kernel.org/stable/c/ed5b8b735369b40d6c1f8ef3e62d369f74b4c491
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3319
rh#2273137
CVE-2024-26733kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26733
SMASH Issue 400226
bnc#1222585
https://git.kernel.org/stable/c/3ab0d6f8289ba8402ca95a9fc61a34909d5e1f3a
https://git.kernel.org/stable/c/97eaa2955db4120ce6ec2ef123e860bc32232c50
https://git.kernel.org/stable/c/a3f2c083cb575d80a7627baf3339e78fedccbb91
https://git.kernel.org/stable/c/a7d6027790acea24446ddd6632d394096c0f4667
https://git.kernel.org/stable/c/dbc9b22d0ed319b4e29034ce0a3fe32a3ee2c587
https://git.kernel.org/stable/c/f119f2325ba70cbfdec701000dcad4d88805d5b0
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3311
rh#2273247
CVE-2024-26735kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26735
SMASH Issue 400228
bnc#1222372
https://git.kernel.org/stable/c/02b08db594e8218cfbc0e4680d4331b457968a9b
https://git.kernel.org/stable/c/5559cea2d5aa3018a5f00dd2aca3427ba09b386b
https://git.kernel.org/stable/c/65c38f23d10ff79feea1e5d50b76dc7af383c1e6
https://git.kernel.org/stable/c/82831e3ff76ef09fb184eb93b79a3eb3fb284f1d
https://git.kernel.org/stable/c/8391b9b651cfdf80ab0f1dc4a489f9d67386e197
https://git.kernel.org/stable/c/91b020aaa1e59bfb669d34c968e3db3d5416bcee
https://git.kernel.org/stable/c/953f42934533c151f440cd32390044d2396b87aa
https://git.kernel.org/stable/c/9e02973dbc6a91e40aa4f5d87b8c47446fbfce44
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3272
rh#2273278
CVE-2024-26739kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26739
SMASH Issue 400232
bnc#1222559
https://git.kernel.org/stable/c/166c2c8a6a4dc2e4ceba9e10cfe81c3e469e3210
https://git.kernel.org/stable/c/28cdbbd38a4413b8eff53399b3f872fd4e80db9d
https://git.kernel.org/stable/c/f4e294bbdca8ac8757db436fc82214f3882fc7e7
jsc#CAR-3289
rh#2273270
CVE-2024-26740kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26740
SMASH Issue 400233
bnc#1222563
https://git.kernel.org/stable/c/52f671db18823089a02f07efc04efdb2272ddc17
https://git.kernel.org/stable/c/60ddea1600bc476e0f5e02bce0e29a460ccbf0be
https://git.kernel.org/stable/c/7c787888d164689da8b1b115f3ef562c1e843af4
jsc#CAR-3291
rh#2273268
CVE-2024-26743kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26743
SMASH Issue 400236
bnc#1222677
https://git.kernel.org/stable/c/135e5465fefa463c5ec93c4eede48b9fedac894a
https://git.kernel.org/stable/c/5639414a52a29336ffa1ede80a67c6d927acbc5a
https://git.kernel.org/stable/c/5ba4e6d5863c53e937f49932dee0ecb004c65928
https://git.kernel.org/stable/c/7f31a244c753aacf40b71d01f03ca6742f81bbbc
https://git.kernel.org/stable/c/95175dda017cd4982cd47960536fa1de003d3298
https://git.kernel.org/stable/c/bab8875c06ebda5e01c5c4cab30022aed85c14e6
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3320
rh#2273262
CVE-2024-26744kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26744
SMASH Issue 400237
bnc#1222449
https://git.kernel.org/stable/c/5a5c039dac1b1b7ba3e91c791f4421052bf79b82
https://git.kernel.org/stable/c/84f1dac960cfa210a3b7a7522e6c2320ae91932b
https://git.kernel.org/stable/c/989af2f29342a9a7c7515523d879b698ac8465f4
https://git.kernel.org/stable/c/aee4dcfe17219fe60f2821923adea98549060af8
https://git.kernel.org/stable/c/c99a827d3cff9f84e1cb997b7cc6386d107aa74d
https://git.kernel.org/stable/c/fdfa083549de5d50ebf7f6811f33757781e838c0
https://git.kernel.org/stable/c/fe2a73d57319feab4b3b175945671ce43492172f
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3283
rh#2273260
CVE-2024-26747kernel-source-rt:Affectedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26747
SMASH Issue 400238
bnc#1222609
https://git.kernel.org/stable/c/0158216805ca7e498d07de38840d2732166ae5fa
https://git.kernel.org/stable/c/01f82de440f2ab07c259b7573371e1c42e5565db
https://git.kernel.org/stable/c/1c9be13846c0b2abc2480602f8ef421360e1ad9e
https://git.kernel.org/stable/c/4b45829440b1b208948b39cc71f77a37a2536734
https://git.kernel.org/stable/c/e279bf8e51893e1fe160b3d8126ef2dd00f661e1
https://git.kernel.org/stable/c/ef982fc41055fcebb361a92288d3225783d12913
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3293
rh#2273072
CVE-2024-26751kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26751
SMASH Issue 400241
bnc#1222724
https://git.kernel.org/stable/c/6abe0895b63c20de06685c8544b908c7e413efa8
https://git.kernel.org/stable/c/70d92abbe29692a3de8697ae082c60f2d21ab482
https://git.kernel.org/stable/c/786f089086b505372fb3f4f008d57e7845fff0d8
https://git.kernel.org/stable/c/97ba7c1f9c0a2401e644760d857b2386aa895997
https://git.kernel.org/stable/c/999a8bb70da2946336327b4480824d1691cae1fa
https://git.kernel.org/stable/c/9e200a06ae2abb321939693008290af32b33dd6e
https://git.kernel.org/stable/c/eec6cbbfa1e8d685cc245cfd5626d0715a127a48
https://git.kernel.org/stable/c/fdf87a0dc26d0550c60edc911cda42f9afec3557
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3301
rh#2273221
CVE-2024-26754kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26754
SMASH Issue 400244
bnc#1222632
https://git.kernel.org/stable/c/136cfaca22567a03bbb3bf53a43d8cb5748b80ec
https://git.kernel.org/stable/c/2e534fd15e5c2ca15821c897352cf0e8a3e30dca
https://git.kernel.org/stable/c/3963f16cc7643b461271989b712329520374ad2a
https://git.kernel.org/stable/c/5013bd54d283eda5262c9ae3bcc966d01daf8576
https://git.kernel.org/stable/c/a576308800be28f2eaa099e7caad093b97d66e77
https://git.kernel.org/stable/c/ba6b8b02a3314e62571a540efa96560888c5f03e
https://git.kernel.org/stable/c/f0ecdfa679189d26aedfe24212d4e69e42c2c861
https://git.kernel.org/stable/c/f8cbd1791900b5d96466eede8e9439a5b9ca4de7
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3321
rh#2273215
CVE-2024-26756kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26756
SMASH Issue 400246
bnc#1222531
https://git.kernel.org/stable/c/13b520fb62b772e408f9b79c5fe18ad414e90417
https://git.kernel.org/stable/c/ad39c08186f8a0f221337985036ba86731d6aafe
jsc#CAR-3287
rh#2273211
CVE-2024-26757kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26757
SMASH Issue 400247
bnc#1222527
https://git.kernel.org/stable/c/2ea169c5a0b1134d573d07fc27a16f327ad0e7d3
https://git.kernel.org/stable/c/55a48ad2db64737f7ffc0407634218cc6e4c513b
jsc#CAR-3286
rh#2273208
CVE-2024-26763kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2024-26763
SMASH Issue 400253
bnc#1222720
https://git.kernel.org/stable/c/0dccbb93538fe89a86c6de31d4b1c8c560848eaa
https://git.kernel.org/stable/c/1a4371db68a31076afbe56ecce34fbbe6c80c529
https://git.kernel.org/stable/c/3c652f6fa1e1f9f02c3fbf359d260ad153ec5f90
https://git.kernel.org/stable/c/43a202bd552976497474ae144942e32cc5f34d7e
https://git.kernel.org/stable/c/50c70240097ce41fe6bce6478b80478281e4d0f7
https://git.kernel.org/stable/c/64ba01a365980755732972523600a961c4266b75
https://git.kernel.org/stable/c/d9e3763a505e50ba3bd22846f2a8db99429fb857
https://git.kernel.org/stable/c/e08c2a8d27e989f0f5b0888792643027d7e691e6
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3361
rh#2273196
CVE-2024-26771kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26771
SMASH Issue 400261
bnc#1222610
https://git.kernel.org/stable/c/4fe4e5adc7d29d214c59b59f61db73dec505ca3d
https://git.kernel.org/stable/c/6e2276203ac9ff10fc76917ec9813c660f627369
https://git.kernel.org/stable/c/7b24760f3a3c7ae1a176d343136b6c25174b7b27
https://git.kernel.org/stable/c/9d508c897153ae8dd79303f7f035f078139f6b49
https://git.kernel.org/stable/c/c432094aa7c9970f2fa10d2305d550d3810657ce
https://git.kernel.org/stable/c/f2a5e30d1e9a629de6179fa23923a318d5feb29e
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3306
rh#2273238
CVE-2024-26773kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26773
SMASH Issue 400263
bnc#1222618
https://git.kernel.org/stable/c/0184747b552d6b5a14db3b7fcc3b792ce64dedd1
https://git.kernel.org/stable/c/21f8cfe79f776287459343e9cfa6055af61328ea
https://git.kernel.org/stable/c/260fc96283c0f594de18a1b045faf6d8fb42874d
https://git.kernel.org/stable/c/4530b3660d396a646aad91a787b6ab37cf604b53
https://git.kernel.org/stable/c/4c21fa60a6f4606f6214a38f50612b17b2f738f5
https://git.kernel.org/stable/c/927794a02169778c9c2e7b25c768ab3ea8c1dc03
https://git.kernel.org/stable/c/a2576ae9a35c078e488f2c573e9e6821d651fbbe
https://git.kernel.org/stable/c/f97e75fa4e12b0aa0224e83fcbda8853ac2adf36
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3300
rh#2273236
CVE-2024-26775kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26775
SMASH Issue 400265
bnc#1222627
https://git.kernel.org/stable/c/19a77b27163820f793b4d022979ffdca8f659b77
https://git.kernel.org/stable/c/2d623c94fbba3554f4446ba6f3c764994e8b0d26
https://git.kernel.org/stable/c/673629018ba04906899dcb631beec34d871f709c
https://git.kernel.org/stable/c/e169bd4fb2b36c4b2bee63c35c740c85daeb2e86
jsc#CAR-3299
rh#2273232
CVE-2024-26777kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26777
SMASH Issue 400267
bnc#1222765
https://git.kernel.org/stable/c/1d11dd3ea5d039c7da089f309f39c4cd363b924b
https://git.kernel.org/stable/c/6db07619d173765bd8622d63809cbfe361f04207
https://git.kernel.org/stable/c/84246c35ca34207114055a87552a1c4289c8fd7e
https://git.kernel.org/stable/c/99f1abc34a6dde248d2219d64aa493c76bbdd9eb
https://git.kernel.org/stable/c/cd36da760bd1f78c63c7078407baf01dd724f313
https://git.kernel.org/stable/c/df6e2088c6f4cad539cf67cba2d6764461e798d1
https://git.kernel.org/stable/c/e421946be7d9bf545147bea8419ef8239cb7ca52
https://git.kernel.org/stable/c/f329523f6a65c3bbce913ad35473d83a319d5d99
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3304
rh#2273228
CVE-2024-26778kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26778
SMASH Issue 400268
bnc#1222770
https://git.kernel.org/stable/c/04e5eac8f3ab2ff52fa191c187a46d4fdbc1e288
https://git.kernel.org/stable/c/070398d32c5f3ab0e890374904ad94551c76aec4
https://git.kernel.org/stable/c/224453de8505aede1890f007be973925a3edf6a1
https://git.kernel.org/stable/c/512ee6d6041e007ef5bf200c6e388e172a2c5b24
https://git.kernel.org/stable/c/84dce0f6a4cc5b7bfd7242ef9290db8ac1dd77ff
https://git.kernel.org/stable/c/8c54acf33e5adaad6374bf3ec1e3aff0591cc8e1
https://git.kernel.org/stable/c/a9ca4e80d23474f90841251f4ac0d941fa337a01
https://git.kernel.org/stable/c/bc3c2e58d73b28b9a8789fca84778ee165a72d13
jsc#CAR-3310
rh#2273225
CVE-2024-26779kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26779
SMASH Issue 400269
bnc#1222772
https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9
https://git.kernel.org/stable/c/54b79d8786964e2f840e8a2ec4a9f9a50f3d4954
https://git.kernel.org/stable/c/5ffab99e070b9f8ae0cf60c3c3602b84eee818dd
https://git.kernel.org/stable/c/76fad1174a0cae6fc857b9f88b261a2e4f07d587
https://git.kernel.org/stable/c/85720b69aef177318f4a18efbcc4302228a340e5
https://git.kernel.org/stable/c/88c18fd06608b3adee547102505d715f21075c9d
https://git.kernel.org/stable/c/bcbc84af1183c8cf3d1ca9b78540c2185cd85e7f
https://git.kernel.org/stable/c/eb39bb548bf974acad7bd6780fe11f9e6652d696
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3322
rh#2273223
CVE-2024-26787kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26787
SMASH Issue 400339
bnc#1222781
https://git.kernel.org/stable/c/0224cbc53ba82b84affa7619b6d1b1a254bc2c53
https://git.kernel.org/stable/c/176e66269f0de327375fc0ea51c12c2f5a97e4c4
https://git.kernel.org/stable/c/5ae5060e17a3fc38e54c3e5bd8abd6b1d5bfae7c
https://git.kernel.org/stable/c/6b1ba3f9040be5efc4396d86c9752cdc564730be
https://git.kernel.org/stable/c/70af82bb9c897faa25a44e4181f36c60312b71ef
https://git.kernel.org/stable/c/d610a307225951929b9dff807788439454476f85
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3352
rh#2273457
CVE-2024-26788kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26788
SMASH Issue 400340
bnc#1222783
https://git.kernel.org/stable/c/3cc5fb824c2125aa3740d905b3e5b378c8a09478
https://git.kernel.org/stable/c/4529c084a320be78ff2c5e64297ae998c6fdf66b
https://git.kernel.org/stable/c/474d521da890b3e3585335fb80a6044cb2553d99
https://git.kernel.org/stable/c/677102a930643c31f1b4c512b041407058bdfef8
https://git.kernel.org/stable/c/87a39071e0b639f45e05d296cc0538eef44ec0bd
https://git.kernel.org/stable/c/9579a21e99fe8dab22a253050ddff28d340d74e1
https://git.kernel.org/stable/c/a69c8bbb946936ac4eb6a6ae1e849435aa8d947d
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3312
rh#2273455
CVE-2024-26790kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26790
SMASH Issue 400342
bnc#1222784
https://git.kernel.org/stable/c/106c1ac953a66556ec77456c46e818208d3a9bce
https://git.kernel.org/stable/c/237ecf1afe6c22534fa43abdf2bf0b0f52de0aaa
https://git.kernel.org/stable/c/518d78b4fac68cac29a263554d7f3b19da99d0da
https://git.kernel.org/stable/c/5b696e9c388251f1c7373be92293769a489fd367
https://git.kernel.org/stable/c/9d739bccf261dd93ec1babf82f5c5d71dd4caa3e
https://git.kernel.org/stable/c/ad2f8920c314e0a2d9e984fc94b729eca3cda471
https://git.kernel.org/stable/c/bb3a06e9b9a30e33d96aadc0e077be095a4f8580
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3313
rh#2273451
CVE-2024-26791kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26791
SMASH Issue 400343
bnc#1222793
https://git.kernel.org/stable/c/11d7a2e429c02d51e2dc90713823ea8b8d3d3a84
https://git.kernel.org/stable/c/2886fe308a83968dde252302884a1e63351cf16d
https://git.kernel.org/stable/c/343eecb4ff49a7b1cc1dfe86958a805cf2341cfb
https://git.kernel.org/stable/c/9845664b9ee47ce7ee7ea93caf47d39a9d4552c4
https://git.kernel.org/stable/c/ab2d68655d0f04650bef09fee948ff80597c5fb9
https://git.kernel.org/stable/c/b1690ced4d2d8b28868811fb81cd33eee5aefee1
https://git.kernel.org/stable/c/c6652e20d7d783d060fe5f987eac7b5cabe31311
https://git.kernel.org/stable/c/f590040ce2b712177306b03c2a63b16f7d48d3c8
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3353
rh#2273448
CVE-2024-26793kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26793
SMASH Issue 400345
bnc#1222428
https://git.kernel.org/stable/c/01129059d5141d62fae692f7a336ae3bc712d3eb
https://git.kernel.org/stable/c/5366969a19a8a0d2ffb3d27ef6e8905e5e4216f8
https://git.kernel.org/stable/c/616d82c3cfa2a2146dd7e3ae47bda7e877ee549e
https://git.kernel.org/stable/c/9376d059a705c5dfaac566c2d09891242013ae16
https://git.kernel.org/stable/c/93dd420bc41531c9a31498b9538ca83ba6ec191e
https://git.kernel.org/stable/c/abd32d7f5c0294c1b2454c5a3b13b18446bac627
https://git.kernel.org/stable/c/e668b92a3a01429923fd5ca13e99642aab47de69
https://git.kernel.org/stable/c/ec92aa2cab6f0048f10d6aa4f025c5885cb1a1b6
jsc#CAR-3285
rh#2273444
CVE-2024-26801kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26801
SMASH Issue 400353
bnc#1222413
https://git.kernel.org/stable/c/2449007d3f73b2842c9734f45f0aadb522daf592
https://git.kernel.org/stable/c/2ab9a19d896f5a0dd386e1f001c5309bc35f433b
https://git.kernel.org/stable/c/45085686b9559bfbe3a4f41d3d695a520668f5e1
https://git.kernel.org/stable/c/6dd0a9dfa99f8990a08eb8fdd8e79bee31c7d8e2
https://git.kernel.org/stable/c/98fb98fd37e42fd4ce13ff657ea64503e24b6090
https://git.kernel.org/stable/c/da4569d450b193e39e87119fd316c0291b585d14
https://git.kernel.org/stable/c/dd594cdc24f2e48dab441732e6dfcafd6b0711d1
https://git.kernel.org/stable/c/e0b278650f07acf2e0932149183458468a731c03
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3279
rh#2273429
CVE-2024-26804kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26804
SMASH Issue 400356
bnc#1222629
https://git.kernel.org/stable/c/049d7989c67e8dd50f07a2096dbafdb41331fb9b
https://git.kernel.org/stable/c/2e95350fe9db9d53c701075060ac8ac883b68aee
https://git.kernel.org/stable/c/5ae1e9922bbdbaeb9cfbe91085ab75927488ac0f
https://git.kernel.org/stable/c/a0a1db40b23e8ff86dea2786c5ea1470bb23ecb9
https://git.kernel.org/stable/c/ab63de24ebea36fe73ac7121738595d704b66d96
https://git.kernel.org/stable/c/afec0c5cd2ed71ca95a8b36a5e6d03333bf34282
https://git.kernel.org/stable/c/f81e94d2dcd2397137edcb8b85f4c5bed5d22383
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3294
rh#2273423
CVE-2024-26805kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26805
SMASH Issue 400357
bnc#1222630
https://git.kernel.org/stable/c/0b27bf4c494d61e5663baa34c3edd7ccebf0ea44
https://git.kernel.org/stable/c/59fc3e3d049e39e7d0d271f20dd5fb47c57faf1d
https://git.kernel.org/stable/c/661779e1fcafe1b74b3f3fe8e980c1e207fea1fd
https://git.kernel.org/stable/c/9ae51361da43270f4ba0eb924427a07e87e48777
https://git.kernel.org/stable/c/c71ed29d15b1a1ed6c464f8c3536996963046285
https://git.kernel.org/stable/c/d3ada42e534a83b618bbc1e490d23bf0fdae4736
https://git.kernel.org/stable/c/ec343a55b687a452f5e87f3b52bf9f155864df65
https://git.kernel.org/stable/c/f19d1f98e60e68b11fc60839105dd02a30ec0d77
jsc#CAR-3295
rh#2273421
CVE-2024-26810kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26810
SMASH Issue 400465
bnc#1222803
https://git.kernel.org/stable/c/03505e3344b0576fd619416793a31eae9c5b73bf
https://git.kernel.org/stable/c/04a4a017b9ffd7b0f427b8c376688d14cb614651
https://git.kernel.org/stable/c/1e71b6449d55179170efc8dee8664510bb813b42
https://git.kernel.org/stable/c/3dd9be6cb55e0f47544e7cdda486413f7134e3b3
https://git.kernel.org/stable/c/3fe0ac10bd117df847c93408a9d428a453cd60e5
https://git.kernel.org/stable/c/6fe478d855b20ac1eb5da724afe16af5a2aaaa40
https://git.kernel.org/stable/c/810cd4bb53456d0503cc4e7934e063835152c1b7
https://git.kernel.org/stable/c/ec73e079729258a05452356cf6d098bf1504d5a6
jsc#CAR-3354
rh#2273654
CVE-2024-26812kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26812
SMASH Issue 400466
bnc#1222808
https://git.kernel.org/stable/c/0e09cf81959d9f12b75ad5c6dd53d237432ed034
https://git.kernel.org/stable/c/18c198c96a815c962adc2b9b77909eec0be7df4d
https://git.kernel.org/stable/c/27d40bf72dd9a6600b76ad05859176ea9a1b4897
https://git.kernel.org/stable/c/4c089cefe30924fbe20dd1ee92774ea1f5eca834
https://git.kernel.org/stable/c/4cb0d7532126d23145329826c38054b4e9a05e7c
https://git.kernel.org/stable/c/69276a555c740acfbff13fb5769ee9c92e1c828e
https://git.kernel.org/stable/c/7d29d4c72c1e196cce6969c98072a272d1a703b3
https://git.kernel.org/stable/c/b18fa894d615c8527e15d96b76c7448800e13899
jsc#CAR-3326
rh#2273650
CVE-2024-26816kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2024-26816
SMASH Issue 401231
SMASH Issue 401233
bnc#1222624
https://git.kernel.org/stable/c/13edb509abc91c72152a11baaf0e7c060a312e03
https://git.kernel.org/stable/c/47635b112a64b7b208224962471e7e42f110e723
https://git.kernel.org/stable/c/52018aa146e3cf76569a9b1e6e49a2b7c8d4a088
https://git.kernel.org/stable/c/5cb59db49c9c0fccfd33b2209af4f7ae3c6ddf40
https://git.kernel.org/stable/c/a4e7ff1a74274e59a2de9bb57236542aa990d20a
https://git.kernel.org/stable/c/aaa8736370db1a78f0e8434344a484f9fd20be3b
https://git.kernel.org/stable/c/ae7079238f6faf1b94accfccf334e98b46a0c0aa
https://git.kernel.org/stable/c/af2a9f98d884205145fd155304a6955822ccca1c
https://git.kernel.org/stable/c/c7cff9780297d55d97ad068b68b703cfe53ef9af
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3296
rh#2274474
CVE-2024-26817kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26817
SMASH Issue 401703
bnc#1222812
https://git.kernel.org/stable/c/0c33d11153949310d76631d8f4a4736519eacd3a
https://git.kernel.org/stable/c/315eb3c2df7e4cb18e3eacfa18a53a46f2bf0ef7
https://git.kernel.org/stable/c/3b0daecfeac0103aba8b293df07a0cbaf8b43f29
https://git.kernel.org/stable/c/8b0564704255c6b3c6a7188e86939f754e1577c0
https://git.kernel.org/stable/c/cbac7de1d9901521e78cdc34e15451df3611f2ad
https://git.kernel.org/stable/c/e6721ea845fcb93a764a92bd40f1afc0d6c69751
https://git.kernel.org/stable/c/e6768c6737f4c02cba193a3339f0cc2907f0b86a
https://git.kernel.org/stable/c/fcbd99b3c73309107e3be71f20dff9414df64f91
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3TH6JK7ZZMSXSVHOJKIMSSOC6EQM4WV/
jsc#CAR-3315
rh#2274989
CVE-2024-26825kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26825
SMASH Issue 402298
bnc#1223065
https://git.kernel.org/stable/c/16d3f507b0fa70453dc54550df093d6e9ac630c1
https://git.kernel.org/stable/c/2f6d16f0520d6505241629ee2f5c131b547d5f9d
https://git.kernel.org/stable/c/471c9ede8061357b43a116fa692e70d91941ac23
https://git.kernel.org/stable/c/5c0c5ffaed73cbae6c317374dc32ba6cacc60895
https://git.kernel.org/stable/c/71349abe3aba7fedcab5b3fcd7aa82371fb5ccbf
https://git.kernel.org/stable/c/7e9a8498658b398bf11b8e388005fa54e40aed81
https://git.kernel.org/stable/c/a3d90fb5c23f29ba59c04005ae76c5228cef2be9
https://git.kernel.org/stable/c/bfb007aebe6bff451f7f3a4be19f4f286d0d5d9c
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3342
rh#2275607
CVE-2024-26828kernel-source-rt:Affectedimportant7.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H)CVE-2024-26828
L3:68040
SMASH Issue 402315
bnc#1223084
bnc#1223363
https://git.kernel.org/stable/c/7190353835b4a219abb70f90b06cdcae97f11512
https://git.kernel.org/stable/c/cffe487026be13eaf37ea28b783d9638ab147204
https://git.kernel.org/stable/c/df2af9fdbc4ddde18a3371c4ca1a86596e8be301
https://git.kernel.org/stable/c/f7ff1c89fb6e9610d2b01c1821727729e6609308
jsc#CAR-3345
rh#2275600
CVE-2024-26830kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26830
SMASH Issue 402318
bnc#1223012
https://git.kernel.org/stable/c/1c981792e4ccbc134b468797acdd7781959e6893
https://git.kernel.org/stable/c/73d9629e1c8c1982f13688c4d1019c3994647ccc
https://git.kernel.org/stable/c/be147926140ac48022c9605d7ab0a67387e4b404
https://git.kernel.org/stable/c/d250a81ba813a93563be68072c563aa1e346346d
jsc#CAR-3328
rh#2275596
CVE-2024-26839kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26839
SMASH Issue 402306
bnc#1222975
https://git.kernel.org/stable/c/2e4f9f20b32658ef3724aa46f7aef4908d2609e3
https://git.kernel.org/stable/c/3fa240bb6b2dbb3e7a3ee1440a4889cbb6207eb7
https://git.kernel.org/stable/c/52de5805c147137205662af89ed7e083d656ae25
https://git.kernel.org/stable/c/809aa64ebff51eb170ee31a95f83b2d21efa32e2
https://git.kernel.org/stable/c/8412c86e89cc78d8b513cb25cf2157a2adf3670a
https://git.kernel.org/stable/c/b41d0ade0398007fb746213f09903d52a920e896
https://git.kernel.org/stable/c/cecfb90cf71d91e9efebd68b9e9b84661b277cc8
https://git.kernel.org/stable/c/f0d857ce31a6bc7a82afcdbadb8f7417d482604b
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3324
rh#2275576
CVE-2024-26840kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26840
SMASH Issue 402328
bnc#1222976
https://git.kernel.org/stable/c/037d5a949b0455540ef9aab34c10ddf54b65d285
https://git.kernel.org/stable/c/38e921616320d159336b0ffadb09e9fb4945c7c3
https://git.kernel.org/stable/c/43eccc5823732ba6daab2511ed32dfc545a666d8
https://git.kernel.org/stable/c/8b218e2f0a27a9f09428b1847b4580640b9d1e58
https://git.kernel.org/stable/c/94965be37add0983672e48ecb33cdbda92b62579
https://git.kernel.org/stable/c/9cac69912052a4def571fedf1cb9bb4ec590e25a
https://git.kernel.org/stable/c/cb5466783793e66272624cf71925ae1d1ba32083
https://git.kernel.org/stable/c/e21a2f17566cbd64926fb8f16323972f7a064444
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3325
rh#2275573
CVE-2024-26846kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26846
SMASH Issue 402334
bnc#1223023
https://git.kernel.org/stable/c/085195aa90a924c79e35569bcdad860d764a8e17
https://git.kernel.org/stable/c/0bf567d6d9ffe09e059bbdfb4d07143cef42c75c
https://git.kernel.org/stable/c/4f2c95015ec2a1899161be6c0bdaecedd5a7bfb2
https://git.kernel.org/stable/c/70fbfc47a392b98e5f8dba70c6efc6839205c982
https://git.kernel.org/stable/c/baa6b7eb8c66486bd64608adc63fe03b30d3c0b9
https://git.kernel.org/stable/c/c0882c366418bf9c19e1ba7f270fe377a9bf5d67
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3779
rh#2275558
CVE-2024-26851kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26851
SMASH Issue 402356
bnc#1223074
https://git.kernel.org/stable/c/014a807f1cc9c9d5173c1cd935835553b00d211c
https://git.kernel.org/stable/c/39001e3c42000e7c2038717af0d33c32319ad591
https://git.kernel.org/stable/c/4bafcc43baf7bcf93566394dbd15726b5b456b7a
https://git.kernel.org/stable/c/767146637efc528b5e3d31297df115e85a2fd362
https://git.kernel.org/stable/c/80ee5054435a11c87c9a4f30f1ff750080c96416
https://git.kernel.org/stable/c/98db42191329c679f4ca52bec0b319689e1ad8cb
https://git.kernel.org/stable/c/b3c0f553820516ad4b62a9390ecd28d6f73a7b13
https://git.kernel.org/stable/c/ccd1108b16ab572d9bf635586b0925635dbd6bbc
jsc#CAR-3343
rh#2275750
CVE-2024-26852kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26852
SMASH Issue 402357
bnc#1223057
bnc#1223059
https://git.kernel.org/stable/c/31ea5bcc7d4cd1423de6be327a2c034725704136
https://git.kernel.org/stable/c/394334fe2ae3b9f1e2332b873857e84cb28aac18
https://git.kernel.org/stable/c/61b34f73cdbdb8eaf9ea12e9e2eb3b29716c4dda
https://git.kernel.org/stable/c/664f9c647260cc9d68b4e31d9899530d89dd045e
https://git.kernel.org/stable/c/685f7d531264599b3f167f1e94bbd22f120e5fab
https://git.kernel.org/stable/c/79ce2e54cc0ae366f45516c00bf1b19aa43e9abe
https://git.kernel.org/stable/c/cae3303257950d03ffec2df4a45e836f10d26c24
https://git.kernel.org/stable/c/ed883060c38721ed828061f6c0c30e5147326c9a
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3339
rh#2275761
CVE-2024-26855kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26855
SMASH Issue 402360
bnc#1223051
https://git.kernel.org/stable/c/06e456a05d669ca30b224b8ed962421770c1496c
https://git.kernel.org/stable/c/0e296067ae0d74a10b4933601f9aa9f0ec8f157f
https://git.kernel.org/stable/c/1a770927dc1d642b22417c3e668c871689fc58b3
https://git.kernel.org/stable/c/37fe99016b12d32100ce670216816dba6c48b309
https://git.kernel.org/stable/c/8d95465d9a424200485792858c5b3be54658ce19
https://git.kernel.org/stable/c/afdd29726a6de4ba27cd15590661424c888dc596
https://git.kernel.org/stable/c/d9fefc51133107e59d192d773be86c1150cfeebb
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3338
rh#2275742
CVE-2024-26857kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26857
SMASH Issue 402362
bnc#1223058
https://git.kernel.org/stable/c/048e16dee1fc609c1c85072ccd70bfd4b5fef6ca
https://git.kernel.org/stable/c/0ece581d2a66e8e488c0d3b3e7b5760dbbfdbdd5
https://git.kernel.org/stable/c/1ca1ba465e55b9460e4e75dec9fff31e708fec74
https://git.kernel.org/stable/c/59d2a4076983303f324557a114cfd5c32e1f6b29
https://git.kernel.org/stable/c/c0b22568a9d8384fd000cc49acb8f74bde40d1b5
https://git.kernel.org/stable/c/c7137900691f5692fe3de54566ea7b30bb35d66c
https://git.kernel.org/stable/c/e431c3227864b5646601c97f5f898d99472f2914
https://git.kernel.org/stable/c/e77e0b0f2a11735c64b105edaee54d6344faca8a
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3340
rh#2275737
CVE-2024-26859kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26859
SMASH Issue 402364
bnc#1223049
https://git.kernel.org/stable/c/3a9f78b297e08ca8e88ae3ecff1f6fe2766dc5eb
https://git.kernel.org/stable/c/44f9f1abb0ecc43023225ab9539167facbabf0ec
https://git.kernel.org/stable/c/4f37d3a7e004bbf560c21441ca9c022168017ec4
https://git.kernel.org/stable/c/7bcc090c81116c66936a7415f2c6b1483a4bcfd9
https://git.kernel.org/stable/c/8eebff95ce9558be66a36aa7cfb43223f3ab4699
https://git.kernel.org/stable/c/8ffcd3ccdbda0c918c4a0f922ef1c17010f1b598
https://git.kernel.org/stable/c/c51f8b6930db3f259b8820b589f2459d2df3fc68
https://git.kernel.org/stable/c/cf7d8cba639ae792a42c2a137b495eac262ac36c
https://git.kernel.org/stable/c/d27e2da94a42655861ca4baea30c8cd65546f25d
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3336
rh#2275733
CVE-2024-26861kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26861
SMASH Issue 402366
bnc#1223076
https://git.kernel.org/stable/c/3f94da807fe1668b9830f0eefbbf7e887b0a7bc6
https://git.kernel.org/stable/c/45a83b220c83e3c326513269afbf69ae6fc65cce
https://git.kernel.org/stable/c/78739d72f16b2d7d549f713f1dfebd678d32484b
https://git.kernel.org/stable/c/bba045dc4d996d03dce6fe45726e78a1a1f6d4c3
https://git.kernel.org/stable/c/d691be84ab898cf136a35176eaf2f8fc116563f0
https://git.kernel.org/stable/c/f87884e0dffd61b47e58bc6e1e2f6843c212b0cc
https://git.kernel.org/stable/c/fdf16de078a97bf14bb8ee2b8d47cc3d3ead09ed
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3344
rh#2275729
CVE-2024-26862kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2024-26862
SMASH Issue 402368
bnc#1223111
https://git.kernel.org/stable/c/2c02c5059c78a52d170bdee4a369b470de6deb37
https://git.kernel.org/stable/c/68e84120319d4fc298fcdb14cf0bea6a0f64ffbd
https://git.kernel.org/stable/c/6ebfad33161afacb3e1e59ed1c2feefef70f9f97
https://git.kernel.org/stable/c/84c510411e321caff3c07e6cd0f917f06633cfc0
https://git.kernel.org/stable/c/8b1e273c6afcf00d3c40a54ada7d6aac1b503b97
https://git.kernel.org/stable/c/d35b62c224e70797f8a1c37fe9bc4b3e294b7560
https://git.kernel.org/stable/c/ee413f30ec4fe94a0bdf32c8f042cb06fa913234
https://git.kernel.org/stable/c/ef7eed7e11d23337310ecc2c014ecaeea52719c5
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3346
rh#2275727
CVE-2024-26863kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26863
SMASH Issue 402369
bnc#1223021
https://git.kernel.org/stable/c/09e5cdbe2cc88c3c758927644a3eb02fac317209
https://git.kernel.org/stable/c/1ed222ca7396938eb1ab2d034f1ba0d8b00a7122
https://git.kernel.org/stable/c/39cc316fb3bc5e7c9dc5eed314fe510d119c6862
https://git.kernel.org/stable/c/7fb2d4d6bb1c85f7a23aace0ed6c86a95dea792a
https://git.kernel.org/stable/c/889ed056eae7fda85b769a9ab33c093379c45428
https://git.kernel.org/stable/c/97d2148ea435dff4b4e71817c9032eb321bcd37e
https://git.kernel.org/stable/c/a809bbfd0e503351d3051317288a70a4569a4949
https://git.kernel.org/stable/c/ddbec99f58571301679addbc022256970ca3eac6
https://git.kernel.org/stable/c/e3b2bfb8ff1810a537b2aa55ba906a6743ed120c
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3329
rh#2275725
CVE-2024-26866kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26866
SMASH Issue 402293
bnc#1223024
https://git.kernel.org/stable/c/1543418e82789cc383cd36d41469983c64e3fc7f
https://git.kernel.org/stable/c/2ae0ab0143fcc06190713ed81a6486ed0ad3c861
https://git.kernel.org/stable/c/996ce839606afd0fef91355627868022aa73eb68
https://git.kernel.org/stable/c/da83ed350e4604b976e94239b08d8e2e7eaee7ea
jsc#CAR-3330
rh#2275719
CVE-2024-26872kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26872
SMASH Issue 402376
bnc#1223115
https://git.kernel.org/stable/c/6413e78086caf7bf15639923740da0d91fdfd090
https://git.kernel.org/stable/c/7104a00fa37ae898a827381f1161fa3286c8b346
https://git.kernel.org/stable/c/85570b91e4820a0db9d9432098778cafafa7d217
https://git.kernel.org/stable/c/bdd895e0190c464f54f84579e7535d80276f0fc5
https://git.kernel.org/stable/c/c21a8870c98611e8f892511825c9607f1e2cd456
https://git.kernel.org/stable/c/e362d007294955a4fb929e1c8978154a64efdcb6
https://git.kernel.org/stable/c/ec77fa12da41260c6bf9e060b89234b980c5130f
jsc#CAR-3365
rh#2275707
CVE-2024-26874kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26874
SMASH Issue 402377
bnc#1223048
https://git.kernel.org/stable/c/3fc88b246a2fc16014e374040fc15af1d3752535
https://git.kernel.org/stable/c/4688be96d20ffa49d2186523ee84f475f316fd49
https://git.kernel.org/stable/c/9acee29a38b4d4b70f1f583e5ef9a245db4db710
https://git.kernel.org/stable/c/9beec711a17245b853d64488fd5b739031612340
https://git.kernel.org/stable/c/a3dd12b64ae8373a41a216a0b621df224210860a
https://git.kernel.org/stable/c/accdac6b71d5a2b84040c3d2234f53a60edc398e
https://git.kernel.org/stable/c/c958e86e9cc1b48cac004a6e245154dfba8e163b
https://git.kernel.org/stable/c/d2bd30c710475b2e29288827d2c91f9e6e2b91d7
https://git.kernel.org/stable/c/dfde84cc6c589f2a9f820f12426d97365670b731
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3335
rh#2275703
CVE-2024-26875kernel-source-rt:Affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26875
SMASH Issue 402378
bnc#1223118
https://git.kernel.org/stable/c/0a0b79ea55de8514e1750884e5fec77f9fdd01ee
https://git.kernel.org/stable/c/3a1ec89708d2e57e2712f46241282961b1a7a475
https://git.kernel.org/stable/c/40cd818fae875c424a8335009db33c7b5a07de3a
https://git.kernel.org/stable/c/8e60b99f6b7ccb3badeb512f5eb613ad45904592
https://git.kernel.org/stable/c/ab896d93fd6a2cd1afeb034c3cc9226cb499209f
https://git.kernel.org/stable/c/d29ed08964cec8b9729bc55c7bb23f679d7a18fb
https://git.kernel.org/stable/c/eaa410e05bdf562c90b23cdf2d9327f9c4625e16
https://git.kernel.org/stable/c/eb6e9dce979c08210ff7249e5e0eceb8991bfcd7
https://git.kernel.org/stable/c/ed8000e1e8e9684ab6c30cf2b526c0cea039929c
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3348
rh#2275701
CVE-2024-26876kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26876
SMASH Issue 402379
bnc#1223119
https://git.kernel.org/stable/c/28a94271bd50e4cf498df0381f776f8ea40a289e
https://git.kernel.org/stable/c/955c1252930677762e0db2b6b9e36938c887445c
https://git.kernel.org/stable/c/aeedaee5ef5468caf59e2bb1265c2116e0c9a924
jsc#CAR-3349
rh#2275699
CVE-2024-26880kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26880
SMASH Issue 402382
bnc#1223188
https://git.kernel.org/stable/c/03ad5ad53e51abf3a4c7538c1bc67a5982b41dc5
https://git.kernel.org/stable/c/15a3fc5c8774c17589dabfe1d642d40685c985af
https://git.kernel.org/stable/c/360a7d1be8112654f1fb328ed3862be630bca3f4
https://git.kernel.org/stable/c/65e8fbde64520001abf1c8d0e573561b4746ef38
https://git.kernel.org/stable/c/69836d9329f0b4c58faaf3d886a7748ddb5bf718
https://git.kernel.org/stable/c/ad10289f68f45649816cc68eb93f45fd5ec48a15
https://git.kernel.org/stable/c/da7ece2197101b1469853e6b5e915be1e3896d52
https://git.kernel.org/stable/c/ef02d8edf738557af2865c5bfb66a03c4e071be7
https://git.kernel.org/stable/c/f89bd27709376d37ff883067193320c58a8c1d5a
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3356
rh#2275690
CVE-2024-26882kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26882
SMASH Issue 402326
bnc#1223034
https://git.kernel.org/stable/c/5c03387021cfa3336b97e0dcba38029917a8af2a
https://git.kernel.org/stable/c/60044ab84836359534bd7153b92e9c1584140e4a
https://git.kernel.org/stable/c/77fd5294ea09b21f6772ac954a121b87323cec80
https://git.kernel.org/stable/c/b0ec2abf98267f14d032102551581c833b0659d3
https://git.kernel.org/stable/c/c4c857723b37c20651300b3de4ff25059848b4b0
https://git.kernel.org/stable/c/ca914f1cdee8a85799942c9b0ce5015bbd6844e1
https://git.kernel.org/stable/c/ec6bb01e02cbd47781dd90775b631a1dc4bd9d2b
https://git.kernel.org/stable/c/f6723d8dbfdc10c784a56748f86a9a3cd410dbd5
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3331
rh#2275686
CVE-2024-26884kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26884
SMASH Issue 402385
bnc#1223189
https://git.kernel.org/stable/c/33ec04cadb77605b71d9298311919303d390c4d5
https://git.kernel.org/stable/c/3b08cfc65f07b1132c1979d73f014ae6e04de55d
https://git.kernel.org/stable/c/64f00b4df0597590b199b62a37a165473bf658a6
https://git.kernel.org/stable/c/6787d916c2cf9850c97a0a3f73e08c43e7d973b1
https://git.kernel.org/stable/c/8435f0961bf3dc65e204094349bd9aeaac1f8868
https://git.kernel.org/stable/c/92c81fbb3ed2e0dfc33a4183a67135e1ab566ace
https://git.kernel.org/stable/c/a6fa75b5096c0f9826a4fabe22d907b0a5bb1016
https://git.kernel.org/stable/c/a83fdaeaea3677b83a53f72ace2d73a19bcd6d93
https://git.kernel.org/stable/c/d817f0d34d927f2deb17dadbfe212c9a6a32ac3e
jsc#CAR-3357
rh#2275682
CVE-2024-26885kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26885
SMASH Issue 402339
bnc#1223190
https://git.kernel.org/stable/c/22079b3a423382335f47d9ed32114e6c9fe88d7c
https://git.kernel.org/stable/c/225da02acdc97af01b6bc6ce1a3e5362bf01d3fb
https://git.kernel.org/stable/c/250051acc21f9d4c5c595e4fcb55986ea08c4691
https://git.kernel.org/stable/c/281d464a34f540de166cee74b723e97ac2515ec3
https://git.kernel.org/stable/c/c826502bed93970f2fd488918a7b8d5f1d30e2e3
https://git.kernel.org/stable/c/e89386f62ce9a9ab9a94835a9890883c23d9d52c
https://git.kernel.org/stable/c/edf7990baa48de5097daa9ac02e06cb4c798a737
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3358
rh#2275680
CVE-2024-26886kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26886
SMASH Issue 402386
bnc#1223044
https://git.kernel.org/stable/c/2c9e2df022ef8b9d7fac58a04a2ef4ed25288955
https://git.kernel.org/stable/c/64be3c6154886200708da0dfe259705fb992416c
https://git.kernel.org/stable/c/817e8138ce86001b2fa5c63d6ede756e205a01f7
https://git.kernel.org/stable/c/cb8adca52f306563d958a863bb0cbae9c184d1ae
https://git.kernel.org/stable/c/f7b94bdc1ec107c92262716b073b3e816d4784fb
jsc#CAR-3363
rh#2275678
CVE-2024-26891kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26891
SMASH Issue 402389
bnc#1223037
https://git.kernel.org/stable/c/025bc6b41e020aeb1e71f84ae3ffce945026de05
https://git.kernel.org/stable/c/2b74b2a92e524d7c8dec8e02e95ecf18b667c062
https://git.kernel.org/stable/c/34a7b30f56d30114bf4d436e4dc793afe326fbcf
https://git.kernel.org/stable/c/4fc82cd907ac075648789cc3a00877778aa1838b
https://git.kernel.org/stable/c/c04f2780919f20e2cc4846764221f5e802555868
https://git.kernel.org/stable/c/d70f1c85113cd8c2aa8373f491ca5d1b22ec0554
https://git.kernel.org/stable/c/f873b85ec762c5a6abe94a7ddb31df5d3ba07d85
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3332
rh#2275668
CVE-2024-26894kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26894
SMASH Issue 402391
bnc#1223043
https://git.kernel.org/stable/c/1cbaf4c793b0808532f4e7b40bc4be7cec2c78f2
https://git.kernel.org/stable/c/3d48e5be107429ff5d824e7f2a00d1b610d36fbc
https://git.kernel.org/stable/c/8d14a4d0afb49a5b8535d414c782bb334860e73e
https://git.kernel.org/stable/c/c2a30c81bf3cb9033fa9f5305baf7c377075e2e5
https://git.kernel.org/stable/c/cd5c2d0b09d5b6d3f0a7bbabe6761a4997e9dee9
https://git.kernel.org/stable/c/d351bcadab6caa6d8ce7159ff4b77e2da35c09fa
https://git.kernel.org/stable/c/e18afcb7b2a12b635ac10081f943fcf84ddacc51
https://git.kernel.org/stable/c/ea96bf3f80625cddba1391a87613356b1b45716d
https://git.kernel.org/stable/c/fad9bcd4d754cc689c19dc04d2c44b82c1a5d6c8
jsc#CAR-3333
rh#2275661
CVE-2024-26900kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26900
SMASH Issue 402396
bnc#1223046
https://git.kernel.org/stable/c/4c1021ce46fc2fb6115f7e79d353941e6dcad366
https://git.kernel.org/stable/c/6cf350658736681b9d6b0b6e58c5c76b235bb4c4
https://git.kernel.org/stable/c/6d32c832a88513f65c2c2c9c75954ee8b387adea
https://git.kernel.org/stable/c/9fd0198f7ef06ae0d6636fb0578560857dead995
https://git.kernel.org/stable/c/beaf11969fd5cbe6f09cefaa34df1ce8578e8dd9
https://git.kernel.org/stable/c/f3a1787dc48213f6caea5ba7d47e0222e7fa34a9
https://git.kernel.org/stable/c/fb5b347efd1bda989846ffc74679d181222fb123
jsc#CAR-3334
rh#2275647
CVE-2024-26901kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2024-26901
SMASH Issue 402299
bnc#1223198
https://git.kernel.org/stable/c/3948abaa4e2be938ccdfc289385a27342fb13d43
https://git.kernel.org/stable/c/423b6bdf19bbc5e1f7e7461045099917378f7e71
https://git.kernel.org/stable/c/4bac28f441e3cc9d3f1a84c8d023228a68d8a7c1
https://git.kernel.org/stable/c/772a7def9868091da3bcb0d6c6ff9f0c03d7fa8b
https://git.kernel.org/stable/c/bf9ec1b24ab4e94345aa1c60811dd329f069c38b
https://git.kernel.org/stable/c/c1362eae861db28b1608b9dc23e49634fe87b63b
https://git.kernel.org/stable/c/cba138f1ef37ec6f961baeab62f312dedc7cf730
https://git.kernel.org/stable/c/cde76b3af247f615447bcfecf610bb76c3529126
https://git.kernel.org/stable/c/e6450d5e46a737a008b4885aa223486113bf0ad6
jsc#CAR-3359
rh#2275645
CVE-2024-26904kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26904
SMASH Issue 402399
bnc#1223193
https://git.kernel.org/stable/c/2daa2a8e895e6dc2395f8628c011bcf1e019040d
https://git.kernel.org/stable/c/7e9422d35d574b646269ca46010a835ca074b310
https://git.kernel.org/stable/c/ab1be3f1aa7799f99155488c28eacaef65eb68fb
https://git.kernel.org/stable/c/c7bb26b847e5b97814f522686068c5628e2b3646
https://git.kernel.org/stable/c/f6d4d29a12655b42a13cec038c2902bb7efc50ed
jsc#CAR-3366
rh#2275639
CVE-2024-26907kernel-source-rt:Affectedlow0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-26907
SMASH Issue 402402
bnc#1223203
https://git.kernel.org/stable/c/185fa07000e0a81d54cf8c05414cebff14469a5c
https://git.kernel.org/stable/c/4d5e86a56615cc387d21c629f9af8fb0e958d350
https://git.kernel.org/stable/c/60ba938a8bc8c90e724c75f98e932f9fb7ae1b9d
https://git.kernel.org/stable/c/9a624a5f95733bac4648ecadb320ca83aa9c08fd
https://git.kernel.org/stable/c/cad82f1671e41094acd3b9a60cd27d67a3c64a21
https://git.kernel.org/stable/c/d27c48dc309da72c3b46351a1205d89687272baa
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3367
rh#2275633
CVE-2024-26915kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26915
SMASH Issue 402453
bnc#1223207
https://git.kernel.org/stable/c/2827633c9dab6304ec4cdbf369363219832e605d
https://git.kernel.org/stable/c/7330256268664ea0a7dd5b07a3fed363093477dd
https://git.kernel.org/stable/c/8983397951b4b0bd51bb4b4ba9749424e1ccbb70
https://git.kernel.org/stable/c/9a9d00c23d170d4ef5a1b28e6b69f5c85dd12bc1
https://git.kernel.org/stable/c/a28f4d1e0bed85943d309ac243fd1c200f8af9a2
jsc#CAR-3368
rh#2275790
CVE-2024-26921kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26921
L3:68040
SMASH Issue 402563
bnc#1223138
bnc#1223139
https://git.kernel.org/stable/c/18685451fc4e546fc0e718580d32df3c0e5c8272
https://git.kernel.org/stable/c/7d0567842b78390dd9b60f00f1d8f838d540e325
https://git.kernel.org/stable/c/e09cbe017311508c21e0739e97198a8388b98981
https://git.kernel.org/stable/c/f4877225313d474659ee53150ccc3d553a978727
jsc#CAR-3355
rh#2275928
CVE-2024-26922kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26922
SMASH Issue 402926
bnc#1223315
https://git.kernel.org/stable/c/1fd7db5c16028dc07b2ceec190f2e895dddb532d
https://git.kernel.org/stable/c/212e3baccdb1939606420d88f7f52d346b49a284
https://git.kernel.org/stable/c/6fef2d4c00b5b8561ad68dd2b68173f5c6af1e75
https://git.kernel.org/stable/c/8b12fc7b032633539acdf7864888b0ebd49e90f2
https://git.kernel.org/stable/c/b1f04b9b1c5317f562a455384c5f7473e46bdbaa
https://git.kernel.org/stable/c/d4da6b084f1c5625937d49bb6722c5b4aef11b8d
https://git.kernel.org/stable/c/ef13eeca7c79136bc38e21eb67322c1cbd5c40ee
https://git.kernel.org/stable/c/f68039375d4d6d67303674c0ab2d06b7295c0ec9
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3364
rh#2276665
CVE-2024-26923kernel-source-rt:Affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26923
L3:68142
SMASH Issue 403113
bnc#1223384
bnc#1223683
https://git.kernel.org/stable/c/2e2a03787f4f0abc0072350654ab0ef3324d9db3
https://git.kernel.org/stable/c/343c5372d5e17b306db5f8f3c895539b06e3177f
https://git.kernel.org/stable/c/47d8ac011fe1c9251070e1bd64cb10b48193ec51
https://git.kernel.org/stable/c/507cc232ffe53a352847893f8177d276c3b532a9
https://git.kernel.org/stable/c/a36ae0ec2353015f0f6762e59f4c2dbc0c906423
https://git.kernel.org/stable/c/b75722be422c276b699200de90527d01c602ea7c
https://git.kernel.org/stable/c/dbdf7bec5c920200077d693193f989cb1513f009
https://git.kernel.org/stable/c/e76c2678228f6aec74b305ae30c9374cc2f28a51
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3369
rh#2277171
CVE-2024-26928kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26928
SMASH Issue 403387
bnc#1223532
https://git.kernel.org/stable/c/229042314602db62559ecacba127067c22ee7b88
https://git.kernel.org/stable/c/3402faf78b2516b0af1259baff50cc8453ef0bd1
https://git.kernel.org/stable/c/a65f2b56334ba4dc30bd5ee9ce5b2691b973344d
https://git.kernel.org/stable/c/ca545b7f0823f19db0f1148d59bc5e1a56634502
jsc#CAR-3382
rh#2277937
CVE-2024-26929kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26929
SMASH Issue 403696
bnc#1223715
bnc#1223716
https://git.kernel.org/stable/c/282877633b25d67021a34169c5b5519b1d4ef65e
https://git.kernel.org/stable/c/82f522ae0d97119a43da53e0f729275691b9c525
https://git.kernel.org/stable/c/846fb9f112f618ec6ae181d8dae7961652574774
https://git.kernel.org/stable/c/9b43d2884b54d415caab48878b526dfe2ae9921b
https://git.kernel.org/stable/c/b03e626bd6d3f0684f56ee1890d70fc9ca991c04
https://git.kernel.org/stable/c/f85af9f1aa5e2f53694a6cbe72010f754b5ff862
jsc#CAR-3692
rh#2278250
CVE-2024-26930kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26930
SMASH Issue 403697
bnc#1223626
bnc#1223681
https://git.kernel.org/stable/c/825d63164a2e6bacb059a9afb5605425b485413f
https://git.kernel.org/stable/c/b7deb675d674f44e0ddbab87fee8f9f098925e73
https://git.kernel.org/stable/c/e288285d47784fdcf7c81be56df7d65c6f10c58b
https://git.kernel.org/stable/c/f14cee7a882cb79528f17a2335f53e9fd1848467
jsc#CAR-3383
rh#2278248
CVE-2024-26931kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26931
SMASH Issue 403698
bnc#1223627
https://git.kernel.org/stable/c/09c0ac18cac206ed1218b1fe6c1a0918e5ea9211
https://git.kernel.org/stable/c/67b2d35853c2da25a8ca1c4190a5e96d3083c2ac
https://git.kernel.org/stable/c/8de1584ec4fe0ebea33c273036e7e0a05e65c81d
https://git.kernel.org/stable/c/8f0d32004e3a572bb77e6c11c2797c87f8c9703d
https://git.kernel.org/stable/c/a27d4d0e7de305def8a5098a614053be208d1aa1
https://git.kernel.org/stable/c/a859f6a8f4234b8ef62862bf7a92f1af5f8cd47a
https://git.kernel.org/stable/c/b73377124f56d2fec154737c2f8d2e839c237d5a
https://git.kernel.org/stable/c/d7a68eee87b05d4e29419e6f151aef99314970a9
https://git.kernel.org/stable/c/ec7587eef003cab15a13446d67c3adb88146a150
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3384
rh#2278245
CVE-2024-26934kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26934
SMASH Issue 403701
bnc#1223671
https://git.kernel.org/stable/c/07acf979da33c721357ff27129edf74c23c036c6
https://git.kernel.org/stable/c/122a06f1068bf5e39089863f4f60b1f5d4273384
https://git.kernel.org/stable/c/12d6a5681a0a5cecc2af7860f0a1613fa7c6e947
https://git.kernel.org/stable/c/1b175bc579f46520b11ecda443bcd2ee4904f66a
https://git.kernel.org/stable/c/80ba43e9f799cbdd83842fc27db667289b3150f5
https://git.kernel.org/stable/c/8cbdd324b41528994027128207fae8100dff094f
https://git.kernel.org/stable/c/ab062fa3dc69aea88fe62162c5881ba14b50ecc5
https://git.kernel.org/stable/c/dbdf66250d2d33e8b27352fcb901de79f3521057
https://git.kernel.org/stable/c/e451709573f8be904a8a72d0775bf114d7c291d9
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3385
rh#2278237
CVE-2024-26937kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26937
SMASH Issue 403705
bnc#1223677
https://git.kernel.org/stable/c/3b031e4fcb2740988143c303f81f69f18ce86325
https://git.kernel.org/stable/c/4a3859ea5240365d21f6053ee219bb240d520895
https://git.kernel.org/stable/c/67944e6db656bf1e986aa2a359f866f851091f8a
https://git.kernel.org/stable/c/7eab7b021835ae422c38b968d5cc60e99408fb62
https://git.kernel.org/stable/c/8fd9b0ce8c26533fe4d5d15ea15bbf7b904b611c
https://git.kernel.org/stable/c/ac9b6b3e8d1237136c8ebf0fa1ce037dd7e2948f
https://git.kernel.org/stable/c/aed034866a08bb7e6e34d50a5629a4d23fe83703
https://git.kernel.org/stable/c/fe34587acc995e7b1d7a5d3444a0736721ec32b3
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3386
rh#2278231
CVE-2024-26950kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26950
SMASH Issue 403719
bnc#1223661
https://git.kernel.org/stable/c/09c3fa70f65175861ca948cb2f0f791e666c90e5
https://git.kernel.org/stable/c/493aa6bdcffd90a4f82aa614fe4f4db0641b4068
https://git.kernel.org/stable/c/4be453271a882c8ebc28df3dbf9e4d95e6ac42f5
https://git.kernel.org/stable/c/71cbd32e3db82ea4a74e3ef9aeeaa6971969c86f
https://git.kernel.org/stable/c/93bcc1752c69bb309f4d8cfaf960ef1faeb34996
https://git.kernel.org/stable/c/c991567e6c638079304cc15dff28748e4a3c4a37
https://git.kernel.org/stable/c/d44bd323d8bb8031eef4bdc44547925998a11e47
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3400
rh#2278200
CVE-2024-26955kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26955
SMASH Issue 403724
bnc#1223657
https://git.kernel.org/stable/c/0c8aa4cfda4e4adb15d5b6536d155eca9c9cd44c
https://git.kernel.org/stable/c/192e9f9078c96be30b31c4b44d6294b24520fce5
https://git.kernel.org/stable/c/269cdf353b5bdd15f1a079671b0f889113865f20
https://git.kernel.org/stable/c/32eaee72e96590a75445c8a6c7c1057673b47e07
https://git.kernel.org/stable/c/48d443d200237782dc82e6b60663ec414ef02e39
https://git.kernel.org/stable/c/76ffbe911e2798c7296968f5fd72f7bf67207a8d
https://git.kernel.org/stable/c/91e4c4595fae5e87069e44687ae879091783c183
https://git.kernel.org/stable/c/ca581d237f3b8539c044205bb003de71d75d227c
https://git.kernel.org/stable/c/f0fe7ad5aff4f0fcf988913313c497de85f1e186
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3399
rh#2278189
CVE-2024-26956kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26956
SMASH Issue 403725
bnc#1223663
https://git.kernel.org/stable/c/2e2619ff5d0def4bb6c2037a32a6eaa28dd95c84
https://git.kernel.org/stable/c/46b832e09d43b394ac0f6d9485d2b1a06593f0b7
https://git.kernel.org/stable/c/82827ca21e7c8a91384c5baa656f78a5adfa4ab4
https://git.kernel.org/stable/c/9cbe1ad5f4354f4df1445e5f4883983328cd6d8e
https://git.kernel.org/stable/c/a8e4d098de1c0f4c5c1f2ed4633a860f0da6d713
https://git.kernel.org/stable/c/b67189690eb4b7ecc84ae16fa1e880e0123eaa35
https://git.kernel.org/stable/c/c3b5c5c31e723b568f83d8cafab8629d9d830ffb
https://git.kernel.org/stable/c/f2f26b4a84a0ef41791bd2d70861c8eac748f4ba
https://git.kernel.org/stable/c/f69e81396aea66304d214f175aa371f1b5578862
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3401
rh#2278187
CVE-2024-26957kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26957
SMASH Issue 403726
bnc#1223666
https://git.kernel.org/stable/c/394b6d8bbdf9ddee6d5bcf3e1f3e9f23eecd6484
https://git.kernel.org/stable/c/50ed48c80fecbe17218afed4f8bed005c802976c
https://git.kernel.org/stable/c/6470078ab3d8f222115e11c4ec67351f3031b3dd
https://git.kernel.org/stable/c/7e500849fa558879a1cde43f80c7c048c2437058
https://git.kernel.org/stable/c/9daddee03de3f231012014dab8ab2b277a116a55
https://git.kernel.org/stable/c/a55677878b93e9ebc31f66d0e2fb93be5e7836a6
https://git.kernel.org/stable/c/a64ab862e84e3e698cd351a87cdb504c7fc575ca
https://git.kernel.org/stable/c/b7f6c3630eb3f103115ab0d7613588064f665d0d
https://git.kernel.org/stable/c/befb7f889594d23e1b475720cf93efd2f77df000
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3440
rh#2278185
CVE-2024-26960kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26960
SMASH Issue 403730
bnc#1223655
https://git.kernel.org/stable/c/0f98f6d2fb5fad00f8299b84b85b6bc1b6d7d19a
https://git.kernel.org/stable/c/1ede7f1d7eed1738d1b9333fd1e152ccb450b86a
https://git.kernel.org/stable/c/2da5568ee222ce0541bfe446a07998f92ed1643e
https://git.kernel.org/stable/c/363d17e7f7907c8e27a9e86968af0eaa2301787b
https://git.kernel.org/stable/c/3ce4c4c653e4e478ecb15d3c88e690f12cbf6b39
https://git.kernel.org/stable/c/82b1c07a0af603e3c47b906c8e991dc96f01688e
https://git.kernel.org/stable/c/d85c11c97ecf92d47a4b29e3faca714dc1f18d0d
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3398
rh#2278178
CVE-2024-26961kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26961
SMASH Issue 403731
bnc#1223652
https://git.kernel.org/stable/c/068ab2759bc0b4daf0b964de61b2731449c86531
https://git.kernel.org/stable/c/20d3e1c8a1847497269f04d874b2a5818ec29e2d
https://git.kernel.org/stable/c/49c8951680d7b76fceaee89dcfbab1363fb24fd1
https://git.kernel.org/stable/c/640297c3e897bd7e1481466a6a5cb9560f1edb88
https://git.kernel.org/stable/c/d3d858650933d44ac12c1f31337e7110c2071821
https://git.kernel.org/stable/c/dcd51ab42b7a0431575689c5f74b8b6efd45fc2f
https://git.kernel.org/stable/c/e8a1e58345cf40b7b272e08ac7b32328b2543e40
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3397
rh#2278176
CVE-2024-26965kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26965
SMASH Issue 403735
bnc#1223648
https://git.kernel.org/stable/c/3ff4a0f6a8f0ad4b4ee9e908bdfc3cacb7be4060
https://git.kernel.org/stable/c/537040c257ab4cd0673fbae048f3940c8ea2e589
https://git.kernel.org/stable/c/7e9926fef71e514b4a8ea9d11d5a84d52b181362
https://git.kernel.org/stable/c/86bf75d9158f511db7530bc82a84b19a5134d089
https://git.kernel.org/stable/c/8f562f3b25177c2055b20fd8cf000496f6fa9194
https://git.kernel.org/stable/c/99740c4791dc8019b0d758c5389ca6d1c0604d95
https://git.kernel.org/stable/c/ae99e199037c580b7350bfa3596f447a53bcf01f
https://git.kernel.org/stable/c/ca2cf98d46748373e830a13d85d215d64a2d9bf2
https://git.kernel.org/stable/c/e2c02a85bf53ae86d79b5fccf0a75ac0b78e0c96
jsc#CAR-3396
rh#2278372
CVE-2024-26966kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26966
SMASH Issue 403736
bnc#1223646
https://git.kernel.org/stable/c/185de0b7cdeaad8b89ebd4c8a258ff2f21adba99
https://git.kernel.org/stable/c/3aedcf3755c74dafc187eb76acb04e3e6348b1a9
https://git.kernel.org/stable/c/5533686e99b04994d7c4877dc0e4282adc9444a2
https://git.kernel.org/stable/c/5638330150db2cc30b53eed04e481062faa3ece8
https://git.kernel.org/stable/c/7e5432401536117c316d7f3b21d46b64c1514f38
https://git.kernel.org/stable/c/9b4c4546dd61950e80ffdca1bf6925f42b665b03
https://git.kernel.org/stable/c/a09aecb6cb482de88301c43bf00a6c8726c4d34f
https://git.kernel.org/stable/c/a903cfd38d8dee7e754fb89fd1bebed99e28003d
https://git.kernel.org/stable/c/b2dfb216f32627c2f6a8041f2d9d56d102ab87c0
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3395
rh#2278370
CVE-2024-26969kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26969
SMASH Issue 403740
bnc#1223645
https://git.kernel.org/stable/c/1040ef5ed95d6fd2628bad387d78a61633e09429
https://git.kernel.org/stable/c/83fe1bbd9e259ad109827ccfbfc2488e0dea8e94
https://git.kernel.org/stable/c/851cc19bdb02556fb13629b3e4fef6f2bdb038fe
https://git.kernel.org/stable/c/9de184d4e557d550fb0b7b833b676bda4f269e4f
https://git.kernel.org/stable/c/b6b31b4c67ea6bd9222e5b73b330554c57f2f90d
https://git.kernel.org/stable/c/be9e2752d823eca1d5af67014a1844a9176ff566
https://git.kernel.org/stable/c/dd92b159c506804ac57adf3742d9728298bb1255
https://git.kernel.org/stable/c/e117c6e2d1617520f5f7d7f6f6b395f01d8b5a27
https://git.kernel.org/stable/c/fc3ac2fcd0a7fad63eba1b359490a4b81720d0f9
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3388
rh#2278364
CVE-2024-26972kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26972
SMASH Issue 403743
bnc#1223643
https://git.kernel.org/stable/c/62b5ae00c2b835639002ce898ccb5d82c51073ae
https://git.kernel.org/stable/c/6379b44cdcd67f5f5d986b73953e99700591edfa
jsc#CAR-3389
rh#2278358
CVE-2024-26973kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26973
SMASH Issue 403744
bnc#1223641
https://git.kernel.org/stable/c/03a7e3f2ba3ca25f1da1d3898709a08db14c1abb
https://git.kernel.org/stable/c/74f852654b8b7866f15323685f1e178d3386c688
https://git.kernel.org/stable/c/9840d1897e28f8733cc1e38f97e044f987dc0a63
https://git.kernel.org/stable/c/a276c595c3a629170b0f052a3724f755d7c6adc6
https://git.kernel.org/stable/c/b7fb63e807c6dadf7ecc1d43448c4f1711d7eeee
https://git.kernel.org/stable/c/c8cc05de8e6b5612b6e9f92c385c1a064b0db375
https://git.kernel.org/stable/c/cdd33d54e789d229d6d5007cbf3f53965ca1a5c6
https://git.kernel.org/stable/c/f52d7663a10a1266a2d3871a6dd8fd111edc549f
https://git.kernel.org/stable/c/fde2497d2bc3a063d8af88b258dbadc86bd7b57c
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3390
rh#2278356
CVE-2024-26974kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26974
SMASH Issue 403745
bnc#1223638
https://git.kernel.org/stable/c/0c2cf5142bfb634c0ef0a1a69cdf37950747d0be
https://git.kernel.org/stable/c/226fc408c5fcd23cc4186f05ea3a09a7a9aef2f7
https://git.kernel.org/stable/c/4ae5a97781ce7d6ecc9c7055396535815b64ca4f
https://git.kernel.org/stable/c/7d42e097607c4d246d99225bf2b195b6167a210c
https://git.kernel.org/stable/c/8a5a7611ccc7b1fba8d933a9f22a2e76859d94dc
https://git.kernel.org/stable/c/8e81cd58aee14a470891733181a47d123193ba81
https://git.kernel.org/stable/c/bb279ead42263e9fb09480f02a4247b2c287d828
https://git.kernel.org/stable/c/d03092550f526a79cf1ade7f0dfa74906f39eb71
https://git.kernel.org/stable/c/daba62d9eeddcc5b1081be7d348ca836c83c59d7
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3391
rh#2278354
CVE-2024-26976kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26976
SMASH Issue 403747
bnc#1223635
https://git.kernel.org/stable/c/3d75b8aa5c29058a512db29da7cbee8052724157
https://git.kernel.org/stable/c/4f3a3bce428fb439c66a578adc447afce7b4a750
https://git.kernel.org/stable/c/82e25cc1c2e93c3023da98be282322fc08b61ffb
https://git.kernel.org/stable/c/83d3c5e309611ef593e2fcb78444fc8ceedf9bac
https://git.kernel.org/stable/c/a75afe480d4349c524d9c659b1a5a544dbc39a98
https://git.kernel.org/stable/c/ab2c2f5d9576112ad22cfd3798071cb74693b1f5
https://git.kernel.org/stable/c/b54478d20375874aeee257744dedfd3e413432ff
https://git.kernel.org/stable/c/caa9af2e27c275e089d702cfbaaece3b42bca31b
https://git.kernel.org/stable/c/f8730d6335e5f43d09151fca1f0f41922209a264
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3392
rh#2278350
CVE-2024-26982kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26982
SMASH Issue 403752
bnc#1223634
https://git.kernel.org/stable/c/7def00ebc9f2d6a581ddf46ce4541f84a10680e5
https://git.kernel.org/stable/c/9253c54e01b6505d348afbc02abaa4d9f8a01395
https://git.kernel.org/stable/c/be383effaee3d89034f0828038f95065b518772e
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3387
rh#2278337
CVE-2024-26984kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26984
SMASH Issue 403693
bnc#1223633
https://git.kernel.org/stable/c/13d76b2f443dc371842916dd8768009ff1594716
https://git.kernel.org/stable/c/1bc4825d4c3ec6abe43cf06c3c39d664d044cbf7
https://git.kernel.org/stable/c/21ca9539f09360fd83654f78f2c361f2f5ddcb52
https://git.kernel.org/stable/c/3ab056814cd8ab84744c9a19ef51360b2271c572
https://git.kernel.org/stable/c/a019b44b1bc6ed224c46fb5f88a8a10dd116e525
https://git.kernel.org/stable/c/ad74d208f213c06d860916ad40f609ade8c13039
https://git.kernel.org/stable/c/bba8ec5e9b16649d85bc9e9086bf7ae5b5716ff9
https://git.kernel.org/stable/c/fff1386cc889d8fb4089d285f883f8cba62d82ce
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3393
rh#2278333
CVE-2024-26988kernel-source-rt:Affectedmoderate6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2024-26988
SMASH Issue 403758
bnc#1223747
https://git.kernel.org/stable/c/0dc727a4e05400205358a22c3d01ccad2c8e1fe4
https://git.kernel.org/stable/c/2ef607ea103616aec0289f1b65d103d499fa903a
https://git.kernel.org/stable/c/46dad3c1e57897ab9228332f03e1c14798d2d3b9
https://git.kernel.org/stable/c/76c2f4d426a5358fced5d5990744d46f10a4ccea
https://git.kernel.org/stable/c/81cf85ae4f2dd5fa3e43021782aa72c4c85558e8
https://git.kernel.org/stable/c/936a02b5a9630c5beb0353c3085cc49d86c57034
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3414
rh#2278324
CVE-2024-26993kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2024-26993
SMASH Issue 403762
bnc#1223693
https://git.kernel.org/stable/c/43f00210cb257bcb0387e8caeb4b46375d67f30c
https://git.kernel.org/stable/c/57baab0f376bec8f54b0fe6beb8f77a57c228063
https://git.kernel.org/stable/c/5d43e072285e81b0b63cee7189b3357c7768a43b
https://git.kernel.org/stable/c/84bd4c2ae9c3d0a7d3a5c032ea7efff17af17e17
https://git.kernel.org/stable/c/a4c99b57d43bab45225ba92d574a8683f9edc8e4
https://git.kernel.org/stable/c/a90bca2228c0646fc29a72689d308e5fe03e6d78
https://git.kernel.org/stable/c/ac107356aabc362aaeb77463e814fc067a5d3957
https://git.kernel.org/stable/c/f28bba37fe244889b81bb5c508d3f6e5c6e342c5
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3404
rh#2278314
CVE-2024-27000kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-27000
SMASH Issue 403768
bnc#1223757
https://git.kernel.org/stable/c/0dc0637e6b16158af85945425821bfd0151adb37
https://git.kernel.org/stable/c/21535ef0ac1945080198fe3e4347ea498205c99a
https://git.kernel.org/stable/c/2c9b943e9924cf1269e44289bc5e60e51b0f5270
https://git.kernel.org/stable/c/479244d68f5d94f3903eced52b093c1e01ddb495
https://git.kernel.org/stable/c/54c4ec5f8c471b7c1137a1f769648549c423c026
https://git.kernel.org/stable/c/56434e295bd446142025913bfdf1587f5e1970ad
https://git.kernel.org/stable/c/5f40fd6ca2cf0bfbc5a5c9e403dfce8ca899ba37
https://git.kernel.org/stable/c/94b0e65c75f4af888ab2dd6c90f060f762924e86
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3416
rh#2278299
CVE-2024-27002kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27002
SMASH Issue 403770
bnc#1223759
https://git.kernel.org/stable/c/165d226472575b213dd90dfda19d1605dd7c19a8
https://git.kernel.org/stable/c/2f7b1d8b5505efb0057cd1ab85fca206063ea4c3
https://git.kernel.org/stable/c/b62ed25feb342eab052822eff0c554873799a4f5
https://git.kernel.org/stable/c/c0dcd5c072e2a3fff886f673e6a5d9bf8090c4cc
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3417
rh#2278295
CVE-2024-27004kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-27004
SMASH Issue 403772
bnc#1223762
https://git.kernel.org/stable/c/115554862294397590088ba02f11f2aba6d5016c
https://git.kernel.org/stable/c/253ab38d1ee652a596942156978a233970d185ba
https://git.kernel.org/stable/c/4af115f1a20a3d9093586079206ee37c2ac55123
https://git.kernel.org/stable/c/60ff482c4205a5aac3b0595ab794cfd62295dab5
https://git.kernel.org/stable/c/a29ec0465dce0b871003698698ac6fa92c9a5034
https://git.kernel.org/stable/c/a424e713e0cc33d4b969cfda25b9f46df4d7b5bc
https://git.kernel.org/stable/c/e581cf5d216289ef292d1a4036d53ce90e122469
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3418
rh#2278291
CVE-2024-27008kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2024-27008
SMASH Issue 403776
bnc#1223802
https://git.kernel.org/stable/c/097c7918fcfa1dee233acfd1f3029f00c3bc8062
https://git.kernel.org/stable/c/26212da39ee14a52c76a202c6ae5153a84f579a5
https://git.kernel.org/stable/c/5050ae879a828d752b439e3827aac126709da6d1
https://git.kernel.org/stable/c/5fd4b090304e450aa0e7cc9cc2b4873285c6face
https://git.kernel.org/stable/c/6690cc2732e2a8d0eaca44dcbac032a4b0148042
https://git.kernel.org/stable/c/c2b97f26f081ceec3298151481687071075a25cb
https://git.kernel.org/stable/c/cf92bb778eda7830e79452c6917efa8474a30c1e
https://git.kernel.org/stable/c/df0991da7db846f7fa4ec6740350f743d3b69b04
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3427
rh#2278283
CVE-2024-27010kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27010
SMASH Issue 403778
bnc#1223720
https://git.kernel.org/stable/c/0f022d32c3eca477fbf79a205243a6123ed0fe11
https://git.kernel.org/stable/c/e6b90468da4dae2281a6e381107f411efb48b0ef
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3408
rh#2278279
CVE-2024-27011kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27011
SMASH Issue 403779
bnc#1223803
https://git.kernel.org/stable/c/49d0e656d19dfb2d4d7c230e4a720d37b3decff6
https://git.kernel.org/stable/c/86a1471d7cde792941109b93b558b5dc078b9ee9
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3428
rh#2278277
CVE-2024-27013kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27013
SMASH Issue 403780
bnc#1223745
https://git.kernel.org/stable/c/14cdb43dbc827e18ac7d5b30c5b4c676219f1421
https://git.kernel.org/stable/c/40f4ced305c6c47487d3cd8da54676e2acc1a6ad
https://git.kernel.org/stable/c/4b0dcae5c4797bf31c63011ed62917210d3fdac3
https://git.kernel.org/stable/c/52854101180beccdb9dc2077a3bea31b6ad48dfa
https://git.kernel.org/stable/c/62e27ef18eb4f0d33bbae8e9ef56b99696a74713
https://git.kernel.org/stable/c/68459b8e3ee554ce71878af9eb69659b9462c588
https://git.kernel.org/stable/c/a50dbeca28acf7051dfa92786b85f704c75db6eb
https://git.kernel.org/stable/c/f8bbc07ac535593139c875ffa19af924b1084540
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3413
rh#2278270
CVE-2024-27014kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27014
SMASH Issue 403781
bnc#1223735
https://git.kernel.org/stable/c/0080bf99499468030248ebd25dd645e487dcecdc
https://git.kernel.org/stable/c/46efa4d5930cf3c2af8c01f75e0a47e4fc045e3b
https://git.kernel.org/stable/c/48c4bb81df19402d4346032353d0795260255e3b
https://git.kernel.org/stable/c/fef965764cf562f28afb997b626fc7c3cec99693
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3409
rh#2278268
CVE-2024-27019kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27019
SMASH Issue 403786
bnc#1223813
https://git.kernel.org/stable/c/379bf7257bc5f2a1b1ca8514e08a871b7bf6d920
https://git.kernel.org/stable/c/4ca946b19caf655a08d5e2266d4d5526025ebb73
https://git.kernel.org/stable/c/ad333578f736d56920e090d7db1f8dec891d815e
https://git.kernel.org/stable/c/cade34279c2249eafe528564bd2e203e4ff15f88
https://git.kernel.org/stable/c/d78d867dcea69c328db30df665be5be7d0148484
https://git.kernel.org/stable/c/df7c0fb8c2b9f9cac65659332581b19682a71349
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3429
rh#2278258
CVE-2024-27020kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27020
SMASH Issue 403755
bnc#1223815
https://git.kernel.org/stable/c/01f1a678b05ade4b1248019c2dcca773aebbeb7f
https://git.kernel.org/stable/c/0b6de00206adbbfc6373b3ae38d2a6f197987907
https://git.kernel.org/stable/c/8d56bad42ac4c43c6c72ddd6a654a2628bf839c5
https://git.kernel.org/stable/c/934e66e231cff2b18faa2c8aad0b8cec13957e05
https://git.kernel.org/stable/c/939109c0a8e2a006a6cc8209e262d25065f4403a
https://git.kernel.org/stable/c/a9ebf340d123ae12582210407f879d6a5a1bc25b
https://git.kernel.org/stable/c/b38a133d37fa421c8447b383d788c9cc6f5cb34c
https://git.kernel.org/stable/c/f969eb84ce482331a991079ab7a5c4dc3b7f89bf
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3430
rh#2278256
CVE-2024-27024kernel-source-rt:Affectedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-27024
SMASH Issue 403815
bnc#1223777
https://git.kernel.org/stable/c/2b505d05280739ce31d5708da840f42df827cb85
https://git.kernel.org/stable/c/786854141057751bc08eb26f1b02e97c1631c8f4
https://git.kernel.org/stable/c/907761307469adecb02461a14120e9a1812a5fb1
https://git.kernel.org/stable/c/997efea2bf3a4adb96c306b9ad6a91442237bf5b
https://git.kernel.org/stable/c/998fd719e6d6468b930ac0c44552ea9ff8b07b80
https://git.kernel.org/stable/c/9dfc15a10dfd44f8ff7f27488651cb5be6af83c2
https://git.kernel.org/stable/c/b562ebe21ed9adcf42242797dd6cb75beef12bf0
https://git.kernel.org/stable/c/c055fc00c07be1f0df7375ab0036cebd1106ed38
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3421
rh#2278486
CVE-2024-27025kernel-source-rt:Affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2024-27025
SMASH Issue 403816
bnc#1223778
https://git.kernel.org/stable/c/31edf4bbe0ba27fd03ac7d87eb2ee3d2a231af6d
https://git.kernel.org/stable/c/44214d744be32a4769faebba764510888f1eb19e
https://git.kernel.org/stable/c/4af837db0fd3679fabc7b7758397090b0c06dced
https://git.kernel.org/stable/c/96436365e5d80d0106ea785a4f80a58e7c9edff8
https://git.kernel.org/stable/c/98e60b538e66c90b9a856828c71d4e975ebfa797
https://git.kernel.org/stable/c/b7f5aed55829f376e4f7e5ea5b80ccdcb023e983
https://git.kernel.org/stable/c/ba6a9970ce9e284cbc04099361c58731e308596a
https://git.kernel.org/stable/c/e803040b368d046434fbc8a91945c690332c4fcf
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3422
rh#2278484
CVE-2024-27037kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27037
SMASH Issue 403828
bnc#1223717
https://git.kernel.org/stable/c/01511ac7be8e45f80e637f6bf61af2d3d2dee9db
https://git.kernel.org/stable/c/0801c893fd48cdba66a3c8f44c3fe43cc67d3b85
https://git.kernel.org/stable/c/58a946ab43501f2eba058d24d96af0ad1122475b
https://git.kernel.org/stable/c/7938e9ce39d6779d2f85d822cc930f73420e54a6
https://git.kernel.org/stable/c/8c4889a9ea861d7be37463c10846eb75e1b49c9d
https://git.kernel.org/stable/c/ca976c6a592f789700200069ef9052493c0b73d8
jsc#CAR-3407
rh#2278458
CVE-2024-27038kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27038
SMASH Issue 403829
bnc#1223816
https://git.kernel.org/stable/c/0efb9ef6fb95384ba631d6819e66f10392aabfa2
https://git.kernel.org/stable/c/239174535dba11f7b83de0eaaa27909024f8c185
https://git.kernel.org/stable/c/6f073b24a9e2becd25ac4505a9780a87e621bb51
https://git.kernel.org/stable/c/a5d9b1aa61b401867b9066d54086b3e4ee91f8ed
https://git.kernel.org/stable/c/a8b2b26fdd011ebe36d68a9a321ca45801685959
https://git.kernel.org/stable/c/c554badcae9c45b737a22d23454170c6020b90e6
https://git.kernel.org/stable/c/d7ae7d1265686b55832a445b1db8cdd69738ac07
https://git.kernel.org/stable/c/e97fe4901e0f59a0bfd524578fe3768f8ca42428
jsc#CAR-3431
rh#2278456
CVE-2024-27043kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-27043
L3:68142
SMASH Issue 403834
bnc#1223824
bnc#1223825
https://git.kernel.org/stable/c/096237039d00c839f3e3a5fe6d001bf0db45b644
https://git.kernel.org/stable/c/0d3fe80b6d175c220b3e252efc6c6777e700e98e
https://git.kernel.org/stable/c/35674111a043b0482a9bc69da8850a83f465b07d
https://git.kernel.org/stable/c/437a111f79a2f5b2a5f21e27fdec6f40c8768712
https://git.kernel.org/stable/c/779e8db7efb22316c8581d6c229636d2f5694a62
https://git.kernel.org/stable/c/8c64f4cdf4e6cc5682c52523713af8c39c94e6d5
https://git.kernel.org/stable/c/b7586e902128e4fb7bfbb661cb52e4215a65637b
https://git.kernel.org/stable/c/d0f5c28333822f9baa5280d813124920720fd856
https://git.kernel.org/stable/c/f20c3270f3ed5aa6919a87e4de9bf6c05fb57086
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3433
rh#2278445
CVE-2024-27046kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27046
SMASH Issue 403837
bnc#1223827
https://git.kernel.org/stable/c/0d387dc503f9a53e6d1f6e9dd0292d38f083eba5
https://git.kernel.org/stable/c/3b1e8a617eb0f4cdc19def530047a95b5abde07d
https://git.kernel.org/stable/c/408ba7fd04f959c61b50db79c983484312fea642
https://git.kernel.org/stable/c/84e95149bd341705f0eca6a7fcb955c548805002
https://git.kernel.org/stable/c/928705e341010dd910fdece61ccb974f494a758f
https://git.kernel.org/stable/c/9d8eb1238377cd994829f9162ae396a84ae037b2
https://git.kernel.org/stable/c/c8df9203bf22c66fa26e8d8c7f8ce181cf88099d
https://git.kernel.org/stable/c/c9b4e220dd18f79507803f38a55d53b483f6c9c3
https://git.kernel.org/stable/c/d746889db75a76aeee95fb705b8e1ac28c684a2e
jsc#CAR-3435
rh#2278435
CVE-2024-27051kernel-source-rt:Affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2024-27051
SMASH Issue 403842
bnc#1223769
https://git.kernel.org/stable/c/74b84d0d71180330efe67c82f973a87f828323e5
https://git.kernel.org/stable/c/9127599c075caff234359950117018a010dd01db
https://git.kernel.org/stable/c/b25b64a241d769e932a022e5c780cf135ef56035
https://git.kernel.org/stable/c/d951cf510fb0df91d3abac0121a59ebbc63c0567
https://git.kernel.org/stable/c/e6e3e51ffba0784782b1a076d7441605697ea3c6
https://git.kernel.org/stable/c/e72160cb6e23b78b41999d6885a34ce8db536095
https://git.kernel.org/stable/c/f661017e6d326ee187db24194cabb013d81bc2a6
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3419
rh#2278425
CVE-2024-27053kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-27053
SMASH Issue 403844
bnc#1223737
https://git.kernel.org/stable/c/205c50306acf58a335eb19fa84e40140f4fe814f
https://git.kernel.org/stable/c/4bfd20d5f5c62b5495d6c0016ee6933bd3add7ce
https://git.kernel.org/stable/c/5800ec78775c0cd646f71eb9bf8402fb794807de
https://git.kernel.org/stable/c/745003b5917b610352f52fe0d11ef658d6471ec2
https://git.kernel.org/stable/c/b4bbf38c350acb6500cbe667b1e2e68f896e4b38
https://git.kernel.org/stable/c/d80fc436751cfa6b02a8eda74eb6cce7dadfe5a2
https://git.kernel.org/stable/c/dd50d3ead6e3707bb0a5df7cc832730c93ace3a7
https://git.kernel.org/stable/c/e556006de4ea93abe2b46cba202a2556c544b8b2
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3410
rh#2278415
CVE-2024-27054kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27054
SMASH Issue 403845
bnc#1223819
https://git.kernel.org/stable/c/ad999aa18103fa038787b6a8a55020abcf34df1a
https://git.kernel.org/stable/c/c3116e62ddeff79cae342147753ce596f01fcf06
https://git.kernel.org/stable/c/ebc5a3bd79e54f98c885c26f0862a27a02c487c5
https://git.kernel.org/stable/c/ec09bcab32fc4765e0cc97e1b72cdd067135f37e
https://git.kernel.org/stable/c/edbdb0d94143db46edd373cc93e433832d29fe19
https://git.kernel.org/stable/c/fa18aa507ea71d8914b6acb2c94db311c757c650
jsc#CAR-3432
rh#2278413
CVE-2024-27056kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27056
SMASH Issue 403847
bnc#1223822
https://git.kernel.org/stable/c/78f65fbf421a61894c14a1b91fe2fb4437b3fe5f
https://git.kernel.org/stable/c/ed35a509390ef4011ea2226da5dd6f62b73873b5
jsc#CAR-3434
rh#2278409
CVE-2024-27059kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27059
SMASH Issue 403850
bnc#1223738
https://git.kernel.org/stable/c/014bcf41d946b36a8f0b8e9b5d9529efbb822f49
https://git.kernel.org/stable/c/284fb1003d5da111019b9e0bf99b084fd71ac133
https://git.kernel.org/stable/c/3a67d4ab9e730361d183086dfb0ddd8c61f01636
https://git.kernel.org/stable/c/6c1f36d92c0a8799569055012665d2bb066fb964
https://git.kernel.org/stable/c/871fd7b10b56d280990b7e754f43d888382ca325
https://git.kernel.org/stable/c/9968c701cba7eda42e5f0052b040349d6222ae34
https://git.kernel.org/stable/c/eb7b01ca778170654e1c76950024270ba74b121f
https://git.kernel.org/stable/c/f42ba916689f5c7b1642092266d2f53cf527aaaa
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3411
rh#2278398
CVE-2024-27062kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27062
SMASH Issue 403853
bnc#1223834
https://git.kernel.org/stable/c/6887314f5356389fc219b8152e951ac084a10ef7
https://git.kernel.org/stable/c/96c8751844171af4b3898fee3857ee180586f589
https://git.kernel.org/stable/c/b7cc4ff787a572edf2c55caeffaa88cd801eb135
jsc#CAR-3436
rh#2278387
CVE-2024-27072kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27072
SMASH Issue 403863
bnc#1223837
https://git.kernel.org/stable/c/3e7d82ebb86e94643bdb30b0b5b077ed27dce1c2
https://git.kernel.org/stable/c/65e6a2773d655172143cc0b927cdc89549842895
jsc#CAR-3437
rh#2278507
CVE-2024-27073kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27073
SMASH Issue 403864
bnc#1223843
https://git.kernel.org/stable/c/1597cd1a88cfcdc4bf8b1b44cd458fed9a5a5d63
https://git.kernel.org/stable/c/24e51d6eb578b82ff292927f14b9f5ec05a46beb
https://git.kernel.org/stable/c/55ca0c7eae8499bb96f4e5d9b26af95e89c4e6a0
https://git.kernel.org/stable/c/656b8cc123d7635dd399d9f02594f27aa797ac3c
https://git.kernel.org/stable/c/7393c681f9aa05ffe2385e8716989565eed2fe06
https://git.kernel.org/stable/c/910363473e4bf97da3c350e08d915546dd6cc30b
https://git.kernel.org/stable/c/af37aed04997e644f7e1b52b696b62dcae3cc016
https://git.kernel.org/stable/c/d0b07f712bf61e1a3cf23c87c663791c42e50837
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3438
rh#2278504
CVE-2024-27074kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27074
SMASH Issue 403865
bnc#1223844
https://git.kernel.org/stable/c/291cda0b805fc0d6e90d201710311630c8667159
https://git.kernel.org/stable/c/7405a0d4442792988e9ae834e7d84f9d163731a4
https://git.kernel.org/stable/c/790fa2c04dfb9f095ec372bf17909424d6e864b3
https://git.kernel.org/stable/c/7f11dd3d165b178e738fe73dfeea513e383bedb5
https://git.kernel.org/stable/c/b49fe84c6cefcc1c2336d793b53442e716c95073
https://git.kernel.org/stable/c/b9b683844b01d171a72b9c0419a2d760d946ee12
https://git.kernel.org/stable/c/d43988a23c32588ccd0c74219637afb96cd78661
https://git.kernel.org/stable/c/e04d15c8bb3e111dd69f98894acd92d63e87aac3
https://git.kernel.org/stable/c/f31c1cc37411f5f7bcb266133f9a7e1b4bdf2975
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3439
rh#2278502
CVE-2024-27075kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27075
SMASH Issue 403866
bnc#1223842
https://git.kernel.org/stable/c/107052a8cfeff3a97326277192b4f052e4860a8a
https://git.kernel.org/stable/c/7a4cf27d1f0538f779bf31b8c99eda394e277119
https://git.kernel.org/stable/c/8fad9c5bb00d3a9508d18bbfe832e33a47377730
https://git.kernel.org/stable/c/c073c8cede5abd3836e83d70d72606d11d0759d4
https://git.kernel.org/stable/c/d20b64f156de5d10410963fe238d82a4e7e97a2f
https://git.kernel.org/stable/c/d6b4895197ab5a47cb81c6852d49320b05052960
https://git.kernel.org/stable/c/ed514ecf4f29c80a2f09ae3c877059b401efe893
https://git.kernel.org/stable/c/fa8b472952ef46eb632825051078c21ce0cafe55
https://git.kernel.org/stable/c/fb07104a02e87c06c39914d13ed67fd8f839ca82
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3442
rh#2278500
CVE-2024-27077kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27077
SMASH Issue 403868
bnc#1223780
https://git.kernel.org/stable/c/0175f2d34c85744f9ad6554f696cf0afb5bd04e4
https://git.kernel.org/stable/c/0c9550b032de48d6a7fa6a4ddc09699d64d9300d
https://git.kernel.org/stable/c/3dd8abb0ed0e0a7c66d6d677c86ccb188cc39333
https://git.kernel.org/stable/c/5dc319cc3c4f7b74f7dfba349aa26f87efb52458
https://git.kernel.org/stable/c/8f94b49a5b5d386c038e355bef6347298aabd211
https://git.kernel.org/stable/c/90029b9c979b60de5cb2b70ade4bbf61d561bc5d
https://git.kernel.org/stable/c/9c23ef30e840fedc66948299509f6c2777c9cf4f
https://git.kernel.org/stable/c/afd2a82fe300032f63f8be5d6cd6981e75f8bbf2
https://git.kernel.org/stable/c/dc866b69cc51af9b8509b4731b8ce2a4950cd0ef
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3423
rh#2278496
CVE-2024-27078kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27078
SMASH Issue 403869
bnc#1223781
https://git.kernel.org/stable/c/0de691ff547d86dd54c24b40a81f9c925df8dd77
https://git.kernel.org/stable/c/31096da07933598da8522c54bd007376fb152a09
https://git.kernel.org/stable/c/4c86c772fef06f5d7a66151bac42366825db0941
https://git.kernel.org/stable/c/622b1cf38521569869c8f7b9fbe9e4f1a289add7
https://git.kernel.org/stable/c/6bf5c2fade8ed53b2d26fa9875e5b04f36c7145d
https://git.kernel.org/stable/c/770a57922ce36a8476c43f7400b6501c554ea511
https://git.kernel.org/stable/c/8269ab16415f2065cd792c49b0475543936cbd79
https://git.kernel.org/stable/c/8cf9c5051076e0eb958f4361d50d8b0c3ee6691c
https://git.kernel.org/stable/c/94303a06e1852a366e9671fff46d19459f88cb28
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3424
rh#2278494
CVE-2024-27388kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27388
SMASH Issue 403872
bnc#1223744
https://git.kernel.org/stable/c/3cfcfc102a5e57b021b786a755a38935e357797d
https://git.kernel.org/stable/c/5e6013ae2c8d420faea553d363935f65badd32c3
https://git.kernel.org/stable/c/934212a623cbab851848b6de377eb476718c3e4c
https://git.kernel.org/stable/c/9806c2393cd2ab0a8e7bb9ffae02ce20e3112ec4
https://git.kernel.org/stable/c/996997d1fb2126feda550d6adcedcbd94911fc69
https://git.kernel.org/stable/c/b97c37978ca825557d331c9012e0c1ddc0e42364
https://git.kernel.org/stable/c/bb336cd8d5ecb69c430ebe3e7bcff68471d93fa8
https://git.kernel.org/stable/c/bfa9d86d39a0fe4685f90c3529aa9bd62a9d97a8
https://git.kernel.org/stable/c/dd292e884c649f9b1c18af0ec75ca90b390cd044
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3412
rh#2278535
CVE-2024-27398kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-27398
L3:68142
SMASH Issue 404986
bnc#1224174
bnc#1225013
https://git.kernel.org/stable/c/012363cb1bec5f33a7b94629ab2c1086f30280f2
https://git.kernel.org/stable/c/1b33d55fb7355e27f8c82cd4ecd560f162469249
https://git.kernel.org/stable/c/3212afd00e3cda790fd0583cb3eaef8f9575a014
https://git.kernel.org/stable/c/33a6e92161a78c1073d90e27abe28d746feb0a53
https://git.kernel.org/stable/c/483bc08181827fc475643272ffb69c533007e546
https://git.kernel.org/stable/c/50c2037fc28df870ef29d9728c770c8955d32178
https://git.kernel.org/stable/c/6a18eeb1b3bbc67c20d9609c31dca6a69b4bcde5
https://git.kernel.org/stable/c/bfab2c1f7940a232cd519e82fff137e308abfd93
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/
jsc#CAR-3452
rh#2280464
CVE-2024-27399kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27399
SMASH Issue 404988
bnc#1224177
https://git.kernel.org/stable/c/06acb75e7ed600d0bbf7bff5628aa8f24a97978c
https://git.kernel.org/stable/c/6466ee65e5b27161c846c73ef407f49dfa1bd1d9
https://git.kernel.org/stable/c/8960ff650aec70485b40771cd8e6e8c4cb467d33
https://git.kernel.org/stable/c/955b5b6c54d95b5e7444dfc81c95c8e013f27ac0
https://git.kernel.org/stable/c/adf0398cee86643b8eacde95f17d073d022f782c
https://git.kernel.org/stable/c/e137e2ba96e51902dc2878131823a96bf8e638ae
https://git.kernel.org/stable/c/e97e16433eb4533083b096a3824b93a5ca3aee79
https://git.kernel.org/stable/c/eb86f955488c39526534211f2610e48a5cf8ead4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/
jsc#CAR-3453
rh#2280462
CVE-2024-27402kernel-source-rt:Affectedmoderate5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2024-27402
SMASH Issue 406329
bnc#1224414
https://git.kernel.org/stable/c/0a9f558c72c47472c38c05fcb72c70abb9104277
https://git.kernel.org/stable/c/7d2a894d7f487dcb894df023e9d3014cf5b93fe5
https://git.kernel.org/stable/c/8ef4fcc7014b9f93619851d6b78d6cc2789a4c88
https://git.kernel.org/stable/c/9d5523e065b568e79dfaa2ea1085a5bcf74baf78
jsc#CAR-3460
rh#2281129
CVE-2024-27403kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27403
SMASH Issue 406296
bnc#1224415
https://git.kernel.org/stable/c/012df10717da02367aaf92c65f9c89db206c15f4
https://git.kernel.org/stable/c/4c167af9f6b5ae4a5dbc243d5983c295ccc2e43c
https://git.kernel.org/stable/c/558b00a30e05753a62ecc7e05e939ca8f0241148
https://git.kernel.org/stable/c/670548c8db44d76e40e1dfc06812bca36a61e9ae
https://git.kernel.org/stable/c/9e0f0430389be7696396c62f037be4bf72cf93e3
jsc#CAR-3461
rh#2281127
CVE-2024-27410kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27410
SMASH Issue 406328
bnc#1224432
https://git.kernel.org/stable/c/063715c33b4c37587aeca2c83cf08ead0c542995
https://git.kernel.org/stable/c/0cfbb26ee5e7b3d6483a73883f9f6157bca22ec9
https://git.kernel.org/stable/c/177d574be4b58f832354ab1ef5a297aa0c9aa2df
https://git.kernel.org/stable/c/930e826962d9f01dcd2220176134427358d112f2
https://git.kernel.org/stable/c/99eb2159680af8786104dac80528acd5acd45980
https://git.kernel.org/stable/c/a2add961a5ed25cfd6a74f9ffb9e7ab6d6ded838
https://git.kernel.org/stable/c/d38d31bbbb9dc0d4d71a45431eafba03d0bc150d
https://git.kernel.org/stable/c/f78c1375339a291cba492a70eaf12ec501d28a8e
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3464
rh#2281113
CVE-2024-27413kernel-source-rt:Affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-27413
SMASH Issue 406301
bnc#1224438
bnc#1225315
https://git.kernel.org/stable/c/00cf21ac526011a29fc708f8912da446fac19f7b
https://git.kernel.org/stable/c/11aabd7487857b8e7d768fefb092f66dfde68492
https://git.kernel.org/stable/c/4b73473c050a612fb4317831371073eda07c3050
https://git.kernel.org/stable/c/537e3f49dbe88881a6f0752beaa596942d9efd64
https://git.kernel.org/stable/c/62a5dcd9bd3097e9813de62fa6f22815e84a0172
https://git.kernel.org/stable/c/950d4d74d311a18baed6878dbfba8180d7e5dddd
https://git.kernel.org/stable/c/ddc547dd05a46720866c32022300f7376c40119f
https://git.kernel.org/stable/c/fccfa646ef3628097d59f7d9c1a3e84d4b6bb45e
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3465
rh#2281105
CVE-2024-27415kernel-source-rt:Affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L)CVE-2024-27415
SMASH Issue 406332
bnc#1224757
https://git.kernel.org/stable/c/2b1414d5e94e477edff1d2c79030f1d742625ea0
https://git.kernel.org/stable/c/62e7151ae3eb465e0ab52a20c941ff33bb6332e9
https://git.kernel.org/stable/c/7c3f28599652acf431a2211168de4a583f30b6d5
https://git.kernel.org/stable/c/80cd0487f630b5382734997c3e5e3003a77db315
https://git.kernel.org/stable/c/cb734975b0ffa688ff6cc0eed463865bf07b6c01
jsc#CAR-3621
rh#2281101
CVE-2024-27417kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27417
SMASH Issue 406304
bnc#1224721
https://git.kernel.org/stable/c/10bfd453da64a057bcfd1a49fb6b271c48653cdb
https://git.kernel.org/stable/c/1b0998fdd85776775d975d0024bca227597e836a
https://git.kernel.org/stable/c/33a1b6bfef6def2068c8703403759024ce17053e
https://git.kernel.org/stable/c/44112bc5c74e64f28f5a9127dc34066c7a09bd0f
https://git.kernel.org/stable/c/810fa7d5e5202fcfb22720304b755f1bdfd4c174
https://git.kernel.org/stable/c/8a54834c03c30e549c33d5da0975f3e1454ec906
https://git.kernel.org/stable/c/9d4ffb5b9d879a75e4f7460e8b10e756b4dfb132
jsc#CAR-3506
rh#2281097
CVE-2024-27435kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27435
SMASH Issue 406361
bnc#1224717
https://git.kernel.org/stable/c/149afee5c7418ec5db9d7387b9c9a5c1eb7ea2a8
https://git.kernel.org/stable/c/262da920896e2f2ab0e3947d9dbee0aa09045818
https://git.kernel.org/stable/c/6851778504cdb49431809b4ba061903d5f592c96
https://git.kernel.org/stable/c/de105068fead55ed5c07ade75e9c8e7f86a00d1d
https://git.kernel.org/stable/c/ff2f90f88d78559802466ad1c84ac5bda4416b3a
jsc#CAR-3507
rh#2281131
CVE-2024-27436kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27436
SMASH Issue 406362
bnc#1224803
https://git.kernel.org/stable/c/22cad1b841a63635a38273b799b4791f202ade72
https://git.kernel.org/stable/c/5cd466673b34bac369334f66cbe14bb77b7d7827
https://git.kernel.org/stable/c/629af0d5fe94a35f498ba2c3f19bd78bfa591be6
https://git.kernel.org/stable/c/6d5dc96b154be371df0d62ecb07efe400701ed8a
https://git.kernel.org/stable/c/6d88b289fb0a8d055cb79d1c46a56aba7809d96d
https://git.kernel.org/stable/c/7e2c1b0f6dd9abde9e60f0f9730026714468770f
https://git.kernel.org/stable/c/9af1658ba293458ca6a13f70637b9654fa4be064
https://git.kernel.org/stable/c/a39d51ff1f52cd0b6fe7d379ac93bd8b4237d1b7
https://git.kernel.org/stable/c/c8a24fd281dcdf3c926413dafbafcf35cde517a9
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3526
rh#2281141
CVE-2024-28085util-linux:Affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N)CVE-2024-28085
L3:68044
L3:68136
L3:68276
MISC:github.com:OSS:2024/03/27/7
MISC:github.com:OSS:2024/03/28/2
OSS:2015/09/20/1
OSS:2024/03/27/5
OSS:2024/03/27/6
OSS:2024/03/27/7
OSS:2024/03/27/8
OSS:2024/03/27/9
OSS:2024/03/28/1
OSS:2024/03/28/2
OSS:2024/03/28/3
OSS:2024/Q1/257
SMASH Issue 398559
SMASH Issue 398560
bnc#1221831
bnc#1223561
bnc#1224876
bnc#1226235
https://github.com/util-linux/util-linux/security/advisories/GHSA-xv2h-c6ww-mrjq
https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html
https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/
https://people.rit.edu/sjf5462/6831711781/wall_2_27_2024.txt
https://security.netapp.com/advisory/ntap-20240531-0003/
jsc#CAR-3261
rh#2271942
CVE-2024-28182nghttp2:Affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2024-28182
L3:68043
OSS:2024/04/03/16
SMASH Issue 397668
bnc#1221399
bnc#1223560
https://github.com/nghttp2/nghttp2/commit/00201ecd8f982da3b67d4f6868af72a1b03b14e0
https://github.com/nghttp2/nghttp2/commit/d71a4668c6bead55805d18810d633fbb98315af9
https://github.com/nghttp2/nghttp2/security/advisories/GHSA-x6x3-gv8h-m57q
https://lists.debian.org/debian-lts-announce/2024/04/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGOME6ZXJG7664IPQNVE3DL67E3YP3HY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J6ZMXUGB66VAXDW5J6QSTHM5ET25FGSA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXJO2EASHM2OQQLGVDY5ZSO7UVDVHTDK/
jsc#CAR-3370
rh#2268639
CVE-2024-2961glibc:Affectedimportant8.2 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)CVE-2024-2961
L3:68007
L3:68038
MISC:www.ambionics.io:OSS:2024/05/27/3
OSS:2024/04/17/9
OSS:2024/04/18/4
OSS:2024/04/24/2
OSS:2024/05/27/1
OSS:2024/05/27/2
OSS:2024/05/27/3
OSS:2024/05/27/4
OSS:2024/05/27/5
OSS:2024/05/27/6
OSS:2024/Q2/137
SMASH Issue 402445
bnc#1222992
bnc#1223019
bnc#1223182
bnc#1223555
https://lists.debian.org/debian-lts-announce/2024/05/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BTJFBGHDYG5PEIFD5WSSSKSFZ2AZWC5N/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P3I4KYS6EU6S7QZ47WFNTPVAHFIUQNEL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YAMJQI3Y6BHWV3CUTYBXOZONCUJNOB2Z/
https://security.netapp.com/advisory/ntap-20240531-0002/
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0004
jsc#CAR-3327
rh#2273404
CVE-2024-33600glibc:Affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2024-33600
L3:68127
L3:68141
SMASH Issue 403188
bnc#1223424
bnc#1223589
bnc#1224861
bnc#1225019
https://security.netapp.com/advisory/ntap-20240524-0013/
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0006
jsc#CAR-3455
rh#2277202
rh#2277204
CVE-2024-33601glibc:Affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2024-33601
SMASH Issue 403189
bnc#1223426
https://security.netapp.com/advisory/ntap-20240524-0014/
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007
jsc#CAR-3456
rh#2277205
CVE-2024-33602glibc:Affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2024-33602
SMASH Issue 403190
bnc#1223425
https://security.netapp.com/advisory/ntap-20240524-0012/
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0008
jsc#CAR-3458
rh#2277206
CVE-2024-33621kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-33621
SMASH Issue 411743
bnc#1226770
https://git.kernel.org/stable/c/0049a623dfbbb49888de7f0c2f33a582b5ead989
https://git.kernel.org/stable/c/13c4543db34e0da5a7d2f550b6262d860f248381
https://git.kernel.org/stable/c/183c4b416454b9983dc1b8aa0022b748911adc48
https://git.kernel.org/stable/c/1abbf079da59ef559d0ab4219d2a0302f7970761
https://git.kernel.org/stable/c/54213c09801e0bd2549ac42961093be36f65a7d0
https://git.kernel.org/stable/c/54768bacfde60e8e4757968d79f8726711dd2cf5
https://git.kernel.org/stable/c/b3dc6e8003b500861fa307e9a3400c52e78e4d3a
https://git.kernel.org/stable/c/cb53706a3403ba67f4040b2a82d9cf79e11b1a48
jsc#CAR-3846
rh#2293657
CVE-2024-34459libxml2:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2024-34459
SMASH Issue 405285
bnc#1224281
bnc#1224282
bnc#1224283
bnc#1224284
https://gitlab.gnome.org/GNOME/libxml2/-/issues/720
https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.8
https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5HVUXKYTBWT3G5DEEQX62STJQBY367NL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/INKSSLW5VMZIXHRPZBAW4TJUX5SQKARG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VRDJCNQP32LV56KESUQ5SNZKAJWSZZRI/
jsc#CAR-3459
rh#2280532
CVE-2024-35247kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35247
SMASH Issue 411969
bnc#1226948
https://git.kernel.org/stable/c/2279c09c36165ccded4d506d11a7714e13b56019
https://git.kernel.org/stable/c/26e6e25d742e29885cf44274fcf6b744366c4702
https://git.kernel.org/stable/c/4d7d12b643c00e7eea51b49a60a2ead182633ec8
https://git.kernel.org/stable/c/75a001914a8d2ccdcbe4b8cc7e94ac71d0e66093
https://git.kernel.org/stable/c/9b4eee8572dcf82b2ed17d9a328c7fb87df2f0e8
https://git.kernel.org/stable/c/b7c0e1ecee403a43abc89eb3e75672b01ff2ece9
jsc#CAR-3882
rh#2294213
CVE-2024-35789kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-35789
SMASH Issue 406368
bnc#1224749
https://git.kernel.org/stable/c/2884a50f52313a7a911de3afcad065ddbb3d78fc
https://git.kernel.org/stable/c/4f2bdb3c5e3189297e156b3ff84b140423d64685
https://git.kernel.org/stable/c/6b948b54c8bd620725e0c906e44b10c0b13087a7
https://git.kernel.org/stable/c/7eeabcea79b67cc29563e6a9a5c81f9e2c664d5b
https://git.kernel.org/stable/c/be1dd9254fc115321d6fbee042026d42afc8d931
https://git.kernel.org/stable/c/c8bddbd91bc8e42c961a5e2cec20ab879f21100f
https://git.kernel.org/stable/c/e8678551c0243f799b4859448781cbec1bd6f1cb
https://git.kernel.org/stable/c/e8b067c4058c0121ac8ca71559df8e2e08ff1a7e
https://git.kernel.org/stable/c/ea9a0cfc07a7d3601cc680718d9cff0d6927a921
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3563
rh#2281057
CVE-2024-35790kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35790
SMASH Issue 406369
bnc#1224712
https://git.kernel.org/stable/c/0ad011776c057ce881b7fd6d8c79ecd459c087e9
https://git.kernel.org/stable/c/165376f6b23e9a779850e750fb2eb06622e5a531
https://git.kernel.org/stable/c/4a22aeac24d0d5f26ba741408e8b5a4be6dc5dc0
jsc#CAR-3508
rh#2281054
CVE-2024-35794kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35794
SMASH Issue 406373
bnc#1224706
https://git.kernel.org/stable/c/16c4770c75b1223998adbeb7286f9a15c65fba73
https://git.kernel.org/stable/c/af916cb66a80597f3523bc85812e790bcdcfd62b
https://git.kernel.org/stable/c/eaa8fc9b092837cf2c754bde1a15d784ce9a85ab
jsc#CAR-3509
rh#2281045
CVE-2024-35805kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35805
SMASH Issue 406434
bnc#1224743
https://git.kernel.org/stable/c/116562e804ffc9dc600adab6326dde31d72262c7
https://git.kernel.org/stable/c/3d47eb405781cc5127deca9a14e24b27696087a1
https://git.kernel.org/stable/c/5f4ad4d0b0943296287313db60b3f84df4aad683
https://git.kernel.org/stable/c/6e7132ed3c07bd8a6ce3db4bb307ef2852b322dc
https://git.kernel.org/stable/c/9759ff196e7d248bcf8386a7451d6ff8537a7d9c
https://git.kernel.org/stable/c/e50f83061ac250f90710757a3e51b70a200835e2
https://git.kernel.org/stable/c/e7d4cff57c3c43fdd72342c78d4138f509c7416e
https://git.kernel.org/stable/c/fa5c055800a7fd49a36bbb52593aca4ea986a366
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3637
rh#2281225
CVE-2024-35806kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35806
SMASH Issue 406383
bnc#1224699
https://git.kernel.org/stable/c/0e6521b0f93ff350434ed4ae61a250907e65d397
https://git.kernel.org/stable/c/276af8efb05c8e47acf2738a5609dd72acfc703f
https://git.kernel.org/stable/c/584c2a9184a33a40fceee838f856de3cffa19be3
https://git.kernel.org/stable/c/62c3ecd2833cff0eff4a82af4082c44ca8d2518a
https://git.kernel.org/stable/c/a62168653774c36398d65846a98034436ee66d03
https://git.kernel.org/stable/c/af25c5180b2b1796342798f6c56fcfd12f5035bd
https://git.kernel.org/stable/c/b56a793f267679945d1fdb9a280013bd2d0ed7f9
https://git.kernel.org/stable/c/dd199e5b759ffe349622a4b8fbcafc51fc51b1ec
https://git.kernel.org/stable/c/e6378314bb920acb39013051fa65d8f9f8030430
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3503
rh#2281223
CVE-2024-35808kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35808
SMASH Issue 406417
bnc#1224623
https://git.kernel.org/stable/c/347dcdc15a1706f61aa545ae498ededdf31aeebc
https://git.kernel.org/stable/c/9e59b8d76ff511505eb0dd1478329f09e0f04669
https://git.kernel.org/stable/c/cd32b27a66db8776d8b8e82ec7d7dde97a8693b0
jsc#CAR-3490
rh#2281219
CVE-2024-35812kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35812
SMASH Issue 406416
bnc#1224624
https://git.kernel.org/stable/c/164be0a824387301312689bb29b2be92ab2cd39d
https://git.kernel.org/stable/c/19f955ad9437a6859a529af34e2eafd903d5e7c1
https://git.kernel.org/stable/c/2ff436b6399859e06539a2b9c667897d3cc85ad5
https://git.kernel.org/stable/c/339f83612f3a569b194680768b22bf113c26a29d
https://git.kernel.org/stable/c/347cca11bb78b9f3c29b45a9c52e70258bd008bf
https://git.kernel.org/stable/c/3afdcc4e1a00facad210f5c5891bb2fbc026067f
https://git.kernel.org/stable/c/5904411219601127ffdbd2d622bb5d67f9d8d16c
https://git.kernel.org/stable/c/7182175f565ffffa2ba1911726c5656bfc7a1bae
https://git.kernel.org/stable/c/8672ad663a22d0e4a325bb7d817b36ec412b967c
https://git.kernel.org/stable/c/916cd2fcbc1e344bcabf4b2a834cdf5a0417d30c
https://git.kernel.org/stable/c/9723602387217caa71d623ffcce314dc39e84a09
https://git.kernel.org/stable/c/9b319f4a88094b2e020e6db6e819c808d890098d
https://git.kernel.org/stable/c/a86e54a345139f1a7668c9f83bdc7ac6f91b6f78
https://git.kernel.org/stable/c/ab92e11b73b48b79f144421430891f3aa6242656
https://git.kernel.org/stable/c/da3b75931bb737be74d6b4341e0080f233ed1409
https://git.kernel.org/stable/c/e4e47e406d74cab601b2ab21ba5e3add811e05ae
jsc#CAR-3481
rh#2281211
CVE-2024-35817kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-35817
SMASH Issue 406454
bnc#1224736
bnc#1225313
https://git.kernel.org/stable/c/589c414138a1bed98e652c905937d8f790804efe
https://git.kernel.org/stable/c/5cdce3dda3b3dacde902f63a8ee72c2b7f91912d
https://git.kernel.org/stable/c/5d5f1a7f3b1039925f79c7894f153c2a905201fb
https://git.kernel.org/stable/c/6c6064cbe58b43533e3451ad6a8ba9736c109ac3
https://git.kernel.org/stable/c/6fcd12cb90888ef2d8af8d4c04e913252eee4ef3
https://git.kernel.org/stable/c/e8d27caef2c829a306e1f762fb95f06e8ec676f6
jsc#CAR-3643
rh#2281202
CVE-2024-35819kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35819
SMASH Issue 406398
bnc#1224683
https://git.kernel.org/stable/c/2b3fede8225133671ce837c0d284804aa3bc7a02
https://git.kernel.org/stable/c/32edca2f03a6cc42c650ddc3ad83d086e3f365d1
https://git.kernel.org/stable/c/54d26adf64c04f186098b39dba86b86037084baa
https://git.kernel.org/stable/c/9a3ca8292ce9fdcce122706c28c3f07bc857fe5e
https://git.kernel.org/stable/c/cd53a8ae5aacb4ecd25088486dea1cd02e74b506
https://git.kernel.org/stable/c/d6b5aac451c9cc12e43ab7308e0e2ddc52c62c14
https://git.kernel.org/stable/c/f39d36b7540cf0088ed7ce2de2794f2aa237f6df
https://git.kernel.org/stable/c/fbec4e7fed89b579f2483041fabf9650fb0dd6bc
https://git.kernel.org/stable/c/ff50716b7d5b7985979a5b21163cd79fb3d21d59
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3497
rh#2281198
CVE-2024-35821kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35821
SMASH Issue 406425
bnc#1224629
https://git.kernel.org/stable/c/142d87c958d9454c3cffa625fab56f3016e8f9f3
https://git.kernel.org/stable/c/17772bbe9cfa972ea1ff827319f6e1340de76566
https://git.kernel.org/stable/c/4aa554832b9dc9e66249df75b8f447d87853e12e
https://git.kernel.org/stable/c/4b7c4fc60d6a46350fbe54f5dc937aeaa02e675e
https://git.kernel.org/stable/c/723012cab779eee8228376754e22c6594229bf8f
https://git.kernel.org/stable/c/778c6ad40256f1c03244fc06d7cdf71f6b5e7310
https://git.kernel.org/stable/c/8f599ab6fabbca4c741107eade70722a98adfd9f
https://git.kernel.org/stable/c/f19b1023a3758f40791ec166038d6411c8894ae3
https://git.kernel.org/stable/c/fc99f4e2d2f1ce766c14e98463c2839194ae964f
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3488
rh#2281194
CVE-2024-35823kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35823
SMASH Issue 406385
bnc#1224692
https://git.kernel.org/stable/c/0190d19d7651c08abc187dac3819c61b726e7e3f
https://git.kernel.org/stable/c/1581dafaf0d34bc9c428a794a22110d7046d186d
https://git.kernel.org/stable/c/1ce408f75ccf1e25b3fddef75cca878b55f2ac90
https://git.kernel.org/stable/c/2933b1e4757a0a5c689cf48d80b1a2a85f237ff1
https://git.kernel.org/stable/c/7529cbd8b5f6697b369803fe1533612c039cabda
https://git.kernel.org/stable/c/994a1e583c0c206c8ca7d03334a65b79f4d8bc51
https://git.kernel.org/stable/c/fc7dfe3d123f00e720be80b920da287810a1f37d
https://git.kernel.org/stable/c/ff7342090c1e8c5a37015c89822a68b275b46f8a
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3499
rh#2281190
CVE-2024-35828kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35828
SMASH Issue 406419
bnc#1224622
https://git.kernel.org/stable/c/4d99d267da3415db2124029cb5a6d2d955ca43f9
https://git.kernel.org/stable/c/5f0e4aede01cb01fa633171f0533affd25328c3a
https://git.kernel.org/stable/c/8e243ac649c10922a6b4855170eaefe4c5b3faab
https://git.kernel.org/stable/c/96481624fb5a6319079fb5059e46dbce43a90186
https://git.kernel.org/stable/c/bea9573c795acec5614d4ac2dcc7b3b684cea5bf
https://git.kernel.org/stable/c/d219724d4b0ddb8ec7dfeaed5989f23edabaf591
https://git.kernel.org/stable/c/da10f6b7918abd5b4bc5c9cb66f0fc6763ac48f3
https://git.kernel.org/stable/c/e888c4461e109f7b93c3522afcbbaa5a8fdf29d2
https://git.kernel.org/stable/c/f0dd27314c7afe34794c2aa19dd6f2d30eb23bc7
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3491
rh#2281180
CVE-2024-35830kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35830
SMASH Issue 406394
bnc#1224680
https://git.kernel.org/stable/c/17c2650de14842c25c569cbb2126c421489a3a24
https://git.kernel.org/stable/c/4f1490a5d7a0472ee5d9f36547bc4ba46be755c7
https://git.kernel.org/stable/c/610f20e5cf35ca9c0992693cae0dd8643ce932e7
https://git.kernel.org/stable/c/87399f1ff92203d65f1febf5919429f4bb613a02
https://git.kernel.org/stable/c/8ba8db9786b55047df5ad3db3e01dd886687a77d
https://git.kernel.org/stable/c/b8505a1aee8f1edc9d16d72ae09c93de086e2a1a
https://git.kernel.org/stable/c/c915c46a25c3efb084c4f5e69a053d7f7a635496
https://git.kernel.org/stable/c/daf21394f9898fb9f0698c3e50de08132d2164e6
https://git.kernel.org/stable/c/edbb3226c985469a2f8eb69885055c9f5550f468
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3521
rh#2281176
CVE-2024-35833kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35833
SMASH Issue 406410
bnc#1224632
https://git.kernel.org/stable/c/15eb996d7d13cb72a16389231945ada8f0fef2c3
https://git.kernel.org/stable/c/198270de9d8eb3b5d5f030825ea303ef95285d24
https://git.kernel.org/stable/c/1c75fe450b5200c78f4a102a0eb8e15d8f1ccda8
https://git.kernel.org/stable/c/25ab4d72eb7cbfa0f3d97a139a9b2bfcaa72dd59
https://git.kernel.org/stable/c/3aa58cb51318e329d203857f7a191678e60bb714
https://git.kernel.org/stable/c/5cd8a51517ce15edbdcea4fc74c4c127ddaa1bd6
https://git.kernel.org/stable/c/ae6769ba51417c1c86fb645812d5bff455eee802
jsc#CAR-3522
rh#2281169
CVE-2024-35835kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35835
SMASH Issue 406444
bnc#1224605
https://git.kernel.org/stable/c/2501afe6c4c9829d03abe9a368b83d9ea1b611b7
https://git.kernel.org/stable/c/3c6d5189246f590e4e1f167991558bdb72a4738b
https://git.kernel.org/stable/c/42876db001bbea7558e8676d1019f08f9390addb
https://git.kernel.org/stable/c/66cc521a739ccd5da057a1cb3d6346c6d0e7619b
https://git.kernel.org/stable/c/b21db3f1ab7967a81d6bbd328d28fe5a4c07a8a7
https://git.kernel.org/stable/c/c57ca114eb00e03274dd38108d07a3750fa3c056
https://git.kernel.org/stable/c/cf116d9c3c2aebd653c2dfab5b10c278e9ec3ee5
https://git.kernel.org/stable/c/e3d3ed8c152971dbe64c92c9ecb98fdb52abb629
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3484
rh#2281165
CVE-2024-35837kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35837
SMASH Issue 406476
bnc#1224500
https://git.kernel.org/stable/c/83f99138bf3b396f761600ab488054396fb5768f
https://git.kernel.org/stable/c/938729484cfa535e9987ed0f86f29a2ae3a8188b
https://git.kernel.org/stable/c/9f538b415db862e74b8c5d3abbccfc1b2b6caa38
https://git.kernel.org/stable/c/af47faa6d3328406038b731794e7cf508c71affa
https://git.kernel.org/stable/c/cec65f09c47d8c2d67f2bcad6cf05c490628d1ec
https://git.kernel.org/stable/c/dc77f6ab5c3759df60ff87ed24f4d45df0f3b4c4
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3476
rh#2281159
CVE-2024-35839kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35839
SMASH Issue 406402
bnc#1224726
https://git.kernel.org/stable/c/544add1f1cfb78c3dfa3e6edcf4668f6be5e730c
https://git.kernel.org/stable/c/7ae19ee81ca56b13c50a78de6c47d5b8fdc9d97b
https://git.kernel.org/stable/c/9325e3188a9cf3f69fc6f32af59844bbc5b90547
https://git.kernel.org/stable/c/9874808878d9eed407e3977fd11fee49de1e1d86
jsc#CAR-3505
rh#2281284
CVE-2024-35847kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35847
SMASH Issue 406379
bnc#1224697
https://git.kernel.org/stable/c/03170e657f62c26834172742492a8cb8077ef792
https://git.kernel.org/stable/c/5b012f77abde89bf0be8a0547636184fea618137
https://git.kernel.org/stable/c/5dbdbe1133911ca7d8466bb86885adec32ad9438
https://git.kernel.org/stable/c/aa44d21574751a7d6bca892eb8e0e9ac68372e52
https://git.kernel.org/stable/c/b72d2b1448b682844f995e660b77f2a1fabc1662
https://git.kernel.org/stable/c/c26591afd33adce296c022e3480dea4282b7ef91
https://git.kernel.org/stable/c/dd681710ab77c8beafe2e263064cb1bd0e2d6ca9
https://git.kernel.org/stable/c/f5417ff561b8ac9a7e53c747b8627a7ab58378ae
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3502
rh#2281268
CVE-2024-35848kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35848
SMASH Issue 406435
bnc#1224612
https://git.kernel.org/stable/c/26d32bec4c6d255a03762f33c637bfa3718be15a
https://git.kernel.org/stable/c/2af84c46b9b8f2d6c0f88d09ee5c849ae1734676
https://git.kernel.org/stable/c/6d8b56ec0c8f30d5657382f47344a32569f7a9bc
https://git.kernel.org/stable/c/c43e5028f5a35331eb25017f5ff6cc21735005c6
https://git.kernel.org/stable/c/c850f71fca09ea41800ed55905980063d17e01da
https://git.kernel.org/stable/c/f42c97027fb75776e2e9358d16bf4a99aeb04cf2
jsc#CAR-3493
rh#2281265
CVE-2024-35849kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2024-35849
SMASH Issue 406458
bnc#1224733
https://git.kernel.org/stable/c/2f7ef5bb4a2f3e481ef05fab946edb97c84f67cf
https://git.kernel.org/stable/c/30189e54ba80e3209d34cfeea87b848f6ae025e6
https://git.kernel.org/stable/c/3a63cee1a5e14a3e52c19142c61dd5fcb524f6dc
https://git.kernel.org/stable/c/689efe22e9b5b7d9d523119a9a5c3c17107a0772
https://git.kernel.org/stable/c/73db209dcd4ae026021234d40cfcb2fb5b564b86
https://git.kernel.org/stable/c/8bdbcfaf3eac42f98e5486b3d7e130fa287811f6
https://git.kernel.org/stable/c/e58047553a4e859dafc8d1d901e1de77c9dd922d
https://git.kernel.org/stable/c/fddc19631c51d9c17d43e9f822a7bc403af88d54
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3642
rh#2281263
CVE-2024-35852kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35852
SMASH Issue 406472
bnc#1224502
https://git.kernel.org/stable/c/51cefc9da400b953fee749c9e5d26cd4a2b5d758
https://git.kernel.org/stable/c/5bfe7bf9656ed2633718388f12b7c38b86414a04
https://git.kernel.org/stable/c/63d814d93c5cce4c18284adc810028f28dca493f
https://git.kernel.org/stable/c/857ed800133ffcfcee28582090b63b0cbb8ba59d
https://git.kernel.org/stable/c/d72dd6fcd7886d0523afbab8b4a4b22d17addd7d
https://git.kernel.org/stable/c/de1aaefa75be9d0ec19c9a3e0e2f9696de20c6ab
https://git.kernel.org/stable/c/fb4e2b70a7194b209fc7320bbf33b375f7114bd5
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3479
rh#2281257
CVE-2024-35853kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35853
SMASH Issue 406449
bnc#1224604
https://git.kernel.org/stable/c/0ae8ff7b6d42e33943af462910bdcfa2ec0cb8cf
https://git.kernel.org/stable/c/413a01886c3958d4b8aac23a3bff3d430b92093e
https://git.kernel.org/stable/c/617e98ba4c50f4547c9eb0946b1cfc26937d70d1
https://git.kernel.org/stable/c/8ca3f7a7b61393804c46f170743c3b839df13977
https://git.kernel.org/stable/c/b3fd51f684a0711504f82de510da109ae639722d
https://git.kernel.org/stable/c/b822644fd90992ee362c5e0c8d2556efc8856c76
https://git.kernel.org/stable/c/c6f3fa7f5a748bf6e5c4eb742686d6952f854e76
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3483
rh#2281255
CVE-2024-35854kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35854
SMASH Issue 406403
bnc#1224636
https://git.kernel.org/stable/c/311eeaa7b9e26aba5b3d57b09859f07d8e9fc049
https://git.kernel.org/stable/c/4c89642ca47fb620914780c7c51d8d1248201121
https://git.kernel.org/stable/c/54225988889931467a9b55fdbef534079b665519
https://git.kernel.org/stable/c/813e2ab753a8f8c243a39ede20c2e0adc15f3887
https://git.kernel.org/stable/c/a02687044e124f8ccb427cd3632124a4e1a7d7c1
https://git.kernel.org/stable/c/a429a912d6c779807f4d72a6cc0a1efaaa3613e1
https://git.kernel.org/stable/c/e118e7ea24d1392878ef85926627c6bc640c4388
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3487
rh#2281253
CVE-2024-35855kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35855
SMASH Issue 406386
bnc#1224694
https://git.kernel.org/stable/c/1b73f6e4ea770410a937a8db98f77e52594d23a0
https://git.kernel.org/stable/c/79b5b4b18bc85b19d3a518483f9abbbe6d7b3ba4
https://git.kernel.org/stable/c/b183b915beef818a25e3154d719ca015a1ae0770
https://git.kernel.org/stable/c/b996e8699da810e4c915841d6aaef761007f933a
https://git.kernel.org/stable/c/c17976b42d546ee118ca300db559630ee96fb758
https://git.kernel.org/stable/c/e24d2487424779c02760ff50cd9021b8676e19ef
https://git.kernel.org/stable/c/feabdac2057e863d0e140a2adf3d232eb4882db4
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3500
rh#2281251
CVE-2024-35862kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-35862
SMASH Issue 406551
bnc#1224764
bnc#1225311
https://git.kernel.org/stable/c/63981561ffd2d4987807df4126f96a11e18b0c1d
https://git.kernel.org/stable/c/aa582b33f94453fdeaff1e7d0aa252c505975e01
https://git.kernel.org/stable/c/d919b6ea15ffa56fbafef4a1d92f47aeda9af645
https://git.kernel.org/stable/c/f9414004798d9742c1af23a1d839fe6a9503751c
jsc#CAR-3622
rh#2281781
CVE-2024-35863kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-35863
SMASH Issue 406552
bnc#1224763
bnc#1225011
https://git.kernel.org/stable/c/0a15ba88a32fa7a516aff7ffd27befed5334dff2
https://git.kernel.org/stable/c/16d58c6a7db5050b9638669084b63fc05f951825
https://git.kernel.org/stable/c/494c91e1e9413b407d12166a61b84200d4d54fac
https://git.kernel.org/stable/c/69ccf040acddf33a3a85ec0f6b45ef84b0f7ec29
jsc#CAR-3513
rh#2281773
CVE-2024-35864kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-35864
SMASH Issue 406553
bnc#1224765
bnc#1225309
https://git.kernel.org/stable/c/705c76fbf726c7a2f6ff9143d4013b18daaaebf1
https://git.kernel.org/stable/c/a8344e2b69bde63f713b0aa796d70dbeadffddfb
https://git.kernel.org/stable/c/c868cabdf6fdd61bea54532271f4708254e57fc5
https://git.kernel.org/stable/c/f92739fdd4522c4291277136399353d7c341fae4
jsc#CAR-3623
rh#2281769
CVE-2024-35865kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35865
SMASH Issue 406554
bnc#1224668
https://git.kernel.org/stable/c/21fed37d2bdcde33453faf61d3d4d96c355f04bd
https://git.kernel.org/stable/c/22863485a4626ec6ecf297f4cc0aef709bc862e4
https://git.kernel.org/stable/c/3dba0e5276f131e36d6d8043191d856f49238628
https://git.kernel.org/stable/c/84488466b7a69570bdbf76dd9576847ab97d54e7
jsc#CAR-3641
rh#2281763
CVE-2024-35866kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35866
SMASH Issue 406555
bnc#1224667
https://git.kernel.org/stable/c/10e17ca4000ec34737bde002a13435c38ace2682
https://git.kernel.org/stable/c/3103163ccd3be4adcfa37e15608fb497be044113
https://git.kernel.org/stable/c/58acd1f497162e7d282077f816faa519487be045
jsc#CAR-3640
rh#2281760
CVE-2024-35871kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35871
SMASH Issue 406560
bnc#1224528
https://git.kernel.org/stable/c/00effef72c98294edb1efa87ffa0f6cfb61b36a4
https://git.kernel.org/stable/c/9abc3e6f1116adb7a2d4fbb8ce20c37916976bf5
https://git.kernel.org/stable/c/d14fa1fcf69db9d070e75f1c4425211fa619dfc8
https://git.kernel.org/stable/c/d8dcba0691b8e42bddb61aab201e4d918a08e5d9
https://git.kernel.org/stable/c/dff6072124f6df77bfd36951fbd88565746980ef
https://git.kernel.org/stable/c/f6583444d7e78dae750798552b65a2519ff3ca84
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3471
rh#2281738
CVE-2024-35877kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35877
SMASH Issue 406566
bnc#1224525
https://git.kernel.org/stable/c/04c35ab3bdae7fefbd7c7a7355f29fa03a035221
https://git.kernel.org/stable/c/09e6bb53217bf388a0d2fd7fb21e74ab9dffc173
https://git.kernel.org/stable/c/1341e4b32e1fb1b0acd002ccd56f07bd32f2abc6
https://git.kernel.org/stable/c/51b7841f3fe84606ec0bd8da859d22e05e5419ec
https://git.kernel.org/stable/c/7cfee26d1950250b14c5cb0a37b142f3fcc6396a
https://git.kernel.org/stable/c/97e93367e82752e475a33839a80b33bdbef1209f
https://git.kernel.org/stable/c/c2b2430b48f3c9eaccd2c3d2ad75bb540d4952f4
https://git.kernel.org/stable/c/f18681daaec9665a15c5e7e0f591aad5d0ac622b
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3472
rh#2281720
CVE-2024-35886kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35886
SMASH Issue 406575
bnc#1224670
https://git.kernel.org/stable/c/167d4b47a9bdcb01541dfa29e9f3cbb8edd3dfd2
https://git.kernel.org/stable/c/40a344b2ddc06c1a2caa7208a43911f39c662778
https://git.kernel.org/stable/c/4a7c465a5dcd657d59d25bf4815e19ac05c13061
https://git.kernel.org/stable/c/9472d07cd095cbd3294ac54c42f304a38fbe9bfe
https://git.kernel.org/stable/c/9c5258196182c25b55c33167cd72fdd9bbf08985
https://git.kernel.org/stable/c/d21d40605bca7bd5fc23ef03d4c1ca1f48bc2cae
https://git.kernel.org/stable/c/f2dd75e57285f49e34af1a5b6cd8945c08243776
https://git.kernel.org/stable/c/fd307f2d91d40fa7bc55df3e2cd1253fabf8a2d6
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3645
rh#2281697
CVE-2024-35887kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35887
SMASH Issue 406576
bnc#1224663
https://git.kernel.org/stable/c/74204bf9050f7627aead9875fe4e07ba125cb19b
https://git.kernel.org/stable/c/c6a368f9c7af4c14b14d390c2543af8001c9bdb9
https://git.kernel.org/stable/c/fd819ad3ecf6f3c232a06b27423ce9ed8c20da89
jsc#CAR-3720
rh#2281695
CVE-2024-35888kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35888
SMASH Issue 406577
bnc#1224518
https://git.kernel.org/stable/c/06a939f72a24a7d8251f84cf4c042df86c6666ac
https://git.kernel.org/stable/c/0ac328a5a4138a6c03dfc3f46017bd5c19167446
https://git.kernel.org/stable/c/17af420545a750f763025149fa7b833a4fc8b8f0
https://git.kernel.org/stable/c/1db7fcb2b290c47c202b79528824f119fa28937d
https://git.kernel.org/stable/c/4e3fdeecec5707678b0d1f18c259dadb97262e9d
https://git.kernel.org/stable/c/b14b9f9503ec823ca75be766dcaeff4f0bfeca85
https://git.kernel.org/stable/c/e54a0c79cdc2548729dd7e2e468b08c5af4d0df5
https://git.kernel.org/stable/c/ee0088101beee10fa809716d6245d915b09c37c7
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3473
rh#2281693
CVE-2024-35893kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35893
SMASH Issue 406582
bnc#1224512
https://git.kernel.org/stable/c/55d3fe7b2b7bc354e7cbc1f7b8f98a29ccd5a366
https://git.kernel.org/stable/c/5e45dc4408857305f4685abfd7a528a1e58b51b5
https://git.kernel.org/stable/c/729ad2ac2a2cdc9f4a4bdfd40bfd276e6bc33924
https://git.kernel.org/stable/c/7bb2c7103d8c13b06a57bf997b8cdbe93cd7283c
https://git.kernel.org/stable/c/a097fc199ab5f4b5392c5144034c0d2148b55a14
https://git.kernel.org/stable/c/d313eb8b77557a6d5855f42d2234bd592c7b50dd
https://git.kernel.org/stable/c/f190a4aa03cbd518bd9c62a66e1233984f5fd2ec
https://git.kernel.org/stable/c/f356eb2fb567e0931143ac1769ac802d3b3e2077
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3478
rh#2281682
CVE-2024-35898kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35898
SMASH Issue 406587
bnc#1224498
https://git.kernel.org/stable/c/24225011d81b471acc0e1e315b7d9905459a6304
https://git.kernel.org/stable/c/2485bcfe05ee3cf9ca8923a94fa2e456924c79c8
https://git.kernel.org/stable/c/69d1fe14a680042ec913f22196b58e2c8ff1b007
https://git.kernel.org/stable/c/8b891153b2e4dc0ca9d9dab8f619d49c740813df
https://git.kernel.org/stable/c/940d41caa71f0d3a52df2fde5fada524a993e331
https://git.kernel.org/stable/c/9b5b7708ec2be21dd7ef8ca0e3abe4ae9f3b083b
https://git.kernel.org/stable/c/a347bc8e6251eaee4b619da28020641eb5b0dd77
https://git.kernel.org/stable/c/e684b1674fd1ca4361812a491242ae871d6b2859
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3470
rh#2281669
CVE-2024-35899kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35899
SMASH Issue 406588
bnc#1224499
https://git.kernel.org/stable/c/24cea9677025e0de419989ecb692acd4bb34cac2
https://git.kernel.org/stable/c/333b5085522cf1898d5a0d92616046b414f631a7
https://git.kernel.org/stable/c/46c4481938e2ca62343b16ea83ab28f4c1733d31
https://git.kernel.org/stable/c/4e8447a9a3d367b5065a0b7abe101da6e0037b6e
https://git.kernel.org/stable/c/d2c9eb19fc3b11caebafde4c30a76a49203d18a6
https://git.kernel.org/stable/c/f4e14695fe805eb0f0cb36e0ad6a560b9f985e86
https://git.kernel.org/stable/c/f7e3c88cc2a977c2b9a8aa52c1ce689e7b394e49
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3475
rh#2281667
CVE-2024-35904kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35904
OSS:2024/05/30/1
OSS:2024/05/30/2
OSS:2024/Q2/263
SMASH Issue 406593
bnc#1224494
https://git.kernel.org/stable/c/37801a36b4d68892ce807264f784d818f8d0d39b
https://git.kernel.org/stable/c/477ed6789eb9f3f4d3568bb977f90c863c12724e
https://git.kernel.org/stable/c/68784a5d01b8868ff85a7926676b6729715fff3c
jsc#CAR-3469
rh#2281655
CVE-2024-35910kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35910
SMASH Issue 406599
bnc#1224489
https://git.kernel.org/stable/c/151c9c724d05d5b0dd8acd3e11cb69ef1f2dbada
https://git.kernel.org/stable/c/2e43d8eba6edd1cf05a3a20fdd77688fa7ec16a4
https://git.kernel.org/stable/c/44e62f5d35678686734afd47c6a421ad30772e7f
https://git.kernel.org/stable/c/899265c1389fe022802aae73dbf13ee08837a35a
https://git.kernel.org/stable/c/91b243de910a9ac8476d40238ab3dbfeedd5b7de
https://git.kernel.org/stable/c/93f0133b9d589cc6e865f254ad9be3e9d8133f50
https://git.kernel.org/stable/c/c1ae4d1e76eacddaacb958b67cd942082f800c87
https://git.kernel.org/stable/c/e3e27d2b446deb1f643758a0c4731f5c22492810
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3468
rh#2281641
CVE-2024-35915kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35915
SMASH Issue 406604
bnc#1224479
https://git.kernel.org/stable/c/03fe259649a551d336a7f20919b641ea100e3fff
https://git.kernel.org/stable/c/11387b2effbb55f58dc2111ef4b4b896f2756240
https://git.kernel.org/stable/c/755e53bbc61bc1aff90eafa64c8c2464fd3dfa3c
https://git.kernel.org/stable/c/8948e30de81faee87eeee01ef42a1f6008f5a83a
https://git.kernel.org/stable/c/a946ebee45b09294c8b0b0e77410b763c4d2817a
https://git.kernel.org/stable/c/ac68d9fa09e410fa3ed20fb721d56aa558695e16
https://git.kernel.org/stable/c/b51ec7fc9f877ef869c01d3ea6f18f6a64e831a7
https://git.kernel.org/stable/c/d24b03535e5eb82e025219c2f632b485409c898f
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3467
rh#2281630
CVE-2024-35922kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35922
SMASH Issue 406612
bnc#1224660
https://git.kernel.org/stable/c/1b107d637fed68a787da77a3514ad06e57abd0b4
https://git.kernel.org/stable/c/1fb52bc1de55e9e0bdf71fe078efd4da0889710f
https://git.kernel.org/stable/c/3d4b909704bf2114f64f87363fa22b5ef8ac4a33
https://git.kernel.org/stable/c/48d6bcfc31751ca2e753d901a2d82f27edf8a029
https://git.kernel.org/stable/c/664206ff8b019bcd1e55b10b2eea3add8761b971
https://git.kernel.org/stable/c/72d091b7515e0532ee015e144c906f3bcfdd6270
https://git.kernel.org/stable/c/951838fee462aa01fa2a6a91d56f9a495082e7f0
https://git.kernel.org/stable/c/c2d953276b8b27459baed1277a4fdd5dd9bd4126
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3638
rh#2281766
CVE-2024-35925kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35925
SMASH Issue 406615
bnc#1224661
https://git.kernel.org/stable/c/21e7d72d0cfcbae6042d498ea2e6f395311767f8
https://git.kernel.org/stable/c/512a01da7134bac8f8b373506011e8aaa3283854
https://git.kernel.org/stable/c/5f7fd6aa4c4877d77133ea86c14cf256f390b2fe
https://git.kernel.org/stable/c/6a55dab4ac956deb23690eedd74e70b892a378e7
https://git.kernel.org/stable/c/93f52fbeaf4b676b21acfe42a5152620e6770d02
https://git.kernel.org/stable/c/98ddf2604ade2d954bf5ec193600d5274a43fd68
https://git.kernel.org/stable/c/b0cb5564c3e8e0ee0a2d28c86fa7f02e82d64c3c
https://git.kernel.org/stable/c/edd073c78d2bf48c5b8bf435bbc3d61d6e7c6c14
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3721
rh#2281752
CVE-2024-35927kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35927
SMASH Issue 406617
bnc#1224654
https://git.kernel.org/stable/c/18451798f4a4e7418b9fad7e7dd313fe84b1f545
https://git.kernel.org/stable/c/3d1b47e3a935abd4f258a945db87e7267ff4079c
https://git.kernel.org/stable/c/4ad8d57d902fbc7c82507cfc1b031f3a07c3de6e
https://git.kernel.org/stable/c/5abffb66d12bcac84bf7b66389c571b8bb6e82bd
https://git.kernel.org/stable/c/786c27982a39d79cc753f84229eb5977ac8ef1c1
jsc#CAR-3636
rh#2281526
CVE-2024-35930kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35930
SMASH Issue 406620
bnc#1224651
https://git.kernel.org/stable/c/07a2aa674fca679316b8ac51440adb895b53a7cf
https://git.kernel.org/stable/c/2ae917d4bcab80ab304b774d492e2fcd6c52c06b
https://git.kernel.org/stable/c/3320126ed3afbc11934502319b340f91a4d61c8f
https://git.kernel.org/stable/c/7849e6f8410da96384e3d1f6b6d730f095142dc7
https://git.kernel.org/stable/c/c473288f27d15014447de5a891bdf22a0695847a
https://git.kernel.org/stable/c/e2cd32435b1dff3d63759476a3abc878e02fb6c8
https://git.kernel.org/stable/c/edf82aa7e9eb864a09229392054d131b34a5c9e8
https://git.kernel.org/stable/c/ee0b5f96b6d66a1e6698228dcb41df11ec7f352f
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3524
rh#2281519
CVE-2024-35933kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35933
SMASH Issue 406623
bnc#1224640
https://git.kernel.org/stable/c/006936ecb4edfc3102464044f75858c714e34d28
https://git.kernel.org/stable/c/22d3053ef05f0b5045e45bd91e7473846261d65e
https://git.kernel.org/stable/c/68a69bb2ecafaacdb998a87783068fb51736f43b
https://git.kernel.org/stable/c/86e9b47e8a75c74b1bd83a479979b425c5dc8bd9
https://git.kernel.org/stable/c/b19fe5eea619d54eea59bb8a37c0f8d00ef0e912
https://git.kernel.org/stable/c/b79e040910101b020931ba0c9a6b77e81ab7f645
https://git.kernel.org/stable/c/ec2049fb2b8be3e108fe2ef1f1040f91e72c9990
https://git.kernel.org/stable/c/ffdca0a62abaf8c41d8d9ea132000fd808de329b
jsc#CAR-3523
rh#2281829
CVE-2024-35935kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35935
SMASH Issue 406625
bnc#1224645
https://git.kernel.org/stable/c/024529c27c8b4b273325a169e078337c8279e229
https://git.kernel.org/stable/c/03938619a1e718b6168ae4528e1b0f979293f1a5
https://git.kernel.org/stable/c/2f6174fd4ccf403b42b3d5f0d1b6b496a0e5330a
https://git.kernel.org/stable/c/3c6ee34c6f9cd12802326da26631232a61743501
https://git.kernel.org/stable/c/4720d590c4cb5d9ffa0060b89743651cc7e995f9
https://git.kernel.org/stable/c/9ae356c627b493323e1433dcb27a26917668c07c
https://git.kernel.org/stable/c/be2b6bcc936ae17f42fff6494106a5660b35d8d3
https://git.kernel.org/stable/c/c1363ed8867b81ea169fba2ccc14af96a85ed183
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3529
rh#2281825
CVE-2024-35936kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35936
SMASH Issue 406626
bnc#1224644
https://git.kernel.org/stable/c/0d23b34c68c46cd225b55868bc8a269e3134816d
https://git.kernel.org/stable/c/1f9212cdbd005bc55f2b7422e7b560d9c02bd1da
https://git.kernel.org/stable/c/36c2a2863bc3896243eb724dc3fd4cf9aea633f2
https://git.kernel.org/stable/c/576164bd01bd795f8b09fb194b493103506b33c9
https://git.kernel.org/stable/c/7411055db5ce64f836aaffd422396af0075fdc99
https://git.kernel.org/stable/c/87299cdaae757f3f41212146cfb5b3af416b8385
https://git.kernel.org/stable/c/bebd9e0ff90034875c5dfe4bd514fd7055fc7a89
https://git.kernel.org/stable/c/d1ffa4ae2d591fdd40471074e79954ec45f147f7
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3527
rh#2281823
CVE-2024-35937kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2024-35937
SMASH Issue 406627
bnc#1224526
https://git.kernel.org/stable/c/16da1e1dac23be45ef6e23c41b1508c400e6c544
https://git.kernel.org/stable/c/5d7a8585fbb31e88fb2a0f581b70667d3300d1e9
https://git.kernel.org/stable/c/9ad7974856926129f190ffbe3beea78460b3b7cc
jsc#CAR-3474
rh#2281821
CVE-2024-35944kernel-source-rt:Affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L)CVE-2024-35944
SMASH Issue 406634
bnc#1224648
https://git.kernel.org/stable/c/130b0cd064874e0d0f58e18fb00e6f3993e90c74
https://git.kernel.org/stable/c/19b070fefd0d024af3daa7329cbc0d00de5302ec
https://git.kernel.org/stable/c/491a1eb07c2bd8841d63cb5263455e185be5866f
https://git.kernel.org/stable/c/ad78c5047dc4076d0b3c4fad4f42ffe9c86e8100
https://git.kernel.org/stable/c/dae70a57565686f16089737adb8ac64471570f73
https://git.kernel.org/stable/c/e87bb99d2df6512d8ee37a5d63d2ca9a39a8c051
https://git.kernel.org/stable/c/f15eca95138b3d4ec17b63c3c1937b0aa0d3624b
https://git.kernel.org/stable/c/feacd430b42bbfa9ab3ed9e4f38b86c43e348c75
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3530
rh#2281807
CVE-2024-35945kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35945
SMASH Issue 406635
bnc#1224639
https://git.kernel.org/stable/c/3419ee39e3d3162ab2ec9942bb537613ed5b6311
https://git.kernel.org/stable/c/61c81872815f46006982bb80460c0c80a949b35b
https://git.kernel.org/stable/c/7a71f61ebf95cedd3f245db6da397822971d8db5
jsc#CAR-3495
rh#2281785
CVE-2024-35950kernel-source-rt:Affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-35950
SMASH Issue 406679
bnc#1224703
bnc#1225310
https://git.kernel.org/stable/c/04e018bd913d3d3336ab7d21c2ad31a9175fe984
https://git.kernel.org/stable/c/18c8cc6680ce938d0458859b6a08b4d34f7d8055
https://git.kernel.org/stable/c/3eadd887dbac1df8f25f701e5d404d1b90fd0fea
https://git.kernel.org/stable/c/41586487769eede64ab1aa6c65c74cbf76c12ef0
https://git.kernel.org/stable/c/5a2f957e3c4553bbb100504a1acfeaeb33f4ca4e
https://git.kernel.org/stable/c/8ceb873d816786a7c8058f50d903574aff8d3764
https://git.kernel.org/stable/c/d2dc6600d4e3e1453e3b1fb233e9f97e2a1ae949
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3639
rh#2281942
CVE-2024-35995kernel-source-rt:Affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2024-35995
SMASH Issue 406724
bnc#1224557
https://git.kernel.org/stable/c/01fc53be672acae37e611c80cc0b4f3939584de3
https://git.kernel.org/stable/c/1b890ae474d19800a6be1696df7fb4d9a41676e4
https://git.kernel.org/stable/c/2f4a4d63a193be6fd530d180bb13c3592052904c
https://git.kernel.org/stable/c/4949affd5288b867cdf115f5b08d6166b2027f87
https://git.kernel.org/stable/c/6cb6b12b78dcd8867a3fdbb1b6d0ed1df2b208d1
https://git.kernel.org/stable/c/6dfd79ed04c578f1d9a9a41ba5b2015cf9f03fc3
https://git.kernel.org/stable/c/b54c4632946ae42f2b39ed38abd909bbf78cbcc2
jsc#CAR-3516
rh#2282088
CVE-2024-36016kernel-source-rt:Affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2024-36016
SMASH Issue 408094
bnc#1225642
https://git.kernel.org/stable/c/0fb736c9931e02dbc7d9a75044c8e1c039e50f04
https://git.kernel.org/stable/c/46f52c89a7e7d2691b97a9728e4591d071ca8abc
https://git.kernel.org/stable/c/47388e807f85948eefc403a8a5fdc5b406a65d5a
https://git.kernel.org/stable/c/4c267110fc110390704cc065edb9817fdd10ff54
https://git.kernel.org/stable/c/774d83b008eccb1c48c14dc5486e7aa255731350
https://git.kernel.org/stable/c/9513d4148950b05bc99fa7314dc883cc0e1605e5
https://git.kernel.org/stable/c/b229bc6c6ea9fe459fc3fa94fd0a27a2f32aca56
https://git.kernel.org/stable/c/b890d45aaf02b564e6cae2d2a590f9649330857d
https://git.kernel.org/stable/c/f126ce7305fe88f49cdabc6db4168b9318898ea3
jsc#CAR-3735
rh#2283894
CVE-2024-36017kernel-source-rt:Affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2024-36017
SMASH Issue 408137
bnc#1225681
https://git.kernel.org/stable/c/1aec77b2bb2ed1db0f5efc61c4c1ca3813307489
https://git.kernel.org/stable/c/206003c748b88890a910ef7142d18f77be57550b
https://git.kernel.org/stable/c/4a4b9757789a1551d2df130df23bfb3545bfa7e8
https://git.kernel.org/stable/c/5e7ef2d88666a0212db8c38e6703864b9ce70169
https://git.kernel.org/stable/c/6c8f44b02500c7d14b5e6618fe4ef9a0da47b3de
https://git.kernel.org/stable/c/6e4c7193954f4faab92f6e8d88bc5565317b44e7
https://git.kernel.org/stable/c/8ac69ff2d0d5be9734c4402de932aa3dc8549c1a
https://git.kernel.org/stable/c/f3c1bf3054f96ddeab0621d920445bada769b40e
jsc#CAR-3740
rh#2284417
CVE-2024-36025kernel-source-rt:Affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L)CVE-2024-36025
SMASH Issue 408154
bnc#1225704
https://git.kernel.org/stable/c/4406e4176f47177f5e51b4cc7e6a7a2ff3dbfbbd
https://git.kernel.org/stable/c/60b87b5ecbe07d70897d35947b0bb3e76ccd1b3a
https://git.kernel.org/stable/c/8c820f7c8e9b46238d277c575392fe9930207aab
https://git.kernel.org/stable/c/9fc74e367be4247a5ac39bb8ec41eaa73fade510
https://git.kernel.org/stable/c/ea8ac95c22c93acecb710209a7fd10b851afe817
jsc#CAR-3744
rh#2284421
CVE-2024-36029kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36029
SMASH Issue 408192
bnc#1225708
https://git.kernel.org/stable/c/1200481cd6069d16ce20133bcd86f5825e26a045
https://git.kernel.org/stable/c/56b99a52229d7f8cd1f53d899f57aa7eb4b199af
https://git.kernel.org/stable/c/a957ea5aa3d3518067a1ba32c6127322ad348d20
https://git.kernel.org/stable/c/f653b04a818c490b045c97834d559911479aa1c5
https://git.kernel.org/stable/c/f8def10f73a516b771051a2f70f2f0446902cb4f
jsc#CAR-3745
rh#2284411
CVE-2024-36244kernel-source-rt:Affectedlow3.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L)CVE-2024-36244
SMASH Issue 411744
bnc#1226797
https://git.kernel.org/stable/c/91f249b01fe490fce11fbb4307952ca8cce78724
https://git.kernel.org/stable/c/b939d1e04a90248b4cdf417b0969c270ceb992b2
https://git.kernel.org/stable/c/fb66df20a7201e60f2b13d7f95d031b31a8831d3
jsc#CAR-3852
rh#2293654
CVE-2024-36270kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36270
SMASH Issue 411745
bnc#1226798
https://git.kernel.org/stable/c/07eeedafc59c45fe5de43958128542be3784764c
https://git.kernel.org/stable/c/10f0af5234dafd03d2b75233428ec3f11cf7e43d
https://git.kernel.org/stable/c/21a673bddc8fd4873c370caf9ae70ffc6d47e8d3
https://git.kernel.org/stable/c/570b4c52096e62fda562448f5760fd0ff06110f0
https://git.kernel.org/stable/c/6fe5af4ff06db3d4d80e07a19356640428159f03
https://git.kernel.org/stable/c/819bfeca16eb9ad647ddcae25e7e12c30612147c
https://git.kernel.org/stable/c/caf3a8afb5ea00db6d5398adf148d5534615fd80
jsc#CAR-3853
rh#2293653
CVE-2024-36286kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2024-36286
SMASH Issue 411747
bnc#1226801
https://git.kernel.org/stable/c/215df6490e208bfdd5b3012f5075e7f8736f3e7a
https://git.kernel.org/stable/c/25ea5377e3d2921a0f96ae2551f5ab1b36825dd4
https://git.kernel.org/stable/c/3989b817857f4890fab9379221a9d3f52bf5c256
https://git.kernel.org/stable/c/68f40354a3851df46c27be96b84f11ae193e36c5
https://git.kernel.org/stable/c/8658bd777cbfcb0c13df23d0ea120e70517761b9
https://git.kernel.org/stable/c/8f365564af898819a523f1a8cf5c6ce053e9f718
https://git.kernel.org/stable/c/dc21c6cc3d6986d938efbf95de62473982c98dec
https://git.kernel.org/stable/c/e01065b339e323b3dfa1be217fd89e9b3208b0ab
jsc#CAR-3854
rh#2293711
CVE-2024-36479kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36479
SMASH Issue 411967
bnc#1226949
https://git.kernel.org/stable/c/1da11f822042eb6ef4b6064dc048f157a7852529
https://git.kernel.org/stable/c/6896b6b2e2d9ec4e1b0acb4c1698a75a4b34d125
https://git.kernel.org/stable/c/d7c4081c54a1d4068de9440957303a76f9e5c95b
jsc#CAR-3883
rh#2294212
CVE-2024-36880kernel-source-rt:Affectedmoderate6.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L)CVE-2024-36880
SMASH Issue 408210
bnc#1225722
https://git.kernel.org/stable/c/02f05ed44b71152d5e11d29be28aed91c0489b4e
https://git.kernel.org/stable/c/1caceadfb50432dbf6d808796cb6c34ebb6d662c
https://git.kernel.org/stable/c/2e4edfa1e2bd821a317e7d006517dcf2f3fac68d
https://git.kernel.org/stable/c/427281f9498ed614f9aabc80e46ec077c487da6d
https://git.kernel.org/stable/c/ed53949cc92e28aaa3463d246942bda1fbb7f307
jsc#CAR-3748
rh#2284280
CVE-2024-36883kernel-source-rt:Affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2024-36883
SMASH Issue 408160
bnc#1225725
https://git.kernel.org/stable/c/0c3248bc708a7797be573214065cf908ff1f54c7
https://git.kernel.org/stable/c/2d60ff5874aefd006717ca5e22ac1e25eac29c42
https://git.kernel.org/stable/c/3cdc34d76c4f777579e28ad373979d36c030cfd3
https://git.kernel.org/stable/c/7b0e64583eab8c1d896b47e5dd0bf2e7d86ec41f
https://git.kernel.org/stable/c/9518b79bfd2fbf99fa9b7e8e36bcb1825e7ba030
https://git.kernel.org/stable/c/a26ff37e624d12e28077e5b24d2b264f62764ad6
https://git.kernel.org/stable/c/b6dbfd5bcc267a95a0bf1bf96af46243f96ec6cd
https://git.kernel.org/stable/c/f4f94587e1bf87cb40ec33955a9d90148dd026ab
jsc#CAR-3749
rh#2284271
CVE-2024-36886kernel-source-rt:Affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2024-36886
SMASH Issue 408159
ZDI-24-821
bnc#1225730
https://git.kernel.org/stable/c/080cbb890286cd794f1ee788bbc5463e2deb7c2b
https://git.kernel.org/stable/c/21ea04aad8a0839b4ec27ef1691ca480620e8e14
https://git.kernel.org/stable/c/367766ff9e407f8a68409b7ce4dc4d5a72afeab1
https://git.kernel.org/stable/c/66116556076f0b96bc1aa9844008c743c8c67684
https://git.kernel.org/stable/c/93bc2d6d16f2c3178736ba6b845b30475856dc40
https://git.kernel.org/stable/c/a0fbb26f8247e326a320e2cb4395bfb234332c90
https://git.kernel.org/stable/c/e19ec8ab0e25bc4803d7cc91c84e84532e2781bd
https://git.kernel.org/stable/c/ffd4917c1edb3c3ff334fce3704fbe9c39f35682
jsc#CAR-3750
rh#2277238
rh#2284262
CVE-2024-36894kernel-source-rt:Affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-36894
SMASH Issue 408235
bnc#1225749
bnc#1226139
https://git.kernel.org/stable/c/24729b307eefcd7c476065cd7351c1a018082c19
https://git.kernel.org/stable/c/73c05ad46bb4fbbdb346004651576d1c8dbcffbb
https://git.kernel.org/stable/c/a0fdccb1c9e027e3195f947f61aa87d6d0d2ea14
https://git.kernel.org/stable/c/d7461830823242702f5d84084bcccb25159003f4
jsc#CAR-3756
rh#2284561
CVE-2024-36901kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36901
SMASH Issue 408186
bnc#1225711
https://git.kernel.org/stable/c/4db783d68b9b39a411a96096c10828ff5dfada7a
https://git.kernel.org/stable/c/55f7eb4001ef2a3b48cf039cf263f9ed0ec5a488
https://git.kernel.org/stable/c/e31b25cc2066d3f2b6c38579253882008d4469b0
https://git.kernel.org/stable/c/ea0cb87402f774b0e1214ffba0f57028b27cf155
jsc#CAR-3746
rh#2284634
CVE-2024-36902kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36902
SMASH Issue 408142
bnc#1225719
https://git.kernel.org/stable/c/1876881c9a49613b5249fb400cbf53412d90cb09
https://git.kernel.org/stable/c/35297fc68de36826087e976f86a5b1f94fd0bf95
https://git.kernel.org/stable/c/4a5a573387da6a6b23a4cc62147453ff1bc32afa
https://git.kernel.org/stable/c/674c951ab8a23f7aff9b4c3f2f865901bc76a290
https://git.kernel.org/stable/c/7e3242c139c38e60844638e394c2877b16b396b0
https://git.kernel.org/stable/c/8745a8d74ba17dafe72b6ab461fa6c007d879747
https://git.kernel.org/stable/c/d101291b2681e5ab938554e3e323f7a7ee33e3aa
https://git.kernel.org/stable/c/ddec23f206a944c73bcc2724358b85388837daff
jsc#CAR-3747
rh#2284545
CVE-2024-36904kernel-source-rt:Affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-36904
SMASH Issue 408180
bnc#1225732
bnc#1225733
https://git.kernel.org/stable/c/13ed7cdf079686ccd3618335205700c03f6fb446
https://git.kernel.org/stable/c/1796ca9c6f5bd50554214053af5f47d112818ee3
https://git.kernel.org/stable/c/1d9cf07810c30ef7948879567d10fd1f01121d34
https://git.kernel.org/stable/c/27b0284d8be182a81feb65581ab6a724dfd596e8
https://git.kernel.org/stable/c/517e32ea0a8c72202d0d8aa8df50a7cd3d6fdefc
https://git.kernel.org/stable/c/6e48faad92be13166184d21506e4e54c79c13adc
https://git.kernel.org/stable/c/84546cc1aeeb4df3e444b18a4293c9823f974be9
https://git.kernel.org/stable/c/f2db7230f73a80dbb179deab78f88a7947f0ab7e
jsc#CAR-3751
rh#2284541
CVE-2024-36905kernel-source-rt:Affectedmoderate5.6 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)CVE-2024-36905
SMASH Issue 408184
bnc#1225742
https://git.kernel.org/stable/c/2552c9d9440f8e7a2ed0660911ff00f25b90a0a4
https://git.kernel.org/stable/c/34e41a031fd7523bf1cd00a2adca2370aebea270
https://git.kernel.org/stable/c/3fe4ef0568a48369b1891395d13ac593b1ba41b1
https://git.kernel.org/stable/c/413c33b9f3bc36fdf719690a78824db9f88a9485
https://git.kernel.org/stable/c/94062790aedb505bdda209b10bea47b294d6394f
https://git.kernel.org/stable/c/cbf232ba11bc86a5281b4f00e1151349ef4d45cf
https://git.kernel.org/stable/c/ed5e279b69e007ce6c0fe82a5a534c1b19783214
https://git.kernel.org/stable/c/f47d0d32fa94e815fdd78b8b88684873e67939f4
jsc#CAR-3755
rh#2284539
CVE-2024-36909kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2024-36909
SMASH Issue 408162
bnc#1225744
https://git.kernel.org/stable/c/2f622008bf784a9f5dd17baa19223cc2ac30a039
https://git.kernel.org/stable/c/30d18df6567be09c1433e81993e35e3da573ac48
https://git.kernel.org/stable/c/82f9e213b124a7d2bb5b16ea35d570260ef467e0
https://git.kernel.org/stable/c/a9212a4e2963a7fbe3864ba33dc551d4ad8d0abb
jsc#CAR-3757
rh#2284615
CVE-2024-36910kernel-source-rt:Affectedmoderate6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N)CVE-2024-36910
SMASH Issue 408198
bnc#1225717
https://git.kernel.org/stable/c/3d788b2fbe6a1a1a9e3db09742b90809d51638b7
https://git.kernel.org/stable/c/6466a0f6d235c8a18c602cb587160d7e49876db9
https://git.kernel.org/stable/c/dabf12bf994318d939f70d47cfda30e47abb2c54
https://git.kernel.org/stable/c/fe2c58602354fbd60680dc42ac3a0b772cda7d23
jsc#CAR-3778
rh#2284534
CVE-2024-36911kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2024-36911
SMASH Issue 408227
bnc#1225745
https://git.kernel.org/stable/c/4aaed9dbe8acd2b6114458f0498a617283d6275b
https://git.kernel.org/stable/c/a56fe611326332bf6b7126e5559590c57dcebad4
https://git.kernel.org/stable/c/bbf9ac34677b57506a13682b31a2a718934c0e31
jsc#CAR-3758
rh#2284531
CVE-2024-36914kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36914
SMASH Issue 408182
bnc#1225757
https://git.kernel.org/stable/c/951a498fa993c5501994ec2df97c9297b02488c7
https://git.kernel.org/stable/c/e9baa7110e9f3756bd5a812af376c288d9be894d
https://git.kernel.org/stable/c/ecedd99a9369fb5cde601ae9abd58bca2739f1ae
jsc#CAR-3759
rh#2284525
CVE-2024-36917kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36917
SMASH Issue 408214
bnc#1225770
https://git.kernel.org/stable/c/22d24a544b0d49bbcbd61c8c0eaf77d3c9297155
https://git.kernel.org/stable/c/507d526a98c355e6f3fb2c47aacad44a69784bee
https://git.kernel.org/stable/c/8a26198186e97ee5fc4b42fde82629cff8c75cd6
https://git.kernel.org/stable/c/e1d38cde2b7b0fbd1c48082e7a98c37d750af59b
jsc#CAR-3763
rh#2284519
CVE-2024-36919kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36919
SMASH Issue 408223
bnc#1225767
https://git.kernel.org/stable/c/1150606d47d711d5bfdf329a1a96ed7027085936
https://git.kernel.org/stable/c/468f3e3c15076338367b0945b041105b67cf31e3
https://git.kernel.org/stable/c/93aa5ccc44781bdfef1bf0bc4c2c292d45251312
https://git.kernel.org/stable/c/acd370c1fb86b7302c1cbb354a7c1cd9953768eb
https://git.kernel.org/stable/c/ad498539dda0816aadef384ec117bfea304c75c3
https://git.kernel.org/stable/c/c214ed2a4dda35b308b0b28eed804d7ae66401f9
https://git.kernel.org/stable/c/c885ab23206b1f1ba0731ffe7c9455c6a91db256
https://git.kernel.org/stable/c/ea50941cd8c9f0b12f38b73d3b1bfeca660dd342
jsc#CAR-3762
rh#2284630
CVE-2024-36923kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2024-36923
SMASH Issue 408231
bnc#1225815
https://git.kernel.org/stable/c/1b4cb6e91f19b81217ad98142ee53a1ab25893fd
https://git.kernel.org/stable/c/6630036b7c228f57c7893ee0403e92c2db2cd21d
jsc#CAR-3765
rh#2284509
CVE-2024-36924kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36924
SMASH Issue 408200
bnc#1225820
https://git.kernel.org/stable/c/6503c39398506cadda9f4c81695a9655ca5fb4fd
https://git.kernel.org/stable/c/ded20192dff31c91cef2a04f7e20e60e9bb887d3
https://git.kernel.org/stable/c/e8bf2c05e8ad68e90f9d5889a9e4ef3f6fe00683
https://git.kernel.org/stable/c/ee833d7e62de2b84ed1332d501b67f12e7e5678f
jsc#CAR-3766
rh#2284506
CVE-2024-36933kernel-source-rt:Affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2024-36933
SMASH Issue 408176
bnc#1225832
https://git.kernel.org/stable/c/29a07f2ee4d273760c2acbfc756e29eccd82470a
https://git.kernel.org/stable/c/37ed6f244ec5bda2e90b085084e322ea55d0aaa2
https://git.kernel.org/stable/c/46134031c20fd313d03b90169d64b2e05ca6b65c
https://git.kernel.org/stable/c/4b911a9690d72641879ea6d13cce1de31d346d79
https://git.kernel.org/stable/c/5a4603fbc285752d19e4b415466db18ef3617e4a
https://git.kernel.org/stable/c/696d18bb59727a2e0526c0802a812620be1c9340
https://git.kernel.org/stable/c/a7c2c3c1caabcb4a3d6c47284c397507aaf54fe9
https://git.kernel.org/stable/c/bbccf0caef2fa917d6d0692385a06ce3c262a216
jsc#CAR-3767
rh#2284488
CVE-2024-36934kernel-source-rt:Affectedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L)CVE-2024-36934
SMASH Issue 408206
bnc#1225760
https://git.kernel.org/stable/c/06cb37e2ba6441888f24566a997481d4197b4e32
https://git.kernel.org/stable/c/0f560240b4cc25d3de527deb257cdf072c0102a9
https://git.kernel.org/stable/c/1518b2b498a0109eb6b15755169d3b6607356b35
https://git.kernel.org/stable/c/6f0f19b79c085cc891c418b768f26f7004bd51a4
https://git.kernel.org/stable/c/80578ec10335bc15ac35fd1703c22aab34e39fdd
https://git.kernel.org/stable/c/8c34096c7fdf272fd4c0c37fe411cd2e3ed0ee9f
https://git.kernel.org/stable/c/bd502ba81cd1d515deddad7dbc6b812b14b97147
https://git.kernel.org/stable/c/e19478763154674c084defc62ae0d64d79657f91
jsc#CAR-3760
rh#2284486
CVE-2024-36938kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36938
SMASH Issue 408172
bnc#1225761
https://git.kernel.org/stable/c/39dc9e1442385d6e9be0b6491ee488dddd55ae27
https://git.kernel.org/stable/c/5965bc7535fb87510b724e5465ccc1a1cf00916d
https://git.kernel.org/stable/c/6648e613226e18897231ab5e42ffc29e63fa3365
https://git.kernel.org/stable/c/772d5729b5ff0df0d37b32db600ce635b2172f80
https://git.kernel.org/stable/c/b397a0ab8582c533ec0c6b732392f141fc364f87
jsc#CAR-3761
rh#2284479
CVE-2024-36940kernel-source-rt:Affectedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2024-36940
SMASH Issue 408164
bnc#1225840
bnc#1225841
https://git.kernel.org/stable/c/288bc4aa75f150d6f1ee82dd43c6da1b438b6068
https://git.kernel.org/stable/c/41f88ef8ba387a12f4a2b8c400b6c9e8e54b2cca
https://git.kernel.org/stable/c/5038a66dad0199de60e5671603ea6623eb9e5c79
https://git.kernel.org/stable/c/558c8039fdf596a584a92c171cbf3298919c448c
https://git.kernel.org/stable/c/735f4c6b6771eafe336404c157ca683ad72a040d
https://git.kernel.org/stable/c/ac7d65795827dc0cf7662384ed27caf4066bd72e
https://git.kernel.org/stable/c/cdaa171473d98962ae86f2a663d398fda2fbeefd
https://git.kernel.org/stable/c/f9f1e321d53e4c5b666b66e5b43da29841fb55ba
jsc#CAR-3769
rh#2284477
CVE-2024-36941kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36941
SMASH Issue 408199
bnc#1225835
https://git.kernel.org/stable/c/244822c09b4f9aedfb5977f03c0deeb39da8ec7d
https://git.kernel.org/stable/c/327382dc0f16b268950b96e0052595efd80f7b0a
https://git.kernel.org/stable/c/5a730a161ac2290d46d49be76b2b1aee8d2eb307
https://git.kernel.org/stable/c/801ea33ae82d6a9d954074fbcf8ea9d18f1543a7
https://git.kernel.org/stable/c/97792d0611ae2e6fe3ccefb0a94a1d802317c457
https://git.kernel.org/stable/c/ad12c74e953b68ad85c78adc6408ed8435c64af4
https://git.kernel.org/stable/c/b0db4caa10f2e4e811cf88744fbf0d074b67ec1f
https://git.kernel.org/stable/c/f92772a642485394db5c9a17bd0ee73fc6902383
jsc#CAR-3768
rh#2284474
CVE-2024-36944kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36944
SMASH Issue 408233
bnc#1225847
https://git.kernel.org/stable/c/148ed8b4d64f94ab079c8f0d88c3f444db97ba97
https://git.kernel.org/stable/c/3628e0383dd349f02f882e612ab6184e4bb3dc10
https://git.kernel.org/stable/c/3dfe35d8683daf9ba69278643efbabe40000bbf6
https://git.kernel.org/stable/c/4a89ac4b0921c4ea21eb1b4cf3a469a91bacfcea
https://git.kernel.org/stable/c/b548c53bc3ab83dc6fc86c8e840f013b2032267a
jsc#CAR-3770
rh#2284468
CVE-2024-36946kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2024-36946
SMASH Issue 408228
bnc#1225851
https://git.kernel.org/stable/c/4ff334cade9dae50e4be387f71e94fae634aa9b4
https://git.kernel.org/stable/c/728a83160f98ee6b60df0d890141b9b7240182fe
https://git.kernel.org/stable/c/9a77226440008cf04ba68faf641a2d50f4998137
https://git.kernel.org/stable/c/d8cac8568618dcb8a51af3db1103e8d4cc4aeea7
https://git.kernel.org/stable/c/dc6beac059f0331de97155a89d84058d4a9e49c7
https://git.kernel.org/stable/c/ec1f71c05caeba0f814df77e0f511d8b4618623a
https://git.kernel.org/stable/c/ee9e39a6cb3ca2a3d35b4ae25547ee3526a44d00
https://git.kernel.org/stable/c/f085e02f0a32f6dfcfabc6535c9c4a1707cef86b
jsc#CAR-3771
rh#2284463
CVE-2024-36949kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36949
SMASH Issue 408205
bnc#1225894
https://git.kernel.org/stable/c/b6f6626528fe724b512c34f3fb5946c36a135f58
https://git.kernel.org/stable/c/d06af584be5a769d124b7302b32a033e9559761d
https://git.kernel.org/stable/c/ed28ef3840bbf93a64376ea7814ce39f86352e14
jsc#CAR-3774
rh#2284456
CVE-2024-36950kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36950
SMASH Issue 408207
bnc#1225895
https://git.kernel.org/stable/c/31279bbca40d2f40cb3bbb6d538ec9620a645dec
https://git.kernel.org/stable/c/4f9cc355c328fc4f41cbd9c4cd58b235184fa420
https://git.kernel.org/stable/c/5982887de60c1b84f9c0ca07c835814d07fd1da0
https://git.kernel.org/stable/c/6fafe3661712b143d9c69a7322294bd53f559d5d
https://git.kernel.org/stable/c/752e3c53de0fa3b7d817a83050b6699b8e9c6ec9
https://git.kernel.org/stable/c/8643332aac0576581cfdf01798ea3e4e0d624b61
https://git.kernel.org/stable/c/b3948c69d60279fce5b2eeda92a07d66296c8130
https://git.kernel.org/stable/c/fa273f312334246c909475c5868e6daab889cc8c
jsc#CAR-3775
rh#2284625
CVE-2024-36951kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36951
SMASH Issue 408161
bnc#1225896
https://git.kernel.org/stable/c/0cac183b98d8a8c692c98e8dba37df15a9e9210d
https://git.kernel.org/stable/c/41dc6791596656dd41100b85647ed489e1d5c2f2
https://git.kernel.org/stable/c/b6735bfe941486c5dfc9c3085d2d75d4923f9449
jsc#CAR-3776
rh#2284600
CVE-2024-36952kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36952
SMASH Issue 408171
bnc#1225898
https://git.kernel.org/stable/c/0936809d968ecf81e0726fbd02ff2a5732d960c3
https://git.kernel.org/stable/c/4ddf01f2f1504fa08b766e8cfeec558e9f8eef6c
https://git.kernel.org/stable/c/718602cd15f4c5710850090ea3066a89eeb46278
https://git.kernel.org/stable/c/76337eb8daee32bcc67742efab3168ed4ca299d0
https://git.kernel.org/stable/c/f2c7f029051edc4b394bb48edbe2297575abefe0
jsc#CAR-3777
rh#2284598
CVE-2024-36953kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36953
SMASH Issue 408190
bnc#1225812
https://git.kernel.org/stable/c/01981276d64e542c177b243f7c979fee855d5487
https://git.kernel.org/stable/c/17db92da8be5dd3bf63c01f4109fe47db64fc66f
https://git.kernel.org/stable/c/3a5b0378ac6776c7c31b18e0f3c1389bd6005e80
https://git.kernel.org/stable/c/4404465a1bee3607ad90a4c5f9e16dfd75b85728
https://git.kernel.org/stable/c/6ddb4f372fc63210034b903d96ebbeb3c7195adb
https://git.kernel.org/stable/c/8d6a1c8e3de36cb0f5e866f1a582b00939e23104
jsc#CAR-3764
rh#2284596
CVE-2024-36960kernel-source-rt:Affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2024-36960
SMASH Issue 408458
bnc#1225872
https://git.kernel.org/stable/c/0dbfc73670b357456196130551e586345ca48e1b
https://git.kernel.org/stable/c/2f527e3efd37c7c5e85e8aa86308856b619fa59f
https://git.kernel.org/stable/c/3cd682357c6167f636aec8ac0efaa8ba61144d36
https://git.kernel.org/stable/c/7b5fd3af4a250dd0a2a558e07b43478748eb5d22
https://git.kernel.org/stable/c/a37ef7613c00f2d72c8fc08bd83fb6cc76926c8c
https://git.kernel.org/stable/c/b7bab33c4623c66e3398d5253870d4e88c52dfc0
https://git.kernel.org/stable/c/cef0962f2d3e5fd0660c8efb72321083a1b531a9
https://git.kernel.org/stable/c/deab66596dfad14f1c54eeefdb72428340d72a77
jsc#CAR-3773
rh#2290408
CVE-2024-36964kernel-source-rt:Affectedimportant7.2 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2024-36964
SMASH Issue 408455
bnc#1225866
bnc#1226325
https://git.kernel.org/stable/c/157d468e34fdd3cb1ddc07c2be32fb3b02826b02
https://git.kernel.org/stable/c/5a605930e19f451294bd838754f7d66c976a8a2c
https://git.kernel.org/stable/c/ad4f65328661392de74e3608bb736fedf3b67e32
https://git.kernel.org/stable/c/ca9b5c81f0c918c63d73d962ed8a8e231f840bc8
https://git.kernel.org/stable/c/cd25e15e57e68a6b18dc9323047fe9c68b99290b
https://git.kernel.org/stable/c/df1962a199783ecd66734d563caf0fedecf08f96
https://git.kernel.org/stable/c/e55c601af3b1223a84f9f27f9cdbd2af5e203bf3
https://git.kernel.org/stable/c/e90bc596a74bb905e0a45bf346038c3f9d1e868d
jsc#CAR-3772
rh#2290404
CVE-2024-36968kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36968
SMASH Issue 409723
bnc#1226130
https://git.kernel.org/stable/c/4d3dbaa252257d20611c3647290e6171f1bbd6c8
https://git.kernel.org/stable/c/a5b862c6a221459d54e494e88965b48dcfa6cc44
https://git.kernel.org/stable/c/ad3f7986c5a0f82b8b66a0afe1cc1f5421e1d674
https://git.kernel.org/stable/c/d2b2f7d3936dc5990549bc36ab7ac7ac37f22c30
https://git.kernel.org/stable/c/dfece2b4e3759759b2bdfac2cd6d0ee9fbf055f3
jsc#CAR-3783
rh#2292324
CVE-2024-36971kernel-source-rt:Affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-36971
SMASH Issue 409899
bnc#1226145
bnc#1226324
https://git.kernel.org/stable/c/051c0bde9f0450a2ec3d62a86d2a0d2fad117f13
https://git.kernel.org/stable/c/2295a7ef5c8c49241bff769e7826ef2582e532a6
https://git.kernel.org/stable/c/5af198c387128a9d2ddd620b0f0803564a4d4508
https://git.kernel.org/stable/c/81dd3c82a456b0015461754be7cb2693991421b4
https://git.kernel.org/stable/c/92f1655aa2b2294d0b49925f3b875a634bd3b59e
https://git.kernel.org/stable/c/b8af8e6118a6605f0e495a58d591ca94a85a50fc
https://git.kernel.org/stable/c/db0082825037794c5dba9959c9de13ca34cc5e72
https://git.kernel.org/stable/c/eacb8b195579c174a6d3e12a9690b206eb7f28cf
jsc#CAR-3784
rh#2292331
CVE-2024-36974kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-36974
SMASH Issue 411236
bnc#1226519
https://git.kernel.org/stable/c/0bf6cc96612bd396048f57d63f1ad454a846e39c
https://git.kernel.org/stable/c/724050ae4b76e4fae05a923cb54101d792cf4404
https://git.kernel.org/stable/c/c37a27a35eadb59286c9092c49c241270c802ae2
https://git.kernel.org/stable/c/f921a58ae20852d188f70842431ce6519c4fdc36
jsc#CAR-3787
rh#2293003
CVE-2024-36978kernel-source-rt:Affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L)CVE-2024-36978
SMASH Issue 411291
bnc#1226514
https://git.kernel.org/stable/c/0f208fad86631e005754606c3ec80c0d44a11882
https://git.kernel.org/stable/c/54c2c171c11a798fe887b3ff72922aa9d1411c1e
https://git.kernel.org/stable/c/affc18fdc694190ca7575b9a86632a73b9fe043d
https://git.kernel.org/stable/c/d6fb5110e8722bc00748f22caeb650fe4672f129
jsc#CAR-3786
rh#2293078
CVE-2024-37021kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-37021
SMASH Issue 411973
bnc#1226950
https://git.kernel.org/stable/c/2da62a139a6221a345db4eb9f4f1c4b0937c89ad
https://git.kernel.org/stable/c/4d4d2d4346857bf778fafaa97d6f76bb1663e3c9
https://git.kernel.org/stable/c/62ac496a01c9337a11362cea427038ba621ca9eb
jsc#CAR-3884
rh#2294211
CVE-2024-37078kernel-source-rt:Affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-37078
SMASH Issue 412079
bnc#1227066
https://git.kernel.org/stable/c/1f3bff69f1214fe03a02bc650d5bbfaa6e65ae7d
https://git.kernel.org/stable/c/271dcd977ccda8c7a26e360425ae7b4db7d2ecc0
https://git.kernel.org/stable/c/614d397be0cf43412b3f94a0f6460eddced8ce92
https://git.kernel.org/stable/c/a4ca369ca221bb7e06c725792ac107f0e48e82e7
jsc#CAR-3890
rh#2294285
CVE-2024-37353kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-37353
SMASH Issue 411751
bnc#1226875
bnc#1226877
https://git.kernel.org/stable/c/04207a9c64e0b16dac842e5b2ecfa53af25bdea7
https://git.kernel.org/stable/c/42d30da50d5c1ec433fd9551bfddd6887407c352
https://git.kernel.org/stable/c/43a9aaf63254ab821f0f25fea25698ebe69ea16a
https://git.kernel.org/stable/c/7fbe54f02a5c77ff5dd65e8ed0b58e3bd8c43e9c
https://git.kernel.org/stable/c/89875151fccdd024d571aa884ea97a0128b968b6
https://git.kernel.org/stable/c/abf001651acd1858252764fa39d79e3d0b5c86b2
https://git.kernel.org/stable/c/bb61a84793858330ba2ca1d202d3779096f6fb54
https://git.kernel.org/stable/c/cb7a7c8144b434e06aba99b13b045a7efe859587
jsc#CAR-3871
jsc#CAR-3872
jsc#CAR-3873
rh#2293686
CVE-2024-37356kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-37356
SMASH Issue 411752
bnc#1226833
https://git.kernel.org/stable/c/02261d3f9dc7d1d7be7d778f839e3404ab99034c
https://git.kernel.org/stable/c/06d0fe049b51b0a92a70df8333fd85c4ba3eb2c6
https://git.kernel.org/stable/c/237340dee373b97833a491d2e99fcf1d4a9adafd
https://git.kernel.org/stable/c/3ebc46ca8675de6378e3f8f40768e180bb8afa66
https://git.kernel.org/stable/c/6aacaa80d962f4916ccf90e2080306cec6c90fcf
https://git.kernel.org/stable/c/8602150286a2a860a1dc55cbd04f99316f19b40a
https://git.kernel.org/stable/c/e65d13ec00a738fa7661925fd5929ab3c765d4be
https://git.kernel.org/stable/c/e9b2f60636d18dfd0dd4965b3316f88dfd6a2b31
jsc#CAR-3855
rh#2293658
CVE-2024-37407libarchive:Affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2024-37407
SMASH Issue 409726
bnc#1226193
https://github.com/libarchive/libarchive/commit/b6a979481b7d77c12fa17bbed94576b63bbcb0c0
https://github.com/libarchive/libarchive/pull/2145
https://github.com/libarchive/libarchive/releases/tag/v3.7.4
jsc#CAR-3785
rh#2292307
CVE-2024-38538kernel-source-rt:Affectedmoderate4.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2024-38538
SMASH Issue 411378
bnc#1226606
https://git.kernel.org/stable/c/1abb371147905ba250b4cc0230c4be7e90bea4d5
https://git.kernel.org/stable/c/28126b83f86ab9cc7936029c2dff845d3dcedba2
https://git.kernel.org/stable/c/5b5d669f569807c7ab07546e73c0741845a2547a
https://git.kernel.org/stable/c/8bd67ebb50c0145fd2ca8681ab65eb7e8cde1afc
https://git.kernel.org/stable/c/f482fd4ce919836a49012b2d31b00fc36e2488f2
jsc#CAR-3802
rh#2293461
CVE-2024-38541kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-38541
SMASH Issue 411457
bnc#1226587
https://git.kernel.org/stable/c/0b0d5701a8bf02f8fee037e81aacf6746558bfd6
https://git.kernel.org/stable/c/cf7385cb26ac4f0ee6c7385960525ad534323252
https://git.kernel.org/stable/c/e45b69360a63165377b30db4a1dfddd89ca18e9a
https://git.kernel.org/stable/c/ee332023adfd5882808f2dabf037b32d6ce36f9e
jsc#CAR-3797
rh#2293458
CVE-2024-38544kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38544
SMASH Issue 411444
bnc#1226597
https://git.kernel.org/stable/c/21b4c6d4d89030fd4657a8e7c8110fd941049794
https://git.kernel.org/stable/c/2b23b6097303ed0ba5f4bc036a1c07b6027af5c6
https://git.kernel.org/stable/c/30df4bef8b8e183333e9b6e9d4509d552c7da6eb
https://git.kernel.org/stable/c/bbad88f111a1829f366c189aa48e7e58e57553fc
https://git.kernel.org/stable/c/faa8d0ecf6c9c7c2ace3ca3e552180ada6f75e19
jsc#CAR-3801
rh#2293455
CVE-2024-38545kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38545
SMASH Issue 411386
bnc#1226595
https://git.kernel.org/stable/c/37a7559dc1358a8d300437e99ed8ecdab0671507
https://git.kernel.org/stable/c/39d26cf46306bdc7ae809ecfdbfeff5aa1098911
https://git.kernel.org/stable/c/63da190eeb5c9d849b71f457b15b308c94cbaf08
https://git.kernel.org/stable/c/763780ef0336a973e933e40e919339381732dcaf
https://git.kernel.org/stable/c/a942ec2745ca864cd8512142100e4027dc306a42
jsc#CAR-3800
rh#2293454
CVE-2024-38546kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38546
SMASH Issue 411383
bnc#1226593
https://git.kernel.org/stable/c/2a345fe928c21de6f3c3c7230ff509d715153a31
https://git.kernel.org/stable/c/2d9adecc88ab678785b581ab021f039372c324cb
https://git.kernel.org/stable/c/42c22b63056cea259d5313bf138a834840af85a5
https://git.kernel.org/stable/c/6cf1874aec42058a5ad621a23b5b2f248def0e96
https://git.kernel.org/stable/c/80431ea3634efb47a3004305d76486db9dd8ed49
https://git.kernel.org/stable/c/bd7827d46d403f8cdb43d16744cb1114e4726b21
https://git.kernel.org/stable/c/c534b63bede6cb987c2946ed4d0b0013a52c5ba7
jsc#CAR-3799
rh#2293453
CVE-2024-38547kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38547
SMASH Issue 411462
bnc#1226632
https://git.kernel.org/stable/c/3b621e9e9e148c0928ab109ac3d4b81487469acb
https://git.kernel.org/stable/c/4b68b861b514a5c09220d622ac3784c0ebac6c80
https://git.kernel.org/stable/c/6482c433863b257b0b9b687c28ce80b89d5f89f0
https://git.kernel.org/stable/c/69b27ff82f87379afeaaea4b2f339032fdd8486e
https://git.kernel.org/stable/c/82c2c85aead3ea3cbceef4be077cf459c5df2272
https://git.kernel.org/stable/c/a1ab99dcc8604afe7e3bccb01b10da03bdd7ea35
https://git.kernel.org/stable/c/cc20c87b04db86c8e3e810bcdca686b406206069
jsc#CAR-3809
rh#2293452
CVE-2024-38549kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38549
SMASH Issue 411346
bnc#1226735
https://git.kernel.org/stable/c/0e3b6f9123726858cac299e1654e3d20424cabe4
https://git.kernel.org/stable/c/13562c2d48c9ee330de1077d00146742be368f05
https://git.kernel.org/stable/c/1e4350095e8ab2577ee05f8c3b044e661b5af9a0
https://git.kernel.org/stable/c/79078880795478d551a05acc41f957700030d364
https://git.kernel.org/stable/c/9489951e3ae505534c4013db4e76b1b5a3151ac7
https://git.kernel.org/stable/c/af26ea99019caee1500bf7e60c861136c0bf8594
https://git.kernel.org/stable/c/be34a1b351ea7faeb15dde8c44fe89de3980ae67
https://git.kernel.org/stable/c/d17b75ee9c2e44d3a3682c4ea5ab713ea6073350
https://git.kernel.org/stable/c/fb4aabdb1b48c25d9e1ee28f89440fd2ce556405
jsc#CAR-3833
rh#2293450
CVE-2024-38552kernel-source-rt:Affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2024-38552
SMASH Issue 411431
bnc#1226767
https://git.kernel.org/stable/c/04bc4d1090c343025d69149ca669a27c5b9c34a7
https://git.kernel.org/stable/c/123edbae64f4d21984359b99c6e79fcde31c6123
https://git.kernel.org/stable/c/4e8c8b37ee84b3b19c448d2b8e4c916d2f5b9c86
https://git.kernel.org/stable/c/604c506ca43fce52bb882cff9c1fdf2ec3b4029c
https://git.kernel.org/stable/c/63ae548f1054a0b71678d0349c7dc9628ddd42ca
https://git.kernel.org/stable/c/7226ddf3311c5e5a7726ad7d4e7b079bb3cfbb29
https://git.kernel.org/stable/c/98b8a6bfd30d07a19cfacdf82b50f84bf3360869
https://git.kernel.org/stable/c/ced9c4e2289a786b8fa684d8893b7045ea53ef7e
https://git.kernel.org/stable/c/e280ab978c81443103d7c61bdd1d8d708cf6ed6d
jsc#CAR-3843
rh#2293447
CVE-2024-38553kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38553
SMASH Issue 411352
bnc#1226744
https://git.kernel.org/stable/c/87bcbc9b7e0b43a69d44efa5f32f11e32d08fa6f
https://git.kernel.org/stable/c/accdd6b912c4219b8e056d1f1ad2e85bc66ee243
https://git.kernel.org/stable/c/c2e0c58b25a0a0c37ec643255558c5af4450c9f5
https://git.kernel.org/stable/c/d38625f71950e79e254515c5fc585552dad4b33e
jsc#CAR-3836
rh#2293446
CVE-2024-38558kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2024-38558
SMASH Issue 411441
bnc#1226783
https://git.kernel.org/stable/c/0b532f59437f688563e9c58bdc1436fefa46e3b5
https://git.kernel.org/stable/c/431e9215576d7b728f3f53a704d237a520092120
https://git.kernel.org/stable/c/483eb70f441e2df66ade78aa7217e6e4caadfef3
https://git.kernel.org/stable/c/5ab6aecbede080b44b8e34720ab72050bf1e6982
https://git.kernel.org/stable/c/6a51ac92bf35d34b4996d6eb67e2fe469f573b11
https://git.kernel.org/stable/c/78741b4caae1e880368cb2f5110635f3ce45ecfd
https://git.kernel.org/stable/c/7c988176b6c16c516474f6fceebe0f055af5eb56
https://git.kernel.org/stable/c/9ec8b0ccadb908d92f7ee211a4eff05fd932f3f6
https://git.kernel.org/stable/c/d73fb8bddf89503c9fae7c42e50d44c89909aad6
jsc#CAR-3849
rh#2293441
CVE-2024-38559kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-38559
SMASH Issue 411435
bnc#1226785
https://git.kernel.org/stable/c/177f43c6892e6055de6541fe9391a8a3d1f95fc9
https://git.kernel.org/stable/c/1f84a2744ad813be23fc4be99fb74bfb24aadb95
https://git.kernel.org/stable/c/4907f5ad246fa9b51093ed7dfc7da9ebbd3f20b8
https://git.kernel.org/stable/c/563e609275927c0b75fbfd0d90441543aa7b5e0d
https://git.kernel.org/stable/c/769b9fd2af02c069451fe9108dba73355d9a021c
https://git.kernel.org/stable/c/a75001678e1d38aa607d5b898ec7ff8ed0700d59
https://git.kernel.org/stable/c/d0184a375ee797eb657d74861ba0935b6e405c62
https://git.kernel.org/stable/c/d93318f19d1e1a6d5f04f5d965eaa9055bb7c613
https://git.kernel.org/stable/c/dccd97b39ab2f2b1b9a47a1394647a4d65815255
jsc#CAR-3850
rh#2293440
CVE-2024-38560kernel-source-rt:Affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-38560
SMASH Issue 411339
bnc#1226786
https://git.kernel.org/stable/c/00b425ff0891283207d7bad607a2412225274d7a
https://git.kernel.org/stable/c/13d0cecb4626fae67c00c84d3c7851f6b62f7df3
https://git.kernel.org/stable/c/1708e3cf2488788cba5489e4f913d227de757baf
https://git.kernel.org/stable/c/204714e68015d6946279719fd464ecaf57240f35
https://git.kernel.org/stable/c/481fc0c8617304a67649027c4a44723a139a0462
https://git.kernel.org/stable/c/595a6b98deec01b6dbb20139f71edcd5fb760ec2
https://git.kernel.org/stable/c/7510fab46b1cbd1680e2a096e779aec3334b4143
https://git.kernel.org/stable/c/7d3e694c4fe30f3aba9cd5ae86fb947a54c3db5c
https://git.kernel.org/stable/c/ecb76200f5557a2886888aaa53702da1ab9e6cdf
jsc#CAR-3851
rh#2293439
CVE-2024-38565kernel-source-rt:Affectedmoderate5.7 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2024-38565
SMASH Issue 411407
bnc#1226747
https://git.kernel.org/stable/c/34f7ebff1b9699e0b89fa58b693bc098c2f5ec72
https://git.kernel.org/stable/c/68a5a00c5d38978a3f8460c6f182f7beec8688ff
https://git.kernel.org/stable/c/79ddf5f2020fd593d50f1363bb5131283d74f78f
https://git.kernel.org/stable/c/7bbf76c9bb2c58375e183074e44f9712483f0603
https://git.kernel.org/stable/c/b33a81e4ecfb022b028cae37d1c1ce28ac1b359d
https://git.kernel.org/stable/c/b4c24de37a6bb383394a6fef2b85a6db41d426f5
https://git.kernel.org/stable/c/beeed260b92af158592f5e8d2dab65dae45c6f70
https://git.kernel.org/stable/c/e120b6388d7d88635d67dcae6483f39c37111850
https://git.kernel.org/stable/c/ee25389df80138907bc9dcdf4a2be2067cde9a81
jsc#CAR-3837
rh#2293428
CVE-2024-38570kernel-source-rt:Affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2024-38570
SMASH Issue 411461
bnc#1226775
bnc#1226782
https://git.kernel.org/stable/c/0636b34b44589b142700ac137b5f69802cfe2e37
https://git.kernel.org/stable/c/501cd8fabf621d10bd4893e37f6ce6c20523c8ca
https://git.kernel.org/stable/c/d98779e687726d8f8860f1c54b5687eec5f63a73
https://git.kernel.org/stable/c/e42e8a24d7f02d28763d16ca7ec5fc6d1f142af0
jsc#CAR-3848
rh#2293423
CVE-2024-38578kernel-source-rt:Affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2024-38578
SMASH Issue 411377
bnc#1226634
https://git.kernel.org/stable/c/0d0f8ba042af16519f1ef7dd10463a33b21b677c
https://git.kernel.org/stable/c/12db25a54ce6bb22b0af28010fff53ef9cb3fe93
https://git.kernel.org/stable/c/1c125b9287e58f364d82174efb167414b92b11f1
https://git.kernel.org/stable/c/235b85981051cd68fc215fd32a81c6f116bfc4df
https://git.kernel.org/stable/c/2ed750b7ae1b5dc72896d7dd114c419afd3d1910
https://git.kernel.org/stable/c/85a6a1aff08ec9f5b929d345d066e2830e8818e5
https://git.kernel.org/stable/c/a20f09452e2f58f761d11ad7b96b5c894c91030e
https://git.kernel.org/stable/c/edbfc42ab080e78c6907d40a42c9d10b69e445c1
https://git.kernel.org/stable/c/f6008487f1eeb8693f8d2a36a89c87d9122ddf74
jsc#CAR-3810
rh#2293415
CVE-2024-38579kernel-source-rt:Affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2024-38579
SMASH Issue 411357
bnc#1226637
https://git.kernel.org/stable/c/2b3460cbf454c6b03d7429e9ffc4fe09322eb1a9
https://git.kernel.org/stable/c/3b7a40740f04e2f27114dfd6225c5e721dda9d57
https://git.kernel.org/stable/c/49833a8da6407e7e9b532cc4054fdbcaf78f5fdd
https://git.kernel.org/stable/c/c0082ee420639a97e40cae66778b02b341b005e5
https://git.kernel.org/stable/c/c256b616067bfd6d274c679c06986b78d2402434
https://git.kernel.org/stable/c/c69a1e4b419c2c466dd8c5602bdebadc353973dd
https://git.kernel.org/stable/c/d0f14ae223c2421b334c1f1a9e48f1e809aee3a0
https://git.kernel.org/stable/c/e719c8991c161977a67197775067ab456b518c7b
https://git.kernel.org/stable/c/ebed0d666fa709bae9e8cafa8ec6e7ebd1d318c6
jsc#CAR-3811
rh#2293414
CVE-2024-38580kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38580
SMASH Issue 411421
bnc#1226610
https://git.kernel.org/stable/c/16e3182f6322575eb7c12e728ad3c7986a189d5d
https://git.kernel.org/stable/c/4efaa5acf0a1d2b5947f98abb3acf8bfd966422b
https://git.kernel.org/stable/c/4f65f4defe4e23659275ce5153541cd4f76ce2d2
https://git.kernel.org/stable/c/559214eb4e5c3d05e69428af2fae2691ba1eb784
https://git.kernel.org/stable/c/cbfd1088e24ec4c1199756a37cb8e4cd0a4b016e
jsc#CAR-3803
jsc#CAR-3804
rh#2293412
CVE-2024-38588kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38588
SMASH Issue 411367
bnc#1226837
https://git.kernel.org/stable/c/31310e373f4c8c74e029d4326b283e757edabc0b
https://git.kernel.org/stable/c/66df065b3106964e667b37bf8f7e55ec69d0c1f6
https://git.kernel.org/stable/c/7b4881da5b19f65709f5c18c1a4d8caa2e496461
https://git.kernel.org/stable/c/dbff5f0bfb2416b8b55c105ddbcd4f885e98fada
https://git.kernel.org/stable/c/e60b613df8b6253def41215402f72986fee3fc8d
jsc#CAR-3856
rh#2293400
CVE-2024-38589kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38589
SMASH Issue 411424
bnc#1226748
https://git.kernel.org/stable/c/1fbfb483c1a290dce3f41f52d45cc46dd88b7691
https://git.kernel.org/stable/c/3db2fc45d1d2a6457f06ebdfd45b9820e5b5c2b7
https://git.kernel.org/stable/c/421c50fa81836775bf0fd6ce0e57a6eb27af24d5
https://git.kernel.org/stable/c/5bc50a705cfac8f64ce51c95611c3dd0554ef9c3
https://git.kernel.org/stable/c/5fb7e2a4335fc67d6952ad2a6613c46e0b05f7c5
https://git.kernel.org/stable/c/b117e5b4f27c2c9076561b6be450a9619f0b79de
https://git.kernel.org/stable/c/b9d663fbf74290cb68fbc66ae4367bd56837ad1d
https://git.kernel.org/stable/c/e03e7f20ebf7e1611d40d1fdc1bde900fd3335f6
https://git.kernel.org/stable/c/f28bdc2ee5d9300cc77bd3d97b5b3cdd14960fd8
jsc#CAR-3838
rh#2293399
CVE-2024-38591kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38591
SMASH Issue 411417
bnc#1226738
https://git.kernel.org/stable/c/22c915af31bd84ffaa46145e317f53333f94a868
https://git.kernel.org/stable/c/4a3be1a0ffe04c085dd7f79be97c91b0c786df3d
https://git.kernel.org/stable/c/72dc542f0d8977e7d41d610db6bb65c47cad43e9
https://git.kernel.org/stable/c/756ddbe665ea7f9416951bd76731b174d136eea0
https://git.kernel.org/stable/c/b46494b6f9c19f141114a57729e198698f40af37
https://git.kernel.org/stable/c/d271e66abac5c7eb8de345b9b44d89f777437a4c
jsc#CAR-3834
rh#2293386
CVE-2024-38596kernel-source-rt:Affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N)CVE-2024-38596
SMASH Issue 411463
bnc#1226846
https://git.kernel.org/stable/c/0688d4e499bee3f2749bca27329bd128686230cb
https://git.kernel.org/stable/c/4d51845d734a4c5d079e56e0916f936a55e15055
https://git.kernel.org/stable/c/540bf24fba16b88c1b3b9353927204b4f1074e25
https://git.kernel.org/stable/c/8299e4d778f664b31b67cf4cf3d5409de2ecb92c
https://git.kernel.org/stable/c/9aa8773abfa0e954136875b4cbf2df4cf638e8a5
https://git.kernel.org/stable/c/a4c88072abcaca593cefe70f90e9d3707526e8f9
https://git.kernel.org/stable/c/a52fa2addfcccc2c5a0217fd45562605088c018b
https://git.kernel.org/stable/c/de6641d213373fbde9bbdd7c4b552254bc9f82fe
https://git.kernel.org/stable/c/fca6072e1a7b1e709ada5604b951513b89b4bd0a
jsc#CAR-3859
rh#2293371
CVE-2024-38597kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38597
SMASH Issue 411356
bnc#1226749
https://git.kernel.org/stable/c/476adb3bbbd7886e8251d3b9ce2d3c3e680f35d6
https://git.kernel.org/stable/c/5de5aeb98f9a000adb0db184e32765e4815d860b
https://git.kernel.org/stable/c/6400d205fbbcbcf9b8510157e1f379c1d7e2e937
https://git.kernel.org/stable/c/ac0a230f719b02432d8c7eba7615ebd691da86f4
https://git.kernel.org/stable/c/e22b23f5888a065d084e87db1eec639c445e677f
https://git.kernel.org/stable/c/faf94f1eb8a34b2c31b2042051ef36f63420ecce
https://git.kernel.org/stable/c/fbeeb55dbb33d562149c57e794f06b7414e44289
jsc#CAR-3839
rh#2293370
CVE-2024-38599kernel-source-rt:Affectedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2024-38599
SMASH Issue 411432
bnc#1226848
https://git.kernel.org/stable/c/2904e1d9b64f72d291095e3cbb31634f08788b11
https://git.kernel.org/stable/c/526235dffcac74c7823ed504dfac4f88d84ba5df
https://git.kernel.org/stable/c/8d431391320c5c5398ff966fb3a95e68a7def275
https://git.kernel.org/stable/c/978a12c91b38bf1a213e567f3c20e2beef215f07
https://git.kernel.org/stable/c/a1d21bcd78cf4a4353e1e835789429c6b76aca8b
https://git.kernel.org/stable/c/af82d8d2179b7277ad627c39e7e0778f1c86ccdb
https://git.kernel.org/stable/c/c6854e5a267c28300ff045480b5a7ee7f6f1d913
https://git.kernel.org/stable/c/f06969df2e40ab1dc8f4364a5de967830c74a098
https://git.kernel.org/stable/c/f0eea095ce8c959b86e1e57fe36ca4fea5ae54f8
jsc#CAR-3860
rh#2293366
CVE-2024-38600kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38600
SMASH Issue 411358
bnc#1226864
https://git.kernel.org/stable/c/2f103287ef7960854808930499d1181bd0145d68
https://git.kernel.org/stable/c/6b55e879e7bd023a03888fc6c8339edf82f576f4
https://git.kernel.org/stable/c/87988a534d8e12f2e6fc01fe63e6c1925dc5307c
https://git.kernel.org/stable/c/88ce3fe255d58a93624b467af036dc3519f309c7
https://git.kernel.org/stable/c/c2fb439f4f1425a961d20bec818fed2c2d9ef70a
https://git.kernel.org/stable/c/ff80185e7b7b547a0911fcfc8aefc61c3e8304d7
jsc#CAR-3863
rh#2293365
CVE-2024-38601kernel-source-rt:Affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38601
SMASH Issue 411447
bnc#1226876
https://git.kernel.org/stable/c/1e160196042cac946798ac192a0bc3398f1aa66b
https://git.kernel.org/stable/c/54c64967ba5f8658ae7da76005024ebd3d9d8f6e
https://git.kernel.org/stable/c/595363182f28786d641666a09e674b852c83b4bb
https://git.kernel.org/stable/c/5ef9e330406d3fb4f4b2c8bca2c6b8a93bae32d1
https://git.kernel.org/stable/c/79b52013429a42b8efdb0cda8bb0041386abab87
https://git.kernel.org/stable/c/af3274905b3143ea23142bbf77bd9b610c54e533
https://git.kernel.org/stable/c/b50932ea673b5a089a4bb570a8a868d95c72854e
https://git.kernel.org/stable/c/c2274b908db05529980ec056359fae916939fdaa
https://git.kernel.org/stable/c/c68b7a442ee61d04ca58b2b5cb5ea7cb8230f84a
jsc#CAR-3870
rh#2293364
CVE-2024-38607kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38607
SMASH Issue 411453
bnc#1226873
https://git.kernel.org/stable/c/010d4cb19bb13f423e3e746b824f314a9bf3e9a9
https://git.kernel.org/stable/c/1e9c3f2caec548cfa7a65416ec4e6006e542f18e
https://git.kernel.org/stable/c/280619bbdeac186fb320fab3d61122d2a085def8
https://git.kernel.org/stable/c/2907d409ce5946390f513976f0454888d37d1058
https://git.kernel.org/stable/c/5900a88e897e6deb1bdce09ee34167a81c2da89d
https://git.kernel.org/stable/c/787fb79efc15b3b86442ecf079b8148f173376d7
https://git.kernel.org/stable/c/d301a71c76ee4c384b4e03cdc320a55f5cf1df05
https://git.kernel.org/stable/c/d43a8c7ec0841e0ff91a968770aeca83f0fd4c56
https://git.kernel.org/stable/c/e4ff8bcfb2841fe4e17e5901578b632adb89036d
jsc#CAR-3869
rh#2293357
CVE-2024-38608kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2024-38608
SMASH Issue 411411
bnc#1226746
https://git.kernel.org/stable/c/3d5918477f94e4c2f064567875c475468e264644
https://git.kernel.org/stable/c/f7e6cfb864a53af71c5cc904f1cc22215d68f5c6
jsc#CAR-3835
rh#2293356
CVE-2024-38611kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2024-38611
SMASH Issue 411360
bnc#1226760
https://git.kernel.org/stable/c/43fff07e4b1956d0e5cf23717507e438278ea3d9
https://git.kernel.org/stable/c/545b215736c5c4b354e182d99c578a472ac9bfce
https://git.kernel.org/stable/c/904db2ba44ae60641b6378c5013254d09acf5e80
https://git.kernel.org/stable/c/c1a3803e5bb91c13e9ad582003e4288f67f06cd9
jsc#CAR-3841
rh#2293352
CVE-2024-38612kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38612
SMASH Issue 411380
bnc#1226855
https://git.kernel.org/stable/c/00e6335329f23ac6cf3105931691674e28bc598c
https://git.kernel.org/stable/c/10610575a3ac2a702bf5c57aa931beaf847949c7
https://git.kernel.org/stable/c/160e9d2752181fcf18c662e74022d77d3164cd45
https://git.kernel.org/stable/c/1a63730fb315bb1bab97edd69ff58ad45e04bb01
https://git.kernel.org/stable/c/3398a40dccb88d3a7eef378247a023a78472db66
https://git.kernel.org/stable/c/646cd236c55e2cb5f146fc41bbe4034c4af5b2a4
https://git.kernel.org/stable/c/85a70ff1e572160f1eeb096ed48d09a1c9d4d89a
https://git.kernel.org/stable/c/c04d6a914e890ccea4a9d11233009a2ee7978bf4
https://git.kernel.org/stable/c/e77a3ec7ada84543e75722a1283785a6544de925
jsc#CAR-3862
rh#2293351
CVE-2024-38615kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38615
SMASH Issue 411418
bnc#1226592
https://git.kernel.org/stable/c/2d730b465e377396d2a09a53524b96b111f7ccb6
https://git.kernel.org/stable/c/35db5e76d5e9f752476df5fa0b9018a2398b0378
https://git.kernel.org/stable/c/3e99f060cfd2e36504d62c9132b453ade5027e1c
https://git.kernel.org/stable/c/8bc9546805e572ad101681437a49939f28777273
https://git.kernel.org/stable/c/a8204d1b6ff762d2171d365c2c8560285d0a233d
https://git.kernel.org/stable/c/ae37ebca325097d773d7bb6ec069123b30772872
https://git.kernel.org/stable/c/b8f85833c05730d631576008daaa34096bc7f3ce
https://git.kernel.org/stable/c/dfc56ff5ec9904c008e9376d90a6d7e2d2bec4d3
jsc#CAR-3798
rh#2293348
CVE-2024-38618kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38618
SMASH Issue 411459
bnc#1226754
https://git.kernel.org/stable/c/2c95241ac5fc90c929d6c0c023e84bf0d30e84c3
https://git.kernel.org/stable/c/4a63bd179fa8d3fcc44a0d9d71d941ddd62f0c4e
https://git.kernel.org/stable/c/68396c825c43664b20a3a1ba546844deb2b4e48f
https://git.kernel.org/stable/c/74bfb8d90f2601718ae203faf45a196844c01fa1
https://git.kernel.org/stable/c/83f0ba8592b9e258fd80ac6486510ab1dcd7ad6e
https://git.kernel.org/stable/c/abb1ad69d98cf1ff25bb14fff0e7c3f66239e1cd
https://git.kernel.org/stable/c/bdd0aa055b8ec7e24bbc19513f3231958741d0ab
https://git.kernel.org/stable/c/ceab795a67dd28dd942d0d8bba648c6c0f7a044b
rh#2293329
CVE-2024-38619kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38619
SMASH Issue 411531
bnc#1226861
https://git.kernel.org/stable/c/16637fea001ab3c8df528a8995b3211906165a30
https://git.kernel.org/stable/c/24bff7f714bdff97c2a75a0ff6a368cdf8ad5af4
https://git.kernel.org/stable/c/2cc32639ec347e3365075b130f9953ef16cb13f1
https://git.kernel.org/stable/c/e0e2eec76920a133dd49a4fbe4656d83596a1361
jsc#CAR-3864
rh#2293273
CVE-2024-38620kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38620
SMASH Issue 411535
bnc#1226869
https://git.kernel.org/stable/c/5af2e235b0d5b797e9531a00c50058319130e156
https://git.kernel.org/stable/c/84a4bb6548a29326564f0e659fb8064503ecc1c7
https://git.kernel.org/stable/c/af1d425b6dc67cd67809f835dd7afb6be4d43e03
https://git.kernel.org/stable/c/d3c7b012d912b31ad23b9349c0e499d6dddd48ec
jsc#CAR-3867
rh#2293275
CVE-2024-38621kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38621
SMASH Issue 411757
bnc#1226895
https://git.kernel.org/stable/c/7532bcec0797adfa08791301c3bcae14141db3bd
https://git.kernel.org/stable/c/a08492832cc4cacc24e0612f483c86ca899b9261
https://git.kernel.org/stable/c/a16775828aaed1c54ff4e6fe83e8e4d5c6a50cb7
https://git.kernel.org/stable/c/b504518a397059e1d55c521ba0ea2b545a6c4b52
https://git.kernel.org/stable/c/d410017a7181cb55e4a5c810b32b75e4416c6808
https://git.kernel.org/stable/c/ecf4ddc3aee8ade504c4d36b7b4053ce6093e200
https://git.kernel.org/stable/c/f6a392266276730bea893b55d12940e32a25f56a
https://git.kernel.org/stable/c/faa4364bef2ec0060de381ff028d1d836600a381
rh#2293709
CVE-2024-38627kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38627
SMASH Issue 411764
bnc#1226857
https://git.kernel.org/stable/c/370c480410f60b90ba3e96abe73ead21ec827b20
https://git.kernel.org/stable/c/3df463865ba42b8f88a590326f4c9ea17a1ce459
https://git.kernel.org/stable/c/4bfd48bb6e62512b9c392c5002c11e1e3b18d247
https://git.kernel.org/stable/c/6cc30ef8eb6d8f8d6df43152264bbf8835d99931
https://git.kernel.org/stable/c/713fc00c571dde4af3db2dbd5d1b0eadc327817b
https://git.kernel.org/stable/c/7419df1acffbcc90037f6b5a2823e81389659b36
https://git.kernel.org/stable/c/a0450d3f38e7c6c0a7c0afd4182976ee15573695
https://git.kernel.org/stable/c/d782a2db8f7ac49c33b9ca3e835500a28667d1be
jsc#CAR-3878
rh#2293700
CVE-2024-38630kernel-source-rt:Affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2024-38630
SMASH Issue 411767
bnc#1226908
https://git.kernel.org/stable/c/573601521277119f2e2ba5f28ae6e87fc594f4d4
https://git.kernel.org/stable/c/9b1c063ffc075abf56f63e55d70b9778ff534314
https://git.kernel.org/stable/c/f19686d616500cd0d47b30cee82392b53f7f784a
jsc#CAR-3880
rh#2293697
CVE-2024-38633kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38633
SMASH Issue 411770
bnc#1226867
https://git.kernel.org/stable/c/21a61a7fbcfdd3493cede43ebc7c4dfae2147a8b
https://git.kernel.org/stable/c/361a92c9038e8c8c3996f8eeaa14522a8ad90752
https://git.kernel.org/stable/c/712a1fcb38dc7cac6da63ee79a88708fbf9c45ec
https://git.kernel.org/stable/c/9db4222ed8cd3e50b81c8b910ae74c26427a4003
https://git.kernel.org/stable/c/b6eb7aff23e05f362e8c9b560f6ac5e727b70e00
https://git.kernel.org/stable/c/e8a10089eddba40d4b2080c9d3fc2d2b2488f762
https://git.kernel.org/stable/c/e8e2a4339decad7e59425b594a98613402652d72
https://git.kernel.org/stable/c/fa84ca78b048dfb00df0ef446f5c35e0a98ca6a0
jsc#CAR-3865
rh#2293695
CVE-2024-38634kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38634
SMASH Issue 411771
bnc#1226868
https://git.kernel.org/stable/c/44b38924135d2093e2ec1812969464845dd66dc9
https://git.kernel.org/stable/c/77ab53371a2066fdf9b895246505f5ef5a4b5d47
https://git.kernel.org/stable/c/78dbda51bb4241b88a52d71620f06231a341f9ba
https://git.kernel.org/stable/c/8296bb9e5925b6634259c5d4daee88f0cc0884ec
https://git.kernel.org/stable/c/865b30c8661924ee9145f442bf32cea549faa869
https://git.kernel.org/stable/c/93df2fba6c7dfa9a2f08546ea9a5ca4728758458
https://git.kernel.org/stable/c/cc121e3722a0a2c8f716ef991e5425b180a5fb94
https://git.kernel.org/stable/c/ea9b35372b58ac2931bfc1d5bc25e839d1221e30
jsc#CAR-3866
rh#2293694
CVE-2024-38635kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38635
SMASH Issue 411772
bnc#1226863
https://git.kernel.org/stable/c/002364b2d594a9afc0385c09e00994c510b1d089
https://git.kernel.org/stable/c/2ebcaa0e5db9b6044bb487ae1cf41bc601761567
https://git.kernel.org/stable/c/4e99103f757cdf636c6ee860994a19a346a11785
https://git.kernel.org/stable/c/7eeef1e935d23db5265233d92395bd5c648a4021
https://git.kernel.org/stable/c/8ee1b439b1540ae543149b15a2a61b9dff937d91
https://git.kernel.org/stable/c/902f6d656441a511ac25c6cffce74496db10a078
https://git.kernel.org/stable/c/fd4bcb991ebaf0d1813d81d9983cfa99f9ef5328
jsc#CAR-3868
rh#2293693
CVE-2024-38637kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38637
SMASH Issue 411774
bnc#1226882
https://git.kernel.org/stable/c/330f6bcdcef03f70f81db5f2ed6747af656a09f2
https://git.kernel.org/stable/c/518e2c46b5dbce40b1aa0100001d03c3ceaa7d38
https://git.kernel.org/stable/c/895cdd9aa9546523df839f9cc1488a0ecc1e0731
https://git.kernel.org/stable/c/8f4a76d477f0cc3c54d512f07f6f88c8e1c1e07b
https://git.kernel.org/stable/c/9b41a9b9c8be8c552f10633453fdb509e83b66f8
https://git.kernel.org/stable/c/a1ba19a1ae7cd1e324685ded4ab563e78fe68648
https://git.kernel.org/stable/c/e2c64246e5dc8c0d35ec41770b85e2b4cafdff21
https://git.kernel.org/stable/c/eac10cf3a97ffd4b4deb0a29f57c118225a42850
jsc#CAR-3874
rh#2293691
CVE-2024-38659kernel-source-rt:Affectedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H)CVE-2024-38659
SMASH Issue 411775
bnc#1226883
https://git.kernel.org/stable/c/25571a12fbc8a1283bd8380d461267956fd426f7
https://git.kernel.org/stable/c/2b649d7e0cb42a660f0260ef25fd55fdc9c6c600
https://git.kernel.org/stable/c/3c0d36972edbe56fcf98899622d9b90ac9965227
https://git.kernel.org/stable/c/7077c22f84f41974a711604a42fd0e0684232ee5
https://git.kernel.org/stable/c/aee1955a1509a921c05c70dad5d6fc8563dfcb31
https://git.kernel.org/stable/c/ca63fb7af9d3e531aa25f7ae187bfc6c7166ec2d
https://git.kernel.org/stable/c/e8021b94b0412c37bcc79027c2e382086b6ce449
https://git.kernel.org/stable/c/f6638e955ca00c489894789492776842e102af9c
jsc#CAR-3875
rh#2293655
CVE-2024-38662kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38662
SMASH Issue 411759
bnc#1226885
https://git.kernel.org/stable/c/000a65bf1dc04fb2b65e2abf116f0bc0fc2ee7b1
https://git.kernel.org/stable/c/11e8ecc5b86037fec43d07b1c162e233e131b1d9
https://git.kernel.org/stable/c/29467edc23818dc5a33042ffb4920b49b090e63d
https://git.kernel.org/stable/c/6693b172f008846811f48a099f33effc26068e1e
https://git.kernel.org/stable/c/98e948fb60d41447fd8d2d0c3b8637fc6b6dc26d
https://git.kernel.org/stable/c/b81e1c5a3c70398cf76631ede63a03616ed1ba3c
jsc#CAR-3876
rh#2293641
CVE-2024-38780kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38780
SMASH Issue 411780
bnc#1226886
https://git.kernel.org/stable/c/165b25e3ee9333f7b04f8db43895beacb51582ed
https://git.kernel.org/stable/c/1ff116f68560a25656933d5a18e7619cb6773d8a
https://git.kernel.org/stable/c/242b30466879e6defa521573c27e12018276c33a
https://git.kernel.org/stable/c/8a283cdfc8beeb14024387a925247b563d614e1e
https://git.kernel.org/stable/c/9d75fab2c14a25553a1664586ed122c316bd1878
https://git.kernel.org/stable/c/a4ee78244445ab73af22bfc5a5fc543963b25aef
https://git.kernel.org/stable/c/ae6fc4e6a3322f6d1c8ff59150d8469487a73dd8
https://git.kernel.org/stable/c/b794918961516f667b0c745aebdfebbb8a98df39
jsc#CAR-3877
rh#2293643
CVE-2024-39276kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-39276
SMASH Issue 412069
bnc#1226993
https://git.kernel.org/stable/c/0c0b4a49d3e7f49690a6827a41faeffad5df7e21
https://git.kernel.org/stable/c/681ff9a09accd8a4379f8bd30b7a1641ee19bb3e
https://git.kernel.org/stable/c/76dc776153a47372719d664e0fc50d6355791abb
https://git.kernel.org/stable/c/896a7e7d0d555ad8b2b46af0c2fa7de7467f9483
https://git.kernel.org/stable/c/9ad75e78747b5a50dc5a52f0f8e92e920a653f16
https://git.kernel.org/stable/c/a95df6f04f2c37291adf26a74205cde0314d4577
https://git.kernel.org/stable/c/b37c0edef4e66fb21a2fbc211471195a383e5ab8
https://git.kernel.org/stable/c/e941b712e758f615d311946bf98216e79145ccd9
jsc#CAR-3887
rh#2294274
CVE-2024-39292kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-39292
SMASH Issue 411975
bnc#1226955
https://git.kernel.org/stable/c/0c02d425a2fbe52643a5859a779db0329e7dddd4
https://git.kernel.org/stable/c/31960d991e43c8d6dc07245f19fc13398e90ead2
https://git.kernel.org/stable/c/351d1a64544944b44732f6a64ed65573b00b9e14
https://git.kernel.org/stable/c/434a06c38ee1217a8baa0dd7c37cc85d50138fb0
https://git.kernel.org/stable/c/66ea9a7c6824821476914bed21a476cd20094f33
https://git.kernel.org/stable/c/73b8e21f76c7dda4905655d2e2c17dc5a73b87f1
https://git.kernel.org/stable/c/a0fbbd36c156b9f7b2276871d499c9943dfe5101
https://git.kernel.org/stable/c/dc1ff95602ee908fcd7d8acee7a0dadb61b1a0c0
jsc#CAR-3885
rh#2294222
CVE-2024-39301kernel-source-rt:Affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-39301
SMASH Issue 412092
bnc#1226994
https://git.kernel.org/stable/c/124947855564572713d705a13be7d0c9dae16a17
https://git.kernel.org/stable/c/2101901dd58c6da4924bc5efb217a1d83436290b
https://git.kernel.org/stable/c/25460d6f39024cc3b8241b14c7ccf0d6f11a736a
https://git.kernel.org/stable/c/6c1791130b781c843572fb6391c4a4c5d857ab17
https://git.kernel.org/stable/c/72c5d8e416ecc46af370a1340b3db5ff0b0cc867
https://git.kernel.org/stable/c/89969ffbeb948ffc159d19252e7469490103011b
https://git.kernel.org/stable/c/ca71f204711ad24113e8b344dc5bb8b0385f5672
https://git.kernel.org/stable/c/fe5c604053c36c62af24eee8a76407d026ea5163
jsc#CAR-3888
rh#2294264
CVE-2024-39362kernel-source-rt:Affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-39362
SMASH Issue 412093
bnc#1226995
https://git.kernel.org/stable/c/3f858bbf04dbac934ac279aaee05d49eb9910051
https://git.kernel.org/stable/c/4f08050a47a59d199e214d711b989bb4f5150373
https://git.kernel.org/stable/c/90dd0592b3b005d6f15c4e23e1364d3ae95e588d
https://git.kernel.org/stable/c/b1574c8c0a80bd587a7651bf64f00be1f5391d27
jsc#CAR-3889
rh#2294235
rh#2294266
CVE-2024-39469kernel-source-rt:Affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-39469
SMASH Issue 412075
bnc#1226992
https://git.kernel.org/stable/c/129dcd3e7d036218db3f59c82d82004b9539ed82
https://git.kernel.org/stable/c/59f14875a96ef93f05b82ad3c980605f2cb444b5
https://git.kernel.org/stable/c/7373a51e7998b508af7136530f3a997b286ce81c
https://git.kernel.org/stable/c/d18b05eda7fa77f02114f15b02c009f28ee42346
rh#2294308
CVE-2024-4741openssl:Not affected, openssl-1_1:Affectedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2024-4741
L3:68214
SMASH Issue 408026
bnc#1225551
bnc#1225552
bnc#1225803
jsc#CAR-3711
openssl.git:commit:05752478df623a9ddf849f897b630c1e0728cb7c
openssl.git:commit:38690cab18de88198f46478565fab423cf534efa
openssl.git:commit:566f3069169b9fab4fbb23da98c3c91730dd5209
openssl.git:commit:bfb8128190632092b3a66465838b87b469455cec
openssl.git:commit:c1bd38a003fa19fd0d8ade85e1bbc20d8ae59dab
rh#2283757

Unaffected

CVEPackage:AffectednessSeverityCVSS v3.1References
CVE-1999-0077kernel-source-rt:Not affectedmoderate ()CVE-1999-0077
SMASH Issue 6137
XF:tcp-seq-predict(139)
bnc#954946
CVE-1999-0524kernel-source-rt:Not affectedlow ()CONFIRM:kb.juniper.net:CVE-2015-2808
CONFIRM:kc.mcafee.com:CVE-2014-8533
CVE-1999-0524
MISC:descriptions.securescout.com:CVE-1999-0524
MISC:kb.vmware.com:CVE-1999-0524
OSVDB:95
SMASH Issue 6581
XF:icmp-netmask(306)
XF:icmp-timestamp(322)
bnc#351997
CVE-2000-1254openssl:Not affected, openssl-1_1:Not affectedmoderate ()BID:90109
CONFIRM:git.openssl.org:CVE-2000-1254
CVE-2000-1254
D:CVE-2000-1254
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[openssl-users] 20000529 64 bit problem in RSA_generate_key in 0.9.5a
MLIST:[oss-security] 20160504 broken RSA keys
OSS:2016/Q2/228
RH:CVE-2000-1254
SECTRACK:1035750
SMASH Issue 168616
UBUNTU:CVE-2000-1254
bnc#978847
rh#1333287
CVE-2001-0328kernel-source-rt:Unsupportedmoderate ()BID:2682
CERT:CA-2001-09
CVE-2001-0328
RH:CVE-2001-0328
SECTRACK:1033181
SECUNIA:8044
SGI:20030201-01-P
SMASH Issue 9195
SREASON:57
bnc#954947
rh#963594
CVE-2002-0640openssh:Not affectedcritical9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)BUGTRAQ:20020628 Sun statement on the OpenSSH Remote Challenge Vulnerability
CVE-2002-0640
OSVDB:839
RH:CVE-2002-0640
RHSA-2002:127
RHSA-2002:131
SMASH Issue 11636
SMASH Issue 411622
SUSE:SuSE-SA:2002:024
bnc#1226641
bnc#1226642
rh#1616784
CVE-2002-20001openssl:Ignore, openssl-1_1:Ignoreimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:CVE-2022-37896
CVE-2002-20001
MISC:dheatattack.com:CVE-2002-20001
MISC:github.com:CVE-2002-20001
MISC:support.f5.com:CVE-2002-20001
MISC:www.arubanetworks.com:CVE-2021-41003
MISC:www.openssl.org:CVE-2002-20001
MISC:www.reddit.com:CVE-2002-20001
MISC:www.researchgate.net:CVE-2002-20001
MISC:www.suse.com:CVE-2002-20001
SMASH Issue 314827
bnc#1192815
bnc#1192820
https://dheatattack.gitlab.io/
https://gitlab.com/dheatattack/dheater
https://ieeexplore.ieee.org/document/10374117
CVE-2003-0028libtirpc:Not affectedimportant ()BUGTRAQ:20030319 EEYE: XDR Integer Overflow
BUGTRAQ:20030319 MITKRB5-SA-2003-003: faulty length checks in xdrmem_getbytes
BUGTRAQ:20030319 RE: EEYE: XDR Integer Overflow
BUGTRAQ:20030325 GLSA: glibc (200303-22)
BUGTRAQ:20030331 GLSA: dietlibc (200303-29)
BUGTRAQ:20030331 GLSA: krb5 & mit-krb5 (200303-28)
BUGTRAQ:20030522 [slackware-security] glibc XDR overflow fix (SSA:2003-141-03)
CERT-VN:VU#516825
CERT:CA-2003-10
CONFIRM:security.netapp.com:CVE-2003-0028
CVE-2003-0028
DEBIAN:DSA-266
DEBIAN:DSA-272
DEBIAN:DSA-282
EEYE:AD20030318
ENGARDE:ESA-20030321-010
MANDRAKE:MDKSA-2003:037
NETBSD:NetBSD-SA2003-008
OVAL:oval:org.mitre.oval:def:230
RH:CVE-2003-0028
RHSA-2003:051
RHSA-2003:052
RHSA-2003:089
RHSA-2003:090
RHSA-2003:091
RHSA-2003:168
RHSA-2003:212
RHSA-2013:0884
SMASH Issue 10487
SUSE:SuSE-SA:2003:027
TRUSTIX:2003-0014
VULNWATCH:20030319 EEYE: XDR Integer Overflow
bnc#816627
rh#1616941
rh#948378
CVE-2005-1918tar:Not affectedmoderate ()CONFIRM:support.avaya.com:CVE-2005-1918
CVE-2005-1918
FEDORA:FLSA:183571-1
RH:CVE-2005-1918
RHSA-2006:0195
SECTRACK:1015655
SECUNIA:18988
SECUNIA:20397
SMASH Issue 18695
UBUNTU:CVE-2005-1918
bnc#145081
rh#140589
CVE-2005-4881kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2005-4881
CONFIRM:www.kernel.org:CVE-2005-4881
CONFIRM:www.kernel.org:CVE-2009-3228
CVE-2005-4881
L3:30773
MISC:git.kernel.org:MLIST:[oss-security] 20090917 Re: CVE request: kernel: tc: uninitialised kernel memory leak
MISC:marc.info:MLIST:[oss-security] 20090917 Re: CVE request: kernel: tc: uninitialised kernel memory leak
MLIST:[oss-security] 20090905 Re: CVE request: kernel: tc: uninitialised kernel memory leak
MLIST:[oss-security] 20090906 Re: CVE request: kernel: tc: uninitialised kernel memory leak
MLIST:[oss-security] 20090907 Re: CVE request: kernel: tc: uninitialised kernel memory leak
MLIST:[oss-security] 20090916 Re: CVE request: kernel: tc: uninitialised kernel memory leak
MLIST:[oss-security] 20090917 Re: CVE request: kernel: tc: uninitialised kernel memory leak
RH:CVE-2005-4881
RHSA-2009:1522
RHSA-2009:1540
RHSA-2009:1548
SECUNIA:37084
SECUNIA:37909
SMASH Issue 27264
SUSE:SUSE-SA:2009:064
UBUNTU:CVE-2005-4881
bnc#536467
rh#520990
rh#521601
rh#528868
CVE-2005-4886kernel-source-rt:Unsupportedimportant ()CONFIRM:git.kernel.org:CVE-2005-4886
CONFIRM:www.kernel.org:CVE-2005-4886
CVE-2005-4886
MLIST:[oss-security] 20100222 CVE-2005-4886 assigned to old remote oops
RH:CVE-2005-4886
RHSA-2005:514
SMASH Issue 27283
UBUNTU:CVE-2005-4886
XF:kernel-selinuxparseskbipv6-dos(56614)
rh#160117
CVE-2006-5051openssh:Not affectedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)APPLE:APPLE-SA-2007-03-13
BID:20241
CERT-VN:VU#851340
CERT:TA07-072A
CONFIRM:docs.info.apple.com:CVE-2006-3081
CONFIRM:openssh.org:CVE-2006-5052
CONFIRM:sourceforge.net:CVE-2006-4924
CONFIRM:support.avaya.com:CVE-2006-4924
CONFIRM:www.arkoon.fr:CVE-2006-5051
CONFIRM:www.vmware.com:CVE-2006-2940
CVE-2006-5051
FREEBSD:FreeBSD-SA-06:22
FREEBSD:FreeBSD-SA-06:22.openssh
GENTOO:GLSA-200611-06
MANDRIVA:MDKSA-2006:179
MLIST:[freebsd-security] 20061002 FreeBSD Security Advisory FreeBSD-SA-06:22.openssh
MLIST:[openssh-unix-dev] 20060927 Announce: OpenSSH 4.4 released
MLIST:[security-announce] 20070409 Globus Security Advisory 2007-02: GSI-OpenSSH vulnerability
OPENBSD:[2.9] 015: SECURITY FIX: October 12, 2006
OPENPKG:OpenPKG-SA-2006.022
OSVDB:29264
RH:CVE-2006-5051
RHSA-2006:0697
RHSA-2006:0698
SECTRACK:1016940
SECUNIA:22158
SECUNIA:22173
SECUNIA:22183
SECUNIA:22196
SECUNIA:22208
SECUNIA:22236
SECUNIA:22245
SECUNIA:22270
SECUNIA:22352
SECUNIA:22362
SECUNIA:22487
SECUNIA:22495
SECUNIA:22823
SECUNIA:22926
SECUNIA:23680
SECUNIA:24479
SECUNIA:24799
SECUNIA:24805
SGI:20061001-01-P
SLACKWARE:SSA:2006-272-02
SMASH Issue 35646
SUSE:SUSE-SA:2006:062
UBUNTU:CVE-2006-5051
UBUNTU:USN-355-1
VUPEN:ADV-2006-4018
VUPEN:ADV-2006-4329
VUPEN:ADV-2007-0930
VUPEN:ADV-2007-1332
XF:openssh-signal-handler-race-condition(29254)
bdo#392428
bdo#498678
bnc#208662
bnc#426510
bnc#545317
http://www.debian.org/security/2006/dsa-1189
http://www.debian.org/security/2006/dsa-1212
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11387
rh#208347
CVE-2006-6304kernel-source-rt:Unsupportedimportant ()BID:21591
CONFIRM:support.avaya.com:CVE-2009-4272
CONFIRM:www.kernel.org:CVE-2006-6304
CVE-2006-6304
L3:10960
RH:CVE-2006-6304
RHSA-2010:0046
SECUNIA:23349
SMASH Issue 36899
TRUSTIX:2006-0074
UBUNTU:CVE-2006-6304
VUPEN:ADV-2006-5002
bnc#289890
rh#537273
CVE-2007-1357kernel-source-rt:Unsupportedimportant ()BID:23376
CONFIRM:issues.rpath.com:CVE-2007-1357
CONFIRM:www.kernel.org:CVE-2007-1357
CVE-2007-1357
L3:8676
SECUNIA:24793
SECUNIA:25226
SECUNIA:25392
SECUNIA:25961
SMASH Issue 24782
SUSE:SUSE-SA:2007:030
SUSE:SUSE-SA:2007:043
UBUNTU:CVE-2007-1357
UBUNTU:USN-464-1
VUPEN:ADV-2007-1340
bnc#251735
rh#235857
CVE-2007-3379kernel-source-rt:Unsupportedlow ()CVE-2007-3379
RH:CVE-2007-3379
RHBA-2007:0304
SMASH Issue 55942
UBUNTU:CVE-2007-3379
bnc#327047
rh#1618314
rh#178981
CVE-2007-3850kernel-source-rt:Unsupportedlow ()BID:26161
CONFIRM:git.kernel.org:CVE-2007-3850
CVE-2007-3850
OSVDB:45488
RH:CVE-2007-3850
RHSA-2007:0940
SMASH Issue 56403
UBUNTU:CVE-2007-3850
bnc#328904
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=721151d004dcf01a71b12bb6b893f9160284cf6e
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10793
rh#308811
CVE-2007-4559python3:Ignoremoderate5.4 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)CVE-2007-4559
L3:64282
L3:64763
L3:65722
MLIST:[python-dev] 20070824 tarfile and directory traversal vulnerability
MLIST:[python-dev] 20070825 tarfile and directory traversal vulnerability
RH:CVE-2007-4559
SECUNIA:26623
SMASH Issue 57438
UBUNTU:CVE-2007-4559
VUPEN:ADV-2007-3022
bnc#1203750
bnc#1205977
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/
https://security.gentoo.org/glsa/202309-06
jsc#CAR-2054
rh#263261
rh#430635
CVE-2007-4567kernel-source-rt:Not affectedimportant ()BID:26943
CONFIRM:bugzilla.kernel.org:CVE-2007-4567
CONFIRM:git.kernel.org:CVE-2007-4567
CVE-2007-4567
CVE-2008-0352
EXPLOIT-DB:4893
MILW0RM:4893
MISC:git.kernel.org:/
MISC:www.kernel.org:CVE-2008-0352
OVAL:oval:org.mitre.oval:def:11083
OVAL:oval:org.mitre.oval:def:7474
RH:CVE-2007-4567
RH:CVE-2008-0352
RHSA-2010:0019
RHSA-2010:0053
RHSA-2010:0079
RHSA-2010:0095
SECUNIA:25505
SECUNIA:28170
SECUNIA:28706
SECUNIA:38015
SMASH Issue 24300
SMASH Issue 57453
UBUNTU:CVE-2007-4567
UBUNTU:CVE-2008-0352
UBUNTU:USN-558-1
UBUNTU:USN-574-1
USN-558-1
XF:linux-kernel-ipv6-dos(39171)
XF:linux-kernel-ipv6-jumbogram-dos(39643)
bnc#307626
linux.git:commit:2570a4f5428bcdb1077622342181755741e7fa60
rh#548641
rh#555217
CVE-2007-4601tcpd:Unsupportedmoderate ()CVE-2007-4601
MISC:bugs.debian.org
MISC:launchpad.net:CVE-2007-4601
OSVDB:40140
RH:CVE-2007-4601
SECUNIA:26567
SMASH Issue 57537
UBUNTU:CVE-2007-4601
UBUNTU:USN-507-1
XF:ubuntu-tcpwrapper-security-bypass(36364)
bdo#405342
bnc#306250
rh#271941
CVE-2007-4998kernel-obs-build:Analysis, kernel-rt:Analysis, kernel-rt_debug:Analysis, kernel-source-rt:Analysis, kernel-syms-rt:Analysismoderate ()CONFIRM:issues.rpath.com:CVE-2007-4998
CVE-2007-4998
OSVDB:43228
RH:CVE-2007-4998
SMASH Issue 58315
UBUNTU:CVE-2007-4998
bnc#348106
rh#356471
CVE-2007-5087kernel-source-rt:Analysismoderate ()BID:25798
CONFIRM:lwn.net:CVE-2007-5087
CVE-2007-5087
MISC:git.kernel.org:CVE-2007-5087
OSVDB:39237
SMASH Issue 58469
bnc#329212
rh#310441
CVE-2007-5494kernel-source-rt:Unsupportedmoderate ()BID:26657
CVE-2007-5494
OSVDB:44153
RH:CVE-2007-5494
RHSA-2007:0993
RHSA-2007:1104
SECTRACK:1019017
SMASH Issue 59308
UBUNTU:CVE-2007-5494
XF:rhel-content-accelerator-dos(38823)
bnc#342685
rh#315051
CVE-2007-5502openssl:Unsupported, openssl-1_1:Unsupportedmoderate ()BID:26652
CERT-VN:VU#150249
CONFIRM:www.openssl.org:CVE-2007-5502
CVE-2007-5502
RH:CVE-2007-5502
SECTRACK:1019029
SECUNIA:27859
SMASH Issue 59325
UBUNTU:CVE-2007-5502
VUPEN:ADV-2007-4044
XF:openssl-fips-prng-security-bypass(38796)
bnc#342634
rh#390371
CVE-2007-5966kernel-source-rt:Not affectedimportant ()BID:26880
BUGTRAQ:20071218 rPSA-2007-0269-1 kernel
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
CONFIRM:issues.rpath.com:CVE-2007-5966
CONFIRM:kernel.org:CVE-2007-5966
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2007-5966
DSA-1436
MANDRIVA:MDVSA-2008:112
OVAL:oval:org.mitre.oval:def:10774
OVAL:oval:org.mitre.oval:def:8125
RH:CVE-2007-5966
RHSA-2008:0585
RHSA-2009:1193
RHSA-2010:0079
SECUNIA:28088
SECUNIA:28105
SECUNIA:28141
SECUNIA:28706
SECUNIA:28806
SECUNIA:31628
SECUNIA:36131
SECUNIA:37471
SMASH Issue 60550
SUSE:SUSE-SA:2008:006
UBUNTU:CVE-2007-5966
UBUNTU:USN-574-1
VUPEN:ADV-2007-4225
VUPEN:ADV-2009-3316
bnc#512584
rh#453135
CVE-2007-6416kernel-source-rt:Unsupportedmoderate ()BID:26954
CONFIRM:xenbits.xensource.com:CVE-2007-6416
CVE-2007-6416
OSVDB:41344
RH:CVE-2007-6416
RHSA-2008:0089
SECUNIA:28146
SMASH Issue 61454
UBUNTU:CVE-2007-6416
bnc#355642
rh#425381
CVE-2007-6694kernel-source-rt:Unsupportedimportant ()BID:27555
CVE-2007-6694
MLIST:[linux-kernel] 20071122 [PATCH] PPC: CHRP - fix possible NULL pointer dereference
RH:CVE-2007-6694
RHSA-2008:0055
RHSA-2008:0154
SECUNIA:28696
SMASH Issue 62031
UBUNTU:CVE-2007-6694
VUPEN:ADV-2008-0380
bnc#357902
rh#396751
CVE-2007-6761kernel-source-rt:Ignorelow ()BID:98001
CONFIRM:git.kernel.org:CVE-2007-6761
CONFIRM:github.com:CVE-2007-6761
CONFIRM:www.linuxgrill.com:CVE-2007-6761
CVE-2007-6761
RH:CVE-2007-6761
SMASH Issue 184124
UBUNTU:CVE-2007-6761
bdo#827340
bnc#1035720
rh#1458182
CVE-2007-6762kernel-source-rt:Unsupportedcritical ()CVE-2007-6762
D:CVE-2007-6762
MISC:git.kernel.org:CVE-2007-6762
MISC:github.com:CVE-2007-6762
MISC:mirrors.edge.kernel.org:CVE-2007-6762
RH:CVE-2007-6762
SMASH Issue 238128
UBUNTU:CVE-2007-6762
bnc#1143172
rh#1735620
CVE-2008-0352kernel-source-rt:Not affectedimportant ()BID:26943
CONFIRM:bugzilla.kernel.org:CVE-2007-4567
CONFIRM:git.kernel.org:CVE-2007-4567
CVE-2007-4567
CVE-2008-0352
EXPLOIT-DB:4893
MILW0RM:4893
MISC:git.kernel.org:/
MISC:www.kernel.org:CVE-2008-0352
OVAL:oval:org.mitre.oval:def:11083
OVAL:oval:org.mitre.oval:def:7474
RH:CVE-2007-4567
RH:CVE-2008-0352
RHSA-2010:0019
RHSA-2010:0053
RHSA-2010:0079
RHSA-2010:0095
SECUNIA:25505
SECUNIA:28170
SECUNIA:28706
SECUNIA:38015
SMASH Issue 24300
UBUNTU:CVE-2007-4567
UBUNTU:CVE-2008-0352
UBUNTU:USN-558-1
UBUNTU:USN-574-1
USN-558-1
XF:linux-kernel-ipv6-dos(39171)
XF:linux-kernel-ipv6-jumbogram-dos(39643)
bnc#307626
linux.git:commit:2570a4f5428bcdb1077622342181755741e7fa60
rh#548641
rh#555217
CVE-2008-1615kernel-source-rt:Unsupportedimportant ()BID:29086
CVE-2008-1615
DSA-1588
FEDORA:FEDORA-2008-4043
L3:30849
RH:CVE-2008-1615
RHSA-2008:0237
RHSA-2008:0275
RHSA-2008:0585
SECTRACK:1020047
SECUNIA:30252
SECUNIA:30294
SECUNIA:30368
SECUNIA:30982
SECUNIA:31628
SMASH Issue 30142
SUSE:SUSE-SA:2008:035
SUSE:SUSE-SA:2008:038
UBUNTU:CVE-2008-1615
XF:linux-kernel-processtrace-dos(42278)
bnc#388123
rh#431430
CVE-2008-1673kernel-source-rt:Unsupportedcritical ()BID:29589
BUGTRAQ:20080611 rPSA-2008-0189-1 kernel xen
CONFIRM:git.kernel.org:CVE-2008-1673
CONFIRM:kernel.org:CVE-2008-1673
CONFIRM:wiki.rpath.com:CVE-2008-1673
CVE-2008-1673
FEDORA:FEDORA-2008-5308
L3:30851
MANDRIVA:MDVSA-2008:113
MANDRIVA:MDVSA-2008:174
RH:CVE-2008-1673
SECTRACK:1020210
SECUNIA:30000
SECUNIA:30580
SECUNIA:30644
SECUNIA:30658
SECUNIA:31836
SECUNIA:32370
SECUNIA:32759
SMASH Issue 30480
SUSE:SUSE-SA:2008:035
SUSE:SUSE-SA:2008:038
SUSE:SUSE-SA:2008:047
SUSE:SUSE-SA:2008:048
SUSE:SUSE-SA:2008:049
SUSE:SUSE-SA:2008:052
SUSE:SUSE-SR:2008:025
UBUNTU:CVE-2008-1673
UBUNTU:USN-625-1
VUPEN:ADV-2008-1770
XF:kernel-ber-decoder-bo(42921)
XF:linux-kernel-ber-decoder-bo(42921)
bnc#397347
bnc#415690
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=33afb8403f361919aa5c8fe1d0a4f5ddbfbbea3c
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ddb2c43594f22843e9f3153da151deaba1a834c5
rh#443962
CVE-2008-1679python3:Not affectedmoderate ()APPLE:APPLE-SA-2007-12-17
APPLE:APPLE-SA-2009-02-12
BID:25696
BUGTRAQ:20080212 FLEA-2008-0002-1 python
BUGTRAQ:20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
CERT:TA07-352A
CONFIRM:bugs.gentoo.org:CVE-2007-4965
CONFIRM:bugs.python.org:CVE-2008-1679
CONFIRM:docs.info.apple.com:CVE-2007-5398
CONFIRM:issues.rpath.com:CVE-2007-4965
CONFIRM:issues.rpath.com:CVE-2008-1679
CONFIRM:support.apple.com:CVE-2006-3467
CONFIRM:support.avaya.com:CVE-2007-4965
CONFIRM:wiki.rpath.com:CVE-2007-4965
CONFIRM:wiki.rpath.com:CVE-2008-1721
CONFIRM:www.novell.com:CVE-2008-3144
CONFIRM:www.novell.com:CVE-2013-1087
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2007-4965
CVE-2008-1679
FEDORA:FEDORA-2007-2663
FULLDISC:20070916 python <= 2.5.1 standart librairy multiples int overflow, heap overflow in imageop module
GENTOO:GLSA-200711-07
GENTOO:GLSA-200807-01
L3:30734
MANDRIVA:MDVSA-2008:012
MANDRIVA:MDVSA-2008:013
MANDRIVA:MDVSA-2008:163
MANDRIVA:MDVSA-2008:164
MISC:bugs.python.org:CVE-2008-1679
MLIST:[Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates
RH:CVE-2007-4965
RH:CVE-2008-1679
RHSA-2007:1076
RHSA-2008:0264
RHSA-2008:0525
RHSA-2008:0629
RHSA-2009:1176
RHSA-2009:1177
RHSA-2009:1178
SECUNIA:26837
SECUNIA:27460
SECUNIA:27562
SECUNIA:27872
SECUNIA:28480
SECUNIA:29955
SECUNIA:30872
SECUNIA:31358
SECUNIA:31365
SECUNIA:31518
SECUNIA:38675
SLACKWARE:SSA:2008-217-01
SMASH Issue 30540
SMASH Issue 58234
SUSE:SUSE-SR:2008:003
SUSE:SUSE-SR:2008:017
UBUNTU:CVE-2007-4965
UBUNTU:CVE-2008-1679
UBUNTU:USN-585-1
UBUNTU:USN-632-1
VUPEN:ADV-2007-3201
VUPEN:ADV-2007-4238
VUPEN:ADV-2008-0637
VUPEN:ADV-2009-3316
XF:python-imageop-bo(36653)
XF:python-imageopc-bo(41958)
bnc#325649
bnc#377090
bnc#444989
http://www.debian.org/security/2008/dsa-1551
http://www.debian.org/security/2008/dsa-1620
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10583
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10804
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7800
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8486
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8496
rh#295971
rh#441306
rh#469656
CVE-2008-2476kernel-source-rt:Unsupportedcritical ()BID:31529
CERT-VN:VU#472363
CONFIRM:support.apple.com:CVE-2008-3584
CONFIRM:www.kb.cert.org:CVE-2008-2476
CVE-2008-2476
FREEBSD:FreeBSD-SA-08:10
MISC:www.juniper.net:CVE-2008-2476
NETBSD:NetBSD-SA2008-013
OPENBSD:[4.2] 015: SECURITY FIX: October 2, 2008
OPENBSD:[4.3] 006: SECURITY FIX: October 2, 2008
RH:CVE-2008-2476
SECTRACK:1020968
SECTRACK:1021109
SECTRACK:1021132
SECUNIA:32112
SECUNIA:32116
SECUNIA:32117
SECUNIA:32133
SECUNIA:32406
SMASH Issue 57200
VUPEN:ADV-2008-2750
VUPEN:ADV-2008-2751
VUPEN:ADV-2008-2752
VUPEN:ADV-2009-0633
XF:multiple-vendors-ndp-dos(45601)
bnc#412118
CVE-2008-2544kernel-source-rt:Not affectedmoderate ()CVE-2008-2544
RH:CVE-2008-2544
SMASH Issue 67385
UBUNTU:CVE-2008-2544
bnc#1189500
rh#213135
rh#449089
CVE-2008-3528kernel-source-rt:Not affectedmoderate ()BUGTRAQ:20081112 rPSA-2008-0316-1 kernel
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
CONFIRM:wiki.rpath.com:CVE-2008-3831
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2008-3528
DSA-1681
MANDRIVA:MDVSA-2008:224
MLIST:[linux-kernel] 20080913 [PATCH 3/4] ext2: Avoid printk floods in the face of directory corruption
MLIST:[linux-kernel] 20080913 [PATCH 4/4] ext3: Avoid printk floods in the face of directory corruption
MLIST:[linux-kernel] 20080918 Re: [PATCH 4/4] ext3: Avoid printk floods in the face of directory corruption
MLIST:[oss-security] 20080918 CVE-2008-3528 Linux kernel ext[234] directory corruption DoS
RH:CVE-2008-3528
RHSA-2008:0972
RHSA-2009:0009
RHSA-2009:0326
SECUNIA:32509
SECUNIA:32709
SECUNIA:32998
SMASH Issue 59054
SUSE:SUSE-SA:2008:051
SUSE:SUSE-SA:2008:052
SUSE:SUSE-SA:2008:053
SUSE:SUSE-SA:2008:056
SUSE:SUSE-SA:2008:057
SUSE:SUSE-SR:2008:025
UBUNTU:CVE-2008-3528
UBUNTU:USN-662-1
VUPEN:ADV-2009-3316
XF:kernel-errorreporting-dos(45720)
bnc#427244
http://www.debian.org/security/2008/dsa-1681
http://www.debian.org/security/2008/dsa-1687
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10852
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8642
linux.git:commit:9d9f177572d9e4eba0f2e18523b44f90dd51fe74
rh#459577
CVE-2008-3529libxml2:Analysiscritical ()APPLE:APPLE-SA-2009-05-12
APPLE:APPLE-SA-2009-06-08-1
APPLE:APPLE-SA-2009-06-17-1
BID:31126
CERT:TA09-133A
CONFIRM:sunsolve.sun.com:CVE-2008-4226
CONFIRM:sunsolve.sun.com:CVE-2009-2713
CONFIRM:support.apple.com:CVE-2006-2783
CONFIRM:support.apple.com:CVE-2008-2829
CONFIRM:support.apple.com:CVE-2008-3623
CONFIRM:support.apple.com:CVE-2009-0945
CONFIRM:support.avaya.com:CVE-2008-3529
CONFIRM:wiki.rpath.com:CVE-2008-3281
CONFIRM:xmlsoft.org:CVE-2017-16932
CVE-2008-3529
DSA-1654
EXPLOIT-DB:8798
GENTOO:GLSA-200812-06
MANDRIVA:MDVSA-2008:192
MILW0RM:8798
OVAL:oval:org.mitre.oval:def:11760
OVAL:oval:org.mitre.oval:def:6103
RH:CVE-2008-3529
RHSA-2008:0884
RHSA-2008:0886
SECTRACK:1020855
SECUNIA:31558
SECUNIA:31855
SECUNIA:31860
SECUNIA:31868
SECUNIA:31982
SECUNIA:32265
SECUNIA:32280
SECUNIA:32807
SECUNIA:32974
SECUNIA:33715
SECUNIA:33722
SECUNIA:35056
SECUNIA:35074
SECUNIA:35379
SECUNIA:36173
SECUNIA:36235
SMASH Issue 59058
SUNALERT:247346
SUNALERT:261688
SUNALERT:265329
SUSE:SUSE-SR:2008:018
UBUNTU:CVE-2008-3529
UBUNTU:USN-644-1
UBUNTU:USN-815-1
VUPEN:ADV-2008-2822
VUPEN:ADV-2009-1297
VUPEN:ADV-2009-1298
VUPEN:ADV-2009-1522
VUPEN:ADV-2009-1621
XF:libxml2-entitynames-bo(45085)
bdo#498768
rh#461015
CVE-2008-3686kernel-source-rt:Analysismoderate ()CONFIRM:git.kernel.org:CVE-2008-3686
CVE-2008-3686
MLIST:[linux-kernel] 20080807 OOPS, ip -f inet6 route get fec0::1, linux-2.6.26, ip6_route_output, rt6_fill_node+0x175
MLIST:[linux-kernel] 20080808 Re: OOPS, ip -f inet6 route get fec0::1, linux-2.6.26, ip6_route_output, rt6_fill_node+0x175
RH:CVE-2008-3686
SECUNIA:31579
SMASH Issue 59350
UBUNTU:CVE-2008-3686
VUPEN:ADV-2008-2422
XF:linux-kernel-rt6fillnode-dos(44605)
bnc#419117
CVE-2008-3915kernel-source-rt:Not affectedcritical ()BID:31133
CONFIRM:git.kernel.org:CVE-2008-3915
CVE-2008-3915
MLIST:[linux-kernel] 20080903 [patch 05/16] nfsd: fix buffer overrun decoding NFSv4 acl
MLIST:[oss-security] 20080904 CVE request: kernel: nfsd: fix buffer overrun decoding NFSv4 acl
MLIST:[oss-security] 20080904 Re: CVE request: kernel: nfsd: fix buffer overrun decoding NFSv4 acl
RH:CVE-2008-3915
RHSA-2008:0857
SMASH Issue 59971
UBUNTU:CVE-2008-3915
XF:linux-kernel-nfsv4-bo(45055)
bnc#423515
rh#461101
CVE-2008-4307kernel-source-rt:Not affectedlow ()BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
CONFIRM:git.kernel.org:CVE-2008-4307
CONFIRM:www.kernel.org:CVE-2008-4307
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2008-4307
DSA-1787
DSA-1794
MLIST:[oss-security] 20090113 CVE-2008-4307 kernel: local denial of service in locks_remove_flock
RH:CVE-2008-4307
RHSA-2009:0451
RHSA-2009:0459
RHSA-2009:0473
SMASH Issue 67590
UBUNTU:CVE-2008-4307
UBUNTU:USN-751-1
VUPEN:ADV-2009-3316
bnc#465672
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=c4d7c402b788b73dc24f1e54a57f89d3dc5eb7bc
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7728
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9233
rh#456282
CVE-2008-5029kernel-source-rt:Not affectedmoderate ()BID:32154
BID:33079
BUGTRAQ:20090101 Linux Kernel 2.6.18/2.6.24/2.6.20/2.6.22/2.6.21 denial of service exploit
BUGTRAQ:20090103 Re: Linux Kernel 2.6.18/2.6.24/2.6.20/2.6.22/2.6.21 denial of service exploit
BUGTRAQ:20090104 Re: Linux Kernel 2.6.18/2.6.24/2.6.20/2.6.22/2.6.21 denial of service exploit
CONFIRM:kernel.org:CVE-2008-5029
CVE-2008-5029
MISC:darkircop.org:CVE-2008-5029
MLIST:[linux-netdev] 20081106 UNIX sockets kernel panic
MLIST:[oss-security] 20081106 CVE request: kernel: Unix sockets kernel panic
RH:CVE-2008-5029
RHSA-2009:0009
RHSA-2009:0014
RHSA-2009:0021
RHSA-2009:0053
RHSA-2009:0225
RHSA-2009:1550
SECTRACK:1021292
SECTRACK:1021511
SECUNIA:33623
SMASH Issue 68275
SREASON:4573
UBUNTU:CVE-2008-5029
XF:linux-kernel-scmdestroy-dos(46538)
bnc#442364
bnc#449739
rh#470201
rh#473259
CVE-2008-5374bash:Unsupportedmoderate ()BID:32733
CVE-2008-5374
RH:CVE-2008-5374
RHSA-2011:0261
RHSA-2011:1073
SECUNIA:43365
SMASH Issue 68561
UBUNTU:CVE-2008-5374
VUPEN:ADV-2011-0414
bnc#735605
rh#475474
CVE-2008-5700kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2008-5700
CONFIRM:www.kernel.org:CVE-2008-5700
CVE-2008-5700
MLIST:[oss-security] 20081209 CVE request: kernel: enforce a minimum SG_IO timeout
RH:CVE-2008-5700
RHSA-2009:0053
RHSA-2009:0326
RHSA-2009:0331
SMASH Issue 68869
UBUNTU:CVE-2008-5700
XF:linux-kernel-libata-dos(47669)
bnc#457896
rh#474495
CVE-2008-7256kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2008-7256
CONFIRM:www.kernel.org:CVE-2008-7256
CVE-2008-7256
MLIST:[oss-security] 20100527 Re: CVE request - kernel: nfsd: fix vm overcommit crash
RH:CVE-2008-7256
RHSA-2010:0631
SMASH Issue 70402
UBUNTU:CVE-2008-7256
XF:kernel-shmem-dos(59224)
rh#595970
CVE-2008-7316kernel-source-rt:Unsupportedlow ()CONFIRM:git.kernel.org:CVE-2008-7316
CONFIRM:github.com:CVE-2008-7316
CONFIRM:mirror.linux.org.au:CVE-2008-7316
CVE-2008-7316
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20160124 Re: CVE Request: Linux: fuse: possible denial of service in fuse_fill_write_pages()
MLIST:[oss-security] 20160124 Re: CVE Request: Linux: fuse: possible denial of service in fuse_fill_write_pages()
OSS:2016/Q1/189
RH:CVE-2008-7316
SMASH Issue 161260
UBUNTU:CVE-2008-7316
bnc#963764
rh#1290642
rh#1302009
CVE-2009-0028kernel-source-rt:Unsupportedmoderate ()BID:33906
BUGTRAQ:20090516 rPSA-2009-0084-1 kernel
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
CONFIRM:wiki.rpath.com:CVE-2009-1527
CVE-2009-0028
DSA-1787
DSA-1794
DSA-1800
L3:25666
L3:25684
MANDRIVA:MDVSA-2009:118
MISC:scary.beasts.org:CVE-2009-0028
MISC:scarybeastsecurity.blogspot.com:CVE-2009-0028
OSVDB:52204
RH:CVE-2009-0028
RHSA-2009:0326
RHSA-2009:0451
RHSA-2009:0459
SECUNIA:33758
SECUNIA:34033
SECUNIA:34680
SECUNIA:34917
SECUNIA:34962
SECUNIA:34981
SECUNIA:35011
SECUNIA:35120
SECUNIA:35121
SECUNIA:35390
SECUNIA:35394
SECUNIA:37471
SMASH Issue 27415
SUSE:SUSE-SA:2009:010
SUSE:SUSE-SA:2009:030
SUSE:SUSE-SA:2009:031
UBUNTU:CVE-2009-0028
UBUNTU:USN-751-1
bnc#465953
bnc#497597
rh#479932
CVE-2009-0029kernel-source-rt:Not affectedimportant ()BID:33275
CVE-2009-0029
DSA-1749
DSA-1787
DSA-1794
FEDORA:FEDORA-2009-0816
MANDRIVA:MDVSA-2009:135
MLIST:[linux-kernel] 20090110 Re: [PATCH -v7][RFC]: mutex: implement adaptive spinning
RH:CVE-2009-0029
SECUNIA:33477
SECUNIA:33674
SECUNIA:34394
SECUNIA:34981
SECUNIA:35011
SMASH Issue 27427
SUSE:SUSE-SA:2009:010
UBUNTU:CVE-2009-0029
bnc#466015
linux.git:commit:002c8976ee537724b20a5e179d9b349309438836
linux.git:commit:003d7ab479168132a2b2c6700fe682b08f08ab0c
linux.git:commit:1134723e96f6e2abcf8bfd7a2d1c96fcc323ef35
linux.git:commit:17da2bd90abf428523de0fb98f7075e00e3ed42e
linux.git:commit:1a94bc34768e463a93cb3751819709ab0ea80a01
linux.git:commit:1e7bfb2134dfec37ce04fb3a4ca89299e892d10c
linux.git:commit:20f37034fb966a1c35894f9fe529fda0b6440101
linux.git:commit:257ac264d69017270fbc3cf5536953525db4076c
linux.git:commit:26689452f5ca201add63b1b1ff0dbcf82d6885e7
linux.git:commit:2b66421995d2e93c9d1a0111acf2581f8529c6e5
linux.git:commit:2e4d0924eb0c403ce4014fa139d1d61bf2c44fee
linux.git:commit:2ed7c03ec17779afb4fcfa3b8c61df61bd4879ba
linux.git:commit:3480b25743cb7404928d57efeaa3d085708b04c2
linux.git:commit:362e9c07c7220c0a78c88826fc0d2bf7e4a4bb68
linux.git:commit:3a1c0fc5927f001d2c70998c08cad42ee5f64849
linux.git:commit:3cdad42884bbd95d5aa01297e8236ea1bad70053
linux.git:commit:3e0fa65f8ba4fd24b3dcfaf14d5b15eaab0fdc61
linux.git:commit:4c696ba7982501d43dea11dbbaabd2aa8a19cc42
linux.git:commit:58fd3aa288939d3097fa04505b25c2f5e6e144d1
linux.git:commit:5a8a82b1d306a325d899b67715618413657efda4
linux.git:commit:5add95d4f7cf08f6f62510f19576992912387501
linux.git:commit:64fd1de3d821659ac0a3004fd5ee1de59e64af30
linux.git:commit:6559eed8ca7db0531a207cd80be5e28cd6f213c5
linux.git:commit:66673f13c10a817e27d71434c1198a4d874e0cd3
linux.git:commit:6673e0c3fbeaed2cd08e2fd4a4aa97382d6fedb0
linux.git:commit:67605d6812691bbd2158d2f60259e0407611bc1b
linux.git:commit:6a6160a7b5c27b3c38651baef92a14fa7072b3c1
linux.git:commit:7187adbf08336bd69da11d42d2542de7b1cc6957
linux.git:commit:754fe8d297bfae7b77f7ce866e2fb0c5fb186506
linux.git:commit:836f92adf121f806e9beb5b6b88bd5c9c4ea3f24
linux.git:commit:938bb9f5e840eddbf54e4f62f6c5ba9b3ae12c9d
linux.git:commit:a26eab2400f0477bfac0255600552394855016f7
linux.git:commit:a5f8fa9e9ba5ef3305e147f41ad6e1e84ac1f0bd
linux.git:commit:a6b42e83f249aad723589b2bdf6d1dfb2b0997c8
linux.git:commit:ae1251ab785f6da87219df8352ffdac68bba23e4
linux.git:commit:b290ebe2c46d01b742b948ce03f09e8a3efb9a92
linux.git:commit:bca268565fd18f0b36ab8fff6e1623d8dffae2b1
linux.git:commit:bdc480e3bef6eb0e7071770834cbdda7e30a5436
linux.git:commit:c4ea37c26a691ad0b7e86aa5884aab27830e95c9
linux.git:commit:c9da9f2129d6a421c32e334a83770a9e67f7feac
linux.git:commit:ca013e945b1ba5828b151ee646946f1297b67a4c
linux.git:commit:d4e82042c4cfa87a7d51710b71f568fe80132551
linux.git:commit:d5460c9974a321a194aded4a8c4daaac68ea8171
linux.git:commit:dbda6ac0897603f6c6dfadbbc37f9882177ec7ac
linux.git:commit:dbf040d9d1cbf1ef6250bdb095c5c118950bcde8
linux.git:commit:e48fbb699f82ef1e80bd7126046394d2dc9ca7e6
linux.git:commit:e55380edf68796d75bf41391a781c68ee678587d
linux.git:commit:e6d9668e119af44ae5bcd5f1197174531458afe3
linux.git:commit:ed6bb6194350dc6ae97a65dbf2d621a3dbe6bbe9
linux.git:commit:ee6a093222549ac0c72cfd296c69fa5e7d6daa34
linux.git:commit:f627a741d24f12955fa2d9f8831c3b12860635bd
rh#479969
CVE-2009-0065kernel-source-rt:Not affectedcritical ()BID:33113
CONFIRM:git.kernel.org:CVE-2009-0065
CONFIRM:patchwork.ozlabs.org:CVE-2009-0065
CVE-2009-0065
HP:HPSBNS02449
L3:25685
MLIST:[oss-security] 20090105 CVE request: kernel: sctp: memory overflow when FWD-TSN chunk is received with bad stream ID
RH:CVE-2009-0065
RHSA-2009:0053
RHSA-2009:0264
RHSA-2009:0331
RHSA-2009:1055
SECTRACK:1022698
SECUNIA:33854
SECUNIA:35174
SECUNIA:36191
SMASH Issue 27595
UBUNTU:CVE-2009-0065
VUPEN:ADV-2009-0029
VUPEN:ADV-2009-2193
bnc#463522
rh#478800
CVE-2009-0269kernel-source-rt:Not affectedmoderate ()BID:33412
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
CONFIRM:git.kernel.org:CVE-2009-0269
CONFIRM:www.kernel.org:CVE-2009-0269
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2009-0269
DSA-1749
DSA-1787
MANDRIVA:MDVSA-2009:118
MLIST:[ecryptfs-devel] 20081222 Re: [PATCH, v5] eCryptfs: check readlink result was not an error before using it
RH:CVE-2009-0269
RHSA-2009:0326
RHSA-2009:0360
SECUNIA:33758
SECUNIA:34394
SECUNIA:34502
SECUNIA:34981
SECUNIA:35390
SECUNIA:35394
SECUNIA:37471
SMASH Issue 28428
SUSE:SUSE-SA:2009:010
SUSE:SUSE-SA:2009:030
SUSE:SUSE-SA:2009:031
UBUNTU:CVE-2009-0269
UBUNTU:USN-751-1
VUPEN:ADV-2009-3316
XF:linux-kernel-readlink-bo(48188)
bnc#470942
http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=a17d5232de7b53d34229de79ec22f4bb04adb7e4
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8169
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8944
rh#481604
CVE-2009-0322kernel-source-rt:Not affectedmoderate ()BID:33428
CONFIRM:git.kernel.org:CVE-2009-0322
CONFIRM:kernel.org:CVE-2009-0322
CVE-2009-0322
RH:CVE-2009-0322
RHSA-2009:0326
RHSA-2009:0331
RHSA-2009:0360
SECUNIA:33656
SMASH Issue 28632
UBUNTU:CVE-2009-0322
bnc#470943
rh#482866
CVE-2009-0342kernel-source-rt:Not affectedimportant ()BID:33417
BID:33948
BID:33951
BUGTRAQ:20090123 Problems with syscall filtering technologies on Linux
CONFIRM:git.kernel.org:CVE-2009-0834
CVE-2009-0342
CVE-2009-0834
CVE-2009-0835
L3:26832
L3:26833
MISC:scary.beasts.org:CVE-2009-0835
MISC:scarybeastsecurity.blogspot.com:CVE-2009-0343
MISC:scarybeastsecurity.blogspot.com:CVE-2009-0835
MISC:www.citi.umich.edu:CVE-2009-0343
MLIST:[linux-kernel] 20090227 Re: [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole
MLIST:[linux-kernel] 20090228 [PATCH 0/2] x86-64: 32/64 syscall arch holes
MLIST:[linux-kernel] 20090228 [PATCH 1/2] x86-64: syscall-audit: fix 32/64 syscall hole
MLIST:[linux-kernel] 20090228 [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole
MLIST:[oss-security] 20090302 CVE request: kernel: x86-64: seccomp: 32/64 syscall hole
MLIST:[oss-security] 20090302 CVE request: kernel: x86-64: syscall-audit: 32/64 syscall hole
RH:CVE-2009-0834
RH:CVE-2009-0835
RHSA-2009:0451
RHSA-2009:0459
RHSA-2009:0473
RHSA-2010:0079
SECTRACK:1022153
SECUNIA:34084
SECUNIA:35185
SMASH Issue 28688
SUSE:SUSE-SA:2009:028
UBUNTU:CVE-2009-0834
UBUNTU:CVE-2009-0835
XF:linux-kernel-auditsyscallentry-sec-bypass(49061)
bnc#483819
bnc#483820
rh#487255
rh#487990
CVE-2009-0675kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2009-0675
CONFIRM:www.kernel.org:CVE-2009-0676
CVE-2009-0675
L3:25672
MANDRIVA:MDVSA-2009:071
MLIST:[netdev] 20090128 [PATCH] drivers/net/skfp: if !capable(CAP_NET_ADMIN): inverted logic
MLIST:[oss-security] 20090220 CVE request: kernel: skfp_ioctl inverted logic flaw
RH:CVE-2009-0675
RHSA-2009:0326
RHSA-2009:0360
SECUNIA:33938
SMASH Issue 30093
UBUNTU:CVE-2009-0675
bnc#478003
rh#486534
CVE-2009-0676kernel-source-rt:Not affectedlow ()BID:33846
CONFIRM:git.kernel.org:CVE-2009-0676
CONFIRM:patchwork.kernel.org:CVE-2009-0676
CVE-2009-0676
MLIST:[linux-kernel] 20090212 [PATCH] 4 bytes kernel memory disclosure in SO_BSDCOMPAT gsopt try #2
MLIST:[linux-kernel] 20090223 net: amend the fix for SO_BSDCOMPAT gsopt infoleak
MLIST:[oss-security] 20090220 CVE request: kernel: memory disclosure in SO_BSDCOMPAT gsopt
MLIST:[oss-security] 20090224 Re: CVE request: kernel: memory disclosure in SO_BSDCOMPAT gsopt
MLIST:[oss-security] 20090302 Re: CVE request: kernel: memory disclosure in SO_BSDCOMPAT gsopt
RH:CVE-2009-0676
RHSA-2009:0326
RHSA-2009:0360
RHSA-2009:0459
SECUNIA:34786
SMASH Issue 30098
SUSE:SUSE-SA:2009:021
UBUNTU:CVE-2009-0676
XF:kernel-sock-information-disclosure(48847)
bnc#478002
linux.git:commit:50fee1dec5d71b8a14c1b82f2f42e16adc227f8b
rh#486305
CVE-2009-0745kernel-source-rt:Not affectedmoderate ()CONFIRM:bugzilla.kernel.org:CVE-2009-0745
CONFIRM:git.kernel.org:CVE-2009-0745
CONFIRM:kernel.org:CVE-2009-0748
CVE-2009-0745
RH:CVE-2009-0745
RHSA-2009:1243
SECUNIA:36562
SMASH Issue 30440
UBUNTU:CVE-2009-0745
VUPEN:ADV-2009-0509
bnc#480860
rh#487929
CVE-2009-0746kernel-source-rt:Unsupportedmoderate ()CONFIRM:bugzilla.kernel.org:CVE-2009-0746
CONFIRM:git.kernel.org:CVE-2009-0746
CVE-2009-0746
OSVDB:52202
RH:CVE-2009-0746
RHSA-2009:1243
SMASH Issue 30446
UBUNTU:CVE-2009-0746
XF:linux-kernel-makeindexeddir-ext4-dos(48872)
rh#487935
CVE-2009-0747kernel-source-rt:Unsupportedmoderate ()CONFIRM:bugzilla.kernel.org:CVE-2009-0747
CONFIRM:git.kernel.org:CVE-2009-0747
CVE-2009-0747
RH:CVE-2009-0747
RHSA-2009:1243
SMASH Issue 30450
UBUNTU:CVE-2009-0747
rh#487942
CVE-2009-0748kernel-source-rt:Unsupportedmoderate ()CONFIRM:bugzilla.kernel.org:CVE-2009-0748
CONFIRM:git.kernel.org:CVE-2009-0748
CVE-2009-0748
OSVDB:52203
RH:CVE-2009-0748
RHSA-2009:1243
SMASH Issue 30453
UBUNTU:CVE-2009-0748
rh#487945
CVE-2009-0778kernel-source-rt:Not affectedimportant ()BID:34084
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
CONFIRM:git.kernel.org:CVE-2009-0778
CONFIRM:www.kernel.org:CVE-2010-3086
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2009-0778
MISC:git.kernel.org:/
MLIST:[oss-security] 20090311 CVE-2009-0778 kernel: rt_cache leak
OVAL:oval:org.mitre.oval:def:10215
OVAL:oval:org.mitre.oval:def:7867
RH:CVE-2009-0778
RHSA-2009:0326
RHSA-2010:0079
SECTRACK:1021958
SECUNIA:33758
SECUNIA:37471
SMASH Issue 30599
UBUNTU:CVE-2009-0778
VUPEN:ADV-2009-3316
XF:linux-kernel-rtcache-dos(49199)
bnc#482712
rh#485163
CVE-2009-0787kernel-source-rt:Not affectedmoderate ()BID:34216
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
CONFIRM:git.kernel.org:CVE-2009-0787
CONFIRM:www.kernel.org:CVE-2009-1072
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2009-0787
OSVDB:52860
RH:CVE-2009-0787
RHSA-2009:0473
SECTRACK:1022177
SECUNIA:34422
SECUNIA:35015
SMASH Issue 30644
UBUNTU:CVE-2009-0787
VUPEN:ADV-2009-0802
VUPEN:ADV-2009-3316
XF:linux-kernel-ecryptfs-information-disclosure(49355)
bnc#487107
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=8faece5f906725c10e7a1f6caf84452abadbdc7b
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11068
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8319
linux.git:commit:8faece5f906725c10e7a1f6caf84452abadbdc7b
rh#491254
CVE-2009-0834kernel-source-rt:Not affectedimportant ()BID:33417
BID:33948
BID:33951
BUGTRAQ:20090123 Problems with syscall filtering technologies on Linux
CONFIRM:git.kernel.org:CVE-2009-0834
CVE-2009-0342
CVE-2009-0834
CVE-2009-0835
L3:26832
L3:26833
MISC:scary.beasts.org:CVE-2009-0835
MISC:scarybeastsecurity.blogspot.com:CVE-2009-0343
MISC:scarybeastsecurity.blogspot.com:CVE-2009-0835
MISC:www.citi.umich.edu:CVE-2009-0343
MLIST:[linux-kernel] 20090227 Re: [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole
MLIST:[linux-kernel] 20090228 [PATCH 0/2] x86-64: 32/64 syscall arch holes
MLIST:[linux-kernel] 20090228 [PATCH 1/2] x86-64: syscall-audit: fix 32/64 syscall hole
MLIST:[linux-kernel] 20090228 [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole
MLIST:[oss-security] 20090302 CVE request: kernel: x86-64: seccomp: 32/64 syscall hole
MLIST:[oss-security] 20090302 CVE request: kernel: x86-64: syscall-audit: 32/64 syscall hole
RH:CVE-2009-0834
RH:CVE-2009-0835
RHSA-2009:0451
RHSA-2009:0459
RHSA-2009:0473
RHSA-2010:0079
SECTRACK:1022153
SECUNIA:34084
SECUNIA:35185
SMASH Issue 28688
SMASH Issue 30847
SUSE:SUSE-SA:2009:028
UBUNTU:CVE-2009-0834
UBUNTU:CVE-2009-0835
XF:linux-kernel-auditsyscallentry-sec-bypass(49061)
bnc#483819
bnc#483820
rh#487255
rh#487990
CVE-2009-0835kernel-source-rt:Not affectedimportant ()BID:33417
BID:33948
BID:33951
BUGTRAQ:20090123 Problems with syscall filtering technologies on Linux
CONFIRM:git.kernel.org:CVE-2009-0834
CVE-2009-0342
CVE-2009-0834
CVE-2009-0835
L3:26832
L3:26833
MISC:scary.beasts.org:CVE-2009-0835
MISC:scarybeastsecurity.blogspot.com:CVE-2009-0343
MISC:scarybeastsecurity.blogspot.com:CVE-2009-0835
MISC:www.citi.umich.edu:CVE-2009-0343
MLIST:[linux-kernel] 20090227 Re: [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole
MLIST:[linux-kernel] 20090228 [PATCH 0/2] x86-64: 32/64 syscall arch holes
MLIST:[linux-kernel] 20090228 [PATCH 1/2] x86-64: syscall-audit: fix 32/64 syscall hole
MLIST:[linux-kernel] 20090228 [PATCH 2/2] x86-64: seccomp: fix 32/64 syscall hole
MLIST:[oss-security] 20090302 CVE request: kernel: x86-64: seccomp: 32/64 syscall hole
MLIST:[oss-security] 20090302 CVE request: kernel: x86-64: syscall-audit: 32/64 syscall hole
RH:CVE-2009-0834
RH:CVE-2009-0835
RHSA-2009:0451
RHSA-2009:0459
RHSA-2009:0473
RHSA-2010:0079
SECTRACK:1022153
SECUNIA:34084
SECUNIA:35185
SMASH Issue 28688
SMASH Issue 30867
SUSE:SUSE-SA:2009:028
UBUNTU:CVE-2009-0834
UBUNTU:CVE-2009-0835
XF:linux-kernel-auditsyscallentry-sec-bypass(49061)
bnc#483819
bnc#483820
rh#487255
rh#487990
CVE-2009-0859kernel-source-rt:Unsupportedmoderate ()BID:34020
CONFIRM:git.kernel.org:CVE-2009-0859
CONFIRM:patchwork.kernel.org:CVE-2009-0859
CVE-2009-0859
L3:25665
MLIST:[git-commits-head] 20090205 shm: fix shmctl(SHM_INFO) lockup with !CONFIG_SHMEM
MLIST:[linux-kernel] 20080229 [BUG] soft lockup detected with ipcs
MLIST:[linux-kernel] 20090127 [PATCH 1/2] fix shmctl(SHM_INFO) lockup with !CONFIG_SHMEM
MLIST:[oss-security] 20090306 CVE request: kernel: shm: fix shmctl(SHM_INFO) lockup with !CONFIG_SHMEM
RH:CVE-2009-0859
SMASH Issue 30994
UBUNTU:CVE-2009-0859
XF:linux-kernel-shmgetstat-dos(49229)
bnc#482720
CVE-2009-0935kernel-source-rt:Not affectedmoderate ()BID:33624
CONFIRM:www.kernel.org:CVE-2009-0935
CVE-2009-0935
MISC:patchwork.kernel.org:MLIST:[oss-security] 20090306 CVE request: kernel: inotify local DoS
MLIST:[linux-kernel] 20090131 [patch 03/43] inotify: clean up inotify_read and fix locking
MLIST:[oss-security] 20090306 CVE request: kernel: inotify local DoS
MLIST:[oss-security] 20090318 Re: CVE request: kernel: inotify local DoS
MLIST:[oss-security] 20090319 Re: CVE request: kernel: inotify local DoS
RH:CVE-2009-0935
SMASH Issue 31331
UBUNTU:CVE-2009-0935
XF:linux-kernel-inotify-read-dos(49331)
bnc#482843
rh#488935
CVE-2009-1046kernel-source-rt:Unsupportedmoderate ()BID:33672
CONFIRM:www.kernel.org:CVE-2009-1046
CVE-2009-1046
L3:30864
MISC:git.kernel.org:MLIST:[oss-security] 20090212 http://www.securityfocus.com/bid/33672/info kernel issue
MLIST:[linux-kernel] 20090130 [PATCH] Fix memory corruption in console selection
MLIST:[linux-kernel] 20090202 Re: [PATCH] Fix memory corruption in console selection
MLIST:[oss-security] 20090212 Re: http://www.securityfocus.com/bid/33672/info kernel
MLIST:[oss-security] 20090212 Re: http://www.securityfocus.com/bid/33672/info kernel issue
MLIST:[oss-security] 20090212 http://www.securityfocus.com/bid/33672/info kernel issue
RH:CVE-2009-1046
RHSA-2009:0451
SMASH Issue 31758
UBUNTU:CVE-2009-1046
bnc#478699
rh#491787
CVE-2009-1072kernel-source-rt:Unsupportedmoderate ()BID:34205
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
CONFIRM:git.kernel.org:CVE-2009-1072
CONFIRM:www.kernel.org:CVE-2009-1072
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2009-1072
DSA-1800
L3:25667
MLIST:[linux-kernel] 20090311 VFS, NFS security bug? Should CAP_MKNOD and CAP_LINUX_IMMUTABLE be added to CAP_FS_MASK?
MLIST:[oss-security] 20090323 CVE request: kernel: nfsd did not drop CAP_MKNOD for non-root
OVAL:oval:org.mitre.oval:def:10314
OVAL:oval:org.mitre.oval:def:8382
RH:CVE-2009-1072
RHSA-2009:1081
RHSA-2009:1106
RHSA-2009:1132
SECUNIA:34422
SECUNIA:34432
SECUNIA:34786
SECUNIA:35121
SECUNIA:35185
SECUNIA:35343
SECUNIA:35390
SECUNIA:35394
SECUNIA:35656
SECUNIA:37471
SMASH Issue 31848
SUSE:SUSE-SA:2009:021
SUSE:SUSE-SA:2009:028
SUSE:SUSE-SA:2009:030
SUSE:SUSE-SA:2009:031
UBUNTU:CVE-2009-1072
UBUNTU:USN-793-1
VUPEN:ADV-2009-0802
VUPEN:ADV-2009-3316
XF:linux-kernel-capmknod-security-bypass(49356)
bnc#487681
bnc#497551
rh#491572
CVE-2009-1192kernel-source-rt:Not affectedmoderate ()BID:34673
BUGTRAQ:20090516 rPSA-2009-0084-1 kernel
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
CONFIRM:git.kernel.org:CVE-2009-1192
CONFIRM:wiki.rpath.com:CVE-2009-1527
CONFIRM:www.kernel.org:CVE-2009-1192
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2009-1192
DSA-1787
DSA-1794
L3:29691
MANDRIVA:MDVSA-2009:119
MANDRIVA:MDVSA-2009:135
MLIST:[oss-security] 20090422 CVE-2009-1192 kernel: agp: zero pages before sending to userspace
RH:CVE-2009-1192
RHSA-2009:1081
RHSA-2009:1106
RHSA-2009:1132
SECUNIA:35387
SECUNIA:37351
SMASH Issue 32447
SUSE:SUSE-SA:2009:032
SUSE:SUSE-SA:2009:054
SUSE:SUSE-SA:2009:056
UBUNTU:CVE-2009-1192
UBUNTU:USN-793-1
VUPEN:ADV-2009-3316
bnc#497159
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=59de2bebabc5027f93df999d59cc65df591c3e6e
http://www.debian.org/security/2009/dsa-1800
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10567
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8003
rh#497020
CVE-2009-1242kernel-source-rt:Not affectedmoderate ()BID:34331
BUGTRAQ:20090516 rPSA-2009-0084-1 kernel
CONFIRM:git.kernel.org:CVE-2009-1242
CONFIRM:patchwork.kernel.org:CVE-2009-1242
CONFIRM:wiki.rpath.com:CVE-2009-1527
CONFIRM:www.kernel.org:CVE-2009-1242
CONFIRM:www.kernel.org:CVE-2009-1243
CVE-2009-1242
DSA-1787
DSA-1800
FEDORA:FEDORA-2009-5356
MISC:vigilance.fr:CVE-2009-1242
MISC:www.globalsecuritymag.com:CVE-2009-1242
MLIST:[oss-security] 20090401 CVE request: kernel: KVM: VMX: Dont allow uninhibited access to EFER on i386
RH:CVE-2009-1242
SECUNIA:34478
SECUNIA:34981
SECUNIA:35120
SECUNIA:35121
SECUNIA:35226
SECUNIA:35387
SECUNIA:35394
SECUNIA:35656
SMASH Issue 32664
SUSE:SUSE-SA:2009:031
SUSE:SUSE-SA:2009:032
UBUNTU:CVE-2009-1242
UBUNTU:USN-793-1
VUPEN:ADV-2009-0924
XF:linux-kernel-eferlme-dos(49594)
bnc#492760
rh#502109
CVE-2009-1336kernel-source-rt:Not affectedmoderate ()BID:34390
CONFIRM:git.kernel.org:CVE-2009-1336
CVE-2009-1336
MLIST:[oss-security] 20090406 CVE request: kernel: NFS: Fix an Oops in encode_lookup()
MLIST:[oss-security] 20090417 Re: CVE request: kernel: NFS: Fix an Oops in encode_lookup()
RH:CVE-2009-1336
RHSA-2009:0473
RHSA-2009:1024
RHSA-2009:1077
SECTRACK:1022176
SECUNIA:35160
SECUNIA:35324
SMASH Issue 59462
UBUNTU:CVE-2009-1336
bnc#492766
rh#494074
CVE-2009-1337kernel-source-rt:Not affectedmoderate ()BID:34405
BUGTRAQ:20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel
CONFIRM:git.kernel.org:CVE-2009-1337
CONFIRM:patchwork.kernel.org:CVE-2009-1337
CONFIRM:www.kernel.org:CVE-2009-1337
CVE-2009-1337
L3:25669
MLIST:[linux-kernel] 20090225 Re: [PATCH 2/2] exit_notify: kill the wrong capable(CAP_KILL) check
MLIST:[oss-security] 20090407 CVE request: kernel: exit_notify: kill the wrong capable(CAP_KILL) check
MLIST:[oss-security] 20090417 Re: CVE request: kernel: exit_notify: kill the wrong capable(CAP_KILL) check
RH:CVE-2009-1337
RHSA-2009:0451
RHSA-2009:0473
RHSA-2009:1024
RHSA-2009:1077
RHSA-2009:1550
SECTRACK:1022141
SMASH Issue 59473
SMASH Issue 83323
UBUNTU:CVE-2009-1337
bnc#492768
rh#493771
CVE-2009-1338kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2009-1338
CONFIRM:www.kernel.org:CVE-2009-1338
CVE-2009-1338
MLIST:[linux-kernel] 20080723 Re: [PATCH 1/2] signals: kill(-1) should only signal processes in the same namespace
MLIST:[oss-security] 20090416 CVE request: kernel: 'kill sig -1' must only apply to caller's PID namespace
MLIST:[oss-security] 20090417 Re: CVE request: kernel: 'kill sig -1' must only apply to caller's PID namespace
MLIST:[oss-security] 20090421 Re: CVE request: kernel: 'kill sig -1' must only apply to caller's PID namespace
RH:CVE-2009-1338
RHSA-2009:1081
SMASH Issue 59481
UBUNTU:CVE-2009-1338
XF:kernel-killsomethinginfo-security-bypass(50386)
bnc#495430
rh#496031
CVE-2009-1385kernel-source-rt:Not affectedimportant ()BID:35185
BUGTRAQ:20090724 rPSA-2009-0111-1 kernel
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
BUGTRAQ:20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel
CONFIRM:git.kernel.org:CVE-2009-1385
CONFIRM:sourceforge.net:CVE-2009-1385
CONFIRM:wiki.rpath.com:CVE-2009-1895
CONFIRM:www.intel.com:CVE-2009-1385
CONFIRM:www.kernel.org:CVE-2009-1385
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2009-1385
DSA-1844
DSA-1865
FEDORA:FEDORA-2009-6768
FEDORA:FEDORA-2009-6846
FEDORA:FEDORA-2009-6883
MANDRIVA:MDVSA-2009:135
MANDRIVA:MDVSA-2009:148
MISC:git.kernel.org:/
MLIST:[oss-security] 20090603 CVE-2009-1385 kernel: e1000_clean_rx_irq() denial of service
OSVDB:54892
OVAL:oval:org.mitre.oval:def:11598
OVAL:oval:org.mitre.oval:def:11681
OVAL:oval:org.mitre.oval:def:8340
RH:CVE-2009-1385
RHSA-2009:1132
RHSA-2009:1157
RHSA-2009:1193
RHSA-2009:1550
RHSA-2010:0019
RHSA-2010:0020
RHSA-2010:0041
RHSA-2010:0053
RHSA-2010:0079
RHSA-2010:0095
RHSA-2010:0111
RHSA-2010:0882
SECUNIA:35265
SECUNIA:35566
SECUNIA:35623
SECUNIA:35656
SECUNIA:35847
SECUNIA:36051
SECUNIA:36131
SECUNIA:36327
SECUNIA:37471
SMASH Issue 41551
SUSE:SUSE-SA:2009:038
UBUNTU:CVE-2009-1385
UBUNTU:USN-793-1
VUPEN:ADV-2009-3316
bnc#509822
bnc#567678
rh#502981
rh#552126
CVE-2009-1388kernel-source-rt:Unsupportedmoderate ()BID:35559
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
CONFIRM:bugzilla.redhat.com
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2009-1388
MLIST:[oss-security] 20090702 CVE-2009-1388 kernel: do_coredump() vs ptrace_start() deadlock
OSVDB:55679
RH:CVE-2009-1388
RHSA-2009:1193
RHSA-2013:1029
RHSA-2013:1411
RHSA-2013:1605
RHSA-2013:1784
RHSA-2013:1785
RHSA-2013:1786
RHSA-2014:0029
RHSA-2014:0245
RHSA-2014:0254
RHSA-2014:0400
RHSA-2014:0401
RHSA-2014:1290
RHSA-2014:1291
RHSA-2014:1904
RHSA-2014:1995
RHSA-2015:0034
SECUNIA:36131
SECUNIA:37471
SMASH Issue 59627
UBUNTU:CVE-2009-1388
VUPEN:ADV-2009-3316
bnc#518716
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8625
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8680
rh#1006505
rh#1007545
rh#108711
rh#504263
rh#958618
rh#978485
CVE-2009-1389kernel-source-rt:Not affectedimportant ()BID:35281
BUGTRAQ:20090724 rPSA-2009-0111-1 kernel
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
CONFIRM:git.kernel.org:CVE-2009-1389
CONFIRM:support.avaya.com:CVE-2009-1389
CONFIRM:support.citrix.com:CVE-2009-1389
CONFIRM:wiki.rpath.com:CVE-2009-1895
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2009-1389
DSA-1844
DSA-1865
FEDORA:FEDORA-2009-6768
FEDORA:FEDORA-2009-6846
FEDORA:FEDORA-2009-6883
MANDRIVA:MDVSA-2009:148
MLIST:[linux-kernel] 20090608 [Security, resend] Instant crash with rtl8169 and large packets
MLIST:[linux-netdev] 20090214 r8169: instant crash if receiving packet larger than MTU
MLIST:[oss-security] 20090610 CVE-2009-1389 kernel: r8169: fix crash when large packets are received
RH:CVE-2009-1389
RHSA-2009:1157
RHSA-2009:1193
RHSA-2009:1211
RHSA-2009:1457
RHSA-2009:1469
RHSA-2010:0019
RHSA-2010:0020
RHSA-2010:0041
RHSA-2010:0053
RHSA-2010:0079
RHSA-2010:0095
RHSA-2010:0111
SECTRACK:1023507
SECUNIA:37298
SMASH Issue 41552
SUSE:SUSE-SA:2009:038
SUSE:SUSE-SA:2010:031
UBUNTU:CVE-2009-1389
UBUNTU:USN-807-1
VUPEN:ADV-2009-3316
VUPEN:ADV-2010-0219
VUPEN:ADV-2010-1857
XF:linux-kernel-rtl8169nic-dos(51051)
bnc#567678
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=fdd7b4c3302c93f6833e338903ea77245eb510b4
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10415
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8108
rh#504726
rh#550907
CVE-2009-1439kernel-source-rt:Not affectedimportant ()BID:34453
CONFIRM:git.kernel.org:CVE-2009-1439
CVE-2009-1439
FEDORA:FEDORA-2009-5383
L3:25671
MISC:blog.fefe.de:CVE-2009-1439
MISC:git.kernel.org:MLIST:[oss-security] 20090514 Update - Re: CVE request? buffer overflow in CIFS in 2.6.*
MISC:xorl.wordpress.com:CVE-2009-1439
MLIST:[linux-cifs-client] 20090406 [PATCH] cifs: Fix insufficient memory allocation for nativeFileSystem field
MLIST:[oss-security] 20090405 CVE request? buffer overflow in CIFS in 2.6.*
MLIST:[oss-security] 20090407 Re: CVE request? buffer overflow in CIFS in 2.6.*
RH:CVE-2009-1439
RHSA-2009:1081
RHSA-2009:1106
RHSA-2009:1211
SECUNIA:35217
SMASH Issue 38960
UBUNTU:CVE-2009-1439
bnc#498824
rh#494275
CVE-2009-1630kernel-source-rt:Unsupportedmoderate ()BID:34934
BUGTRAQ:20090724 rPSA-2009-0111-1 kernel
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
CONFIRM:bugzilla.linux-nfs.org:CVE-2009-1630
CONFIRM:wiki.rpath.com:CVE-2009-1895
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2009-1630
DSA-1809
DSA-1844
DSA-1865
MANDRIVA:MDVSA-2009:135
MANDRIVA:MDVSA-2009:148
MLIST:[linux-nfs] 20090509 [NFS] [PATCH] nfs: Fix NFS v4 client handling of MAY_EXEC in nfs_permission.
MLIST:[nfsv4] 20061116 Status of execute permissions in NFSv4 ACLs ?
MLIST:[nfsv4] 20061117 [Patch] Re: Status of execute permissions in NFSv4 ACLs ?
MLIST:[oss-security] 20090513 CVE request: kernel: problem with NFS v4 client handling of MAY_EXEC in nfs_permission
OVAL:oval:org.mitre.oval:def:8543
OVAL:oval:org.mitre.oval:def:9990
RH:CVE-2009-1630
RHSA-2009:1106
RHSA-2009:1132
RHSA-2009:1157
SECUNIA:35106
SECUNIA:35298
SECUNIA:35394
SECUNIA:35656
SECUNIA:35847
SECUNIA:36051
SECUNIA:36327
SECUNIA:37471
SMASH Issue 60277
SUSE:SUSE-SA:2009:031
SUSE:SUSE-SA:2009:038
UBUNTU:CVE-2009-1630
UBUNTU:USN-793-1
VUPEN:ADV-2009-1331
VUPEN:ADV-2009-3316
bnc#1175689
rh#500297
CVE-2009-1633kernel-source-rt:Not affectedimportant ()BID:34612
CONFIRM:git.kernel.org:CVE-2009-1633
CONFIRM:www.kernel.org:CVE-2009-1633
CVE-2009-1633
MISC:git.kernel.org:MLIST:[oss-security] 20090514 Update - Re: CVE request? buffer overflow in CIFS in 2.6.*
MISC:git.kernel.org:MLIST:[oss-security] 20090515 Re: Re: Update - Re: CVE request? buffer overflow in CIFS in 2.6.*
MLIST:[oss-security] 20090429 Re: CVE request? buffer overflow in CIFS in 2.6.*
MLIST:[oss-security] 20090514 Re: Update - Re: CVE request? buffer overflow in CIFS in 2.6.*
MLIST:[oss-security] 20090514 Update - Re: CVE request? buffer overflow in CIFS in 2.6.*
MLIST:[oss-security] 20090515 Re: Re: Update - Re: CVE request? buffer overflow in CIFS in 2.6.*
RH:CVE-2009-1633
RHSA-2009:1106
RHSA-2009:1157
RHSA-2009:1211
SMASH Issue 40786
UBUNTU:CVE-2009-1633
rh#496572
CVE-2009-1883kernel-source-rt:Not affectedmoderate ()CVE-2009-1883
DSA-1929
MLIST:[oss-security] 20090915 CVE-2009-1883 kernel: missing capability check in z90crypt
MLIST:[oss-security] 20090915 Re: CVE-2009-1883 kernel: missing capability check in z90crypt
RH:CVE-2009-1883
RHSA-2009:1438
SECUNIA:37105
SMASH Issue 60795
UBUNTU:CVE-2009-1883
UBUNTU:USN-852-1
bnc#539879
rh#505983
CVE-2009-1895kernel-source-rt:Not affectedimportant ()BID:35647
BUGTRAQ:20090724 rPSA-2009-0111-1 kernel
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
BUGTRAQ:20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel
CONFIRM:bugs.launchpad.net:CVE-2009-1895
CONFIRM:git.kernel.org:CVE-2009-1895
CONFIRM:patchwork.kernel.org:CVE-2009-1895
CONFIRM:wiki.rpath.com:CVE-2009-1895
CONFIRM:www.kernel.org:CVE-2009-1895
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2009-1895
DSA-1844
DSA-1845
FEDORA:FEDORA-2009-8144
FEDORA:FEDORA-2009-8264
MANDRIVA:MDVSA-2011:051
MISC:blog.cr0.org:CVE-2009-1895
OSVDB:55807
RH:CVE-2009-1895
RHSA-2009:1193
RHSA-2009:1438
RHSA-2009:1540
RHSA-2009:1550
RHSA-2010:0079
SECUNIA:35801
SECUNIA:36045
SECUNIA:36051
SECUNIA:36054
SECUNIA:36116
SECUNIA:36131
SECUNIA:36759
SMASH Issue 55773
UBUNTU:CVE-2009-1895
UBUNTU:USN-807-1
VUPEN:ADV-2009-1866
VUPEN:ADV-2009-3316
bnc#521427
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f9fabcb58a6d26d6efde842d1703ac7cfa9427b6
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11768
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7826
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9453
rh#511171
CVE-2009-1961kernel-source-rt:Not affectedmoderate ()BID:35143
CONFIRM:git.kernel.org:CVE-2009-1961
CVE-2009-1961
DSA-1844
MANDRIVA:MDVSA-2009:135
MANDRIVA:MDVSA-2009:148
MISC:git.kernel.org:MLIST:[oss-security] 20090530 Re: CVE request: kernel: splice local denial of service
MLIST:[oss-security] 20090529 CVE request: kernel: splice local denial of service
MLIST:[oss-security] 20090530 Re: CVE request: kernel: splice local denial of service
MLIST:[oss-security] 20090602 Re: CVE request: kernel: splice local denial of service
MLIST:[oss-security] 20090603 Re: CVE request: kernel: splice local denial of service
RH:CVE-2009-1961
RHSA-2009:1157
SECTRACK:1022307
SECUNIA:35390
SECUNIA:35394
SECUNIA:35656
SECUNIA:35847
SECUNIA:36051
SMASH Issue 60936
SUSE:SUSE-SA:2009:030
SUSE:SUSE-SA:2009:031
SUSE:SUSE-SA:2009:038
UBUNTU:CVE-2009-1961
UBUNTU:USN-793-1
bnc#495065
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=7bfac9ecf0585962fe13584f5cf526d8c8e76f17
rh#503474
CVE-2009-2406kernel-source-rt:Not affectedmoderate ()BID:35851
BUGTRAQ:20090728 [RISE-2009002] Linux eCryptfs parse_tag_11_packet Literal Data Buffer Overflow Vulnerability
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
CONFIRM:git.kernel.org:CVE-2009-2406
CONFIRM:www.kernel.org:CVE-2009-2406
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2009-2406
DSA-1844
DSA-1845
FEDORA:FEDORA-2009-8144
FEDORA:FEDORA-2009-8264
MANDRIVA:MDVSA-2011:029
MISC:git.kernel.org:/
MISC:risesecurity.org:CVE-2009-2406
OVAL:oval:org.mitre.oval:def:10072
OVAL:oval:org.mitre.oval:def:8246
RH:CVE-2009-2406
RHSA-2009:1193
SECTRACK:1022663
SECUNIA:35985
SECUNIA:36045
SECUNIA:36051
SECUNIA:36054
SECUNIA:36116
SECUNIA:36131
SECUNIA:37471
SMASH Issue 61656
SUSE:SUSE-SR:2009:015
UBUNTU:CVE-2009-2406
UBUNTU:USN-807-1
VUPEN:ADV-2009-2041
VUPEN:ADV-2009-3316
bnc#523719
rh#512861
rh#512885
CVE-2009-2407kernel-source-rt:Not affectedmoderate ()BID:35850
BUGTRAQ:20090728 [RISE-2009003] Linux eCryptfs parse_tag_3_packet Encrypted Key Buffer Overflow Vulnerability
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
CONFIRM:git.kernel.org:CVE-2009-2407
CONFIRM:www.kernel.org:CVE-2009-2406
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2009-2407
DSA-1844
DSA-1845
FEDORA:FEDORA-2009-8144
FEDORA:FEDORA-2009-8264
MISC:git.kernel.org:/
MISC:risesecurity.org:CVE-2009-2407
OVAL:oval:org.mitre.oval:def:11255
OVAL:oval:org.mitre.oval:def:8057
RH:CVE-2009-2407
RHSA-2009:1193
SECUNIA:35985
SECUNIA:36045
SECUNIA:36051
SECUNIA:36054
SECUNIA:36116
SECUNIA:36131
SECUNIA:37471
SMASH Issue 61659
SUSE:SUSE-SR:2009:015
UBUNTU:CVE-2009-2407
UBUNTU:USN-807-1
VUPEN:ADV-2009-2041
VUPEN:ADV-2009-3316
bnc#523719
rh#512861
rh#512885
CVE-2009-2691kernel-source-rt:Not affectedmoderate ()BID:36019
CONFIRM:git.kernel.org:CVE-2009-2691
CVE-2009-2691
FEDORA:FEDORA-2009-9044
MLIST:[linux-kernel] 20090623 [PATCH 0/1] mm_for_maps: simplify, use ptrace_may_access()
MLIST:[linux-kernel] 20090623 [PATCH 1/1] mm_for_maps: simplify, use ptrace_may_access()
MLIST:[linux-kernel] 20090710 [PATCH 1/2] mm_for_maps: shift down_read(mmap_sem) to the caller
MLIST:[linux-kernel] 20090710 [PATCH 2/2] mm_for_maps: take ->cred_guard_mutex to fix the race
MLIST:[oss-security] 20090811 CVE-2009-2691 kernel: /proc/$pid/maps visible during initial setuid ELF loading
RH:CVE-2009-2691
RHSA-2009:1540
SECUNIA:36265
SECUNIA:36501
SMASH Issue 62136
UBUNTU:CVE-2009-2691
VUPEN:ADV-2009-2246
XF:linux-kernel-mmformaps-info-disclosure(52401)
bnc#529919
rh#516171
CVE-2009-2698kernel-source-rt:Not affectedimportant ()BID:36108
BUGTRAQ:20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
BUGTRAQ:20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel
CONFIRM:git.kernel.org:CVE-2009-2698
CONFIRM:support.avaya.com:CVE-2009-1389
CONFIRM:www.kernel.org:CVE-2009-2698
CONFIRM:www.vmware.com:CVE-2009-1895
CVE-2009-2698
DSA-1872
MANDRIVA:MDVSA-2011:051
MLIST:[oss-security] 20090825 CVE-2009-2698 kernel: udp socket NULL ptr dereference
OVAL:oval:org.mitre.oval:def:11514
OVAL:oval:org.mitre.oval:def:8557
OVAL:oval:org.mitre.oval:def:9142
RH:CVE-2009-2698
RHSA-2009:1222
RHSA-2009:1223
RHSA-2009:1233
RHSA-2009:1457
RHSA-2009:1469
SECTRACK:1022761
SECUNIA:23073
SECUNIA:36430
SECUNIA:36510
SECUNIA:37105
SECUNIA:37298
SECUNIA:37471
SMASH Issue 40473
SUSE:SUSE-SA:2009:046
UBUNTU:CVE-2009-2698
UBUNTU:USN-852-1
VUPEN:ADV-2009-3316
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1e0c14f49d6b393179f423abbac47f85618d3d46
rh#518034
CVE-2009-2767kernel-source-rt:Unsupportedimportant ()CONFIRM:git.kernel.org:CVE-2009-2767
CVE-2009-2767
MLIST:[linux-kernel] 20090804 Re: [PATCH] posix-timers: fix oops in clock_nanosleep() with CLOCK_MONOTONIC_RAW
MLIST:[oss-security] 20090806 CVE request: kernel: clock_nanosleep() with CLOCK_MONOTONIC_RAW NULL pointer dereference
RH:CVE-2009-2767
SECUNIA:36200
SMASH Issue 62189
UBUNTU:CVE-2009-2767
VUPEN:ADV-2009-2197
XF:linux-kernel-clocknanosleep-priv-escalation(52317)
bnc#529555
rh#515867
CVE-2009-2848kernel-source-rt:Not affectedmoderate ()CVE-2009-2848
DSA-1872
DSA-1928
L3:29692
MLIST:[linux-kernel] 20090801 [PATCH v2] execve: must clear current->clear_child_tid
MLIST:[oss-security] 20090804 CVE request - kernel: execve: must clear current->clear_child_tid
MLIST:[oss-security] 20090805 Re: CVE request - kernel: execve: must clear current->clear_child_tid
RH:CVE-2009-2848
RHSA-2009:1239
RHSA-2009:1243
RHSA-2009:1438
RHSA-2009:1466
RHSA-2009:1550
SECUNIA:35983
SMASH Issue 62262
SMASH Issue 84071
UBUNTU:CVE-2009-2848
XF:kernel-execve-dos(52899)
bnc#527865
rh#515423
CVE-2009-2903kernel-source-rt:Not affectedimportant ()BID:36379
CONFIRM:git.kernel.org:CVE-2009-2903
CVE-2009-2903
DSA-1915
DSA-1928
MANDRIVA:MDVSA-2009:329
MISC:git.kernel.org:/
MLIST:[oss-security] 20090914 CVE-2009-2903 kernel: appletalk: denial of service when handling IP tunnelled over DDP datagrams
MLIST:[oss-security] 20090914 Re: CVE-2009-2903 kernel: appletalk: denial of service when handling IP tunnelled over DDP datagrams
MLIST:[oss-security] 20090917 Re: CVE-2009-2903 kernel: appletalk: denial of service when handling IP tunnelled over DDP datagrams
RH:CVE-2009-2903
SECUNIA:36707
SECUNIA:37105
SECUNIA:37909
SMASH Issue 62330
SUSE:SUSE-SA:2009:061
SUSE:SUSE-SA:2009:064
SUSE:SUSE-SA:2010:012
SUSE:SUSE-SA:2010:013
UBUNTU:CVE-2009-2903
UBUNTU:USN-852-1
linux.git:commit:ffcfb8db540ff879c2a85bf7e404954281443414
rh#522331
CVE-2009-2908kernel-source-rt:Not affectedmoderate ()BID:36639
CONFIRM:git.kernel.org:CVE-2009-2908
CVE-2009-2908
DSA-1915
DSA-1928
FEDORA:FEDORA-2009-10525
MISC:bugs.launchpad.net:CVE-2009-2908
MISC:git.kernel.org:/
MLIST:[oss-security] 20091006 Kernel ecryptfs CVE id (CVE-2009-2908)
MLIST:[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates
OVAL:oval:org.mitre.oval:def:10216
OVAL:oval:org.mitre.oval:def:6992
RH:CVE-2009-2908
RHSA-2009:1548
SECUNIA:37075
SECUNIA:37105
SECUNIA:38794
SECUNIA:38834
SMASH Issue 62339
UBUNTU:CVE-2009-2908
UBUNTU:USN-852-1
VUPEN:ADV-2010-0528
XF:kernel-ecryptfs-dos(53693)
bnc#545274
rh#527534
CVE-2009-2909kernel-source-rt:Unsupportedimportant ()BID:36635
CONFIRM:git.kernel.org:CVE-2009-2909
CONFIRM:www.kernel.org:CVE-2009-3623
CVE-2009-2909
DSA-1915
DSA-1928
DSA-1929
FEDORA:FEDORA-2009-10525
MISC:git.kernel.org:/
MLIST:[linux-kernel] 20091002 [071/136] net ax25: Fix signed comparison in the sockopt handler
MLIST:[oss-security] 20091007 More kernel CVE info (CVE-2009-2909)
RH:CVE-2009-2909
SECUNIA:37075
SECUNIA:37351
SMASH Issue 62340
SUSE:SUSE-SA:2009:054
SUSE:SUSE-SA:2009:056
UBUNTU:CVE-2009-2909
UBUNTU:USN-864-1
rh#528887
CVE-2009-2910kernel-source-rt:Unsupportedlow ()BID:36576
CONFIRM:git.kernel.org:CVE-2009-2910
CONFIRM:support.avaya.com:CVE-2009-4272
CONFIRM:www.kernel.org:CVE-2009-3638
CVE-2009-2910
DSA-1915
DSA-1928
FEDORA:FEDORA-2009-10525
MLIST:[linux-kernel] 20091001 [tip:x86/urgent] x86: Don't leak 64-bit kernel register values to 32-bit processes
MLIST:[oss-security] 20091001 CVE Request (kernel)
MLIST:[oss-security] 20091001 Re: CVE Request (kernel)
MLIST:[oss-security] 20091002 Re: CVE Request (kernel)
MLIST:[oss-security] 20091009 Re: CVE Request (kernel)
OVAL:oval:org.mitre.oval:def:10823
OVAL:oval:org.mitre.oval:def:7359
RH:CVE-2009-2910
RHSA-2009:1540
RHSA-2009:1671
RHSA-2010:0046
RHSA-2010:0095
SECUNIA:36927
SECUNIA:37075
SECUNIA:37351
SMASH Issue 62344
SUSE:SUSE-SA:2009:054
SUSE:SUSE-SA:2009:056
SUSE:SUSE-SA:2010:012
UBUNTU:CVE-2009-2910
UBUNTU:USN-864-1
bnc#1175785
http://git.kernel.org/?p=linux/kernel/git/x86/linux-2.6-tip.git%3Ba=commit%3Bh=24e35800cdc4350fc34e2bed37b608a9e13ab3b6
rh#526788
CVE-2009-3234kernel-source-rt:Analysismoderate ()BID:36423
CVE-2009-3234
MLIST:[linux-kernel] 20090916 [patch 15/45] perf_counter: Fix buffer overflow in perf_copy_attr()
MLIST:[oss-security] 20090916 CVE request: kernel: perf_counter: Fix buffer overflow in perf_copy_attr()
MLIST:[oss-security] 20090917 Re: CVE request: kernel: perf_counter: Fix buffer overflow in perf_copy_attr()
RH:CVE-2009-3234
SMASH Issue 62795
UBUNTU:CVE-2009-3234
bnc#541652
CVE-2009-3286kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2009-3286
CVE-2009-3286
DSA-1915
DSA-1928
DSA-1929
MLIST:[oss-security] 20090921 CVE request: kernel: issue with O_EXCL creates on NFSv4
RH:CVE-2009-3286
RHSA-2009:1548
SMASH Issue 62879
UBUNTU:CVE-2009-3286
bnc#541648
rh#524520
CVE-2009-3288kernel-source-rt:Analysismoderate ()CVE-2009-3288
MLIST:[linux-kernel] 20090902 [BUG] 2.6.31-rc8 readcd Oops
MLIST:[linux-kernel] 20090903 [PATCH] sg: fix oops in the error path in sg_build_indirect()
MLIST:[oss-security] 20090904 CVE request: kernel: NULL pointer dereference in sg_build_indirect()
RH:CVE-2009-3288
SMASH Issue 62883
UBUNTU:CVE-2009-3288
bnc#537139
CVE-2009-3547kernel-source-rt:Not affectedimportant ()BID:36901
BUGTRAQ:20100625 VMSA-2010-0010 ESX 3.5 third party update for Service Console kernel
CONFIRM:git.kernel.org:CVE-2009-3547
CONFIRM:www.kernel.org:CVE-2009-3547
CVE-2009-3547
DSA-1927
DSA-1928
DSA-1929
FEDORA:FEDORA-2009-11038
MANDRIVA:MDVSA-2009:329
MISC:git.kernel.org:/
MLIST:[linux-kernel] 20091014 fs/pipe.c null pointer dereference
MLIST:[linux-kernel] 20091021 Re: [PATCH v4 1/1]: fs: pipe.c null pointer dereference + really sign off + unmangled diffs
MLIST:[oss-security] 20091103 CVE-2009-3547 kernel: fs: pipe.c null pointer dereference
MLIST:[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates
OVAL:oval:org.mitre.oval:def:11513
OVAL:oval:org.mitre.oval:def:7608
OVAL:oval:org.mitre.oval:def:9327
RH:CVE-2009-3547
RHSA-2009:1540
RHSA-2009:1541
RHSA-2009:1548
RHSA-2009:1550
RHSA-2009:1587
RHSA-2009:1588
RHSA-2009:1672
SECUNIA:37351
SECUNIA:38017
SECUNIA:38794
SECUNIA:38834
SMASH Issue 40897
SUSE:SUSE-SA:2009:054
SUSE:SUSE-SA:2009:056
SUSE:SUSE-SA:2010:001
SUSE:SUSE-SA:2010:012
UBUNTU:CVE-2009-3547
UBUNTU:USN-864-1
VUPEN:ADV-2010-0528
rh#530490
CVE-2009-3556kernel-source-rt:Not affectedlow ()CONFIRM:support.avaya.com:CVE-2009-4272
CVE-2009-3556
MLIST:[oss-security] 20100120 CVE-2009-3556 kernel: qla2xxx NPIV vport management pseudofiles are world writable
OVAL:oval:org.mitre.oval:def:6744
OVAL:oval:org.mitre.oval:def:9738
RH:CVE-2009-3556
RHSA-2010:0046
RHSA-2010:0095
SMASH Issue 63348
SUSE:SUSE-SA:2010:019
UBUNTU:CVE-2009-3556
XF:kernel-qla2xxx-security-bypass(55809)
bnc#572193
rh#537177
CVE-2009-3559perl:Already fixedimportant ()APPLE:APPLE-SA-2010-03-29-1
APPLE:APPLE-SA-2016-03-21-1
APPLE:APPLE-SA-2016-03-21-2
APPLE:APPLE-SA-2016-03-21-3
APPLE:APPLE-SA-2016-03-21-5
APPLE:APPLE-SA-2016-05-16-4
APPLE:APPLE-SA-2016-07-18-1
APPLE:APPLE-SA-2016-07-18-2
APPLE:APPLE-SA-2016-07-18-3
APPLE:APPLE-SA-2016-07-18-4
APPLE:APPLE-SA-2016-07-18-6
APPLE:APPLE-SA-2016-09-20
BID:100503
BID:100514
BID:100861
BID:103144
BID:103415
BID:103782
BID:103796
BID:103846
BID:103848
BID:103954
BID:104222
BID:104764
BID:104765
BID:104768
BID:104773
BID:104774
BID:104775
BID:104780
BID:104782
BID:105117
BID:105118
BID:105126
BID:105587
BID:105590
BID:105591
BID:105597
BID:105601
BID:105602
BID:105608
BID:105615
BID:105617
BID:105619
BID:105622
BID:105624
BID:105635
BID:105637
BID:105647
BID:105656
BID:105658
BID:106619
BID:106622
BID:106625
BID:106626
BID:106627
BID:106628
BID:67121
BID:69257
BID:70142
BID:74073
BID:74075
BID:74078
BID:74081
BID:74085
BID:74095
BID:74112
BID:76157
BID:76187
BID:76282
BID:76289
BID:76291
BID:79091
BID:82307
BID:82990
BID:84220
BID:84223
BID:84271
BID:85572
BID:85576
BID:85801
BID:86957
BID:90876
BID:91067
BID:91068
BID:91081
BID:91566
BID:91787
BID:91869
BID:93132
BID:93287
BID:93604
BID:93685
BID:93687
BID:93697
BID:93711
BID:93718
BID:93728
BID:93744
BID:94371
BID:94377
BID:94925
BID:95019
BID:95131
BID:95429
BID:95849
BID:96389
BID:96392
BID:96409
BID:96410
BID:96434
BID:96435
BID:96436
BID:97102
BID:97725
BID:97742
BID:97763
BID:97765
BID:97776
BID:97791
BID:97812
BID:97818
BID:97831
BID:97848
BID:97849
BID:97851
BID:99046
BUGTRAQ:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
BUGTRAQ:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
CISCO:20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016
CONFIRM:access.redhat.com:CVE-2014-0114
CONFIRM:access.redhat.com:CVE-2014-3577
CONFIRM:access.redhat.com:CVE-2015-0293
CONFIRM:access.redhat.com:CVE-2015-3456
CONFIRM:advisories.mageia.org:CVE-2014-0114
CONFIRM:advisories.mageia.org:CVE-2014-4330
CONFIRM:bto.bluecoat.com:CVE-2016-1950
CONFIRM:bto.bluecoat.com:CVE-2016-3191
CONFIRM:bto.bluecoat.com:CVE-2016-7052
CONFIRM:bugs.eclipse.org:CVE-2018-12539
CONFIRM:bugs.exim.org:CVE-2015-8381
CONFIRM:bugs.exim.org:CVE-2015-8382
CONFIRM:bugs.jython.org:CVE-2016-4000
CONFIRM:bugs.launchpad.net:CVE-2015-8866
CONFIRM:bugs.launchpad.net:CVE-2015-8867
CONFIRM:bugs.php.net:CVE-2015-8866
CONFIRM:bugs.php.net:CVE-2015-8867
CONFIRM:bugs.php.net:CVE-2015-8878
CONFIRM:bugs.php.net:CVE-2016-3141
CONFIRM:bugs.php.net:CVE-2016-4070
CONFIRM:bugzilla.mozilla.org:CVE-2016-1950
CONFIRM:bugzilla.mozilla.org:CVE-2016-1955
CONFIRM:bugzilla.mozilla.org:CVE-2016-1956
CONFIRM:bugzilla.mozilla.org:CVE-2016-1959
CONFIRM:bugzilla.mozilla.org:CVE-2016-1967
CONFIRM:bugzilla.mozilla.org:CVE-2016-1968
CONFIRM:bugzilla.mozilla.org:CVE-2016-1969
CONFIRM:bugzilla.mozilla.org:CVE-2016-1970
CONFIRM:bugzilla.mozilla.org:CVE-2016-1971
CONFIRM:bugzilla.mozilla.org:CVE-2016-1972
CONFIRM:bugzilla.mozilla.org:CVE-2016-1973
CONFIRM:bugzilla.mozilla.org:CVE-2016-1975
CONFIRM:bugzilla.mozilla.org:CVE-2016-1976
CONFIRM:bugzilla.redhat.com:CVE-2015-7559
CONFIRM:bugzilla.redhat.com:CVE-2016-9583
CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-412672.pdf
CONFIRM:codereview.chromium.org:CVE-2016-1675
CONFIRM:codereview.chromium.org:CVE-2016-1676
CONFIRM:codereview.chromium.org:CVE-2016-1677
CONFIRM:codereview.chromium.org:CVE-2016-1678
CONFIRM:codereview.chromium.org:CVE-2016-1679
CONFIRM:codereview.chromium.org:CVE-2016-1680
CONFIRM:codereview.chromium.org:CVE-2016-1681
CONFIRM:codereview.chromium.org:CVE-2016-1682
CONFIRM:codereview.chromium.org:CVE-2016-1685
CONFIRM:codereview.chromium.org:CVE-2016-1686
CONFIRM:codereview.chromium.org:CVE-2016-1687
CONFIRM:codereview.chromium.org:CVE-2016-1688
CONFIRM:codereview.chromium.org:CVE-2016-1689
CONFIRM:codereview.chromium.org:CVE-2016-1691
CONFIRM:codereview.chromium.org:CVE-2016-1692
CONFIRM:codereview.chromium.org:CVE-2016-1693
CONFIRM:codereview.chromium.org:CVE-2016-1694
CONFIRM:codereview.chromium.org:CVE-2016-1701
CONFIRM:commons.apache.org:CVE-2014-0114
CONFIRM:crbug.com:CVE-2016-1672
CONFIRM:crbug.com:CVE-2016-1673
CONFIRM:crbug.com:CVE-2016-1674
CONFIRM:crbug.com:CVE-2016-1675
CONFIRM:crbug.com:CVE-2016-1676
CONFIRM:crbug.com:CVE-2016-1677
CONFIRM:crbug.com:CVE-2016-1678
CONFIRM:crbug.com:CVE-2016-1679
CONFIRM:crbug.com:CVE-2016-1680
CONFIRM:crbug.com:CVE-2016-1681
CONFIRM:crbug.com:CVE-2016-1682
CONFIRM:crbug.com:CVE-2016-1683
CONFIRM:crbug.com:CVE-2016-1684
CONFIRM:crbug.com:CVE-2016-1685
CONFIRM:crbug.com:CVE-2016-1686
CONFIRM:crbug.com:CVE-2016-1687
CONFIRM:crbug.com:CVE-2016-1688
CONFIRM:crbug.com:CVE-2016-1689
CONFIRM:crbug.com:CVE-2016-1690
CONFIRM:crbug.com:CVE-2016-1691
CONFIRM:crbug.com:CVE-2016-1692
CONFIRM:crbug.com:CVE-2016-1693
CONFIRM:crbug.com:CVE-2016-1694
CONFIRM:crbug.com:CVE-2016-1695
CONFIRM:curl.haxx.se:CVE-2016-0755
CONFIRM:curl.haxx.se:CVE-2016-9586
CONFIRM:curl.haxx.se:CVE-2018-1000121
CONFIRM:developer.mozilla.org:CVE-2016-1950
CONFIRM:git.gnome.org:CVE-2016-1683
CONFIRM:git.gnome.org:CVE-2016-1684
CONFIRM:git.gnupg.org:CVE-2017-9526
CONFIRM:git.php.net:CVE-2015-8382
CONFIRM:git.php.net:CVE-2015-8866
CONFIRM:git.php.net:CVE-2015-8867
CONFIRM:git.php.net:CVE-2016-3141
CONFIRM:git.savannah.gnu.org:CVE-2014-9746
CONFIRM:git.savannah.gnu.org:CVE-2014-9747
CONFIRM:github.com:CVE-2013-7330
CONFIRM:github.com:CVE-2014-2058
CONFIRM:github.com:CVE-2014-2059
CONFIRM:github.com:CVE-2014-2061
CONFIRM:github.com:CVE-2014-2062
CONFIRM:github.com:CVE-2014-2063
CONFIRM:github.com:CVE-2014-2064
CONFIRM:github.com:CVE-2014-2065
CONFIRM:github.com:CVE-2014-2066
CONFIRM:github.com:CVE-2014-2067
CONFIRM:github.com:CVE-2014-2068
CONFIRM:github.com:CVE-2016-1182
CONFIRM:github.com:CVE-2016-4979
CONFIRM:github.com:CVE-2016-9389
CONFIRM:github.com:CVE-2016-9394
CONFIRM:github.com:CVE-2016-9583
CONFIRM:github.com:CVE-2016-9586
CONFIRM:github.com:CVE-2016-9840
CONFIRM:github.com:CVE-2016-9841
CONFIRM:github.com:CVE-2016-9842
CONFIRM:github.com:CVE-2016-9843
CONFIRM:github.com:CVE-2017-1000071
CONFIRM:github.com:CVE-2017-14735
CONFIRM:googlechromereleases.blogspot.com:CVE-2016-1695
CONFIRM:h20566.www2.hpe.com:CVE-2016-0763
CONFIRM:h20566.www2.hpe.com:CVE-2016-2014
CONFIRM:h20566.www2.hpe.com:CVE-2016-2183
CONFIRM:h20566.www2.hpe.com:CVE-2016-5388
CONFIRM:h20566.www2.hpe.com:CVE-2016-5773
CONFIRM:h20566.www2.hpe.com:CVE-2016-6306
CONFIRM:h20566.www2.hpe.com:CVE-2016-8518
CONFIRM:h20566.www2.hpe.com:CVE-2017-5787
CONFIRM:hg.mozilla.org:CVE-2016-1975
CONFIRM:hg.python.org:CVE-2016-4000
CONFIRM:httpd.apache.org:CVE-2016-4979
CONFIRM:issues.apache.org:CVE-2014-0114
CONFIRM:issues.apache.org:CVE-2015-1832
CONFIRM:issues.apache.org:CVE-2015-7559
CONFIRM:issues.apache.org:CVE-2016-1000031
CONFIRM:jenkins.io:CVE-2017-1000403
CONFIRM:kb.juniper.net:CVE-2015-3209
CONFIRM:kb.juniper.net:CVE-2016-7052
CONFIRM:kb.pulsesecure.net:CVE-2016-6306
CONFIRM:kc.mcafee.com:CVE-2016-6306
CONFIRM:mariadb.com:CVE-2015-2571
CONFIRM:metacpan.org:CVE-2014-4330
CONFIRM:nodejs.org:CVE-2016-7099
CONFIRM:nodesecurity.io:CVE-2013-7454
CONFIRM:nodesecurity.io:CVE-2014-9772
CONFIRM:nodesecurity.io:CVE-2015-8315
CONFIRM:nodesecurity.io:CVE-2015-8854
CONFIRM:nodesecurity.io:CVE-2015-8855
CONFIRM:nodesecurity.io:CVE-2015-8856
CONFIRM:nodesecurity.io:CVE-2015-8858
CONFIRM:nodesecurity.io:CVE-2015-8859
CONFIRM:nodesecurity.io:CVE-2015-8860
CONFIRM:nodesecurity.io:CVE-2015-8862
CONFIRM:nodesecurity.io:CVE-2016-4055
CONFIRM:php.net:CVE-2016-3142
CONFIRM:pivotal.io:CVE-2018-1258
CONFIRM:rwkbp.makekb.com:CVE-2015-8965
CONFIRM:security-tracker.debian.org:CVE-2016-1181
CONFIRM:security-tracker.debian.org:CVE-2016-1182
CONFIRM:security.netapp.com:CVE-2014-0114
CONFIRM:security.netapp.com:CVE-2015-2575
CONFIRM:security.netapp.com:CVE-2016-1000031
CONFIRM:security.netapp.com:CVE-2016-1182
CONFIRM:security.netapp.com:CVE-2016-4979
CONFIRM:security.netapp.com:CVE-2016-9843
CONFIRM:security.netapp.com:CVE-2017-10388
CONFIRM:security.netapp.com:CVE-2017-5645
CONFIRM:security.netapp.com:CVE-2018-1305
CONFIRM:security.netapp.com:CVE-2018-2973
CONFIRM:security.netapp.com:CVE-2019-2435
CONFIRM:support.apple.com:CVE-2009-0689
CONFIRM:support.apple.com:CVE-2016-1950
CONFIRM:support.apple.com:CVE-2016-4073
CONFIRM:support.apple.com:CVE-2016-4616
CONFIRM:support.apple.com:CVE-2016-4653
CONFIRM:support.apple.com:CVE-2016-7582
CONFIRM:support.apple.com:CVE-2017-13873
CONFIRM:support.apple.com:CVE-2017-13877
CONFIRM:support.apple.com:CVE-2017-6464
CONFIRM:support.f5.com:CVE-2015-8854
CONFIRM:support.f5.com:CVE-2016-2178
CONFIRM:support.hpe.com:CVE-2016-6306
CONFIRM:support.hpe.com:CVE-2016-7052
CONFIRM:support.hpe.com:CVE-2018-2940
CONFIRM:support.hpe.com:CVE-2018-2973
CONFIRM:svn.apache.org:CVE-2012-6153
CONFIRM:svn.apache.org:CVE-2015-1832
CONFIRM:vcs.pcre.org:CVE-2015-8382
CONFIRM:vcs.pcre.org:CVE-2015-8395
CONFIRM:www-01.ibm.com:CVE-2014-0114
CONFIRM:www-01.ibm.com:CVE-2014-3022
CONFIRM:www-01.ibm.com:CVE-2015-1832
CONFIRM:www-01.ibm.com:CVE-2016-3191
CONFIRM:www-01.ibm.com:CVE-2016-7052
CONFIRM:www.apache.org:CVE-2016-4979
CONFIRM:www.huawei.com:CVE-2016-6306
CONFIRM:www.ibm.com:CVE-2014-0963
CONFIRM:www.ibm.com:CVE-2018-1656
CONFIRM:www.lsexperts.de:CVE-2014-4330
CONFIRM:www.mozilla.org:CVE-2016-1950
CONFIRM:www.mozilla.org:CVE-2016-1955
CONFIRM:www.mozilla.org:CVE-2016-1956
CONFIRM:www.mozilla.org:CVE-2016-1959
CONFIRM:www.mozilla.org:CVE-2016-1967
CONFIRM:www.mozilla.org:CVE-2016-1968
CONFIRM:www.mozilla.org:CVE-2016-1969
CONFIRM:www.mozilla.org:CVE-2016-1973
CONFIRM:www.mozilla.org:CVE-2016-1976
CONFIRM:www.oracle.com:CVE-2014-0114
CONFIRM:www.oracle.com:CVE-2014-4271
CONFIRM:www.oracle.com:CVE-2014-6564
CONFIRM:www.oracle.com:CVE-2015-0437
CONFIRM:www.oracle.com:CVE-2015-2568
CONFIRM:www.oracle.com:CVE-2015-2579
CONFIRM:www.oracle.com:CVE-2015-4879
CONFIRM:www.oracle.com:CVE-2015-8391
CONFIRM:www.oracle.com:CVE-2016-0778
CONFIRM:www.oracle.com:CVE-2016-2802
CONFIRM:www.oracle.com:CVE-2016-4957
CONFIRM:www.oracle.com:CVE-2016-5240
CONFIRM:www.oracle.com:CVE-2016-5477
CONFIRM:www.oracle.com:CVE-2016-6302
CONFIRM:www.oracle.com:CVE-2016-6304
CONFIRM:www.oracle.com:CVE-2016-7039
CONFIRM:www.oracle.com:CVE-2016-7154
CONFIRM:www.oracle.com:CVE-2016-8296
CONFIRM:www.oracle.com:CVE-2017-10365
CONFIRM:www.oracle.com:CVE-2017-3456
CONFIRM:www.oracle.com:CVE-2017-3626
CONFIRM:www.oracle.com:CVE-2017-3636
CONFIRM:www.oracle.com:CVE-2017-5689
CONFIRM:www.oracle.com:CVE-2017-5709
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CONFIRM:www.oracle.com:CVE-2018-18223
CONFIRM:www.oracle.com:CVE-2018-2639
CONFIRM:www.oracle.com:CVE-2018-2819
CONFIRM:www.oracle.com:CVE-2018-3081
CONFIRM:www.oracle.com:CVE-2018-3125
CONFIRM:www.pcre.org:CVE-2015-2325
CONFIRM:www.php.net:CVE-2009-3558
CONFIRM:www.php.net:CVE-2016-9935
CONFIRM:www.php.net:CVE-2016-9936
CONFIRM:www.splunk.com:CVE-2016-6304
CONFIRM:www.tenable.com:CVE-2016-4055
CONFIRM:www.tenable.com:CVE-2016-7052
CONFIRM:www.tenable.com:CVE-2016-8625
CONFIRM:www.tenable.com:CVE-2016-9260
CONFIRM:www.tenable.com:CVE-2016-9261
CONFIRM:www.vmware.com:CVE-2014-0114
CONFIRM:www.vmware.com:CVE-2014-8371
CONFIRM:x-stream.github.io:CVE-2013-7285
CVE-2009-3559
CVE-2012-6153
CVE-2013-7285
CVE-2013-7451
CVE-2013-7452
CVE-2013-7453
CVE-2013-7454
CVE-2014-0114
CVE-2014-0245
CVE-2014-3540
CVE-2014-4172
CVE-2014-4330
CVE-2014-4651
CVE-2014-7192
CVE-2014-9745
CVE-2014-9746
CVE-2014-9747
CVE-2014-9772
CVE-2015-0405
CVE-2015-0423
CVE-2015-0433
CVE-2015-0438
CVE-2015-0439
CVE-2015-0441
CVE-2015-0498
CVE-2015-0499
CVE-2015-0500
CVE-2015-0501
CVE-2015-0503
CVE-2015-0505
CVE-2015-0506
CVE-2015-0507
CVE-2015-0508
CVE-2015-0511
CVE-2015-0852
CVE-2015-1832
CVE-2015-2325
CVE-2015-2326
CVE-2015-2566
CVE-2015-2567
CVE-2015-2568
CVE-2015-2571
CVE-2015-2573
CVE-2015-2575
CVE-2015-2576
CVE-2015-2613
CVE-2015-5125
CVE-2015-5127
CVE-2015-5128
CVE-2015-5129
CVE-2015-5130
CVE-2015-5131
CVE-2015-5132
CVE-2015-5134
CVE-2015-5328
CVE-2015-5539
CVE-2015-5540
CVE-2015-5541
CVE-2015-5544
CVE-2015-5545
CVE-2015-5551
CVE-2015-5552
CVE-2015-5553
CVE-2015-5554
CVE-2015-5555
CVE-2015-5556
CVE-2015-5557
CVE-2015-5558
CVE-2015-5559
CVE-2015-5560
CVE-2015-5561
CVE-2015-5564
CVE-2015-5565
CVE-2015-5566
CVE-2015-7559
CVE-2015-7940
CVE-2015-8315
CVE-2015-8381
CVE-2015-8382
CVE-2015-8383
CVE-2015-8384
CVE-2015-8385
CVE-2015-8386
CVE-2015-8387
CVE-2015-8388
CVE-2015-8389
CVE-2015-8390
CVE-2015-8391
CVE-2015-8392
CVE-2015-8393
CVE-2015-8394
CVE-2015-8395
CVE-2015-8854
CVE-2015-8855
CVE-2015-8856
CVE-2015-8857
CVE-2015-8858
CVE-2015-8859
CVE-2015-8860
CVE-2015-8861
CVE-2015-8862
CVE-2015-8878
CVE-2015-8965
CVE-2015-9251
CVE-2016-0635
CVE-2016-0755
CVE-2016-1000031
CVE-2016-1181
CVE-2016-1182
CVE-2016-1672
CVE-2016-1673
CVE-2016-1674
CVE-2016-1675
CVE-2016-1676
CVE-2016-1677
CVE-2016-1678
CVE-2016-1679
CVE-2016-1680
CVE-2016-1681
CVE-2016-1682
CVE-2016-1683
CVE-2016-1684
CVE-2016-1685
CVE-2016-1686
CVE-2016-1687
CVE-2016-1688
CVE-2016-1689
CVE-2016-1690
CVE-2016-1691
CVE-2016-1692
CVE-2016-1693
CVE-2016-1694
CVE-2016-1695
CVE-2016-1950
CVE-2016-1955
CVE-2016-1956
CVE-2016-1959
CVE-2016-1967
CVE-2016-1968
CVE-2016-1969
CVE-2016-1970
CVE-2016-1971
CVE-2016-1972
CVE-2016-1973
CVE-2016-1975
CVE-2016-1976
CVE-2016-2178
CVE-2016-2515
CVE-2016-2537
CVE-2016-3141
CVE-2016-3142
CVE-2016-4000
CVE-2016-4055
CVE-2016-4070
CVE-2016-4612
CVE-2016-4619
CVE-2016-4979
CVE-2016-5483
CVE-2016-5501
CVE-2016-5538
CVE-2016-5605
CVE-2016-5608
CVE-2016-5610
CVE-2016-5611
CVE-2016-5613
CVE-2016-5616
CVE-2016-5617
CVE-2016-5684
CVE-2016-6814
CVE-2016-9389
CVE-2016-9392
CVE-2016-9583
CVE-2016-9586
CVE-2016-9840
CVE-2016-9841
CVE-2016-9842
CVE-2017-0379
CVE-2017-13745
CVE-2017-14229
CVE-2017-14735
CVE-2017-15095
CVE-2017-16012
CVE-2017-3308
CVE-2017-3309
CVE-2017-3329
CVE-2017-3453
CVE-2017-3454
CVE-2017-3456
CVE-2017-3461
CVE-2017-3462
CVE-2017-3463
CVE-2017-3464
CVE-2017-3468
CVE-2017-3600
CVE-2017-9526
CVE-2018-1000121
CVE-2018-12539
CVE-2018-1258
CVE-2018-1517
CVE-2018-1656
CVE-2018-2767
CVE-2018-2797
CVE-2018-2815
CVE-2018-2825
CVE-2018-2826
CVE-2018-2909
CVE-2018-2938
CVE-2018-2940
CVE-2018-2941
CVE-2018-2952
CVE-2018-2964
CVE-2018-2972
CVE-2018-2973
CVE-2018-3005
CVE-2018-3055
CVE-2018-3085
CVE-2018-3086
CVE-2018-3087
CVE-2018-3088
CVE-2018-3089
CVE-2018-3090
CVE-2018-3091
CVE-2018-3127
CVE-2018-3134
CVE-2018-3136
CVE-2018-3139
CVE-2018-3149
CVE-2018-3150
CVE-2018-3169
CVE-2018-3180
CVE-2018-3183
CVE-2018-3209
CVE-2018-3211
CVE-2018-3214
CVE-2018-3287
CVE-2018-3288
CVE-2018-3289
CVE-2018-3290
CVE-2018-3291
CVE-2018-3292
CVE-2018-3293
CVE-2018-3294
CVE-2018-3295
CVE-2018-3296
CVE-2018-3297
CVE-2018-3298
CVE-2019-2422
CVE-2019-2426
CVE-2019-2449
CVE-2019-2455
CVE-2019-2481
CVE-2019-2482
CVE-2019-2503
CVE-2019-2507
CVE-2019-2510
CVE-2019-2513
CVE-2019-2528
CVE-2019-2529
CVE-2019-2530
CVE-2019-2531
CVE-2019-2532
CVE-2019-2533
CVE-2019-2534
CVE-2019-2535
CVE-2019-2536
CVE-2019-2537
CVE-2019-2539
CVE-2019-2540
CVE-2024-2466
D:CVE-2015-2301
D:CVE-2015-2571
D:CVE-2015-2573
D:CVE-2015-2575
D:CVE-2015-2576
D:CVE-2015-5557
D:CVE-2015-5558
D:CVE-2015-5559
D:CVE-2015-5560
D:CVE-2015-5561
D:CVE-2015-5562
D:CVE-2015-5563
D:CVE-2015-5564
D:CVE-2015-5565
D:CVE-2015-8386
D:CVE-2015-8387
D:CVE-2015-8388
D:CVE-2015-8389
D:CVE-2015-8390
D:CVE-2015-8391
D:CVE-2015-8392
D:CVE-2015-8393
D:CVE-2015-8394
D:CVE-2015-8395
D:CVE-2016-1674
D:CVE-2016-1682
D:CVE-2016-1694
D:CVE-2016-1695
D:CVE-2016-1950
D:CVE-2016-1970
D:CVE-2016-1973
D:CVE-2016-2178
D:CVE-2016-3141
D:CVE-2016-4055
D:CVE-2016-5608
D:CVE-2016-5610
D:CVE-2016-9586
D:CVE-2017-9526
D:CVE-2018-1517
D:CVE-2018-1656
D:CVE-2018-3297
D:CVE-2018-3298
D:CVE-2022-2590
DEBIAN:DSA-3959
DEBIAN:DSA-4136
DEBIAN:DSA-4268
DEBIAN:DSA-4281
DEBIAN:DSA-4341
DSA-2940
DSA-3229
DSA-3311
DSA-3370
DSA-3392
DSA-3417
DSA-3455
DSA-3510
DSA-3520
DSA-3590
DSA-3605
DSA-3621
DSA-3673
DSA-3688
DSA-3834
DSA-3880
DSA-3893
DSA-3944
DSA-4136
DSA-4281
DSA-5378
EXPLOIT-DB:37852
EXPLOIT-DB:37854
EXPLOIT-DB:37855
EXPLOIT-DB:37856
EXPLOIT-DB:37857
EXPLOIT-DB:37859
EXPLOIT-DB:37861
FEDORA:FEDORA-2014-11453
FEDORA:FEDORA-2014-9380
FEDORA:FEDORA-2015-16104
FEDORA:FEDORA-2015-16105
FEDORA:FEDORA-2015-16106
FEDORA:FEDORA-2015-7d95466eda
FEDORA:FEDORA-2015-992342e82f
FEDORA:FEDORA-2015-decbab7c9f
FEDORA:FEDORA-2015-eb896290d3
FEDORA:FEDORA-2016-3fa315a5dd
FEDORA:FEDORA-2016-55137a3adb
FEDORA:FEDORA-2016-57bebab3b6
FEDORA:FEDORA-2016-5a141de5d9
FREEBSD:FreeBSD-SA-16:26
FULLDISC:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
FULLDISC:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
FULLDISC:20160706 CVE-2016-4979: HTTPD webserver - X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs]
FULLDISC:20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities
GENTOO:GLSA-201507-19
GENTOO:GLSA-201605-06
GENTOO:GLSA-201607-02
GENTOO:GLSA-201607-07
GENTOO:GLSA-201607-09
GENTOO:GLSA-201610-02
GENTOO:GLSA-201612-16
GENTOO:GLSA-201612-27
GENTOO:GLSA-201701-47
GENTOO:GLSA-201701-56
GENTOO:GLSA-201701-68
GENTOO:GLSA-201710-28
GLSA-201908-24
GLSA-202007-54
HP:HPSBGN03041
HP:HPSBMU03090
HP:HPSBST03160
IBM Security Bulletin 0713459 (Cognos Business Intelligence)
IBM Security Bulletin 0713487 (Rational Collaborative Lifecycle Management)
IBM Security Bulletin 0715641 (Cognos Business Intelligence)
IBM Security Bulletin 0715721 (Agile Lifecycle Manager)
IBM Security Bulletin 0716285 (Cognos TM1)
IBM Security Bulletin 0716289 (Cognos Insight)
IBM Security Bulletin 0717693 (Tivoli Monitoring V6)
IBM Security Bulletin 0717727 (Tivoli Monitoring V6)
IBM Security Bulletin 0717895 (Rational Business Developer)
IBM Security Bulletin 0718381 (Platform Symphony)
IBM Security Bulletin 0718421 (InfoSphere Guardium Data Redaction)
IBM Security Bulletin 0718447 (Cognos Planning)
IBM Security Bulletin 0718949 (Cloud Manager with Openstack)
IBM Security Bulletin 0719163 (Rational Reporting for Development Intelligence)
IBM Security Bulletin 0719165 (Rational Insight)
IBM Security Bulletin 0720115 (Spectrum Conductor with Spark)
IBM Security Bulletin 0728577 (Content Classification)
IBM Security Bulletin 0729341 (ILOG CPLEX Optimization Studio)
IBM Security Bulletin 0729343 (Decision Optimization Center)
IBM Security Bulletin 0729607 (WebSphere Application Server)
IBM Security Bulletin 0735319 (Tivoli System Automation Application Manager)
IBM Security Bulletin 0735477 (Spectrum Conductor)
IBM Security Bulletin 0737281 (Application Delivery Intelligence)
IBM Security Bulletin 0738853 (Tivoli Monitoring V6)
IBM Security Bulletin 0739057 (Sterling Connect:Direct for Microsoft Windows)
IBM Security Bulletin 0739549 (Sterling Connect:Direct File Agent)
IBM Security Bulletin 0739701 (Sterling Connect:Direct FTP+)
IBM Security Bulletin 0739763 (Sterling Connect:Direct for UNIX)
IBM Security Bulletin 0743351 (Workload Scheduler)
IBM Security Bulletin 0792275 (Tivoli Netcool/Impact)
IBM Security Bulletin 2015806 (Runtimes for Java Technology)
IBM Security Bulletin 2016406 (Decision Optimization Center)
IBM Security Bulletin 2016663 (Tivoli Netcool OMNIbus)
IBM Security Bulletin 2016776 (Content Collector)
IBM Security Bulletin 2016781 (Content Collector for SAP Applications)
IBM Security Bulletin 2016827 (MessageSight)
IBM Security Bulletin 2017431 (PureApplication System)
IBM Security Bulletin 2017432 (PureApplication System)
IBM Security Bulletin 2017449 (Web Experience Factory)
IBM Security Bulletin 2017554 (Rational Software Architect)
IBM Security Bulletin 715641 (Cognos Business Intelligence Server)
IBM Security Bulletin 717121 (Cognos Controller)
IBM Security Bulletin 717125 (MQ Appliance)
IBM Security Bulletin 719933 (Tivoli Application Dependency Discovery Manager)
IBM Security Bulletin 720173 (Transformation Extender)
IBM Security Bulletin 725491 (DB2 for Linux, UNIX and Windows)
IBM Security Bulletin 726009 (DataPower Gateways)
IBM Security Bulletin 728399 (WebSphere Service Registry and Repository)
IBM Security Bulletin 728567 (Algo Credit Manager)
IBM Security Bulletin 728607 (PureApplication System)
IBM Security Bulletin 729116 (Spectrum Protect Plus)
IBM Security Bulletin 729699 (QRadar SIEM)
IBM Security Bulletin 729745 (WebSphere Application Server Patterns)
IBM Security Bulletin 730083 (Rational ClearCase)
IBM Security Bulletin 730311 (Cognos Command Center)
IBM Security Bulletin 730799 (Spectrum Control Standard Edition)
IBM Security Bulletin 730909 (AIX family)
IBM Security Bulletin 731323 (Financial Transaction Manager)
IBM Security Bulletin 731325 (Financial Transaction Manager)
IBM Security Bulletin 731329 (i)
IBM Security Bulletin 731331 (Financial Transaction Manager)
IBM Security Bulletin 731337 (Financial Transaction Manager)
IBM Security Bulletin 731339 (Financial Transaction Manager)
IBM Security Bulletin 731419 (Rational Software Architect Designer)
IBM Security Bulletin 731507 (Rational Software Architect Design Manager)
IBM Security Bulletin 731615 (Process Designer)
IBM Security Bulletin 731641 (InfoSphere Guardium Data Redaction)
IBM Security Bulletin 731875 (FileNet System Monitor)
IBM Security Bulletin 732375 (Initiate Master Data Service)
IBM Security Bulletin 732455 (Rational Performance Tester)
IBM Security Bulletin 732457 (Rational Service Tester for SOA Quality)
IBM Security Bulletin 732723 (Tivoli Application Dependency Discovery Manager)
IBM Security Bulletin 732753 (Agile Lifecycle Manager)
IBM Security Bulletin 732785 (Security Guardium)
IBM Security Bulletin 732846 (Spectrum Symphony)
IBM Security Bulletin 732850 (App Connect Enterprise)
IBM Security Bulletin 732896 (Planning Analytics)
IBM Security Bulletin 732932 (SPSS Statistics)
IBM Security Bulletin 733068 (Liberty for Java for Bluemix)
IBM Security Bulletin 733457 (Tivoli Netcool/OMNIbus)
IBM Security Bulletin 733543 (Tivoli Netcool/Impact)
IBM Security Bulletin 733845 (Integration Designer)
IBM Security Bulletin 733857 (Rational DOORS Web Access)
IBM Security Bulletin 733869 (DataPower Gateways)
IBM Security Bulletin 733905 (Rational Application Developer for WebSphere Software)
IBM Security Bulletin 734161 (WebSphere Application Server in Cloud)
IBM Security Bulletin 734595 (Rational Build Forge)
IBM Security Bulletin 735325 (Tivoli System Automation for Multiplatforms)
IBM Security Bulletin 735421 (MessageSight)
IBM Security Bulletin 735481 (Rational Directory Server)
IBM Security Bulletin 735515 (Rational Host On-Demand)
IBM Security Bulletin 735541 (Rational Method Composer)
IBM Security Bulletin 735551 (Runtimes for Java Technology)
IBM Security Bulletin 735807 (Tivoli Monitoring V6)
IBM Security Bulletin 737495 (Cloud App Management)
IBM Security Bulletin 737775 (Web Experience Factory)
IBM Security Bulletin 737813 (Content Collector for SAP Applications)
IBM Security Bulletin 738337 (Monitoring)
IBM Security Bulletin 738347 (Rational Publishing Engine)
IBM Security Bulletin 738633 (WebSphere Service Registry and Repository)
IBM Security Bulletin 738729 (Installation Manager)
IBM Security Bulletin 738743 (Rational Developer for i)
IBM Security Bulletin 738905 (Cognos Insight)
IBM Security Bulletin 738907 (Cognos TM1)
IBM Security Bulletin 738985 (WebSphere MQ)
IBM Security Bulletin 738997 (MQ)
IBM Security Bulletin 739183 (http://www.ibm.com/support/docview.wss?uid=ibm10739183)
IBM Security Bulletin 739227 (Cloud Orchestrator)
IBM Security Bulletin 739231 (Algo Credit Manager)
IBM Security Bulletin 739251 (Decision Optimization Center)
IBM Security Bulletin 739261 (Monitoring)
IBM Security Bulletin 739387 (Spectrum Protect for Virtual Environments)
IBM Security Bulletin 739455 (Spectrum Protect Snapshot)
IBM Security Bulletin 739941 (Content Collector)
IBM Security Bulletin 739985 (WebSphere Application Server Patterns)
IBM Security Bulletin 740269 (Notes)
IBM Security Bulletin 740383 (Sterling Connect:Direct Browser User Interface)
IBM Security Bulletin 740419 (Security Access Manager Appliance)
IBM Security Bulletin 740447 (Operational Decision Manager)
IBM Security Bulletin 740467 (Tivoli Storage Manager FastBack)
IBM Security Bulletin 740673 (Control Center)
IBM Security Bulletin 741745 (Tivoli Composite Application Manager (ITCAM) for Transactions)
IBM Security Bulletin 742369 (Security SiteProtector System)
IBM Security Bulletin 742729 (QRadar SIEM)
IBM Security Bulletin 743071 (Rational Asset Analyzer)
IBM Security Bulletin 743149 (Financial Transaction Manager)
IBM Security Bulletin 743157 (Financial Transaction Manager)
IBM Security Bulletin 743193 (Spectrum Protect)
IBM Security Bulletin 743961 (Rational Publishing Engine)
IBM Security Bulletin 744823 (Rational Collaborative Lifecycle Management)
IBM Security Bulletin 787583 (API Connect)
IBM Security Bulletin 787833 (AIX family)
IBM Security Bulletin 788277 (WebSphere Cast Iron)
IBM Security Bulletin 789805 (WebSphere MQ)
IBM Security Bulletin 791171 (Rational DOORS Web Access)
IBM Security Bulletin 791855 (WebSphere eXtreme Scale)
IBM Security Bulletin 791861 (WebSphere DataPower XC10 Appliance)
IBM Security Bulletin 792239 (Cloud Manager with Openstack)
IBM Security Bulletin T1027807 (AIX family)
JVN:JVN#03188560
JVN:JVN#65044642
JVNDB:JVNDB-2016-000096
JVNDB:JVNDB-2016-000097
L3:42159
L3:44989
L3:45334
L3:45906
L3:53225
MANDRIVA:MDVSA-2009:302
MANDRIVA:MDVSA-2014:095
MANDRIVA:MDVSA-2015:136
MANDRIVA:MDVSA-2015:227
MISC:access.redhat.com:CVE-2014-0245
MISC:access.redhat.com:MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MISC:blog.diniscruz.com:CVE-2013-7285
MISC:blogs.gentoo.org:CVE-2016-9399
MISC:bugs.exim.org:CVE-2015-2325
MISC:bugs.exim.org:CVE-2015-2326
MISC:bugs.launchpad.net:MLIST:[oss-security] 20150911 CVE Request: 2 FreeType issues
MISC:bugs.php.net:CVE-2009-3559
MISC:bugzilla.redhat.com:CVE-2014-0245
MISC:bugzilla.redhat.com:CVE-2016-9586
MISC:curl.haxx.se
MISC:curl.haxx.se:OSS:2018/Q1/235
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:developer.mozilla.org:CVE-2016-1979
MISC:eprint.iacr.org:CVE-2016-2178
MISC:eprint.iacr.org:CVE-2017-0379
MISC:exchange.xforce.ibmcloud.com:CVE-2014-4172
MISC:fortiguard.com:CVE-2015-2325
MISC:fortiguard.com:CVE-2015-2326
MISC:git.gnupg.org:CVE-2017-0379
MISC:git.openssl.org:MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MISC:github.com:CVE-2014-4172
MISC:github.com:CVE-2015-9251
MISC:github.com:CVE-2017-14229
MISC:github.com:MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
MISC:github.com:OSS:2018/Q1/235
MISC:github.com:OSS:2024/Q1/256
MISC:ics-cert.us-cert.gov:CVE-2015-9251
MISC:issues.apache.org:CVE-2014-4651
MISC:issues.jasig.org:CVE-2014-4172
MISC:lists.apache.org:CVE-2018-1305
MISC:lists.debian.org:CVE-2017-0379
MISC:lists.fedoraproject.org:CVE-2014-4172
MISC:mail-archives.apache.org:CVE-2016-6814
MISC:nodesecurity.io:CVE-2014-10064
MISC:nodesecurity.io:CVE-2015-8857
MISC:nodesecurity.io:MLIST:[oss-security] 20160420 various vulnerabilities in Node.js packages
MISC:packetstormsecurity.com:CVE-2014-4330
MISC:packetstormsecurity.com:CVE-2016-0755
MISC:packetstormsecurity.com:CVE-2016-4979
MISC:savannah.nongnu.org:CVE-2014-9747
MISC:seclists.org:CVE-2014-4651
MISC:security-tracker.debian.org:CVE-2016-4000
MISC:security-tracker.debian.org:CVE-2017-0379
MISC:snyk.io:CVE-2015-9251
MISC:snyk.io:CVE-2016-4000
MISC:sw.aveva.com:CVE-2015-9251
MISC:web-in-security.blogspot.ca:CVE-2015-7940
MISC:web.archive.org:CVE-2013-7285
MISC:wiki.mozilla.org:CVE-2016-9843
MISC:www.arista.com:CVE-2016-6306
MISC:www.debian.org:CVE-2014-4172
MISC:www.mail-archive.com:CVE-2014-4172
MISC:www.openssl.org:CVE-2016-6302
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2014-0107
MISC:www.oracle.com:CVE-2015-7501
MISC:www.oracle.com:CVE-2016-1000031
MISC:www.sourceclear.com:CVE-2015-8861
MISC:www.talosintelligence.com:CVE-2016-5684
MISC:www.tenable.com:CVE-2016-1000031
MISC:www.tenable.com:CVE-2016-6793
MLIST:[activemq-issues] 20190718 [jira] [Updated] (AMQ-7236) SEV-1 Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring framework) and xstream-1.4.10.jar
MLIST:[activemq-issues] 20190826 [jira] [Created] (AMQ-7288) Security Vulnerabilities in ActiveMQ dependent libraries.
MLIST:[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior
MLIST:[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[debian-lts-announce] 20180306 [SECURITY] [DLA 1301-1] tomcat7 security update
MLIST:[debian-lts-announce] 20180318 [SECURITY] [DLA 1309-1] curl security update
MLIST:[debian-lts-announce] 20180627 [SECURITY] [DLA 1400-1] tomcat7 security update
MLIST:[debian-lts-announce] 20180729 [SECURITY] [DLA 1450-1] tomcat8 security update
MLIST:[debian-lts-announce] 20181105 [SECURITY] [DLA 1566-1] mysql-5.5 security update
MLIST:[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update
MLIST:[debian-lts-announce] 20181122 [SECURITY] [DLA 1590-1] openjdk-7 security update
MLIST:[debian-lts-announce] 20190201 [SECURITY] [DLA 1655-1] mariadb-10.0 security update
MLIST:[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update
MLIST:[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update
MLIST:[flink-dev] 20190811 Apache flink 1.7.2 security issues
MLIST:[flink-user] 20190811 Apache flink 1.7.2 security issues
MLIST:[flink-user] 20190813 Apache flink 1.7.2 security issues
MLIST:[flink-user] 20190813 Re: Apache flink 1.7.2 security issues
MLIST:[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20....
MLIST:[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20....
MLIST:[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20....
MLIST:[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20....
MLIST:[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
MLIST:[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
MLIST:[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html secu...
MLIST:[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html se...
MLIST:[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
MLIST:[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
MLIST:[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/
MLIST:[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.h...
MLIST:[oss-security] 20091120 CVE request: php 5.3.1 update
MLIST:[oss-security] 20091120 Re: CVE request: php 5.3.1 update
MLIST:[oss-security] 20140109 Re: CVE request: remote code execution via deserialization in XStream
MLIST:[oss-security] 20140220 Re: Possible CVE Requests: several issues fixed in Jenkins (Advisory 2014-02-14)
MLIST:[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE
MLIST:[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE
MLIST:[oss-security] 20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
MLIST:[oss-security] 20150804 Re: CVE Request: Information disclosure in pcre
MLIST:[oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp
MLIST:[oss-security] 20150911 CVE Request: 2 FreeType issues
MLIST:[oss-security] 20150925 Re: CVE Request: 2 FreeType issues
MLIST:[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle
MLIST:[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle
MLIST:[oss-security] 20151128 Re: Heap Overflow in PCRE
MLIST:[oss-security] 20160420 various vulnerabilities in Node.js packages
MLIST:[oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases
MLIST:[oss-security] 20160608 CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MLIST:[oss-security] 20160609 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MLIST:[oss-security] 20160705 CVE-2016-4979: HTTPD webserver - X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs]
MLIST:[oss-security] 20161117 Re: jasper: multiple assertion failures
MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
MLIST:[perl.perl5.porters] 20140918 fix for CVE-2014-4330 present in blead
MLIST:[php-announce] 20091119 5.3.1 Release announcement
MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
MLIST:[xstream-user] 20130717 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper
MLIST:[xstream-user] 20130718 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper
OSS:2015/Q4/414
OSS:2015/Q4/419
OSS:2015/Q4/422
OSS:2016/Q1/258
OSS:2016/Q1/625
OSS:2016/Q2/122
OSS:2016/Q2/493
OSS:2016/Q4/602
OSS:2016/Q4/719
OSS:2017/Q2/418
OSS:2017/Q4/297
OSS:2017/Q4/298
OSS:2017/Q4/299
OSS:2017/Q4/300
OSS:2017/Q4/301
OSS:2017/Q4/59
OSS:2017/Q4/60
OSS:2018/Q1/174
OSS:2018/Q1/235
OSS:2018/Q2/21
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/11/10/2
OSS:2022/Q3/99
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2024/03/27/4
OSS:2024/Q1/256
Oracle:CVE-2011-4461
Oracle:CVE-2013-1768
Oracle:CVE-2014-0114
Oracle:CVE-2014-3490
Oracle:CVE-2014-3577
Oracle:CVE-2015-0204
Oracle:CVE-2015-0235
Oracle:CVE-2015-0405
Oracle:CVE-2015-0423
Oracle:CVE-2015-0433
Oracle:CVE-2015-0438
Oracle:CVE-2015-0439
Oracle:CVE-2015-0441
Oracle:CVE-2015-0498
Oracle:CVE-2015-0499
Oracle:CVE-2015-0500
Oracle:CVE-2015-0501
Oracle:CVE-2015-0503
Oracle:CVE-2015-0505
Oracle:CVE-2015-0506
Oracle:CVE-2015-0507
Oracle:CVE-2015-0508
Oracle:CVE-2015-0511
Oracle:CVE-2015-1832
Oracle:CVE-2015-2566
Oracle:CVE-2015-2567
Oracle:CVE-2015-2568
Oracle:CVE-2015-2571
Oracle:CVE-2015-2573
Oracle:CVE-2015-2575
Oracle:CVE-2015-2576
Oracle:CVE-2015-5600
Oracle:CVE-2015-6937
Oracle:CVE-2015-7501
Oracle:CVE-2015-7940
Oracle:CVE-2015-8965
Oracle:CVE-2015-9251
Oracle:CVE-2016-0635
Oracle:CVE-2016-0714
Oracle:CVE-2016-0729
Oracle:CVE-2016-1000031
Oracle:CVE-2016-1181
Oracle:CVE-2016-1182
Oracle:CVE-2016-1950
Oracle:CVE-2016-2099
Oracle:CVE-2016-2107
Oracle:CVE-2016-2176
Oracle:CVE-2016-2179
Oracle:CVE-2016-2183
Oracle:CVE-2016-3092
Oracle:CVE-2016-3506
Oracle:CVE-2016-4000
Oracle:CVE-2016-4055
Oracle:CVE-2016-4979
Oracle:CVE-2016-5007
Oracle:CVE-2016-5019
Oracle:CVE-2016-5080
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2016-5501
Oracle:CVE-2016-5538
Oracle:CVE-2016-5605
Oracle:CVE-2016-5608
Oracle:CVE-2016-5610
Oracle:CVE-2016-5611
Oracle:CVE-2016-5613
Oracle:CVE-2016-5616
Oracle:CVE-2016-5617
Oracle:CVE-2016-5684
Oracle:CVE-2016-6304
Oracle:CVE-2016-6814
Oracle:CVE-2016-7103
Oracle:CVE-2016-7167
Oracle:CVE-2016-9583
Oracle:CVE-2016-9841
Oracle:CVE-2016-9843
Oracle:CVE-2016-9878
Oracle:CVE-2017-0379
Oracle:CVE-2017-10068
Oracle:CVE-2017-12617
Oracle:CVE-2017-13077
Oracle:CVE-2017-13745
Oracle:CVE-2017-14229
Oracle:CVE-2017-14735
Oracle:CVE-2017-15095
Oracle:CVE-2017-17562
Oracle:CVE-2017-3308
Oracle:CVE-2017-3309
Oracle:CVE-2017-3329
Oracle:CVE-2017-3453
Oracle:CVE-2017-3454
Oracle:CVE-2017-3456
Oracle:CVE-2017-3461
Oracle:CVE-2017-3462
Oracle:CVE-2017-3463
Oracle:CVE-2017-3464
Oracle:CVE-2017-3468
Oracle:CVE-2017-3600
Oracle:CVE-2017-3633
Oracle:CVE-2017-3732
Oracle:CVE-2017-3736
Oracle:CVE-2017-3737
Oracle:CVE-2017-5533
Oracle:CVE-2017-5645
Oracle:CVE-2017-5662
Oracle:CVE-2017-5664
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-6074
Oracle:CVE-2017-7525
Oracle:CVE-2017-7805
Oracle:CVE-2017-9798
Oracle:CVE-2018-0732
Oracle:CVE-2018-0734
Oracle:CVE-2018-0739
Oracle:CVE-2018-1000120
Oracle:CVE-2018-1000300
Oracle:CVE-2018-10933
Oracle:CVE-2018-11039
Oracle:CVE-2018-1171
Oracle:CVE-2018-11763
Oracle:CVE-2018-11776
Oracle:CVE-2018-11784
Oracle:CVE-2018-1258
Oracle:CVE-2018-1275
Oracle:CVE-2018-1305
Oracle:CVE-2018-13785
Oracle:CVE-2018-1656
Oracle:CVE-2018-2562
Oracle:CVE-2018-2563
Oracle:CVE-2018-2572
Oracle:CVE-2018-2587
Oracle:CVE-2018-2598
Oracle:CVE-2018-2612
Oracle:CVE-2018-2622
Oracle:CVE-2018-2628
Oracle:CVE-2018-2640
Oracle:CVE-2018-2665
Oracle:CVE-2018-2668
Oracle:CVE-2018-2676
Oracle:CVE-2018-2685
Oracle:CVE-2018-2686
Oracle:CVE-2018-2687
Oracle:CVE-2018-2688
Oracle:CVE-2018-2689
Oracle:CVE-2018-2690
Oracle:CVE-2018-2693
Oracle:CVE-2018-2694
Oracle:CVE-2018-2698
Oracle:CVE-2018-2718
Oracle:CVE-2018-2737
Oracle:CVE-2018-2738
Oracle:CVE-2018-2739
Oracle:CVE-2018-2742
Oracle:CVE-2018-2746
Oracle:CVE-2018-2747
Oracle:CVE-2018-2748
Oracle:CVE-2018-2749
Oracle:CVE-2018-2750
Oracle:CVE-2018-2752
Oracle:CVE-2018-2753
Oracle:CVE-2018-2754
Oracle:CVE-2018-2755
Oracle:CVE-2018-2756
Oracle:CVE-2018-2758
Oracle:CVE-2018-2759
Oracle:CVE-2018-2760
Oracle:CVE-2018-2761
Oracle:CVE-2018-2762
Oracle:CVE-2018-2763
Oracle:CVE-2018-2764
Oracle:CVE-2018-2765
Oracle:CVE-2018-2766
Oracle:CVE-2018-2767
Oracle:CVE-2018-2768
Oracle:CVE-2018-2769
Oracle:CVE-2018-2770
Oracle:CVE-2018-2771
Oracle:CVE-2018-2772
Oracle:CVE-2018-2773
Oracle:CVE-2018-2774
Oracle:CVE-2018-2775
Oracle:CVE-2018-2776
Oracle:CVE-2018-2777
Oracle:CVE-2018-2778
Oracle:CVE-2018-2779
Oracle:CVE-2018-2780
Oracle:CVE-2018-2781
Oracle:CVE-2018-2782
Oracle:CVE-2018-2783
Oracle:CVE-2018-2784
Oracle:CVE-2018-2785
Oracle:CVE-2018-2786
Oracle:CVE-2018-2787
Oracle:CVE-2018-2788
Oracle:CVE-2018-2789
Oracle:CVE-2018-2790
Oracle:CVE-2018-2791
Oracle:CVE-2018-2792
Oracle:CVE-2018-2793
Oracle:CVE-2018-2794
Oracle:CVE-2018-2795
Oracle:CVE-2018-2796
Oracle:CVE-2018-2797
Oracle:CVE-2018-2798
Oracle:CVE-2018-2799
Oracle:CVE-2018-2800
Oracle:CVE-2018-2801
Oracle:CVE-2018-2804
Oracle:CVE-2018-2805
Oracle:CVE-2018-2806
Oracle:CVE-2018-2807
Oracle:CVE-2018-2808
Oracle:CVE-2018-2809
Oracle:CVE-2018-2810
Oracle:CVE-2018-2811
Oracle:CVE-2018-2812
Oracle:CVE-2018-2813
Oracle:CVE-2018-2814
Oracle:CVE-2018-2815
Oracle:CVE-2018-2816
Oracle:CVE-2018-2817
Oracle:CVE-2018-2818
Oracle:CVE-2018-2819
Oracle:CVE-2018-2820
Oracle:CVE-2018-2821
Oracle:CVE-2018-2822
Oracle:CVE-2018-2823
Oracle:CVE-2018-2825
Oracle:CVE-2018-2826
Oracle:CVE-2018-2827
Oracle:CVE-2018-2828
Oracle:CVE-2018-2830
Oracle:CVE-2018-2831
Oracle:CVE-2018-2832
Oracle:CVE-2018-2834
Oracle:CVE-2018-2835
Oracle:CVE-2018-2836
Oracle:CVE-2018-2837
Oracle:CVE-2018-2838
Oracle:CVE-2018-2839
Oracle:CVE-2018-2840
Oracle:CVE-2018-2841
Oracle:CVE-2018-2842
Oracle:CVE-2018-2843
Oracle:CVE-2018-2844
Oracle:CVE-2018-2845
Oracle:CVE-2018-2846
Oracle:CVE-2018-2849
Oracle:CVE-2018-2850
Oracle:CVE-2018-2852
Oracle:CVE-2018-2854
Oracle:CVE-2018-2855
Oracle:CVE-2018-2856
Oracle:CVE-2018-2857
Oracle:CVE-2018-2858
Oracle:CVE-2018-2859
Oracle:CVE-2018-2860
Oracle:CVE-2018-2861
Oracle:CVE-2018-2862
Oracle:CVE-2018-2863
Oracle:CVE-2018-2864
Oracle:CVE-2018-2865
Oracle:CVE-2018-2866
Oracle:CVE-2018-2867
Oracle:CVE-2018-2868
Oracle:CVE-2018-2869
Oracle:CVE-2018-2870
Oracle:CVE-2018-2871
Oracle:CVE-2018-2872
Oracle:CVE-2018-2873
Oracle:CVE-2018-2874
Oracle:CVE-2018-2876
Oracle:CVE-2018-2877
Oracle:CVE-2018-2878
Oracle:CVE-2018-2879
Oracle:CVE-2018-2881
Oracle:CVE-2018-2882
Oracle:CVE-2018-2887
Oracle:CVE-2018-2888
Oracle:CVE-2018-2889
Oracle:CVE-2018-2891
Oracle:CVE-2018-2892
Oracle:CVE-2018-2893
Oracle:CVE-2018-2894
Oracle:CVE-2018-2895
Oracle:CVE-2018-2896
Oracle:CVE-2018-2897
Oracle:CVE-2018-2898
Oracle:CVE-2018-2899
Oracle:CVE-2018-2900
Oracle:CVE-2018-2901
Oracle:CVE-2018-2902
Oracle:CVE-2018-2903
Oracle:CVE-2018-2904
Oracle:CVE-2018-2905
Oracle:CVE-2018-2906
Oracle:CVE-2018-2907
Oracle:CVE-2018-2908
Oracle:CVE-2018-2909
Oracle:CVE-2018-2911
Oracle:CVE-2018-2912
Oracle:CVE-2018-2913
Oracle:CVE-2018-2914
Oracle:CVE-2018-2915
Oracle:CVE-2018-2916
Oracle:CVE-2018-2917
Oracle:CVE-2018-2918
Oracle:CVE-2018-2919
Oracle:CVE-2018-2920
Oracle:CVE-2018-2921
Oracle:CVE-2018-2922
Oracle:CVE-2018-2923
Oracle:CVE-2018-2924
Oracle:CVE-2018-2925
Oracle:CVE-2018-2926
Oracle:CVE-2018-2927
Oracle:CVE-2018-2928
Oracle:CVE-2018-2929
Oracle:CVE-2018-2930
Oracle:CVE-2018-2932
Oracle:CVE-2018-2933
Oracle:CVE-2018-2934
Oracle:CVE-2018-2935
Oracle:CVE-2018-2936
Oracle:CVE-2018-2937
Oracle:CVE-2018-2938
Oracle:CVE-2018-2939
Oracle:CVE-2018-2940
Oracle:CVE-2018-2941
Oracle:CVE-2018-2942
Oracle:CVE-2018-2943
Oracle:CVE-2018-2944
Oracle:CVE-2018-2945
Oracle:CVE-2018-2946
Oracle:CVE-2018-2947
Oracle:CVE-2018-2948
Oracle:CVE-2018-2949
Oracle:CVE-2018-2950
Oracle:CVE-2018-2951
Oracle:CVE-2018-2952
Oracle:CVE-2018-2953
Oracle:CVE-2018-2954
Oracle:CVE-2018-2955
Oracle:CVE-2018-2956
Oracle:CVE-2018-2957
Oracle:CVE-2018-2958
Oracle:CVE-2018-2959
Oracle:CVE-2018-2960
Oracle:CVE-2018-2961
Oracle:CVE-2018-2962
Oracle:CVE-2018-2963
Oracle:CVE-2018-2964
Oracle:CVE-2018-2965
Oracle:CVE-2018-2966
Oracle:CVE-2018-2967
Oracle:CVE-2018-2968
Oracle:CVE-2018-2969
Oracle:CVE-2018-2970
Oracle:CVE-2018-2971
Oracle:CVE-2018-2972
Oracle:CVE-2018-2973
Oracle:CVE-2018-2974
Oracle:CVE-2018-2975
Oracle:CVE-2018-2976
Oracle:CVE-2018-2977
Oracle:CVE-2018-2979
Oracle:CVE-2018-2980
Oracle:CVE-2018-2981
Oracle:CVE-2018-2982
Oracle:CVE-2018-2984
Oracle:CVE-2018-2985
Oracle:CVE-2018-2986
Oracle:CVE-2018-2987
Oracle:CVE-2018-2988
Oracle:CVE-2018-2989
Oracle:CVE-2018-2990
Oracle:CVE-2018-2991
Oracle:CVE-2018-2992
Oracle:CVE-2018-2993
Oracle:CVE-2018-2994
Oracle:CVE-2018-2995
Oracle:CVE-2018-2996
Oracle:CVE-2018-2997
Oracle:CVE-2018-2998
Oracle:CVE-2018-2999
Oracle:CVE-2018-3000
Oracle:CVE-2018-3001
Oracle:CVE-2018-3002
Oracle:CVE-2018-3003
Oracle:CVE-2018-3004
Oracle:CVE-2018-3005
Oracle:CVE-2018-3006
Oracle:CVE-2018-3007
Oracle:CVE-2018-3008
Oracle:CVE-2018-3009
Oracle:CVE-2018-3010
Oracle:CVE-2018-3011
Oracle:CVE-2018-3012
Oracle:CVE-2018-3013
Oracle:CVE-2018-3014
Oracle:CVE-2018-3015
Oracle:CVE-2018-3016
Oracle:CVE-2018-3017
Oracle:CVE-2018-3018
Oracle:CVE-2018-3019
Oracle:CVE-2018-3020
Oracle:CVE-2018-3021
Oracle:CVE-2018-3022
Oracle:CVE-2018-3023
Oracle:CVE-2018-3024
Oracle:CVE-2018-3025
Oracle:CVE-2018-3026
Oracle:CVE-2018-3027
Oracle:CVE-2018-3028
Oracle:CVE-2018-3029
Oracle:CVE-2018-3030
Oracle:CVE-2018-3031
Oracle:CVE-2018-3032
Oracle:CVE-2018-3033
Oracle:CVE-2018-3034
Oracle:CVE-2018-3035
Oracle:CVE-2018-3036
Oracle:CVE-2018-3037
Oracle:CVE-2018-3038
Oracle:CVE-2018-3039
Oracle:CVE-2018-3040
Oracle:CVE-2018-3041
Oracle:CVE-2018-3042
Oracle:CVE-2018-3043
Oracle:CVE-2018-3044
Oracle:CVE-2018-3045
Oracle:CVE-2018-3046
Oracle:CVE-2018-3047
Oracle:CVE-2018-3048
Oracle:CVE-2018-3049
Oracle:CVE-2018-3050
Oracle:CVE-2018-3051
Oracle:CVE-2018-3052
Oracle:CVE-2018-3053
Oracle:CVE-2018-3054
Oracle:CVE-2018-3055
Oracle:CVE-2018-3056
Oracle:CVE-2018-3057
Oracle:CVE-2018-3058
Oracle:CVE-2018-3059
Oracle:CVE-2018-3060
Oracle:CVE-2018-3061
Oracle:CVE-2018-3062
Oracle:CVE-2018-3063
Oracle:CVE-2018-3064
Oracle:CVE-2018-3065
Oracle:CVE-2018-3066
Oracle:CVE-2018-3067
Oracle:CVE-2018-3068
Oracle:CVE-2018-3069
Oracle:CVE-2018-3070
Oracle:CVE-2018-3071
Oracle:CVE-2018-3072
Oracle:CVE-2018-3073
Oracle:CVE-2018-3074
Oracle:CVE-2018-3075
Oracle:CVE-2018-3076
Oracle:CVE-2018-3077
Oracle:CVE-2018-3078
Oracle:CVE-2018-3079
Oracle:CVE-2018-3080
Oracle:CVE-2018-3081
Oracle:CVE-2018-3082
Oracle:CVE-2018-3084
Oracle:CVE-2018-3085
Oracle:CVE-2018-3086
Oracle:CVE-2018-3087
Oracle:CVE-2018-3088
Oracle:CVE-2018-3089
Oracle:CVE-2018-3090
Oracle:CVE-2018-3091
Oracle:CVE-2018-3092
Oracle:CVE-2018-3093
Oracle:CVE-2018-3094
Oracle:CVE-2018-3095
Oracle:CVE-2018-3096
Oracle:CVE-2018-3097
Oracle:CVE-2018-3098
Oracle:CVE-2018-3099
Oracle:CVE-2018-3100
Oracle:CVE-2018-3101
Oracle:CVE-2018-3102
Oracle:CVE-2018-3103
Oracle:CVE-2018-3104
Oracle:CVE-2018-3105
Oracle:CVE-2018-3108
Oracle:CVE-2018-3109
Oracle:CVE-2018-3115
Oracle:CVE-2018-3122
Oracle:CVE-2018-3125
Oracle:CVE-2018-3126
Oracle:CVE-2018-3127
Oracle:CVE-2018-3128
Oracle:CVE-2018-3129
Oracle:CVE-2018-3130
Oracle:CVE-2018-3131
Oracle:CVE-2018-3132
Oracle:CVE-2018-3133
Oracle:CVE-2018-3134
Oracle:CVE-2018-3135
Oracle:CVE-2018-3136
Oracle:CVE-2018-3137
Oracle:CVE-2018-3138
Oracle:CVE-2018-3139
Oracle:CVE-2018-3140
Oracle:CVE-2018-3141
Oracle:CVE-2018-3142
Oracle:CVE-2018-3143
Oracle:CVE-2018-3144
Oracle:CVE-2018-3145
Oracle:CVE-2018-3146
Oracle:CVE-2018-3147
Oracle:CVE-2018-3148
Oracle:CVE-2018-3149
Oracle:CVE-2018-3150
Oracle:CVE-2018-3151
Oracle:CVE-2018-3152
Oracle:CVE-2018-3153
Oracle:CVE-2018-3154
Oracle:CVE-2018-3155
Oracle:CVE-2018-3156
Oracle:CVE-2018-3157
Oracle:CVE-2018-3158
Oracle:CVE-2018-3159
Oracle:CVE-2018-3160
Oracle:CVE-2018-3161
Oracle:CVE-2018-3162
Oracle:CVE-2018-3163
Oracle:CVE-2018-3164
Oracle:CVE-2018-3165
Oracle:CVE-2018-3166
Oracle:CVE-2018-3167
Oracle:CVE-2018-3168
Oracle:CVE-2018-3169
Oracle:CVE-2018-3170
Oracle:CVE-2018-3171
Oracle:CVE-2018-3172
Oracle:CVE-2018-3173
Oracle:CVE-2018-3174
Oracle:CVE-2018-3175
Oracle:CVE-2018-3176
Oracle:CVE-2018-3177
Oracle:CVE-2018-3178
Oracle:CVE-2018-3179
Oracle:CVE-2018-3180
Oracle:CVE-2018-3181
Oracle:CVE-2018-3182
Oracle:CVE-2018-3183
Oracle:CVE-2018-3184
Oracle:CVE-2018-3185
Oracle:CVE-2018-3186
Oracle:CVE-2018-3187
Oracle:CVE-2018-3188
Oracle:CVE-2018-3189
Oracle:CVE-2018-3190
Oracle:CVE-2018-3191
Oracle:CVE-2018-3192
Oracle:CVE-2018-3193
Oracle:CVE-2018-3194
Oracle:CVE-2018-3195
Oracle:CVE-2018-3196
Oracle:CVE-2018-3197
Oracle:CVE-2018-3198
Oracle:CVE-2018-3200
Oracle:CVE-2018-3201
Oracle:CVE-2018-3202
Oracle:CVE-2018-3203
Oracle:CVE-2018-3204
Oracle:CVE-2018-3205
Oracle:CVE-2018-3206
Oracle:CVE-2018-3207
Oracle:CVE-2018-3208
Oracle:CVE-2018-3209
Oracle:CVE-2018-3210
Oracle:CVE-2018-3211
Oracle:CVE-2018-3212
Oracle:CVE-2018-3213
Oracle:CVE-2018-3214
Oracle:CVE-2018-3215
Oracle:CVE-2018-3217
Oracle:CVE-2018-3218
Oracle:CVE-2018-3219
Oracle:CVE-2018-3220
Oracle:CVE-2018-3221
Oracle:CVE-2018-3222
Oracle:CVE-2018-3223
Oracle:CVE-2018-3224
Oracle:CVE-2018-3225
Oracle:CVE-2018-3226
Oracle:CVE-2018-3227
Oracle:CVE-2018-3228
Oracle:CVE-2018-3229
Oracle:CVE-2018-3230
Oracle:CVE-2018-3231
Oracle:CVE-2018-3232
Oracle:CVE-2018-3233
Oracle:CVE-2018-3234
Oracle:CVE-2018-3235
Oracle:CVE-2018-3236
Oracle:CVE-2018-3237
Oracle:CVE-2018-3238
Oracle:CVE-2018-3239
Oracle:CVE-2018-3241
Oracle:CVE-2018-3242
Oracle:CVE-2018-3243
Oracle:CVE-2018-3244
Oracle:CVE-2018-3245
Oracle:CVE-2018-3246
Oracle:CVE-2018-3247
Oracle:CVE-2018-3248
Oracle:CVE-2018-3249
Oracle:CVE-2018-3250
Oracle:CVE-2018-3251
Oracle:CVE-2018-3252
Oracle:CVE-2018-3253
Oracle:CVE-2018-3254
Oracle:CVE-2018-3255
Oracle:CVE-2018-3256
Oracle:CVE-2018-3257
Oracle:CVE-2018-3258
Oracle:CVE-2018-3259
Oracle:CVE-2018-3261
Oracle:CVE-2018-3262
Oracle:CVE-2018-3263
Oracle:CVE-2018-3264
Oracle:CVE-2018-3265
Oracle:CVE-2018-3266
Oracle:CVE-2018-3267
Oracle:CVE-2018-3268
Oracle:CVE-2018-3269
Oracle:CVE-2018-3270
Oracle:CVE-2018-3271
Oracle:CVE-2018-3272
Oracle:CVE-2018-3273
Oracle:CVE-2018-3274
Oracle:CVE-2018-3275
Oracle:CVE-2018-3276
Oracle:CVE-2018-3277
Oracle:CVE-2018-3278
Oracle:CVE-2018-3279
Oracle:CVE-2018-3280
Oracle:CVE-2018-3281
Oracle:CVE-2018-3282
Oracle:CVE-2018-3283
Oracle:CVE-2018-3284
Oracle:CVE-2018-3285
Oracle:CVE-2018-3286
Oracle:CVE-2018-3287
Oracle:CVE-2018-3288
Oracle:CVE-2018-3289
Oracle:CVE-2018-3290
Oracle:CVE-2018-3291
Oracle:CVE-2018-3292
Oracle:CVE-2018-3293
Oracle:CVE-2018-3294
Oracle:CVE-2018-3295
Oracle:CVE-2018-3296
Oracle:CVE-2018-3297
Oracle:CVE-2018-3298
Oracle:CVE-2018-3299
Oracle:CVE-2018-3301
Oracle:CVE-2018-3302
Oracle:CVE-2018-3303
Oracle:CVE-2018-3304
Oracle:CVE-2018-3305
Oracle:CVE-2018-3309
Oracle:CVE-2018-3311
Oracle:CVE-2018-3639
Oracle:CVE-2018-7489
Oracle:CVE-2018-8013
Oracle:CVE-2018-8014
Oracle:CVE-2018-8037
Oracle:CVE-2019-10173
Oracle:CVE-2019-1543
Oracle:CVE-2019-2395
Oracle:CVE-2019-2396
Oracle:CVE-2019-2397
Oracle:CVE-2019-2398
Oracle:CVE-2019-2399
Oracle:CVE-2019-2400
Oracle:CVE-2019-2401
Oracle:CVE-2019-2402
Oracle:CVE-2019-2403
Oracle:CVE-2019-2404
Oracle:CVE-2019-2405
Oracle:CVE-2019-2406
Oracle:CVE-2019-2407
Oracle:CVE-2019-2408
Oracle:CVE-2019-2409
Oracle:CVE-2019-2410
Oracle:CVE-2019-2411
Oracle:CVE-2019-2412
Oracle:CVE-2019-2413
Oracle:CVE-2019-2414
Oracle:CVE-2019-2415
Oracle:CVE-2019-2416
Oracle:CVE-2019-2417
Oracle:CVE-2019-2418
Oracle:CVE-2019-2419
Oracle:CVE-2019-2420
Oracle:CVE-2019-2421
Oracle:CVE-2019-2422
Oracle:CVE-2019-2423
Oracle:CVE-2019-2425
Oracle:CVE-2019-2426
Oracle:CVE-2019-2427
Oracle:CVE-2019-2429
Oracle:CVE-2019-2430
Oracle:CVE-2019-2431
Oracle:CVE-2019-2432
Oracle:CVE-2019-2433
Oracle:CVE-2019-2434
Oracle:CVE-2019-2435
Oracle:CVE-2019-2436
Oracle:CVE-2019-2437
Oracle:CVE-2019-2438
Oracle:CVE-2019-2439
Oracle:CVE-2019-2440
Oracle:CVE-2019-2441
Oracle:CVE-2019-2442
Oracle:CVE-2019-2443
Oracle:CVE-2019-2444
Oracle:CVE-2019-2445
Oracle:CVE-2019-2446
Oracle:CVE-2019-2447
Oracle:CVE-2019-2448
Oracle:CVE-2019-2449
Oracle:CVE-2019-2450
Oracle:CVE-2019-2451
Oracle:CVE-2019-2452
Oracle:CVE-2019-2453
Oracle:CVE-2019-2455
Oracle:CVE-2019-2456
Oracle:CVE-2019-2457
Oracle:CVE-2019-2458
Oracle:CVE-2019-2459
Oracle:CVE-2019-2460
Oracle:CVE-2019-2461
Oracle:CVE-2019-2462
Oracle:CVE-2019-2463
Oracle:CVE-2019-2464
Oracle:CVE-2019-2465
Oracle:CVE-2019-2466
Oracle:CVE-2019-2467
Oracle:CVE-2019-2468
Oracle:CVE-2019-2469
Oracle:CVE-2019-2470
Oracle:CVE-2019-2471
Oracle:CVE-2019-2472
Oracle:CVE-2019-2473
Oracle:CVE-2019-2474
Oracle:CVE-2019-2475
Oracle:CVE-2019-2476
Oracle:CVE-2019-2477
Oracle:CVE-2019-2478
Oracle:CVE-2019-2479
Oracle:CVE-2019-2480
Oracle:CVE-2019-2481
Oracle:CVE-2019-2482
Oracle:CVE-2019-2485
Oracle:CVE-2019-2486
Oracle:CVE-2019-2487
Oracle:CVE-2019-2488
Oracle:CVE-2019-2489
Oracle:CVE-2019-2490
Oracle:CVE-2019-2491
Oracle:CVE-2019-2492
Oracle:CVE-2019-2493
Oracle:CVE-2019-2494
Oracle:CVE-2019-2495
Oracle:CVE-2019-2496
Oracle:CVE-2019-2497
Oracle:CVE-2019-2498
Oracle:CVE-2019-2499
Oracle:CVE-2019-2500
Oracle:CVE-2019-2501
Oracle:CVE-2019-2502
Oracle:CVE-2019-2503
Oracle:CVE-2019-2504
Oracle:CVE-2019-2505
Oracle:CVE-2019-2506
Oracle:CVE-2019-2507
Oracle:CVE-2019-2508
Oracle:CVE-2019-2509
Oracle:CVE-2019-2510
Oracle:CVE-2019-2511
Oracle:CVE-2019-2512
Oracle:CVE-2019-2513
Oracle:CVE-2019-2519
Oracle:CVE-2019-2520
Oracle:CVE-2019-2521
Oracle:CVE-2019-2522
Oracle:CVE-2019-2523
Oracle:CVE-2019-2524
Oracle:CVE-2019-2525
Oracle:CVE-2019-2526
Oracle:CVE-2019-2527
Oracle:CVE-2019-2528
Oracle:CVE-2019-2529
Oracle:CVE-2019-2530
Oracle:CVE-2019-2531
Oracle:CVE-2019-2532
Oracle:CVE-2019-2533
Oracle:CVE-2019-2534
Oracle:CVE-2019-2535
Oracle:CVE-2019-2536
Oracle:CVE-2019-2537
Oracle:CVE-2019-2538
Oracle:CVE-2019-2539
Oracle:CVE-2019-2540
Oracle:CVE-2019-2541
Oracle:CVE-2019-2543
Oracle:CVE-2019-2544
Oracle:CVE-2019-2545
Oracle:CVE-2019-2546
Oracle:CVE-2019-2547
Oracle:CVE-2019-2548
Oracle:CVE-2019-2549
Oracle:CVE-2019-2550
Oracle:CVE-2019-2552
Oracle:CVE-2019-2553
Oracle:CVE-2019-2554
Oracle:CVE-2019-2555
Oracle:CVE-2019-2556
Oracle:CVE-2019-2574
Oracle:CVE-2019-2656
Oracle:CVE-2019-2657
Oracle:CVE-2019-2678
Oracle:CVE-2019-2679
Oracle:CVE-2019-2680
Oracle:CVE-2019-2690
Oracle:CVE-2019-2696
Oracle:CVE-2019-2703
Oracle:CVE-2019-2721
Oracle:CVE-2019-2722
Oracle:CVE-2019-2723
Oracle:CVE-2019-2848
Oracle:CVE-2019-2850
Oracle:CVE-2019-2859
Oracle:CVE-2019-2863
Oracle:CVE-2019-2864
Oracle:CVE-2019-2865
Oracle:CVE-2019-2866
Oracle:CVE-2019-2867
Oracle:CVE-2019-2873
Oracle:CVE-2019-2874
Oracle:CVE-2019-2875
Oracle:CVE-2019-2876
Oracle:CVE-2019-2877
RH:CVE-2009-3559
RH:CVE-2012-6153
RH:CVE-2013-7285
RH:CVE-2014-3540
RH:CVE-2014-4330
RH:CVE-2014-4651
RH:CVE-2014-9746
RH:CVE-2014-9747
RH:CVE-2015-0405
RH:CVE-2015-0423
RH:CVE-2015-0433
RH:CVE-2015-0438
RH:CVE-2015-0439
RH:CVE-2015-0441
RH:CVE-2015-0498
RH:CVE-2015-0499
RH:CVE-2015-0500
RH:CVE-2015-0501
RH:CVE-2015-0503
RH:CVE-2015-0505
RH:CVE-2015-0506
RH:CVE-2015-0507
RH:CVE-2015-0508
RH:CVE-2015-0511
RH:CVE-2015-2325
RH:CVE-2015-2326
RH:CVE-2015-2566
RH:CVE-2015-2567
RH:CVE-2015-2568
RH:CVE-2015-2571
RH:CVE-2015-2573
RH:CVE-2015-2575
RH:CVE-2015-2576
RH:CVE-2015-5125
RH:CVE-2015-5127
RH:CVE-2015-5129
RH:CVE-2015-5130
RH:CVE-2015-5131
RH:CVE-2015-5132
RH:CVE-2015-5134
RH:CVE-2015-5539
RH:CVE-2015-5540
RH:CVE-2015-5541
RH:CVE-2015-5544
RH:CVE-2015-5545
RH:CVE-2015-5551
RH:CVE-2015-5552
RH:CVE-2015-5553
RH:CVE-2015-5554
RH:CVE-2015-5555
RH:CVE-2015-5556
RH:CVE-2015-5557
RH:CVE-2015-5558
RH:CVE-2015-5559
RH:CVE-2015-5560
RH:CVE-2015-5561
RH:CVE-2015-5564
RH:CVE-2015-5565
RH:CVE-2015-5566
RH:CVE-2015-7559
RH:CVE-2015-8315
RH:CVE-2015-8381
RH:CVE-2015-8382
RH:CVE-2015-8383
RH:CVE-2015-8384
RH:CVE-2015-8385
RH:CVE-2015-8386
RH:CVE-2015-8387
RH:CVE-2015-8388
RH:CVE-2015-8389
RH:CVE-2015-8390
RH:CVE-2015-8391
RH:CVE-2015-8392
RH:CVE-2015-8393
RH:CVE-2015-8394
RH:CVE-2015-8395
RH:CVE-2015-8855
RH:CVE-2015-8860
RH:CVE-2016-0755
RH:CVE-2016-1672
RH:CVE-2016-1673
RH:CVE-2016-1674
RH:CVE-2016-1675
RH:CVE-2016-1676
RH:CVE-2016-1677
RH:CVE-2016-1678
RH:CVE-2016-1679
RH:CVE-2016-1680
RH:CVE-2016-1681
RH:CVE-2016-1682
RH:CVE-2016-1683
RH:CVE-2016-1684
RH:CVE-2016-1685
RH:CVE-2016-1686
RH:CVE-2016-1687
RH:CVE-2016-1688
RH:CVE-2016-1689
RH:CVE-2016-1690
RH:CVE-2016-1691
RH:CVE-2016-1692
RH:CVE-2016-1693
RH:CVE-2016-1694
RH:CVE-2016-1695
RH:CVE-2016-1950
RH:CVE-2016-1955
RH:CVE-2016-1956
RH:CVE-2016-1959
RH:CVE-2016-1967
RH:CVE-2016-1968
RH:CVE-2016-1969
RH:CVE-2016-1970
RH:CVE-2016-1971
RH:CVE-2016-1972
RH:CVE-2016-1973
RH:CVE-2016-1975
RH:CVE-2016-1976
RH:CVE-2016-3141
RH:CVE-2016-4055
RH:CVE-2016-4070
RH:CVE-2016-4979
RH:CVE-2016-5483
RH:CVE-2016-5617
RH:CVE-2016-9586
RH:CVE-2016-9840
RH:CVE-2016-9841
RH:CVE-2016-9842
RH:CVE-2016-9843
RH:CVE-2017-3308
RH:CVE-2017-3309
RH:CVE-2017-3329
RH:CVE-2017-3453
RH:CVE-2017-3454
RH:CVE-2017-3456
RH:CVE-2017-3461
RH:CVE-2017-3462
RH:CVE-2017-3463
RH:CVE-2017-3464
RH:CVE-2017-3468
RH:CVE-2017-3600
RH:CVE-2017-9526
RH:CVE-2018-1000121
RH:CVE-2018-12539
RH:CVE-2018-1305
RH:CVE-2018-1517
RH:CVE-2018-1656
RH:CVE-2018-2767
RH:CVE-2018-2938
RH:CVE-2018-2940
RH:CVE-2018-2952
RH:CVE-2018-2973
RH:CVE-2019-2455
RH:CVE-2019-2481
RH:CVE-2019-2482
RH:CVE-2019-2503
RH:CVE-2019-2507
RH:CVE-2019-2510
RH:CVE-2019-2513
RH:CVE-2019-2528
RH:CVE-2019-2529
RH:CVE-2019-2530
RH:CVE-2019-2531
RH:CVE-2019-2532
RH:CVE-2019-2533
RH:CVE-2019-2534
RH:CVE-2019-2535
RH:CVE-2019-2536
RH:CVE-2019-2537
RH:CVE-2019-2539
RHBA-2015:1659
RHBA-2015:1762
RHBA-2015:1763
RHBA-2019:0327
RHSA-2014:0216
RHSA-2014:0294
RHSA-2014:0323
RHSA-2014:0371
RHSA-2014:0372
RHSA-2014:0374
RHSA-2014:0389
RHSA-2014:0452
RHSA-2014:0474
RHSA-2014:0497
RHSA-2014:0498
RHSA-2014:0500
RHSA-2014:0511
RHSA-2014:0702
RHSA-2014:1007
RHSA-2014:1059
RHSA-2014:1082
RHSA-2014:1098
RHSA-2014:1146
RHSA-2014:1162
RHSA-2014:1163
RHSA-2014:1166
RHSA-2014:1320
RHSA-2014:1321
RHSA-2014:1322
RHSA-2014:1323
RHSA-2014:1833
RHSA-2014:1834
RHSA-2014:1835
RHSA-2014:1836
RHSA-2014:1891
RHSA-2014:1892
RHSA-2014:1904
RHSA-2014:2019
RHSA-2014:2020
RHSA-2015:0125
RHSA-2015:0158
RHSA-2015:0234
RHSA-2015:0235
RHSA-2015:0675
RHSA-2015:0720
RHSA-2015:0765
RHSA-2015:0850
RHSA-2015:0851
RHSA-2015:1009
RHSA-2015:1176
RHSA-2015:1177
RHSA-2015:1603
RHSA-2015:1628
RHSA-2015:1629
RHSA-2015:1646
RHSA-2015:1647
RHSA-2015:1665
RHSA-2015:1888
RHSA-2016:0197
RHSA-2016:0370
RHSA-2016:0371
RHSA-2016:0373
RHSA-2016:0495
RHSA-2016:1025
RHSA-2016:1132
RHSA-2016:1190
RHSA-2016:1420
RHSA-2016:1773
RHSA-2016:1931
RHSA-2016:1940
RHSA-2016:2035
RHSA-2016:2036
RHSA-2016:2130
RHSA-2016:2131
RHSA-2016:2595
RHSA-2016:2749
RHSA-2016:2750
RHSA-2016:2927
RHSA-2016:2928
RHSA-2016:2957
RHSA-2017:0184
RHSA-2017:0193
RHSA-2017:0194
RHSA-2017:0272
RHSA-2017:0868
RHSA-2017:1208
RHSA-2017:1220
RHSA-2017:1221
RHSA-2017:1222
RHSA-2017:1658
RHSA-2017:1659
RHSA-2017:2192
RHSA-2017:2486
RHSA-2017:2596
RHSA-2017:2787
RHSA-2017:2886
RHSA-2017:2999
RHSA-2017:3046
RHSA-2017:3047
RHSA-2017:3189
RHSA-2017:3190
RHSA-2017:3453
RHSA-2018:0279
RHSA-2018:0342
RHSA-2018:0465
RHSA-2018:0466
RHSA-2018:0478
RHSA-2018:0479
RHSA-2018:0480
RHSA-2018:0481
RHSA-2018:0501
RHSA-2018:0574
RHSA-2018:0576
RHSA-2018:0577
RHSA-2018:1320
RHSA-2018:1447
RHSA-2018:1448
RHSA-2018:1449
RHSA-2018:1450
RHSA-2018:1451
RHSA-2018:2241
RHSA-2018:2242
RHSA-2018:2253
RHSA-2018:2254
RHSA-2018:2255
RHSA-2018:2256
RHSA-2018:2283
RHSA-2018:2286
RHSA-2018:2439
RHSA-2018:2568
RHSA-2018:2569
RHSA-2018:2575
RHSA-2018:2576
RHSA-2018:2669
RHSA-2018:2712
RHSA-2018:2713
RHSA-2018:2729
RHSA-2018:2927
RHSA-2018:2939
RHSA-2018:3007
RHSA-2018:3008
RHSA-2018:3157
RHSA-2018:3558
RHSA-2019:1258
RHSA-2019:1543
RHSA-2019:1822
RHSA-2019:1823
RHSA-2019:2205
RHSA-2019:2327
RHSA-2019:2413
RHSA-2019:2484
RHSA-2019:2511
RHSA-2019:2995
RHSA-2019:3708
RHSA-2019:3892
RHSA-2019:4352
RHSA-2020:0445
RHSA-2020:0544
RHSA-2020:0594
RHSA-2020:0727
RHSA-2020:0983
RHSA-2020:5663
SECTRACK ID: 1041302
SECTRACK:1032121
SECTRACK:1034077
SECTRACK:1034882
SECTRACK:1035215
SECTRACK:1035255
SECTRACK:1035981
SECTRACK:1036054
SECTRACK:1036056
SECTRACK:1036225
SECTRACK:1036377
SECTRACK:1036378
SECTRACK:1036393
SECTRACK:1036397
SECTRACK:1037036
SECTRACK:1037046
SECTRACK:1037053
SECTRACK:1037515
SECTRACK:1037640
SECTRACK:1038287
SECTRACK:1039427
SECTRACK:1039596
SECTRACK:1039600
SECTRACK:1040428
SECTRACK:1040529
SECTRACK:1041294
SECTRACK:1041296
SECTRACK:1041302
SECTRACK:1041765
SECTRACK:1041887
SECTRACK:1041888
SECTRACK:1041896
SECUNIA:57477
SECUNIA:58710
SECUNIA:58851
SECUNIA:58947
SECUNIA:59014
SECUNIA:59118
SECUNIA:59228
SECUNIA:59245
SECUNIA:59246
SECUNIA:59430
SECUNIA:59464
SECUNIA:59479
SECUNIA:59480
SECUNIA:59704
SECUNIA:59718
SECUNIA:60177
SECUNIA:60703
SECUNIA:61441
SECUNIA:61961
SLACKWARE:SSA:2016-039-01
SMASH Issue 106174
SMASH Issue 106399
SMASH Issue 115944
SMASH Issue 115951
SMASH Issue 116060
SMASH Issue 121091
SMASH Issue 122403
SMASH Issue 157079
SMASH Issue 157080
SMASH Issue 159370
SMASH Issue 159501
SMASH Issue 161165
SMASH Issue 161277
SMASH Issue 162768
SMASH Issue 162800
SMASH Issue 162870
SMASH Issue 163267
SMASH Issue 168106
SMASH Issue 168107
SMASH Issue 168108
SMASH Issue 168109
SMASH Issue 168110
SMASH Issue 168111
SMASH Issue 168112
SMASH Issue 168113
SMASH Issue 168114
SMASH Issue 168115
SMASH Issue 168116
SMASH Issue 168117
SMASH Issue 168118
SMASH Issue 168119
SMASH Issue 168120
SMASH Issue 169466
SMASH Issue 169472
SMASH Issue 169820
SMASH Issue 169849
SMASH Issue 170597
SMASH Issue 170598
SMASH Issue 173284
SMASH Issue 173285
SMASH Issue 173743
SMASH Issue 173744
SMASH Issue 173746
SMASH Issue 173747
SMASH Issue 173748
SMASH Issue 173749
SMASH Issue 173750
SMASH Issue 177157
SMASH Issue 177158
SMASH Issue 177160
SMASH Issue 177510
SMASH Issue 177997
SMASH Issue 183785
SMASH Issue 183803
SMASH Issue 183804
SMASH Issue 186176
SMASH Issue 186594
SMASH Issue 195320
SMASH Issue 200729
SMASH Issue 201476
SMASH Issue 201809
SMASH Issue 203304
SMASH Issue 205710
SMASH Issue 210804
SMASH Issue 210805
SMASH Issue 210807
SMASH Issue 210809
SMASH Issue 210923
SMASH Issue 210972
SMASH Issue 211000
SMASH Issue 211001
SMASH Issue 211002
SMASH Issue 211003
SMASH Issue 211004
SMASH Issue 211005
SMASH Issue 211006
SMASH Issue 211038
SMASH Issue 211039
SMASH Issue 211040
SMASH Issue 211041
SMASH Issue 211042
SMASH Issue 211051
SMASH Issue 212718
SMASH Issue 212765
SMASH Issue 212925
SMASH Issue 216708
SMASH Issue 216720
SMASH Issue 216727
SMASH Issue 216869
SMASH Issue 216870
SMASH Issue 216871
SMASH Issue 216872
SMASH Issue 216873
SMASH Issue 216874
SMASH Issue 216875
SMASH Issue 216876
SMASH Issue 216877
SMASH Issue 216878
SMASH Issue 216880
SMASH Issue 216904
SMASH Issue 222884
SMASH Issue 222951
SMASH Issue 63351
SMASH Issue 77111
SUSE:SUSE-SU-2015:0946
SUSE:SUSE-SU-2016:0727
SUSE:SUSE-SU-2016:0777
SUSE:SUSE-SU-2016:0820
SUSE:SUSE-SU-2016:0909
SUSE:SUSE-SU-2016:1277
SUSE:SUSE-SU-2016:2387
SUSE:SUSE-SU-2016:2394
SUSE:SUSE-SU-2016:2458
SUSE:SUSE-SU-2016:2468
SUSE:SUSE-SU-2016:2469
SUSE:SUSE-SU-2016:2470
SUSE:SUSE-SU-2017:2699
SUSE:SUSE-SU-2017:2700
SUSE:openSUSE-SU-2015:0858
SUSE:openSUSE-SU-2015:0967
SUSE:openSUSE-SU-2015:1911
SUSE:openSUSE-SU-2016:0360
SUSE:openSUSE-SU-2016:0373
SUSE:openSUSE-SU-2016:0376
SUSE:openSUSE-SU-2016:0731
SUSE:openSUSE-SU-2016:0733
SUSE:openSUSE-SU-2016:1274
SUSE:openSUSE-SU-2016:1373
SUSE:openSUSE-SU-2016:1430
SUSE:openSUSE-SU-2016:1433
SUSE:openSUSE-SU-2016:1496
SUSE:openSUSE-SU-2016:1557
SUSE:openSUSE-SU-2016:2391
SUSE:openSUSE-SU-2016:2407
SUSE:openSUSE-SU-2016:2496
SUSE:openSUSE-SU-2016:2537
SUSE:openSUSE-SU-2016:3202
SUSE:openSUSE-SU-2017:0077
SUSE:openSUSE-SU-2017:0080
SUSE:openSUSE-SU-2018:0458
SUSE:openSUSE-SU-2019:1814
UBUNTU:CVE-2009-3559
UBUNTU:CVE-2012-6153
UBUNTU:CVE-2013-7285
UBUNTU:CVE-2013-7451
UBUNTU:CVE-2013-7452
UBUNTU:CVE-2013-7453
UBUNTU:CVE-2013-7454
UBUNTU:CVE-2014-4330
UBUNTU:CVE-2014-9746
UBUNTU:CVE-2014-9747
UBUNTU:CVE-2014-9772
UBUNTU:CVE-2015-0405
UBUNTU:CVE-2015-0423
UBUNTU:CVE-2015-0433
UBUNTU:CVE-2015-0438
UBUNTU:CVE-2015-0439
UBUNTU:CVE-2015-0441
UBUNTU:CVE-2015-0498
UBUNTU:CVE-2015-0499
UBUNTU:CVE-2015-0500
UBUNTU:CVE-2015-0501
UBUNTU:CVE-2015-0503
UBUNTU:CVE-2015-0505
UBUNTU:CVE-2015-0506
UBUNTU:CVE-2015-0507
UBUNTU:CVE-2015-0508
UBUNTU:CVE-2015-0511
UBUNTU:CVE-2015-2325
UBUNTU:CVE-2015-2326
UBUNTU:CVE-2015-2566
UBUNTU:CVE-2015-2567
UBUNTU:CVE-2015-2568
UBUNTU:CVE-2015-2571
UBUNTU:CVE-2015-2573
UBUNTU:CVE-2015-2575
UBUNTU:CVE-2015-5125
UBUNTU:CVE-2015-5127
UBUNTU:CVE-2015-5128
UBUNTU:CVE-2015-5129
UBUNTU:CVE-2015-5130
UBUNTU:CVE-2015-5131
UBUNTU:CVE-2015-5132
UBUNTU:CVE-2015-5134
UBUNTU:CVE-2015-5539
UBUNTU:CVE-2015-5540
UBUNTU:CVE-2015-5541
UBUNTU:CVE-2015-5544
UBUNTU:CVE-2015-5545
UBUNTU:CVE-2015-5551
UBUNTU:CVE-2015-5552
UBUNTU:CVE-2015-5553
UBUNTU:CVE-2015-5554
UBUNTU:CVE-2015-5555
UBUNTU:CVE-2015-5556
UBUNTU:CVE-2015-5557
UBUNTU:CVE-2015-5558
UBUNTU:CVE-2015-5559
UBUNTU:CVE-2015-5560
UBUNTU:CVE-2015-5561
UBUNTU:CVE-2015-5564
UBUNTU:CVE-2015-5565
UBUNTU:CVE-2015-5566
UBUNTU:CVE-2015-7559
UBUNTU:CVE-2015-8381
UBUNTU:CVE-2015-8382
UBUNTU:CVE-2015-8383
UBUNTU:CVE-2015-8384
UBUNTU:CVE-2015-8385
UBUNTU:CVE-2015-8386
UBUNTU:CVE-2015-8387
UBUNTU:CVE-2015-8388
UBUNTU:CVE-2015-8389
UBUNTU:CVE-2015-8390
UBUNTU:CVE-2015-8391
UBUNTU:CVE-2015-8392
UBUNTU:CVE-2015-8393
UBUNTU:CVE-2015-8394
UBUNTU:CVE-2015-8395
UBUNTU:CVE-2015-8854
UBUNTU:CVE-2015-8855
UBUNTU:CVE-2015-8856
UBUNTU:CVE-2015-8857
UBUNTU:CVE-2015-8858
UBUNTU:CVE-2015-8859
UBUNTU:CVE-2015-8860
UBUNTU:CVE-2015-8861
UBUNTU:CVE-2015-8862
UBUNTU:CVE-2016-0755
UBUNTU:CVE-2016-1672
UBUNTU:CVE-2016-1673
UBUNTU:CVE-2016-1674
UBUNTU:CVE-2016-1675
UBUNTU:CVE-2016-1676
UBUNTU:CVE-2016-1677
UBUNTU:CVE-2016-1678
UBUNTU:CVE-2016-1679
UBUNTU:CVE-2016-1680
UBUNTU:CVE-2016-1681
UBUNTU:CVE-2016-1682
UBUNTU:CVE-2016-1683
UBUNTU:CVE-2016-1684
UBUNTU:CVE-2016-1685
UBUNTU:CVE-2016-1686
UBUNTU:CVE-2016-1687
UBUNTU:CVE-2016-1688
UBUNTU:CVE-2016-1689
UBUNTU:CVE-2016-1690
UBUNTU:CVE-2016-1691
UBUNTU:CVE-2016-1692
UBUNTU:CVE-2016-1693
UBUNTU:CVE-2016-1694
UBUNTU:CVE-2016-1695
UBUNTU:CVE-2016-1950
UBUNTU:CVE-2016-1955
UBUNTU:CVE-2016-1956
UBUNTU:CVE-2016-1959
UBUNTU:CVE-2016-1967
UBUNTU:CVE-2016-1968
UBUNTU:CVE-2016-1969
UBUNTU:CVE-2016-1970
UBUNTU:CVE-2016-1971
UBUNTU:CVE-2016-1972
UBUNTU:CVE-2016-1973
UBUNTU:CVE-2016-1975
UBUNTU:CVE-2016-1976
UBUNTU:CVE-2016-2178
UBUNTU:CVE-2016-3141
UBUNTU:CVE-2016-4055
UBUNTU:CVE-2016-4070
UBUNTU:CVE-2016-4619
UBUNTU:CVE-2016-4979
UBUNTU:CVE-2016-5483
UBUNTU:CVE-2016-5501
UBUNTU:CVE-2016-5538
UBUNTU:CVE-2016-5605
UBUNTU:CVE-2016-5608
UBUNTU:CVE-2016-5610
UBUNTU:CVE-2016-5611
UBUNTU:CVE-2016-5613
UBUNTU:CVE-2016-9586
UBUNTU:CVE-2016-9840
UBUNTU:CVE-2016-9841
UBUNTU:CVE-2016-9842
UBUNTU:CVE-2016-9843
UBUNTU:CVE-2017-3308
UBUNTU:CVE-2017-3309
UBUNTU:CVE-2017-3329
UBUNTU:CVE-2017-3453
UBUNTU:CVE-2017-3454
UBUNTU:CVE-2017-3456
UBUNTU:CVE-2017-3461
UBUNTU:CVE-2017-3462
UBUNTU:CVE-2017-3463
UBUNTU:CVE-2017-3464
UBUNTU:CVE-2017-3468
UBUNTU:CVE-2017-3600
UBUNTU:CVE-2017-9526
UBUNTU:CVE-2018-1000121
UBUNTU:CVE-2018-1258
UBUNTU:CVE-2018-1305
UBUNTU:CVE-2018-1517
UBUNTU:CVE-2018-1656
UBUNTU:CVE-2018-2767
UBUNTU:CVE-2018-2909
UBUNTU:CVE-2018-2938
UBUNTU:CVE-2018-2940
UBUNTU:CVE-2018-2952
UBUNTU:CVE-2018-2973
UBUNTU:CVE-2018-3005
UBUNTU:CVE-2018-3055
UBUNTU:CVE-2018-3085
UBUNTU:CVE-2018-3086
UBUNTU:CVE-2018-3087
UBUNTU:CVE-2018-3088
UBUNTU:CVE-2018-3089
UBUNTU:CVE-2018-3090
UBUNTU:CVE-2018-3091
UBUNTU:CVE-2018-3287
UBUNTU:CVE-2018-3288
UBUNTU:CVE-2018-3289
UBUNTU:CVE-2018-3290
UBUNTU:CVE-2018-3291
UBUNTU:CVE-2018-3292
UBUNTU:CVE-2018-3293
UBUNTU:CVE-2018-3294
UBUNTU:CVE-2018-3295
UBUNTU:CVE-2018-3296
UBUNTU:CVE-2018-3297
UBUNTU:CVE-2018-3298
UBUNTU:CVE-2019-2455
UBUNTU:CVE-2019-2481
UBUNTU:CVE-2019-2482
UBUNTU:CVE-2019-2503
UBUNTU:CVE-2019-2507
UBUNTU:CVE-2019-2510
UBUNTU:CVE-2019-2513
UBUNTU:CVE-2019-2528
UBUNTU:CVE-2019-2529
UBUNTU:CVE-2019-2530
UBUNTU:CVE-2019-2531
UBUNTU:CVE-2019-2532
UBUNTU:CVE-2019-2533
UBUNTU:CVE-2019-2534
UBUNTU:CVE-2019-2535
UBUNTU:CVE-2019-2536
UBUNTU:CVE-2019-2537
UBUNTU:CVE-2019-2539
UBUNTU:USN-2575-1
UBUNTU:USN-2769-1
UBUNTU:USN-2882-1
UBUNTU:USN-2916-1
UBUNTU:USN-2917-1
UBUNTU:USN-2917-2
UBUNTU:USN-2917-3
UBUNTU:USN-2924-1
UBUNTU:USN-2934-1
UBUNTU:USN-2952-1
UBUNTU:USN-2952-2
UBUNTU:USN-2992-1
UBUNTU:USN-3598-1
UBUNTU:USN-3598-2
UBUNTU:USN-3665-1
UBUNTU:USN-3693-1
UBUNTU:USN-3725-1
UBUNTU:USN-3725-2
UBUNTU:USN-3727-1
UBUNTU:USN-3734-1
UBUNTU:USN-3735-1
UBUNTU:USN-3747-1
USN-3087-1
USN-3087-2
USN-3867-1
USN-4246-1
USN-4292-1
XF:perl-cve20144330-dos(96216)
ZDI-16-570
ZDI-18-1232ZDI-CAN-6635
ZDI-18-1233ZDI-CAN-6591
ZDI-18-1234ZDI-CAN-6592
ZDI-18-1292ZDI-CAN-7329
bdo#1033297
bdo#583651
bdo#759718
bdo#782645
bdo#797165
bdo#798619
bdo#798620
bdo#802671
bdo#802971
bdo#854713
bdo#860544
bdo#864859
bdo#867247
bdo#873383
bdo#885345
bdo#898444
bdo#898445
bdo#912848
bnc#1003579
bnc#1003580
bnc#1005621
bnc#1015332
bnc#1016653
bnc#1022633
bnc#1042326
bnc#1043777
bnc#1084524
bnc#1085215
bnc#1088681
bnc#1101644
bnc#1101645
bnc#1101656
bnc#1101667
bnc#1101675
bnc#1104668
bnc#1112097
bnc#1120866
bnc#1122198
bnc#557157
bnc#885963
bnc#896715
bnc#927623
bnc#941239
bnc#947966
bnc#957598
bnc#958373
bnc#962983
bnc#969821
bnc#969894
bnc#970257
bnc#970377
bnc#970378
bnc#970379
bnc#970380
bnc#970381
bnc#970431
bnc#970433
bnc#976547
bnc#977050
bnc#981886
bnc#983249
bnc#983519
bnc#987365
bnc#988162
http://www.debian.org/security/2016/dsa-3560
https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=95433e8e339dbb6b5d5541473c1661db6ba2c451
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/
https://security.netapp.com/advisory/ntap-20230216-0002/
https://support.f5.com/csp/article/K05052081?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K46337613?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K46337613?utm_source=f5support&utm_medium=RSS
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
openssl.git:commit:399944622df7bd81af62e67ea967c470534090e2
rh#1051277
rh#1091938
rh#1101303
rh#1104858
rh#1107544
rh#1112877
rh#1116665
rh#1129074
rh#1129916
rh#1131350
rh#1139700
rh#1167537
rh#1183461
rh#1187225
rh#1202366
rh#1202380
rh#1202384
rh#1202395
rh#1202418
rh#1203195
rh#1207198
rh#1207202
rh#1209496
rh#1209501
rh#1212753
rh#1212755
rh#1212757
rh#1212758
rh#1212759
rh#1212760
rh#1212763
rh#1212764
rh#1212765
rh#1212767
rh#1212768
rh#1212769
rh#1212770
rh#1212771
rh#1212772
rh#1212774
rh#1212776
rh#1212777
rh#1212779
rh#1212780
rh#1212781
rh#1212782
rh#1212783
rh#1237223
rh#1252697
rh#1252707
rh#1256449
rh#1262373
rh#1277888
rh#1287614
rh#1287623
rh#1287629
rh#1287636
rh#1287646
rh#1287654
rh#1287659
rh#1287666
rh#1287671
rh#1287690
rh#1287695
rh#1287702
rh#1287711
rh#1291742
rh#1293972
rh#1302263
rh#1304645
rh#1310509
rh#1311503
rh#1315312
rh#1315328
rh#1315570
rh#1315571
rh#1315575
rh#1315776
rh#1315777
rh#1315780
rh#1315782
rh#1317560
rh#1323114
rh#1323749
rh#1329533
rh#1329552
rh#1340005
rh#1340006
rh#1340007
rh#1340008
rh#1340009
rh#1340010
rh#1340011
rh#1340012
rh#1340013
rh#1340014
rh#1340015
rh#1340016
rh#1340017
rh#1340018
rh#1340019
rh#1340021
rh#1340022
rh#1340023
rh#1340024
rh#1340026
rh#1340027
rh#1340028
rh#1340029
rh#1340030
rh#1341821
rh#1343400
rh#1343538
rh#1343540
rh#1352476
rh#1369383
rh#1378936
rh#1384344
rh#1386562
rh#1386564
rh#1393454
rh#1396963
rh#1396971
rh#1397485
rh#1399546
rh#1402345
rh#1402346
rh#1402348
rh#1402351
rh#1405148
rh#1406712
rh#1414133
rh#1433010
rh#1443358
rh#1443359
rh#1443360
rh#1443365
rh#1443366
rh#1443369
rh#1443376
rh#1443377
rh#1443378
rh#1443379
rh#1443385
rh#1443387
rh#1459887
rh#1485274
rh#1501812
rh#1501813
rh#1501814
rh#1501815
rh#1501816
rh#1501817
rh#1501818
rh#1501819
rh#1501820
rh#1516791
rh#1519780
rh#1548282
rh#1552631
rh#1553413
rh#1564965
rh#1578582
rh#1591854
rh#1600925
rh#1602141
rh#1602145
rh#1602146
rh#1607582
rh#1608073
rh#1614973
rh#1618767
rh#1618869
rh#1618871
rh#1666742
rh#1666743
rh#1666744
rh#1666749
rh#1666750
rh#1666751
rh#1666752
rh#1666753
rh#1666755
rh#1666756
rh#1666757
rh#1666758
rh#1666759
rh#1666760
rh#1666761
rh#1666762
rh#1666763
rh#1666764
rh#1714979
rh#1716448
rh#1716453
rh#1716454
rh#1722971
rh#1731271
rh#2061700
rh#2116175
rh#2119127
rh#2161287
rh#2270497
rh#539529
rh#873317
xf#141681
xf#141953
xf#141971
xf#141981
xf#141982
xf#144882
xf#146672
xf#146803
xf#146804
xf#146815
xf#146827
xf#146834
xf#146835
xf#151452
xf#151455
xf#151465
xf#151466
xf#151486
xf#151497
xf#151500
xf#151525
xf#151527
xf#151530
xf#155741
xf#155744
xf#155766
xf#155850
CVE-2009-3620kernel-source-rt:Not affectedimportant ()BID:36824
CONFIRM:git.kernel.org:CVE-2009-3620
CONFIRM:www.kernel.org:CVE-2009-3620
CVE-2009-3620
DSA-1927
DSA-1928
FEDORA:FEDORA-2009-11038
MANDRIVA:MDVSA-2010:088
MANDRIVA:MDVSA-2010:198
MISC:git.kernel.org:/
MISC:secunia.com:MLIST:[oss-security] 20091019 Re: CVE request: kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised
MLIST:[linux-kernel] 20090921 [git pull] drm tree.
MLIST:[oss-security] 20091019 CVE request: kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised
MLIST:[oss-security] 20091019 Re: CVE request: kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised
MLIST:[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates
OVAL:oval:org.mitre.oval:def:6763
OVAL:oval:org.mitre.oval:def:9891
RH:CVE-2009-3620
RHSA-2009:1540
RHSA-2009:1670
RHSA-2009:1671
RHSA-2010:0882
SECUNIA:36707
SECUNIA:37909
SECUNIA:38794
SECUNIA:38834
SMASH Issue 63477
SUSE:SUSE-SA:2009:061
SUSE:SUSE-SA:2009:064
SUSE:SUSE-SA:2010:012
SUSE:SUSE-SA:2010:013
UBUNTU:CVE-2009-3620
UBUNTU:USN-864-1
VUPEN:ADV-2010-0528
rh#529597
CVE-2009-3621kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2009-3621
CONFIRM:patchwork.kernel.org:CVE-2009-3621
CVE-2009-3621
DSA-1927
DSA-1928
DSA-1929
FEDORA:FEDORA-2009-11038
MANDRIVA:MDVSA-2009:329
MLIST:[linux-kernel] 20091019 Re: [PATCH] AF_UNIX: Fix deadlock on connecting to shutdown socket
MLIST:[oss-security] 20091019 CVE request: kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket
MLIST:[oss-security] 20091019 Re: CVE request: kernel: AF_UNIX: Fix deadlock on connecting to shutdown socket
MLIST:[security-announce] 20100303 VMSA-2010-0004 ESX Service Console and vMA third party updates
OVAL:oval:org.mitre.oval:def:6895
OVAL:oval:org.mitre.oval:def:9921
RH:CVE-2009-3621
RHSA-2009:1540
RHSA-2009:1670
RHSA-2009:1671
SECUNIA:37086
SECUNIA:37909
SECUNIA:38017
SECUNIA:38794
SECUNIA:38834
SMASH Issue 63479
SUSE:SUSE-SA:2009:061
SUSE:SUSE-SA:2009:064
SUSE:SUSE-SA:2010:001
SUSE:SUSE-SA:2010:012
SUSE:SUSE-SA:2010:013
UBUNTU:CVE-2009-3621
UBUNTU:USN-864-1
VUPEN:ADV-2010-0528
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=77238f2b942b38ab4e7f3aced44084493e4a8675
rh#529626
CVE-2009-3624kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2009-3624
CONFIRM:www.kernel.org:CVE-2009-3624
CVE-2009-3624
MISC:twitter.com:CVE-2009-3624
MLIST:[oss-security] 20091022 CVE request: kernel: get_instantiation_keyring() should inc the keyring refcount in all cases
MLIST:[oss-security] 20091022 Re: CVE request: kernel: get_instantiation_keyring() should inc the keyring refcount in all cases
RH:CVE-2009-3624
SMASH Issue 63487
SUSE:SUSE-SA:2010:001
UBUNTU:CVE-2009-3624
UBUNTU:USN-864-1
bnc#549030
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=21279cfa107af07ef985539ac0de2152b9cba5f5
rh#530283
CVE-2009-3638kernel-source-rt:Not affectedimportant ()BID:36803
CONFIRM:git.kernel.org:CVE-2009-3638
CONFIRM:www.kernel.org:CVE-2009-3638
CVE-2009-3638
DSA-1927
DSA-1962
FEDORA:FEDORA-2009-11038
MANDRIVA:MDVSA-2009:329
MISC:git.kernel.org:/
MLIST:[oss-security] 20091023 CVE request: kvm: integer overflow in kvm_dev_ioctl_get_supported_cpuid()
MLIST:[oss-security] 20091023 Re: CVE request: kvm: integer overflow in kvm_dev_ioctl_get_supported_cpuid()
RH:CVE-2009-3638
SMASH Issue 40852
UBUNTU:CVE-2009-3638
UBUNTU:USN-864-1
XF:linux-kernel-supportedcpuid-code-execution(53934)
bdo#557739
bdo#562075
bdo#562076
bnc#550072
rh#530515
CVE-2009-3889kernel-source-rt:Not affectedmoderate ()BID:37019
CONFIRM:git.kernel.org:CVE-2009-3889
CONFIRM:support.avaya.com:CVE-2009-4272
CONFIRM:www.kernel.org:CVE-2010-0437
CVE-2009-3889
DSA-2005
MLIST:[oss-security] 20091113 CVE request: kernel: bad permissions on megaraid_sas sysfs files
MLIST:[oss-security] 20091113 Re: CVE request: kernel: bad permissions on megaraid_sas sysfs files
OSVDB:60202
RH:CVE-2009-3889
RHSA-2009:1635
RHSA-2010:0046
RHSA-2010:0076
RHSA-2010:0095
SMASH Issue 63885
SUSE:SUSE-SA:2009:061
SUSE:SUSE-SA:2009:064
SUSE:SUSE-SA:2010:013
UBUNTU:CVE-2009-3889
UBUNTU:USN-864-1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=66dca9b8c50b5e59d3bea8b21cee5c6dae6c9c46
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11018
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7163
rh#526068
CVE-2009-3939kernel-source-rt:Not affectedimportant ()BID:37019
CONFIRM:support.avaya.com:CVE-2009-4272
CVE-2009-3939
DSA-1996
L3:30871
MLIST:[oss-security] 20091113 CVE request: kernel: bad permissions on megaraid_sas sysfs files
OSVDB:60201
RH:CVE-2009-3939
RHSA-2009:1635
RHSA-2010:0046
RHSA-2010:0076
RHSA-2010:0095
SECUNIA:37909
SECUNIA:38017
SECUNIA:38276
SECUNIA:38492
SECUNIA:38779
SMASH Issue 63924
SUSE:SUSE-SA:2009:061
SUSE:SUSE-SA:2009:064
SUSE:SUSE-SA:2010:001
SUSE:SUSE-SA:2010:005
SUSE:SUSE-SA:2010:010
SUSE:SUSE-SA:2010:012
SUSE:SUSE-SA:2010:014
UBUNTU:CVE-2009-3939
UBUNTU:USN-864-1
bnc#557180
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10310
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7540
rh#526068
CVE-2009-4020kernel-source-rt:Not affectedimportant ()CONFIRM:support.avaya.com:CVE-2009-4272
CONFIRM:userweb.kernel.org:CVE-2009-4020
CVE-2009-4020
DSA-2003
DSA-2005
MLIST:[linux-mm-commits] 20091203 + hfs-fix-a-potential-buffer-overflow.patch added to -mm tree
MLIST:[oss-security] 20091204 CVE-2009-4020 kernel: hfs buffer overflow
OVAL:oval:org.mitre.oval:def:10091
OVAL:oval:org.mitre.oval:def:6750
RH:CVE-2009-4020
RHSA-2010:0046
RHSA-2010:0076
RHSA-2010:0095
RHSA-2012:1323
RHSA-2012:1347
SECUNIA:38276
SECUNIA:39742
SMASH Issue 47338
SUSE:SUSE-SA:2010:005
SUSE:SUSE-SA:2010:019
SUSE:SUSE-SA:2010:023
UBUNTU:CVE-2009-4020
bnc#564374
rh#540736
rh#819471
CVE-2009-4026kernel-source-rt:Not affectedimportant ()BID:37170
CONFIRM:git.kernel.org:CVE-2009-4027
CONFIRM:www.kernel.org:CVE-2009-4027
CVE-2009-4026
MISC:git.kernel.org:/
MLIST:[oss-security] 20091201 CVE request: kernel: mac80211: fix two remote exploits
RH:CVE-2009-4026
RHSA-2010:0178
RHSA-2010:0380
SECUNIA:38017
SMASH Issue 64038
SUSE:SUSE-SA:2010:001
UBUNTU:CVE-2009-4026
UBUNTU:USN-864-1
bnc#558267
rh#541149
CVE-2009-4027kernel-source-rt:Not affectedimportant ()BID:37170
CONFIRM:www.kernel.org:CVE-2009-4027
CVE-2009-4027
DSA-1996
MISC:git.kernel.org:/
OVAL:oval:org.mitre.oval:def:11583
RH:CVE-2009-4027
RHSA-2010:0178
RHSA-2010:0380
SECUNIA:38017
SECUNIA:38492
SMASH Issue 41130
SUSE:SUSE-SA:2010:001
UBUNTU:CVE-2009-4027
UBUNTU:USN-864-1
bnc#558267
rh#541149
CVE-2009-4031kernel-source-rt:Not affectedimportant ()BID:37130
CONFIRM:git.kernel.org:CVE-2009-4031
CONFIRM:www.kernel.org:CVE-2009-4031
CVE-2009-4031
DSA-1962
FEDORA:FEDORA-2009-13098
MISC:git.kernel.org:MLIST:[oss-security] 20091125 CVE request: kernel: KVM: x86 emulator: limit instructions to 15 bytes
MLIST:[oss-security] 20091125 CVE request: kernel: KVM: x86 emulator: limit instructions to 15 bytes
MLIST:[oss-security] 20091125 Re: CVE request: kernel: KVM: x86 emulator: limit instructions to 15 bytes
RH:CVE-2009-4031
RHSA-2009:1659
RHSA-2009:1692
SMASH Issue 41763
SUSE:SUSE-SA:2010:018
UBUNTU:CVE-2009-4031
bdo#557739
bdo#562075
bdo#562076
bnc#558269
bnc#558662
http://git.kernel.org/?p=linux/kernel/git/avi/kvm.git%3Ba=commit%3Bh=e42d9b8141d1f54ff72ad3850bb110c95a5f3b88
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11089
rh#541160
CVE-2009-4067kernel-source-rt:Not affectedlow ()BID:48383
BID:48929
BID:49146
CONFIRM:ftp.osuosl.org:CVE-2011-3209
CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:ftp.osuosl.org:CVE-2012-4444
CONFIRM:git.kernel.org:CVE-2011-1160
CONFIRM:git.kernel.org:CVE-2011-1585
CONFIRM:git.kernel.org:CVE-2011-1833
CONFIRM:git.kernel.org:CVE-2011-2496
CONFIRM:git.kernel.org:CVE-2011-2695
CONFIRM:git.kernel.org:CVE-2011-2699
CONFIRM:git.kernel.org:CVE-2011-2723
CONFIRM:git.kernel.org:CVE-2011-3188
CONFIRM:git.kernel.org:CVE-2011-3191
CONFIRM:git.kernel.org:CVE-2011-3209
CONFIRM:github.com:CVE-2011-1160
CONFIRM:github.com:CVE-2011-1585
CONFIRM:github.com:CVE-2011-1833
CONFIRM:github.com:CVE-2011-2496
CONFIRM:github.com:CVE-2011-2699
CONFIRM:github.com:CVE-2011-3188
CONFIRM:github.com:CVE-2011-3191
CONFIRM:github.com:CVE-2011-3209
CONFIRM:support.f5.com:CVE-2011-3188
CONFIRM:www.kernel.org:CVE-2011-2695
CONFIRM:www.kernel.org:CVE-2011-2723
CONFIRM:www.kernel.org:CVE-2011-4594
CONFIRM:xenbits.xen.org:CVE-2011-3131
CVE-2009-4067
CVE-2011-1160
CVE-2011-1162
CVE-2011-1585
CVE-2011-1833
CVE-2011-2484
CVE-2011-2496
CVE-2011-2695
CVE-2011-2699
CVE-2011-2723
CVE-2011-2942
CVE-2011-3131
CVE-2011-3188
CVE-2011-3191
CVE-2011-3209
CVE-2011-3347
CVE-2023-2002
DSA-2240
DSA-2264
DSA-2303
DSA-2310
DSA-2443
HP:HPSBGN02970
MANDRIVA:MDVSA-2013:150
MISC:git.kernel.org:MLIST:[oss-security] 20110415 Re: CVE Request: cifs session reuse
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:labs.mwrinfosecurity.com:CVE-2009-4067
MISC:tpmdd.git.sourceforge.net:MLIST:[oss-security] 20110315 Re: CVE requests - kernel: tpm infoleaks
MISC:www.redhat.com:MLIST:[oss-security] 20111024 kernel; CVE-2011-2942 and CVE-2011-3209
MLIST:[Xen-devel] 20110616 IOMMU faults
MLIST:[Xen-devel] 20110812 Xen Advisory 5 (CVE-2011-3131) IOMMU fault livelock
MLIST:[linux-ext4] 20110603 [PATCH 1/2] ext4: Fix max file size and logical block counting of extent format file
MLIST:[linux-kernel] 20110616 [PATCH] taskstats: don't allow duplicate entries in listener mode
MLIST:[oss-security] 20110315 Re: CVE requests - kernel: tpm infoleaks
MLIST:[oss-security] 20110415 Re: CVE Request: cifs session reuse
MLIST:[oss-security] 20110622 CVE request: kernel: taskstats local DoS
MLIST:[oss-security] 20110622 Re: CVE request: kernel: taskstats local DoS
MLIST:[oss-security] 20110627 Re: CVE request: kernel: mm: avoid wrapping vm_pgoff in mremap() and stack expansions
MLIST:[oss-security] 20110715 CVE Request -- kernel: ext4: kernel panic when writing data to the last block of sparse file
MLIST:[oss-security] 20110715 Re: CVE Request -- kernel: ext4: kernel panic when writing data to the last block of sparse file
MLIST:[oss-security] 20110720 Re: CVE request: kernel: ipv6: make fragment identifications less predictable
MLIST:[oss-security] 20110728 CVE request: kernel: gro: Only reset frag0 when skb can be pulled
MLIST:[oss-security] 20110729 Re: CVE request: kernel: gro: Only reset frag0 when skb can be pulled
MLIST:[oss-security] 20110823 Re: CVE request: kernel: change in how tcp seq numbers are generated
MLIST:[oss-security] 20110824 Re: CVE request: kernel: cifs: singedness issue in CIFSFindNext()
MLIST:[oss-security] 20111024 kernel; CVE-2011-2942 and CVE-2011-3209
OSS:2023/04/16/3
Oracle:CVE-2011-2699
RH:CVE-2009-4067
RH:CVE-2011-1160
RH:CVE-2011-1162
RH:CVE-2011-1585
RH:CVE-2011-1833
RH:CVE-2011-2484
RH:CVE-2011-2496
RH:CVE-2011-2695
RH:CVE-2011-2699
RH:CVE-2011-2723
RH:CVE-2011-2942
RH:CVE-2011-3131
RH:CVE-2011-3188
RH:CVE-2011-3191
RH:CVE-2011-3209
RH:CVE-2011-3347
RHSA-2011:1189
RHSA-2011:1241
RHSA-2011:1253
RHSA-2011:1321
RHSA-2011:1350
RHSA-2011:1386
RHSA-2011:1408
RHSA-2011:1418
RHSA-2011:1419
RHSA-2011:1465
RHSA-2011:1479
RHSA-2011:1530
RHSA-2012:0010
RHSA-2012:0116
RHSA-2012:0358
SECTRACK:1025876
SECTRACK:1027274
SECUNIA:45193
SECUNIA:45622
SMASH Issue 3151
SMASH Issue 44690
SMASH Issue 44698
SMASH Issue 45394
SMASH Issue 45473
SMASH Issue 45808
SMASH Issue 45983
SMASH Issue 46142
SMASH Issue 46145
SMASH Issue 46252
SMASH Issue 46253
SMASH Issue 46436
SMASH Issue 72317
SMASH Issue 72335
SMASH Issue 72529
SMASH Issue 72895
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2009-4067
UBUNTU:CVE-2011-1160
UBUNTU:CVE-2011-1162
UBUNTU:CVE-2011-1585
UBUNTU:CVE-2011-1833
UBUNTU:CVE-2011-2484
UBUNTU:CVE-2011-2496
UBUNTU:CVE-2011-2695
UBUNTU:CVE-2011-2699
UBUNTU:CVE-2011-2723
UBUNTU:CVE-2011-2942
UBUNTU:CVE-2011-3131
UBUNTU:CVE-2011-3188
UBUNTU:CVE-2011-3191
UBUNTU:CVE-2011-3209
UBUNTU:CVE-2011-3347
XF:kernel-taskstats-dos(68150)
bdo#618485
bdo#633738
bnc#680040
bnc#687812
bnc#701492
bnc#702285
bnc#703153
bnc#706374
bnc#706375
bnc#707288
bnc#709164
bnc#709771
bnc#711539
bnc#712051
bnc#714001
bnc#726064
bnc#732006
bnc#737874
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1309d7afbed112f0e8e90be9af975550caa0076b
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=17dd759c67f21e34f2156abcf415e1f60605a188
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4ff67b720c02c36e54d55b88c2931879b7db1cd2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6e5714eaf77d79ae1c8b47e3e040ff5411b717ec
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9438fabb73eb48055b58b89fc51e0bc4db22fabd
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=982134ba62618c2d69fbbbd166d0a11ee3b7e3d8
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bc0b96b54a21246e377122d54569eef71cec535f
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f17722f917b2f21497deb6edc62fb1683daa08e6
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f8bd2258e2d520dff28c855658bd24bdafb5102d
https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=fadca7bdc43b02f518585d9547019966415cadfd
https://support.f5.com/csp/article/K15301?utm_source=f5support&%3Butm_medium=RSS
linux.git:commit:3321c07ae5068568cd61ac9f4ba749006a7185c9
rh#684671
rh#697394
rh#715436
rh#716538
rh#722393
rh#722557
rh#723429
rh#726552
rh#729465
rh#730341
rh#730917
rh#731172
rh#732629
rh#732658
rh#732869
rh#732878
rh#736425
rh#814278
CVE-2009-4131kernel-source-rt:Not affectedimportant ()BID:37277
CONFIRM:git.kernel.org:CVE-2009-4131
CONFIRM:www.kernel.org:CVE-2009-4307
CVE-2009-4131
FEDORA:FEDORA-2009-13039
MANDRIVA:MDVSA-2009:329
MISC:git.kernel.org:/
MISC:www.theregister.co.uk:CVE-2009-4131
MLIST:[linux-kernel] 20091209 [GIT PULL] ext4 updates for v2.6.33
RH:CVE-2009-4131
SECUNIA:37658
SECUNIA:37686
SECUNIA:38017
SMASH Issue 64259
SUSE:SUSE-SA:2010:001
UBUNTU:CVE-2009-4131
UBUNTU:USN-869-1
VUPEN:ADV-2009-3468
bnc#561018
rh#544471
rh#547263
CVE-2009-4272kernel-source-rt:Unsupportedimportant ()CONFIRM:git.kernel.org:CVE-2009-4272
CONFIRM:support.avaya.com:CVE-2009-4272
CONFIRM:www.kernel.org:CVE-2009-4272
CVE-2009-4272
MISC:git.kernel.org:/
MLIST:[oss-security] 20100120 CVE-2009-4272 kernel: emergency route cache flushing leads to node deadlock
MLIST:[oss-security] 20100120 Re: CVE-2009-4272 kernel: emergency route cache flushing leads to node deadlock
OVAL:oval:org.mitre.oval:def:11167
OVAL:oval:org.mitre.oval:def:7026
RH:CVE-2009-4272
RHSA-2010:0046
RHSA-2010:0095
SMASH Issue 64496
UBUNTU:CVE-2009-4272
XF:linux-kernel-routing-dos(55808)
bnc#572190
rh#545411
CVE-2009-4306kernel-source-rt:Not affectedmoderate ()CVE-2009-4306
MISC:twitter.com:CVE-2009-4306
RH:CVE-2009-4306
SMASH Issue 64518
UBUNTU:CVE-2009-4306
bnc#564380
rh#547263
CVE-2009-4307kernel-source-rt:Not affectedimportant ()CONFIRM:bugzilla.kernel.org:CVE-2009-4307
CONFIRM:git.kernel.org:CVE-2009-4307
CVE-2009-4307
DSA-2443
RH:CVE-2009-4307
RHSA-2010:0178
RHSA-2010:0380
RHSA-2012:1445
RHSA-2012:1580
SMASH Issue 64520
UBUNTU:CVE-2009-4307
bnc#564381
linux.git:commit:d50f2ab6f050311dbf7b8f5501b25f0bf64a439b
rh#547251
rh#809687
CVE-2009-4308kernel-source-rt:Not affectedimportant ()CONFIRM:git.kernel.org:CVE-2009-4308
CVE-2009-4308
RH:CVE-2009-4308
RHSA-2010:0147
SMASH Issue 64521
UBUNTU:CVE-2009-4308
bnc#564382
rh#547255
CVE-2009-4536kernel-source-rt:Not affectedimportant ()BID:37519
CONFIRM:marc.info:CVE-2009-4536
CVE-2009-4536
DSA-2003
MISC:blog.c22.cc:CVE-2009-4537
MLIST:[oss-security] 20091228 CVE requests - kernel security regressions for CVE-2009-1385/and -1389
MLIST:[oss-security] 20091229 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389
MLIST:[oss-security] 20091231 Re: CVE requests - kernel security regressions for CVE-2009-1385/and -1389
RH:CVE-2009-4536
RHSA-2010:0019
RHSA-2010:0020
RHSA-2010:0041
RHSA-2010:0053
RHSA-2010:0079
RHSA-2010:0095
RHSA-2010:0111
RHSA-2010:0882
SECTRACK:1023420
SECUNIA:38031
SECUNIA:38610
SMASH Issue 44865
UBUNTU:CVE-2009-4536
XF:kernel-e1000main-security-bypass(55648)
bnc#583167
bnc#583434
rh#550907
rh#551214
rh#552126
CVE-2009-4537kernel-source-rt:Not affectedimportant ()BID:37521
CONFIRM:marc.info:CVE-2009-4537
CVE-2009-4537
MISC:twitter.com:CVE-2009-4537
MLIST:[linux-netdev] 20091228 [PATCH RFC] r8169: straighten out overlength frame detection
RH:CVE-2009-4537
RHSA-2010:0019
RHSA-2010:0020
RHSA-2010:0041
RHSA-2010:0053
RHSA-2010:0079
RHSA-2010:0095
RHSA-2010:0111
SECTRACK:1023419
SMASH Issue 42154
UBUNTU:CVE-2009-4537
XF:kernel-r8169-dos(55647)
bdo#573071
linux.git:commit:6631424fd2efd75e7394b318ad2a8597327857a9
linux.git:commit:c0cd884af045338476b8e69a61fceb3f34ff22f1
rh#550907
CVE-2009-4538kernel-source-rt:Not affectedcritical ()BID:37523
CVE-2009-4538
RH:CVE-2009-4538
RHSA-2010:0019
RHSA-2010:0020
RHSA-2010:0041
RHSA-2010:0053
RHSA-2010:0079
RHSA-2010:0095
RHSA-2010:0111
SMASH Issue 46118
UBUNTU:CVE-2009-4538
XF:kernel-edriver-unspecified(55645)
linux.git:commit:b94b50289622e816adc9f94111cfc2679c80177c
rh#551214
CVE-2009-4880glibc:Analysismoderate ()BID:36443
CONFIRM:sources.redhat.com:CVE-2009-4881
CONFIRM:sourceware.org:CVE-2009-4880
CVE-2009-4880
RH:CVE-2009-4880
SMASH Issue 65506
SREASONRES:20090917 glibc x<=2.10.1 stdio/strfmon.c Multiple Vulnerabilities
UBUNTU:CVE-2009-4880
XF:gnuclibrary-strfmon-overflow(59242)
bdo#583908
rh#524671
rh#599070
CVE-2009-4881glibc:Analysismoderate ()CONFIRM:sourceware.org:CVE-2009-4881
CVE-2009-4881
RH:CVE-2009-4881
SMASH Issue 65508
UBUNTU:CVE-2009-4881
XF:gnuclibrary-vstrfmonl-overflow(59241)
bdo#583908
rh#599095
CVE-2009-5079groff:Analysislow ()CVE-2009-5079
RH:CVE-2009-5079
SMASH Issue 65792
UBUNTU:CVE-2009-5079
bnc#703664
CVE-2009-5082groff:Analysislow ()CVE-2009-5082
RH:CVE-2009-5082
SMASH Issue 65796
UBUNTU:CVE-2009-5082
bnc#703667
CVE-2009-5155glibc:Not affectedlow4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2009-5155
CONFIRM:support.f5.com:CVE-2009-5155
CVE-2009-5155
L3:53935
L3:54120
MISC:debbugs.gnu.org:CVE-2009-5155
MISC:git.savannah.gnu.org:CVE-2009-5155
MISC:sourceware.org:CVE-2009-5155
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
RH:CVE-2009-5155
SMASH Issue 225350
UBUNTU:CVE-2009-5155
bnc#1127223
rh#1683683
rh#1684057
CVE-2010-0003kernel-source-rt:Not affectedmoderate ()BID:37724
BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
CONFIRM:git.kernel.org:CVE-2010-0003
CONFIRM:patchwork.kernel.org:CVE-2010-0003
CONFIRM:www.kernel.org:CVE-2010-0291
CONFIRM:www.vmware.com:CVE-2010-1087
CVE-2010-0003
DSA-1996
DSA-2005
FEDORA:FEDORA-2010-0919
MLIST:[oss-security] 20100112 CVE request - kernel: infoleak if print-fatal-signals=1
MLIST:[oss-security] 20100113 Re: CVE request - kernel: infoleak if print-fatal-signals=1
RH:CVE-2010-0003
RHSA-2010:0146
RHSA-2010:0147
RHSA-2010:0161
SECUNIA:38333
SECUNIA:38492
SECUNIA:38779
SECUNIA:39033
SECUNIA:43315
SMASH Issue 28177
SUSE:SUSE-SA:2010:010
SUSE:SUSE-SA:2010:012
SUSE:SUSE-SA:2010:014
UBUNTU:CVE-2010-0003
bnc#569902
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b45c6e76bc2c72f6426c14bed64fdcbc9bf37cb0
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10550
rh#554578
CVE-2010-0006kernel-source-rt:Not affectedimportant ()BID:37810
CONFIRM:bugs.gentoo.org:CVE-2010-0006
CONFIRM:git.kernel.org:CVE-2010-0006
CONFIRM:security-tracker.debian.org:/tracker/CVE-2010-0006
CONFIRM:security-tracker.debian.org:CVE-2010-0006
CONFIRM:www.kernel.org:CVE-2010-0291
CVE-2010-0006
FEDORA:FEDORA-2010-0919
MISC:cert.fi:CVE-2010-0006
MISC:git.kernel.org:/
MLIST:[linux-netdev] 20100114 [PATCH]: ipv6: skb_dst() can be NULL in ipv6_hop_jumbo().
MLIST:[oss-security] 20100114 CVE-2010-0006 - kernel: ipv6: skb_dst() can be NULL in ipv6_hop_jumbo()
OSVDB:61876
RH:CVE-2010-0006
SECUNIA:38168
SECUNIA:38333
SMASH Issue 28196
SUSE:SUSE-SA:2010:010
UBUNTU:CVE-2010-0006
bnc#570608
rh#555217
CVE-2010-0007kernel-source-rt:Not affectedmoderate ()BID:37762
BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
CONFIRM:git.kernel.org:CVE-2010-0007
CONFIRM:www.kernel.org:CVE-2010-0007
CONFIRM:www.vmware.com:CVE-2010-1087
CVE-2010-0007
DSA-1996
DSA-2003
DSA-2005
FEDORA:FEDORA-2010-0919
MANDRIVA:MDVSA-2011:051
MLIST:[oss-security] 20100113 CVE Request: kernel ebtables perm check
MLIST:[oss-security] 20100114 Re: CVE Request: kernel ebtables perm check
RH:CVE-2010-0007
RHSA-2010:0146
RHSA-2010:0147
RHSA-2010:0161
SECUNIA:38133
SECUNIA:38296
SMASH Issue 28206
SUSE:SUSE-SA:2010:007
SUSE:SUSE-SA:2010:010
SUSE:SUSE-SA:2010:012
SUSE:SUSE-SA:2010:013
SUSE:SUSE-SA:2010:014
UBUNTU:CVE-2010-0007
VUPEN:ADV-2010-0109
XF:kernel-ebtables-security-bypass(55602)
bnc#570602
bnc#570606
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dce766af541f6605fa9889892c0280bab31c66ab
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9630
rh#555238
CVE-2010-0008kernel-source-rt:Not affectedimportant ()BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
CONFIRM:git.kernel.org:CVE-2010-0008
CONFIRM:www.kernel.org:CVE-2007-6716
CONFIRM:www.vmware.com:CVE-2010-1087
CVE-2010-0008
MISC:git.kernel.org:/
MLIST:[oss-security] 20100317 CVE-2010-0008 kernel: sctp remote denial of service
OVAL:oval:org.mitre.oval:def:11160
RH:CVE-2010-0008
RHSA-2010:0146
RHSA-2010:0147
RHSA-2010:0148
RHSA-2010:0149
RHSA-2010:0172
RHSA-2010:0342
SECUNIA:39295
SECUNIA:43315
SMASH Issue 28216
UBUNTU:CVE-2010-0008
bnc#586195
rh#555658
CVE-2010-0307kernel-source-rt:Not affectedmoderate ()BID:38027
BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
CONFIRM:git.kernel.org:CVE-2010-0307
CONFIRM:marc.info:CVE-2010-0307
CONFIRM:support.avaya.com:CVE-2010-1086
CONFIRM:www.kernel.org:CVE-2010-0410
CONFIRM:www.vmware.com:CVE-2010-1087
CVE-2010-0307
DSA-1996
FEDORA:FEDORA-2010-1787
MANDRIVA:MDVSA-2010:066
MISC:www.globalsecuritymag.com:CVE-2010-0307
MLIST:[linux-mm] 20100128 DoS on x86_64
MLIST:[oss-security] 20100201 CVE request - kernel: DoS on x86_64
MLIST:[oss-security] 20100201 Re: CVE request - kernel: DoS on x86_64
MLIST:[oss-security] 20100203 Re: CVE request - kernel: DoS on x86_64
MLIST:[oss-security] 20100204 Re: CVE request - kernel: DoS on x86_64
RH:CVE-2010-0307
RHSA-2010:0146
RHSA-2010:0398
RHSA-2010:0771
SECUNIA:38922
SECUNIA:39649
SMASH Issue 29541
SUSE:SUSE-SA:2010:014
UBUNTU:CVE-2010-0307
UBUNTU:USN-914-1
VUPEN:ADV-2010-0638
bnc#575644
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=221af7f87b97431e3ee21ce4b0e77d5411cf1549
http://www.globalsecuritymag.com/Vigil-nce-Linux-kernel-denial-of%2C20100202%2C15754.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10870
rh#560547
CVE-2010-0410kernel-source-rt:Not affectedmoderate ()BID:38058
BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
CONFIRM:git.kernel.org:CVE-2010-0410
CONFIRM:support.avaya.com:CVE-2010-1086
CONFIRM:www.kernel.org:CVE-2010-0410
CONFIRM:www.vmware.com:CVE-2010-1087
CVE-2010-0410
DSA-1996
DSA-2003
DSA-2005
FEDORA:FEDORA-2010-1787
FEDORA:FEDORA-2010-1804
MANDRIVA:MDVSA-2010:088
MLIST:[oss-security] 20100203 CVE request: kernel OOM/crash in drivers/connector
MLIST:[oss-security] 20100203 Re: CVE request: kernel OOM/crash in drivers/connector
RH:CVE-2010-0410
RHSA-2010:0161
RHSA-2010:0398
SECUNIA:38557
SECUNIA:39742
SMASH Issue 29938
SUSE:SUSE-SA:2010:014
SUSE:SUSE-SA:2010:018
SUSE:SUSE-SA:2010:019
SUSE:SUSE-SA:2010:023
UBUNTU:CVE-2010-0410
UBUNTU:USN-914-1
VUPEN:ADV-2010-0638
bnc#576927
bnc#605463
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f98bfbd78c37c5946cc53089da32a5f741efdeb7
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10903
rh#561682
rh#566624
rh#569237
CVE-2010-0415kernel-source-rt:Not affectedmoderate ()BID:38144
BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
CONFIRM:git.kernel.org:CVE-2010-0415
CONFIRM:www.kernel.org:CVE-2010-0623
CONFIRM:www.vmware.com:CVE-2010-1087
CVE-2010-0415
DSA-1996
DSA-2003
DSA-2005
FEDORA:FEDORA-2010-1787
FEDORA:FEDORA-2010-1804
MANDRIVA:MDVSA-2010:066
MANDRIVA:MDVSA-2010:198
MLIST:[oss-security] 20100207 CVE request: information leak / potential crash in sys_move_pages
MLIST:[oss-security] 20100207 Re: CVE request: information leak / potential crash in sys_move_pages
MLIST:[oss-security] 20100208 Re: CVE request: information leak / potential crash in sys_move_pages
RH:CVE-2010-0415
RHSA-2010:0147
RHSA-2010:0161
SMASH Issue 29963
SUSE:SUSE-SA:2010:014
SUSE:SUSE-SA:2010:018
UBUNTU:CVE-2010-0415
UBUNTU:USN-914-1
VUPEN:ADV-2010-0638
bnc#577753
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f5a55f1a6c5abee15a0e878e5c74d9f1569b8b0
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9399
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-0622kernel-source-rt:Ignoremoderate ()CONFIRM:git.kernel.org:CVE-2010-0622
CVE-2010-0622
DSA-2003
DSA-2012
MISC:git.kernel.org:MLIST:[oss-security] 20100211 Re: CVE request - kernel: futex: Handle user space corruption gracefully
MLIST:[oss-security] 20100209 CVE request - kernel: futex: Handle user space corruption gracefully
MLIST:[oss-security] 20100211 Re: CVE request - kernel: futex: Handle user space corruption gracefully
RH:CVE-2010-0622
RHSA-2010:0161
RHSA-2010:0504
SECUNIA:38905
SMASH Issue 30747
UBUNTU:CVE-2010-0622
bdo#568561
bdo#570554
bnc#579439
rh#562582
rh#563091
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-0623kernel-source-rt:Not affectedmoderate ()CONFIRM:bugzilla.kernel.org:CVE-2010-0623
CONFIRM:git.kernel.org:CVE-2010-0623
CONFIRM:www.kernel.org:CVE-2010-0623
CVE-2010-0623
MANDRIVA:MDVSA-2010:088
MLIST:[oss-security] 20100211 Re: CVE request - kernel: futex: Handle user space corruption gracefully
RH:CVE-2010-0623
SECUNIA:38922
SMASH Issue 30751
SUSE:SUSE-SA:2010:018
UBUNTU:CVE-2010-0623
UBUNTU:USN-914-1
VUPEN:ADV-2010-0638
rh#566023
CVE-2010-0727kernel-source-rt:Ignoremoderate ()CONFIRM:www.kernel.org:CVE-2010-0727
CVE-2010-0727
DSA-2053
MANDRIVA:MDVSA-2010:066
MLIST:[linux-kernel] 20100311 [PATCH 3/3] GFS2: Skip check for mandatory locks when unlocking
MLIST:[oss-security] 20100312 CVE-2010-0727 kernel: gfs/gfs2 locking code DoS flaw
OVAL:oval:org.mitre.oval:def:11392
RH:CVE-2010-0727
RHSA-2010:0178
RHSA-2010:0291
RHSA-2010:0330
RHSA-2010:0331
RHSA-2010:0380
RHSA-2010:0521
SECTRACK:1023809
SECUNIA:39830
SMASH Issue 31169
UBUNTU:CVE-2010-0727
bdo#573071
bnc#589280
rh#562582
rh#570863
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-0730kernel-source-rt:Not affectedlow ()CVE-2010-0730
RH:CVE-2010-0730
RHSA-2010:0398
SMASH Issue 31181
UBUNTU:CVE-2010-0730
bnc#601231
rh#572971
CVE-2010-0741kernel-source-rt:Not affectedimportant ()CONFIRM:bugs.edge.launchpad.net:CVE-2010-0741
CONFIRM:git.kernel.org:CVE-2010-0741
CONFIRM:patchwork.kernel.org:CVE-2010-0741
CVE-2010-0741
MISC:git.kernel.org:/
MLIST:[oss-security] 20100329 CVE-2010-0741 qemu: Improper handling of erroneous data provided by Linux virtio-net driver
MLIST:[qemu-devel] 20091029 Re: qemu-kvm-0.11 regression, crashes on older guests with virtio network
MLIST:[qemu-devel] 20091029 [PATCH] whitelist host virtio networking features [was Re: qemu-kvm-0.11 regression, crashes on older ...]
OVAL:oval:org.mitre.oval:def:11143
RH:CVE-2010-0741
RHSA-2010:0271
RHSA-2010:0476
SECTRACK:1023798
SMASH Issue 31250
UBUNTU:CVE-2010-0741
VUPEN:ADV-2010-0760
bnc#596032
rh#577218
CVE-2010-1148kernel-source-rt:Not affectedmoderate ()BID:39186
CVE-2010-1148
MISC:xorl.wordpress.com:CVE-2010-1148
MLIST:[linux-cifs-client] 20100402 [patch] skip posix open if nameidata is null
MLIST:[linux-cifs-client] 20100404 [patch] skip posix open if nameidata is null
MLIST:[oss-security] 20100405 CVE request: kernel: cifs: cifs_create() NULL pointer dereference
MLIST:[oss-security] 20100405 Re: CVE request: kernel: cifs: cifs_create() NULL pointer dereference
RH:CVE-2010-1148
SECUNIA:39344
SMASH Issue 32847
UBUNTU:CVE-2010-1148
XF:linux-kernel-cifscreate-dos(57561)
bnc#593940
rh#579445
CVE-2010-1162kernel-source-rt:Not affectedimportant ()CONFIRM:git.kernel.org:CVE-2010-1162
CONFIRM:www.kernel.org:CVE-2010-1488
CVE-2010-1162
DSA-2053
MANDRIVA:MDVSA-2010:198
MLIST:[oss-security] 20100414 Couple of kernel issues
MLIST:[oss-security] 20100414 Re: Couple of kernel issues
MLIST:[oss-security] 20100415 CVE request: kernel: tty: release_one_tty() forgets to put pids
MLIST:[oss-security] 20100415 Re: CVE request: kernel: tty: release_one_tty() forgets to put pids
RH:CVE-2010-1162
RHSA-2010:0631
SMASH Issue 42683
SUSE:SUSE-SA:2010:031
UBUNTU:CVE-2010-1162
VUPEN:ADV-2010-1857
bdo#573071
bnc#596462
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6da8d866d0d39e9509ff826660f6a86a6757c966
rh#562582
rh#582068
rh#582076
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-1173kernel-source-rt:Not affectedimportant ()BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
CONFIRM:git.kernel.org:CVE-2010-1173
CONFIRM:kbase.redhat.com:CVE-2010-1173
CONFIRM:www.vmware.com:CVE-2010-1087
CVE-2010-1173
DSA-2053
MANDRIVA:MDVSA-2010:198
MISC:git.kernel.org:/
MLIST:[netdev] 20100428 Re: [PATCH]: sctp: Fix skb_over_panic resulting from multiple invalid parameter errors (CVE-2010-1173) (v4)
MLIST:[oss-security] 20100429 CVE-2010-1173 kernel: skb_over_panic resulting from multiple invalid parameter errors
MLIST:[oss-security] 20100429 Re: CVE-2010-1173 kernel: skb_over_panic resulting from multiple invalid parameter errors
OVAL:oval:org.mitre.oval:def:11416
RH:CVE-2010-1173
RHSA-2010:0474
RHSA-2010:0504
RHSA-2010:0631
SECUNIA:39830
SECUNIA:40218
SECUNIA:43315
SMASH Issue 46119
UBUNTU:CVE-2010-1173
bdo#573071
bnc#600375
linux.git:commit:2e3219b5c8a2e44e0b83ae6e04f52f20a82ac0f2
linux.git:commit:5fa782c2f5ef6c2e4f04d3e228412c9b4a4c8809
linux.git:commit:7437e7d3672b6d23c08212c68752c9a9c25f8e9e
rh#562582
rh#584645
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-1188kernel-source-rt:Not affectedimportant ()BID:39016
CONFIRM:git.kernel.org:CVE-2010-1188
CVE-2010-1188
MLIST:[oss-security] 20100329 CVE request: kernel: ipv6: skb is unexpectedly freed (remote DoS)
RH:CVE-2010-1188
RHSA-2010:0178
RHSA-2010:0380
RHSA-2010:0394
RHSA-2010:0424
RHSA-2010:0439
RHSA-2010:0882
SECTRACK:1023992
SECUNIA:39652
SMASH Issue 62338
UBUNTU:CVE-2010-1188
bnc#592571
rh#577711
CVE-2010-1436kernel-source-rt:Not affectedmoderate ()BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
CONFIRM:www.vmware.com:CVE-2010-1087
CVE-2010-1436
MLIST:[oss-security] 20100427 CVE request - gfs2 kernel issue
MLIST:[oss-security] 20100427 Re: CVE request - gfs2 kernel issue
OVAL:oval:org.mitre.oval:def:10652
RH:CVE-2010-1436
RHSA-2010:0504
SECUNIA:43315
SMASH Issue 62776
UBUNTU:CVE-2010-1436
XF:kernel-gfs2quota-dos(58839)
bnc#599957
rh#586006
CVE-2010-1437kernel-source-rt:Not affectedmoderate ()BID:39719
BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
CONFIRM:patchwork.kernel.org:CVE-2010-1437
CONFIRM:www.vmware.com:CVE-2010-1087
CVE-2010-1437
DSA-2053
MLIST:[linux-kernel] 20100422 [PATCH 0/1][BUG][IMPORTANT] KEYRINGS: find_keyring_by_name() can gain the freed keyring
MLIST:[linux-kernel] 20100430 [PATCH 2/7] KEYS: find_keyring_by_name() can gain access to a freed keyring
MLIST:[linux-kernel] 20100503 Re: [PATCH 2/7] KEYS: find_keyring_by_name() can gain access to a freed keyring
MLIST:[oss-security] 20100427 CVE request - kernel: find_keyring_by_name() can gain the freed keyring
MLIST:[oss-security] 20100427 Re: CVE request - kernel: find_keyring_by_name() can gain the freed keyring
OVAL:oval:org.mitre.oval:def:9715
RH:CVE-2010-1437
RHSA-2010:0474
RHSA-2010:0504
RHSA-2010:0631
SECUNIA:39830
SECUNIA:40218
SECUNIA:40645
SECUNIA:43315
SMASH Issue 42681
SUSE:SUSE-SA:2010:031
UBUNTU:CVE-2010-1437
VUPEN:ADV-2010-1857
XF:kernel-findkeyringbyname-dos(58254)
bdo#573071
bnc#599955
rh#562582
rh#585094
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-1641kernel-source-rt:Not affectedmoderate ()BID:40356
BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
CONFIRM:git.kernel.org:CVE-2010-1641
CONFIRM:www.kernel.org:CVE-2010-1641
CONFIRM:www.vmware.com:CVE-2010-1087
CVE-2010-1641
MLIST:[cluster-devel] 20100525 [PATCH 3/3] GFS2: Fix permissions checking for setflags ioctl()
MLIST:[oss-security] 20100525 CVE request - kernel: GFS2: The setflags ioctl() doesn't check file ownership
MLIST:[oss-security] 20100525 Re: CVE request - kernel: GFS2: The setflags ioctl() doesn't check file ownership
MLIST:[oss-security] 20100526 Re: CVE request - kernel: GFS2: The setflags ioctl() doesn't check file ownership
RH:CVE-2010-1641
RHSA-2010:0504
SMASH Issue 42679
SUSE:SUSE-SA:2010:031
SUSE:SUSE-SA:2010:033
UBUNTU:CVE-2010-1641
VUPEN:ADV-2010-1857
XF:kernel-gfs2-security-bypass(58926)
bnc#608576
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7df0e0397b9a18358573274db9fdab991941062f
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9916
rh#595579
CVE-2010-1643kernel-source-rt:Not affectedmoderate ()BID:40377
CONFIRM:git.kernel.org:CVE-2010-1643
CONFIRM:www.kernel.org:CVE-2010-1643
CVE-2010-1643
MANDRIVA:MDVSA-2010:198
MISC:vigilance.fr:CVE-2010-1643
MLIST:[oss-security] 20100526 CVE request - kernel: nfsd: fix vm overcommit crash
MLIST:[oss-security] 20100526 Re: CVE request - kernel: nfsd: fix vm overcommit crash
RH:CVE-2010-1643
RHSA-2010:0631
SMASH Issue 42680
SUSE:SUSE-SA:2010:031
UBUNTU:CVE-2010-1643
VUPEN:ADV-2010-1857
XF:linux-kernel-knfsd-dos(58957)
bnc#608933
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=731572d39fcd3498702eda4600db4c43d51e0b26
rh#595970
CVE-2010-2066kernel-source-rt:Not affectedmoderate ()BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
CONFIRM:git.kernel.org:CVE-2010-2066
CONFIRM:www.kernel.org:CVE-2010-4805
CONFIRM:www.vmware.com:CVE-2010-1087
CVE-2010-2066
MLIST:[oss-security] 20100607 CVE request - kernel: ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files
MLIST:[oss-security] 20100609 Re: CVE request - kernel: ext4: Make sure the MOVE_EXT ioctl can't overwrite append-only files
RH:CVE-2010-2066
RHSA-2010:0610
SECUNIA:43315
SMASH Issue 63733
SUSE:SUSE-SA:2010:033
UBUNTU:CVE-2010-2066
UBUNTU:USN-1000-1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1f5a81e41f8b1a782c68d3843e9ec1bfaadf7d72
rh#601006
CVE-2010-2226kernel-source-rt:Not affectedmoderate ()BID:40920
BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
CONFIRM:git.kernel.org:CVE-2010-2226
CONFIRM:www.kernel.org:CVE-2010-4805
CONFIRM:www.vmware.com:CVE-2010-1087
CVE-2010-2226
DSA-2094
MANDRIVA:MDVSA-2010:198
MLIST:[oss-security] 20100617 CVE request - kernel: xfs swapext ioctl issue
MLIST:[oss-security] 20100618 Re: CVE request - kernel: xfs swapext ioctl issue
MLIST:[xfs] 20100616 Re: [Security] XFS swapext ioctl minor security issues
RH:CVE-2010-2226
RHSA-2010:0610
SECUNIA:43315
SMASH Issue 44051
SUSE:SUSE-SA:2010:060
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-2226
UBUNTU:USN-1000-1
VUPEN:ADV-2011-0298
bdo#589179
bnc#615141
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1817176a86352f65210139d4c794ad2d19fc6b63
rh#605158
CVE-2010-2240kernel-source-rt:Not affectedimportant ()BUGTRAQ:20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-2240
CONFIRM:www.kernel.org:CVE-2010-2240
CONFIRM:www.kernel.org:CVE-2010-2946
CONFIRM:www.vmware.com:CVE-2009-4536
CONFIRM:www.vmware.com:CVE-2011-1786
CVE-2010-2240
DSA-2094
MANDRIVA:MDVSA-2010:172
MANDRIVA:MDVSA-2010:198
MANDRIVA:MDVSA-2011:051
MISC:git.kernel.org
MISC:git.kernel.org:/
MISC:www.invisiblethingslab.com:CVE-2010-2240
MLIST:[security-announce] 20110428 VMSA-2011-0007 VMware ESXi and ESX Denial of Service and third party updates for Likewise components and ESX Service Console
OSS:2017/Q2/500
OVAL:oval:org.mitre.oval:def:13247
RH:CVE-2010-2240
RHSA-2010:0631
RHSA-2010:0660
RHSA-2010:0661
RHSA-2010:0670
RHSA-2010:0676
RHSA-2010:0677
RHSA-2010:0882
SECTRACK:1024344
SMASH Issue 42571
SMASH Issue 42927
UBUNTU:CVE-2010-2240
bdo#589179
bnc#615929
bnc#618152
rh#606611
CVE-2010-2248kernel-source-rt:Not affectedimportant ()BID:42242
BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
CONFIRM:git.kernel.org:CVE-2010-2248
CONFIRM:www.kernel.org:CVE-2010-2248
CONFIRM:www.vmware.com:CVE-2010-1087
CVE-2010-2248
DSA-2094
MANDRIVA:MDVSA-2010:198
MANDRIVA:MDVSA-2011:051
MISC:git.kernel.org:/
MLIST:[oss-security] 20100628 CVE request - kernel: cifs: Fix a kernel BUG with remote OS/2 server
MLIST:[oss-security] 20100628 Re: CVE request - kernel: cifs: Fix a kernel BUG with remote OS/2 server
RH:CVE-2010-2248
RHSA-2010:0606
RHSA-2010:0610
RHSA-2010:0631
SECTRACK:1024285
SECUNIA:43315
SMASH Issue 63979
SUSE:SUSE-SA:2010:060
UBUNTU:CVE-2010-2248
UBUNTU:USN-1000-1
bdo#589179
bnc#618156
rh#608583
CVE-2010-2492kernel-source-rt:Not affectedimportant ()BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-2492
CONFIRM:support.avaya.com:CVE-2010-3015
CONFIRM:www.kernel.org:CVE-2010-4805
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-2492
DSA-2110
MANDRIVA:MDVSA-2010:172
MANDRIVA:MDVSA-2010:198
MISC:git.kernel.org:/
RH:CVE-2010-2492
RHSA-2010:0723
RHSA-2011:0007
SECUNIA:42890
SECUNIA:46397
SMASH Issue 64320
UBUNTU:CVE-2010-2492
bnc#619850
linux.git:commit:a6f80fb7b5986fda663d94079d3bba0937a6b6ff
rh#611385
CVE-2010-2495kernel-source-rt:Not affectedcritical ()CONFIRM:git.kernel.org:CVE-2010-2495
CONFIRM:www.kernel.org:CVE-2010-4263
CVE-2010-2495
MISC:git.kernel.org:/
MLIST:[oss-security] 20100623 kernel: l2tp: Fix oops in pppol2tp_xmit
MLIST:[oss-security] 20100704 Re: CVE Request: kernel: l2tp: Fix oops in pppol2tp_xmit
MLIST:[oss-security] 20100704 Re: kernel: l2tp: Fix oops in pppol2tp_xmit
MLIST:[oss-security] 20100706 Re: CVE Request: kernel: l2tp: Fix oops in pppol2tp_xmit
RH:CVE-2010-2495
SMASH Issue 64328
SUSE:SUSE-SA:2010:033
UBUNTU:CVE-2010-2495
UBUNTU:USN-1000-1
bnc#616612
rh#562582
rh#607054
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-2521kernel-source-rt:Not affectedcritical ()BID:42249
BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
CONFIRM:git.kernel.org:CVE-2010-2521
CONFIRM:www.kernel.org:CVE-2010-2521
CONFIRM:www.vmware.com:CVE-2010-1087
CVE-2010-2521
DSA-2094
MANDRIVA:MDVSA-2010:198
MANDRIVA:MDVSA-2011:051
MISC:git.kernel.org:/
MLIST:[oss-security] 20100707 CVE request - kernel: nfsd4: bug in read_buf
MLIST:[oss-security] 20100708 Re: CVE request - kernel: nfsd4: bug in read_buf
RH:CVE-2010-2521
RHSA-2010:0606
RHSA-2010:0610
RHSA-2010:0631
RHSA-2010:0893
RHSA-2010:0907
SECTRACK:1024286
SECUNIA:43315
SMASH Issue 64368
SUSE:SUSE-SA:2010:040
UBUNTU:CVE-2010-2521
UBUNTU:USN-1000-1
VUPEN:ADV-2010-3050
bdo#589179
bnc#620372
rh#612028
CVE-2010-2524kernel-source-rt:Not affectedimportant ()BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
CONFIRM:git.kernel.org:CVE-2010-2524
CONFIRM:www.kernel.org:CVE-2010-4805
CONFIRM:www.vmware.com:CVE-2010-1087
CVE-2010-2524
DSA-2264
MANDRIVA:MDVSA-2010:172
MLIST:[oss-security] 20100802 CVE-2010-2524 kernel: dns_resolver upcall security issue
MLIST:[oss-security] 20100802 Re: CVE-2010-2524 kernel: dns_resolver upcall security issue
MLIST:[oss-security] 20100803 Re: CVE-2010-2524 kernel: dns_resolver upcall security issue
RH:CVE-2010-2524
RHSA-2010:0610
SECUNIA:43315
SMASH Issue 42984
SUSE:SUSE-SA:2010:040
UBUNTU:CVE-2010-2524
UBUNTU:USN-1000-1
bdo#618485
bnc#627386
bnc#627447
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4c0c03ca54f72fdd5912516ad0a23ec5cf01bda7
linux.git:commit:4c0c03ca54f72fdd5912516ad0a23ec5cf01bda7
rh#562582
rh#612166
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-2632glibc:Unsupportedmoderate ()CONFIRM:kb.juniper.net:CVE-2010-2632
CONFIRM:support.avaya.com:CVE-2010-2632
CVE-2010-2632
OSS:2017/Q2/111
RHSA-2011:0337
SECTRACK:1024975
SECUNIA:42984
SECUNIA:43433
SECUNIA:55212
SMASH Issue 64526
SREASONRES:20101007 Multiple Vendors libc/glob(3) resource exhaustion (+0day remote ftpd-anon)
VUPEN:ADV-2011-0151
XF:solaris-ftp-dos(64798)
bnc#644882
rh#681667
rh#681681
rh#681698
CVE-2010-2798kernel-source-rt:Not affectedimportant ()BID:42124
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-2798
CONFIRM:support.avaya.com:CVE-2010-3015
CONFIRM:www.kernel.org:CVE-2010-4805
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-2798
DSA-2094
MANDRIVA:MDVSA-2010:198
MISC:git.kernel.org:/
MLIST:[oss-security] 20100802 CVE request: kernel: gfs2: rename cases kernel panic
MLIST:[oss-security] 20100802 Re: CVE request: kernel: gfs2: rename cases kernel panic
RH:CVE-2010-2798
RHSA-2010:0660
RHSA-2010:0670
RHSA-2010:0723
SECTRACK:1024386
SECUNIA:46397
SMASH Issue 42983
SUSE:SUSE-SA:2010:040
SUSE:SUSE-SA:2010:054
UBUNTU:CVE-2010-2798
UBUNTU:USN-1000-1
bdo#589179
bnc#627386
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-2803kernel-source-rt:Not affectedimportant ()CONFIRM:git.kernel.org:CVE-2010-2803
CONFIRM:www.kernel.org:CVE-2010-2959
CVE-2010-2803
DSA-2094
MANDRIVA:MDVSA-2010:198
RH:CVE-2010-2803
RHSA-2010:0842
SECUNIA:41512
SMASH Issue 43356
SUSE:SUSE-SA:2010:040
SUSE:SUSE-SA:2010:041
SUSE:SUSE-SA:2010:054
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-2803
VUPEN:ADV-2010-2430
VUPEN:ADV-2011-0298
bdo#589179
bnc#628604
http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=1b2f1489633888d4a06028315dc19d65768a1c05
http://git.kernel.org/?p=linux/kernel/git/airlied/drm-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9f0aee83335db1f3915f4e42a5e21b351740afd
linux.git:commit:b9f0aee83335db1f3915f4e42a5e21b351740afd
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-2942kernel-source-rt:Not affectedmoderate ()BID:42529
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-2942
CONFIRM:patchwork.ozlabs.org:CVE-2010-2942
CONFIRM:support.avaya.com:CVE-2010-3015
CONFIRM:www.kernel.org:CVE-2010-2942
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-2942
MISC:git.kernel.org:/
MLIST:[oss-security] 20100818 CVE request - kernel: net sched memleak
MLIST:[oss-security] 20100819 Re: CVE request - kernel: net sched memleak
RH:CVE-2010-2942
RHSA-2010:0723
RHSA-2010:0771
RHSA-2010:0779
RHSA-2010:0839
RHSA-2011:0007
RHSA-2011:0330
SECUNIA:41512
SECUNIA:46397
SMASH Issue 43354
SUSE:SUSE-SA:2010:040
SUSE:SUSE-SA:2010:041
SUSE:SUSE-SA:2010:054
SUSE:SUSE-SA:2010:060
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-2942
UBUNTU:USN-1000-1
VUPEN:ADV-2010-2430
VUPEN:ADV-2011-0298
bnc#632309
rh#624903
rh#636386
CVE-2010-2943kernel-source-rt:Not affectedimportant ()BID:42527
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-2943
CONFIRM:support.avaya.com:CVE-2010-3015
CONFIRM:www.kernel.org:CVE-2010-4805
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-2943
MLIST:[linux-xfs] 20100620 [PATCH 0/4, V2] xfs: validate inode numbers in file handles correctly
MLIST:[linux-xfs] 20100620 [PATCH 2/4] xfs: validate untrusted inode numbers during lookup
MLIST:[linux-xfs] 20100620 [PATCH 3/4] xfs: rename XFS_IGET_BULKSTAT to XFS_IGET_UNTRUSTED
MLIST:[linux-xfs] 20100620 [PATCH 4/4] xfs: remove block number from inode lookup code
MLIST:[oss-security] 20100818 CVE request - kernel: xfs: stale data exposure
MLIST:[oss-security] 20100819 Re: CVE request - kernel: xfs: stale data exposure
MLIST:[xfs] 20100617 [PATCH] xfsqa: test open_by_handle() on unlinked and freed inode clusters V2
MLIST:[xfs] 20100618 Re: [PATCH] xfsqa: test open_by_handle() on unlinked and freed inode clusters V2
RH:CVE-2010-2943
RHSA-2010:0723
SECUNIA:42758
SECUNIA:43161
SECUNIA:46397
SMASH Issue 65092
UBUNTU:CVE-2010-2943
UBUNTU:USN-1041-1
UBUNTU:USN-1057-1
VUPEN:ADV-2011-0070
VUPEN:ADV-2011-0280
bnc#632317
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1920779e67cbf5ea8afef317777c5bf2b8096188
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7124fe0a5b619d65b739477b3b55a20bf805b06d
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7b6259e7a83647948fa33a736cc832310c8d85aa
rh#562582
rh#620300
rh#621435
rh#624327
rh#624923
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-2954kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2010-2954
CONFIRM:www.kernel.org:CVE-2010-2954
CVE-2010-2954
DSA-2110
MISC:git.kernel.org:/
MISC:twitter.com:CVE-2010-2954
MLIST:[netdev] 20100830 [PATCH] irda: Correctly clean up self->ias_obj on irda_bind() failure.
MLIST:[oss-security] 20100901 CVE-2010-2954 kernel: irda null ptr deref
RH:CVE-2010-2954
SECUNIA:41234
SECUNIA:41512
SMASH Issue 43352
SUSE:SUSE-SA:2010:041
SUSE:SUSE-SA:2010:050
SUSE:SUSE-SA:2010:054
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-2954
UBUNTU:USN-1000-1
VUPEN:ADV-2010-2266
VUPEN:ADV-2010-2430
VUPEN:ADV-2011-0298
XF:kernel-irdabind-dos(61522)
bnc#636112
rh#628770
CVE-2010-2959kernel-source-rt:Ignoreimportant ()BID:42585
CONFIRM:git.kernel.org:CVE-2010-2959
CONFIRM:www.kernel.org:CVE-2010-2959
CVE-2010-2959
DSA-2094
FEDORA:FEDORA-2010-13903
MANDRIVA:MDVSA-2010:198
MISC:jon.oberheide.org:CVE-2010-2959
MLIST:[oss-security] 20100820 kernel: can: add limit for nframes and clean up signed/unsigned variables
RH:CVE-2010-2959
SECUNIA:41512
SMASH Issue 44050
SUSE:SUSE-SA:2010:040
SUSE:SUSE-SA:2010:041
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-2959
VUPEN:ADV-2010-2430
VUPEN:ADV-2011-0298
bdo#589179
bnc#633581
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#625699
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-2963kernel-source-rt:Ignoreimportant ()BID:44242
CONFIRM:git.kernel.org:CVE-2010-2963
CONFIRM:www.kernel.org:CVE-2010-4655
CVE-2010-2963
DSA-2126
FEDORA:FEDORA-2010-18983
MANDRIVA:MDVSA-2010:257
MISC:www.outflux.net:CVE-2010-2963
RH:CVE-2010-2963
SECTRACK:1024710
SECUNIA:42745
SMASH Issue 43681
SUSE:SUSE-SA:2010:053
SUSE:SUSE-SA:2010:057
UBUNTU:CVE-2010-2963
UBUNTU:USN-1000-1
VUPEN:ADV-2010-3321
bnc#646045
linux.git:commit:afaef01c001537fa97a25092d7f54d764dc7d8c1
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#642465
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-3015kernel-source-rt:Ignoremoderate ()BID:42477
CONFIRM:git.kernel.org:CVE-2010-3015
CVE-2010-3015
MANDRIVA:MDVSA-2010:247
MLIST:[oss-security] 20100816 CVE request - kernel: integer overflow in ext4_ext_get_blocks()
MLIST:[oss-security] 20100816 Re: CVE request - kernel: integer overflow in ext4_ext_get_blocks()
MLIST:[oss-security] 20100817 Re: CVE request - kernel: integer overflow in ext4_ext_get_blocks()
RH:CVE-2010-3015
RHSA-2010:0723
SMASH Issue 43355
UBUNTU:CVE-2010-3015
VUPEN:ADV-2010-3117
XF:kernel-stacksize-dos(61156)
bdo#589179
bnc#631801
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-3066kernel-source-rt:Not affectedmoderate ()BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-3066
CONFIRM:www.kernel.org:CVE-2007-6716
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-3066
RH:CVE-2010-3066
RHSA-2010:0839
SECTRACK:1024708
SMASH Issue 65317
UBUNTU:CVE-2010-3066
bnc#657944
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87e2831c3fa39cbf6f7ab676bb5aef039b9659e2
rh#631716
CVE-2010-3067kernel-source-rt:Not affectedmoderate ()BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-3067
CONFIRM:www.kernel.org:CVE-2010-3067
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-3067
DSA-2126
MANDRIVA:MDVSA-2010:257
MANDRIVA:MDVSA-2011:029
MANDRIVA:MDVSA-2011:051
RH:CVE-2010-3067
RHSA-2010:0758
RHSA-2010:0779
RHSA-2010:0839
RHSA-2011:0007
SECUNIA:42778
SECUNIA:42801
SECUNIA:42890
SECUNIA:43291
SECUNIA:46397
SMASH Issue 43693
SUSE:SUSE-SA:2010:060
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:002
SUSE:SUSE-SA:2011:007
SUSE:SUSE-SA:2011:008
UBUNTU:CVE-2010-3067
UBUNTU:USN-1000-1
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0298
VUPEN:ADV-2011-0375
XF:kernel-doiosubmit-dos(61884)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75e1c70fc31490ef8a373ea2a4bea2524099b478
rh#629441
CVE-2010-3078kernel-source-rt:Not affectedmoderate ()BID:43022
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-3078
CONFIRM:www.kernel.org:CVE-2010-3084
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-3078
DSA-2110
MISC:git.kernel.org:/
MLIST:[oss-security] 20100907 CVE request: kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak
MLIST:[oss-security] 20100907 Re: CVE request: kernel: xfs: XFS_IOC_FSGETXATTR ioctl memory leak
MLIST:[xfs-masters] 20100906 [PATCH] xfs: prevent reading uninitialized stack memory
RH:CVE-2010-3078
RHSA-2010:0839
RHSA-2011:0007
SECTRACK:1024418
SECUNIA:41284
SECUNIA:41512
SECUNIA:42890
SECUNIA:46397
SMASH Issue 43349
SUSE:SUSE-SA:2010:041
SUSE:SUSE-SA:2010:050
SUSE:SUSE-SA:2010:054
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-3078
UBUNTU:USN-1000-1
VUPEN:ADV-2010-2430
VUPEN:ADV-2011-0298
bnc#637436
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-3079kernel-source-rt:Not affectedmoderate ()BID:43684
CONFIRM:git.kernel.org:CVE-2010-3079
CONFIRM:www.kernel.org:CVE-2010-3079
CVE-2010-3079
RH:CVE-2010-3079
RHSA-2010:0842
SECUNIA:42758
SMASH Issue 44049
SUSE:SUSE-SA:2010:050
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-3079
UBUNTU:USN-1041-1
VUPEN:ADV-2011-0070
VUPEN:ADV-2011-0298
bnc#637502
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9c55cb12c1c172e2d51e85fbb5a4796ca86b77e7
linux.git:commit:df09162550fbb53354f0c88e85b5d0e6129ee9cc
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-3080kernel-source-rt:Not affectedimportant ()BID:43062
CONFIRM:git.kernel.org:CVE-2010-3080
CONFIRM:www.kernel.org:CVE-2010-3084
CVE-2010-3080
DSA-2110
MANDRIVA:MDVSA-2010:198
MISC:git.kernel.org:MLIST:[oss-security] 20100908 CVE-2010-3080 kernel: /dev/sequencer open failure is not handled correctly
MLIST:[oss-security] 20100908 CVE-2010-3080 kernel: /dev/sequencer open failure is not handled correctly
RH:CVE-2010-3080
RHSA-2011:0007
SECUNIA:42890
SMASH Issue 43348
SUSE:SUSE-SA:2010:050
SUSE:SUSE-SA:2010:054
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-3080
UBUNTU:USN-1000-1
VUPEN:ADV-2011-0298
bnc#638277
http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=c598337660c21c0afaa9df5a65bb4a7a0cf15be8
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=27f7ad53829f79e799a253285318bff79ece15bd
linux.git:commit:27f7ad53829f79e799a253285318bff79ece15bd
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-3081kernel-source-rt:Not affectedimportant ()BUGTRAQ:20101130 VMSA-2010-0017 VMware ESX third party update for Service Console kerne
BUGTRAQ:20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX
CONFIRM:access.redhat.com:CVE-2010-3081
CONFIRM:git.kernel.org:CVE-2010-3081
CONFIRM:www.kernel.org:CVE-2010-3301
CONFIRM:www.vmware.com:CVE-2010-1087
CONFIRM:www.vmware.com:CVE-2010-3081
CVE-2010-3081
DSA-2110
FULLDISC:20100916 Ac1db1tch3z vs x86_64 Linux Kernel
FULLDISC:20100916 Workaround for Ac1db1tch3z exploit.
L3:34428
MANDRIVA:MDVSA-2010:198
MANDRIVA:MDVSA-2010:214
MANDRIVA:MDVSA-2010:247
MISC:blog.ksplice.com:CVE-2010-3081
MISC:git.kernel.org:/
MISC:isc.sans.edu:CVE-2010-3081
MISC:sota.gen.nz:CVE-2010-3081
MLIST:[oss-security] 20100916 CVE-2010-3081 kernel: 64-bit Compatibility Mode Stack Pointer Underflow
RH:CVE-2010-3081
RHSA-2010:0704
RHSA-2010:0705
RHSA-2010:0711
RHSA-2010:0718
RHSA-2010:0719
RHSA-2010:0758
RHSA-2010:0842
RHSA-2010:0882
SECUNIA:42384
SECUNIA:43315
SMASH Issue 43174
SUSE:SUSE-SA:2010:050
SUSE:SUSE-SA:2011:007
SUSE:SUSE-SR:2010:017
UBUNTU:CVE-2010-3081
VUPEN:ADV-2010-3083
VUPEN:ADV-2010-3117
VUPEN:ADV-2011-0298
bnc#639709
rh#634457
CVE-2010-3084kernel-source-rt:Not affectedimportant ()BID:43098
CONFIRM:git.kernel.org:CVE-2010-3084
CONFIRM:www.kernel.org:CVE-2010-3084
CVE-2010-3084
MISC:git.kernel.org:/
MLIST:[netdev] 20100907 [PATCH net-2.6] niu: Fix kernel buffer overflow for ETHTOOL_GRXCLSRLALL
MLIST:[oss-security] 20100909 CVE request: kernel: niu buffer overflow for ETHTOOL_GRXCLSRLALL
MLIST:[oss-security] 20100910 Re: CVE request: kernel: niu buffer overflow for ETHTOOL_GRXCLSRLALL
RH:CVE-2010-3084
RHSA-2010:0842
SMASH Issue 44047
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-3084
UBUNTU:USN-1000-1
VUPEN:ADV-2011-0298
bnc#638274
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#632069
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-3086kernel-source-rt:Not affectedmoderate ()BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-3086
CONFIRM:kerneltrap.org:CVE-2010-3086
CONFIRM:www.kernel.org:CVE-2010-3086
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-3086
MLIST:[oss-security] 20101110 CVE-2010-3086 kernel panic via futex
RH:CVE-2010-3086
RHSA-2010:0839
SECTRACK:1024709
SMASH Issue 65357
SUSE:SUSE-SA:2010:060
UBUNTU:CVE-2010-3086
bnc#652595
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9d55b9923a1b7ea8193b8875c57ec940dc2ff027
rh#429412
rh#633170
CVE-2010-3296kernel-source-rt:Not affectedlow ()BID:43221
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-3296
CONFIRM:www.kernel.org:CVE-2010-3298
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-3296
DSA-2126
MLIST:[linux-kernel] 20100911 [PATCH] drivers/net/cxgb3/cxgb3_main.c: prevent reading uninitialized stack memory
MLIST:[oss-security] 20100914 CVE request: kernel: numerous infoleaks
MLIST:[oss-security] 20100914 Re: CVE request: kernel: numerous infoleaks
RH:CVE-2010-3296
RHSA-2010:0771
RHSA-2011:0007
RHSA-2011:0017
RHSA-2011:0421
SECUNIA:41440
SECUNIA:42758
SECUNIA:42884
SECUNIA:46397
SMASH Issue 43350
SUSE:SUSE-SA:2010:050
SUSE:SUSE-SA:2010:054
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-3296
UBUNTU:USN-1041-1
VUPEN:ADV-2011-0070
VUPEN:ADV-2011-0298
bnc#639481
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=49c37c0334a9b85d30ab3d6b5d1acb05ef2ef6de
rh#633140
rh#633145
rh#633149
rh#633158
CVE-2010-3297kernel-source-rt:Not affectedlow ()BID:43229
CONFIRM:git.kernel.org:CVE-2010-3297
CONFIRM:www.kernel.org:CVE-2010-3298
CVE-2010-3297
DSA-2126
MANDRIVA:MDVSA-2011:051
MLIST:[linux-kernel] 20100911 [PATCH] drivers/net/eql.c: prevent reading uninitialized stack memory
MLIST:[oss-security] 20100914 CVE request: kernel: numerous infoleaks
MLIST:[oss-security] 20100914 Re: CVE request: kernel: numerous infoleaks
RH:CVE-2010-3297
RHSA-2010:0771
RHSA-2011:0007
RHSA-2011:0017
RHSA-2011:0421
SECUNIA:41440
SECUNIA:42758
SECUNIA:43161
SMASH Issue 43351
SUSE:SUSE-SA:2010:050
SUSE:SUSE-SA:2010:054
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-3297
UBUNTU:USN-1041-1
UBUNTU:USN-1057-1
VUPEN:ADV-2011-0070
VUPEN:ADV-2011-0280
VUPEN:ADV-2011-0298
bnc#639482
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=44467187dc22fdd33a1a06ea0ba86ce20be3fe3c
rh#633140
rh#633145
rh#633149
rh#633158
CVE-2010-3298kernel-source-rt:Not affectedlow ()BID:43226
CONFIRM:git.kernel.org:CVE-2010-3298
CONFIRM:www.kernel.org:CVE-2010-3298
CVE-2010-3298
MLIST:[linux-kernel] 20100911 [PATCH] drivers/net/usb/hso.c: prevent reading uninitialized memory
MLIST:[oss-security] 20100914 CVE request: kernel: numerous infoleaks
MLIST:[oss-security] 20100914 Re: CVE request: kernel: numerous infoleaks
RH:CVE-2010-3298
RHSA-2010:0771
RHSA-2011:0007
RHSA-2011:0017
RHSA-2011:0421
SECUNIA:41440
SECUNIA:42758
SECUNIA:42890
SMASH Issue 44048
SUSE:SUSE-SA:2010:050
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-3298
UBUNTU:USN-1041-1
VUPEN:ADV-2011-0070
VUPEN:ADV-2011-0298
bnc#639483
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=7011e660938fc44ed86319c18a5954e95a82ab3e
rh#633140
rh#633145
rh#633149
rh#633158
CVE-2010-3432kernel-source-rt:Not affectedimportant ()BID:43480
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-3432
CONFIRM:www.kernel.org:CVE-2010-3432
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-3432
DSA-2126
MISC:git.kernel.org:/
MLIST:[netdev] 20100915 [PATCH] net: SCTP remote/local Denial of Service vulnerability description and fix
MLIST:[oss-security] 20100924 CVE Request -- Linux/SCTP DoS in sctp_packet_config()
MLIST:[oss-security] 20100925 Re: CVE Request -- Linux/SCTP DoS in sctp_packet_config()
RH:CVE-2010-3432
RHSA-2010:0842
RHSA-2010:0936
RHSA-2010:0958
RHSA-2011:0004
SECUNIA:42400
SECUNIA:42778
SECUNIA:42789
SECUNIA:46397
SMASH Issue 44062
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-3432
UBUNTU:USN-1000-1
VUPEN:ADV-2010-3113
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0024
VUPEN:ADV-2011-0298
bnc#641983
rh#637675
CVE-2010-3437kernel-source-rt:Not affectedmoderate ()BID:43551
CONFIRM:git.kernel.org:CVE-2010-3437
CONFIRM:www.kernel.org:CVE-2010-3437
CVE-2010-3437
DSA-2126
EXPLOIT-DB:15150
MANDRIVA:MDVSA-2011:029
MANDRIVA:MDVSA-2011:051
MISC:jon.oberheide.org:CVE-2010-3437
MLIST:[oss-security] 20100928 CVE request - kernel: pktcdvd ioctl dev_minor missing range check
MLIST:[oss-security] 20100928 Re: CVE request - kernel: pktcdvd ioctl dev_minor missing range check
RH:CVE-2010-3437
RHSA-2010:0842
SECUNIA:42778
SECUNIA:42801
SECUNIA:42932
SMASH Issue 43687
SUSE:SUSE-SA:2010:060
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:002
SUSE:SUSE-SA:2011:004
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-3437
UBUNTU:USN-1000-1
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0124
VUPEN:ADV-2011-0298
bnc#642486
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=252a52aa4fa22a668f019e55b3aac3ff71ec1c29
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-3442kernel-source-rt:Not affectedmoderate ()BID:43787
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-3442
CONFIRM:www.kernel.org:CVE-2010-3442
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-3442
DSA-2126
FEDORA:FEDORA-2010-18983
MANDRIVA:MDVSA-2010:257
MISC:git.kernel.org:MLIST:[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new()
MLIST:[oss-security] 20100929 CVE request - kernel: prevent heap corruption in snd_ctl_new()
MLIST:[oss-security] 20100929 Re: CVE request - kernel: prevent heap corruption in snd_ctl_new()
RH:CVE-2010-3442
RHSA-2010:0842
RHSA-2010:0936
RHSA-2010:0958
RHSA-2011:0004
SMASH Issue 43694
SUSE:SUSE-SA:2010:060
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:002
SUSE:SUSE-SA:2011:007
SUSE:SUSE-SA:2011:008
UBUNTU:CVE-2010-3442
UBUNTU:USN-1000-1
VUPEN:ADV-2010-3113
VUPEN:ADV-2010-3321
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0024
VUPEN:ADV-2011-0298
VUPEN:ADV-2011-0375
bnc#642484
http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=5591bf07225523600450edd9e6ad258bb877b779
rh#638478
CVE-2010-3477kernel-source-rt:Unsupportedlow ()BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-3477
CONFIRM:www.kernel.org:CVE-2010-3084
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-3477
DSA-2126
RH:CVE-2010-3477
RHSA-2010:0779
RHSA-2010:0839
RHSA-2011:0007
RHSA-2011:0330
SECTRACK:1024603
SECUNIA:42890
SECUNIA:46397
SMASH Issue 65970
UBUNTU:CVE-2010-3477
UBUNTU:USN-1000-1
rh#636386
CVE-2010-3698kernel-source-rt:Not affectedmoderate ()BID:44500
CONFIRM:git.kernel.org:CVE-2010-3698
CONFIRM:www.kernel.org:CVE-2010-4655
CVE-2010-3698
FEDORA:FEDORA-2010-18983
MANDRIVA:MDVSA-2011:029
RH:CVE-2010-3698
RHSA-2010:0842
RHSA-2010:0898
SECUNIA:42745
SMASH Issue 66094
UBUNTU:CVE-2010-3698
VUPEN:ADV-2010-3123
VUPEN:ADV-2010-3321
bnc#1161450
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9581d442b9058d3699b4be568b6e5eae38a41493
linux.git:commit:9581d442b9058d3699b4be568b6e5eae38a41493
rh#639879
CVE-2010-3705kernel-source-rt:Not affectedimportant ()CONFIRM:git.kernel.org:CVE-2010-3705
CONFIRM:www.kernel.org:CVE-2010-4655
CVE-2010-3705
DSA-2126
FEDORA:FEDORA-2010-18983
MANDRIVA:MDVSA-2011:029
MISC:git.kernel.org:/
MLIST:[linux-kernel] 20101001 [PATCH] Fix out-of-bounds reading in sctp_asoc_get_hmac()
MLIST:[oss-security] 20101004 CVE request: kernel: SCTP memory corruption in HMAC handling
MLIST:[oss-security] 20101004 Re: CVE request: kernel: SCTP memory corruption in HMAC handling
RH:CVE-2010-3705
RHSA-2010:0842
RHSA-2010:0958
SECUNIA:42745
SMASH Issue 66097
UBUNTU:CVE-2010-3705
UBUNTU:USN-1000-1
VUPEN:ADV-2010-3321
bnc#643513
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-3858kernel-source-rt:Not affectedmoderate ()BID:44301
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-3858
CONFIRM:www.kernel.org:CVE-2010-4655
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-3858
DSA-2126
EXPLOIT-DB:15619
MANDRIVA:MDVSA-2010:257
MISC:grsecurity.net:CVE-2010-4243
MLIST:[oss-security] 20101021 CVE request: kernel: setup_arg_pages: diagnose excessive argument size
MLIST:[oss-security] 20101022 Re: CVE request: kernel: setup_arg_pages: diagnose excessive argument size
RH:CVE-2010-3858
RHSA-2010:0958
RHSA-2011:0004
RHSA-2011:0836
SECUNIA:42758
SECUNIA:42789
SECUNIA:46397
SMASH Issue 66187
UBUNTU:CVE-2010-3858
UBUNTU:USN-1041-1
VUPEN:ADV-2011-0024
VUPEN:ADV-2011-0070
bnc#648302
bnc#655220
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1b528181b2ffa14721fb28ad1bd539fe1732c583
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#645222
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-3859kernel-source-rt:Unsupportedmoderate ()BID:44354
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-4160
CONFIRM:www.kernel.org:CVE-2010-4347
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-3859
DSA-2126
MANDRIVA:MDVSA-2011:029
MLIST:[netdev] 20101021 TIPC security issues
MLIST:[netdev] 20101027 Re: [PATCH 1/4] tipc: Fix bugs in tipc_msg_calc_data_size()
MLIST:[netdev] 20101027 [PATCH 0/4] RFC: tipc int vs size_t fixes
MLIST:[netdev] 20101027 [PATCH 1/4] tipc: Fix bugs in tipc_msg_calc_data_size()
MLIST:[netdev] 20101027 [PATCH 2/4] tipc: Fix bugs in tipc_msg_build()
MLIST:[netdev] 20101027 [PATCH 3/4] tipc: Update arguments to use size_t for iovec array sizes
MLIST:[netdev] 20101027 [PATCH 4/4] tipc: Fix bugs in sending of large amounts of byte-stream data
MLIST:[netdev] 20101028 Re: [PATCH 2/4] tipc: Fix bugs in tipc_msg_build()
MLIST:[oss-security] 20101022 CVE request: kernel: heap overflow in TIPC
MLIST:[oss-security] 20101022 Re: CVE request: kernel: heap overflow in TIPC
RH:CVE-2010-3859
RHSA-2011:0004
RHSA-2011:0162
SECUNIA:42789
SECUNIA:42963
SECUNIA:46397
SMASH Issue 66188
UBUNTU:CVE-2010-3859
VUPEN:ADV-2011-0024
VUPEN:ADV-2011-0168
bnc#648624
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a
rh#645867
CVE-2010-3861kernel-source-rt:Not affectedlow ()BID:44427
CONFIRM:git.kernel.org:CVE-2010-3861
CONFIRM:www.kernel.org:CVE-2010-4655
CVE-2010-3861
MLIST:[oss-security] 20101025 CVE request: kernel: heap contents leak from ETHTOOL_GRXCLSRLALL
MLIST:[oss-security] 20101026 Re: CVE request: kernel: heap contents leak from ETHTOOL_GRXCLSRLALL
RH:CVE-2010-3861
RHSA-2010:0958
RHSA-2011:0007
SECUNIA:42758
SECUNIA:42778
SECUNIA:42801
SECUNIA:42890
SECUNIA:42932
SMASH Issue 44060
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:002
SUSE:SUSE-SA:2011:004
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-3861
UBUNTU:USN-1041-1
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0070
VUPEN:ADV-2011-0124
VUPEN:ADV-2011-0298
bnc#649187
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ae6df5f96a51818d6376da5307d773baeece4014
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#646725
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-3865kernel-source-rt:Not affectedimportant ()BID:44549
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-3865
MLIST:[netdev] 20101028 Re: [Security] TIPC security issues
MLIST:[oss-security] 20101029 CVE request: kernel: iovec overflow in rds_rdma_pages()
MLIST:[oss-security] 20101101 Re: CVE request: kernel: iovec overflow in rds_rdma_pages()
RH:CVE-2010-3865
RHSA-2011:0004
RHSA-2011:0007
SECUNIA:42778
SECUNIA:42789
SECUNIA:42801
SECUNIA:42890
SECUNIA:46397
SMASH Issue 44063
SUSE:SUSE-SA:2010:057
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:002
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-3865
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0024
VUPEN:ADV-2011-0298
XF:kernel-rdsrdmapages-overflow(62881)
bnc#650128
rh#647416
CVE-2010-3875kernel-source-rt:Not affectedimportant ()BID:44630
CONFIRM:git.kernel.org:CVE-2010-3875
CONFIRM:www.kernel.org:CVE-2010-4248
CVE-2010-3875
DSA-2126
DSA-2240
DSA-2264
MANDRIVA:MDVSA-2011:029
MANDRIVA:MDVSA-2011:051
MLIST:[netdev] 20101031 [PATCH 1/3] net: ax25: fix information leak to userland
MLIST:[oss-security] 20101102 CVE request: kernel stack infoleaks
MLIST:[oss-security] 20101104 Re: CVE request: kernel stack infoleaks
RH:CVE-2010-3875
SMASH Issue 46121
UBUNTU:CVE-2010-3875
bdo#618485
bnc#650897
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fe10ae53384e48c51996941b7720ee16995cbcb7
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#649713
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-3876kernel-source-rt:Not affectedimportant ()BID:44630
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-3876
CONFIRM:www.kernel.org:CVE-2010-4248
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-3876
DSA-2126
MLIST:[netdev] 20101031 [PATCH 2/3] net: packet: fix information leak to userland
MLIST:[oss-security] 20101102 CVE request: kernel stack infoleaks
MLIST:[oss-security] 20101102 Re: CVE request: kernel stack infoleaks
MLIST:[oss-security] 20101104 Re: CVE request: kernel stack infoleaks
RH:CVE-2010-3876
RHSA-2010:0958
RHSA-2011:0004
RHSA-2011:0007
RHSA-2011:0162
SECUNIA:42789
SECUNIA:42890
SECUNIA:42963
SECUNIA:46397
SMASH Issue 46122
UBUNTU:CVE-2010-3876
VUPEN:ADV-2011-0024
VUPEN:ADV-2011-0168
bnc#650897
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=67286640f638f5ad41a946b9a3dc75327950248f
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#649715
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-3877kernel-source-rt:Not affectedimportant ()BID:44630
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-3877
CONFIRM:www.kernel.org:CVE-2010-4248
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-3877
DSA-2126
MANDRIVA:MDVSA-2011:029
MLIST:[netdev] 20101031 [PATCH 3/3] net: tipc: fix information leak to userland
MLIST:[oss-security] 20101102 CVE request: kernel stack infoleaks
MLIST:[oss-security] 20101104 Re: CVE request: kernel stack infoleaks
RH:CVE-2010-3877
RHSA-2011:0017
SECUNIA:42884
SECUNIA:46397
SMASH Issue 46123
UBUNTU:CVE-2010-3877
XF:kernel-getname-info-disc(64578)
bnc#650897
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=88f8a5e3e7defccd3925cabb1ee4d3994e5cdb52
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#649717
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-3880kernel-source-rt:Not affectedmoderate ()BID:44665
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-3880
CONFIRM:www.kernel.org:CVE-2010-4248
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-3880
DSA-2126
MLIST:[netdev] 20101103 [PATCH 2/2] inet_diag: Make sure we actually run the same bytecode we audited.
MLIST:[oss-security] 20101104 CVE request: kernel: logic error in INET_DIAG bytecode auditing
MLIST:[oss-security] 20101105 Re: CVE request: kernel: logic error in INET_DIAG bytecode auditing
RH:CVE-2010-3880
RHSA-2010:0958
RHSA-2011:0004
RHSA-2011:0007
SECUNIA:42126
SECUNIA:42789
SECUNIA:42890
SECUNIA:46397
SMASH Issue 66197
UBUNTU:CVE-2010-3880
VUPEN:ADV-2011-0024
bnc#651599
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22e76c849d505d87c5ecf3d3e6742a65f0ff4860
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-3881kernel-source-rt:Not affectedlow ()BID:44666
CONFIRM:git.kernel.org:CVE-2010-3881
CONFIRM:www.kernel.org:CVE-2010-4347
CVE-2010-3881
MLIST:[kvm] 20101030 [patch v2] x86: kvm: x86: fix information leak to userland
MLIST:[oss-security] 20101104 CVE request: kernel: kvm kernel stack leakage
MLIST:[oss-security] 20101105 Re: CVE request: kernel: kvm kernel stack leakage
RH:CVE-2010-3881
RHSA-2010:0998
RHSA-2011:0542
RHSA-2011:0883
SECTRACK:1024912
SECUNIA:42932
SMASH Issue 44061
SUSE:SUSE-SA:2011:004
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-3881
VUPEN:ADV-2010-3287
VUPEN:ADV-2011-0124
VUPEN:ADV-2011-0298
bnc#651596
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=97e69aa62f8b5d338d6cff49be09e37cc1262838
http://git.kernel.org/?p=virt/kvm/kvm.git%3Ba=commit%3Bh=831d9d02f9522e739825a51a11e3bc5aa531a905
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#649920
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-3904kernel-source-rt:Not affectedimportant ()BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CERT-VN:VU#362983
CONFIRM:git.kernel.org:CVE-2010-3904
CONFIRM:www.kernel.org:CVE-2010-4655
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-3904
EXPLOIT-DB:44677
MISC:packetstormsecurity.com:CVE-2010-3904
MISC:www.vsecurity.com:CVE-2010-3904
RH:CVE-2010-3904
RHSA-2010:0792
RHSA-2010:0842
RHSA-2011:0542
SECTRACK:1024613
SECUNIA:46397
SMASH Issue 43385
SUSE:SUSE-SA:2010:053
SUSE:SUSE-SA:2010:057
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-3904
UBUNTU:USN-1000-1
VUPEN:ADV-2011-0298
rh#642896
rh#680345
CVE-2010-4072kernel-source-rt:Ignorelow ()BID:45054
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-4072
CONFIRM:www.kernel.org:CVE-2010-4075
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-4072
DSA-2126
MANDRIVA:MDVSA-2011:029
MANDRIVA:MDVSA-2011:051
MLIST:[linux-kernel] 20101006 [PATCH] ipc: initialize structure memory to zero for shmctl
MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures
RH:CVE-2010-4072
RHSA-2010:0958
RHSA-2011:0007
RHSA-2011:0017
RHSA-2011:0162
SECUNIA:42758
SECUNIA:42778
SECUNIA:42884
SECUNIA:42890
SECUNIA:42932
SECUNIA:42963
SECUNIA:43161
SECUNIA:43291
SECUNIA:46397
SMASH Issue 43691
SUSE:SUSE-SA:2010:060
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:004
SUSE:SUSE-SA:2011:007
SUSE:SUSE-SA:2011:008
UBUNTU:CVE-2010-4072
UBUNTU:USN-1041-1
UBUNTU:USN-1057-1
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0070
VUPEN:ADV-2011-0124
VUPEN:ADV-2011-0168
VUPEN:ADV-2011-0280
VUPEN:ADV-2011-0298
VUPEN:ADV-2011-0375
bnc#642314
bnc#651216
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#648656
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-4073kernel-source-rt:Ignorelow ()BID:45073
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-4073
CONFIRM:www.kernel.org:CVE-2010-4075
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-4073
DSA-2126
MANDRIVA:MDVSA-2011:029
MANDRIVA:MDVSA-2011:051
MLIST:[linux-kernel] 20101006 [PATCH v3] IPC: Initialize structure memory to zero for compat functions
MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures
RH:CVE-2010-4073
RHSA-2010:0958
RHSA-2011:0007
RHSA-2011:0017
RHSA-2011:0162
SECUNIA:42778
SECUNIA:42884
SECUNIA:42890
SECUNIA:42932
SECUNIA:42963
SECUNIA:43291
SECUNIA:46397
SMASH Issue 43690
SREASON:8366
SUSE:SUSE-SA:2010:060
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:004
SUSE:SUSE-SA:2011:007
SUSE:SUSE-SA:2011:008
UBUNTU:CVE-2010-4073
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0124
VUPEN:ADV-2011-0168
VUPEN:ADV-2011-0298
VUPEN:ADV-2011-0375
bnc#642314
bnc#651216
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#648658
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-4074kernel-source-rt:Ignoremoderate ()BID:45074
CONFIRM:git.kernel.org:CVE-2010-4074
CONFIRM:www.kernel.org:CVE-2010-4082
CVE-2010-4074
DSA-2126
MISC:git.kernel.org:MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures
MISC:userweb.kernel.org:MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures
MLIST:[linux-kernel] 20100915 [PATCH] drivers/usb/serial/mos*: prevent reading uninitialized stack memory
MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures
RH:CVE-2010-4074
RHSA-2010:0958
RHSA-2011:0007
SECUNIA:42890
SMASH Issue 66348
UBUNTU:CVE-2010-4074
bnc#642309
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#648659
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-4075kernel-source-rt:Ignoremoderate ()BID:43806
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:www.kernel.org:CVE-2010-4075
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-4075
DSA-2264
MISC:git.kernel.org:CVE-2010-4077
MLIST:[linux-kernel] 20100915 [PATCH] drivers/serial/serial_core.c: prevent readinguninitialized stack memory
MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures
RH:CVE-2010-4075
RHSA-2010:0958
RHSA-2011:0007
RHSA-2011:0017
RHSA-2011:0162
SECUNIA:42884
SECUNIA:42890
SECUNIA:42963
SECUNIA:46397
SMASH Issue 46124
UBUNTU:CVE-2010-4075
VUPEN:ADV-2011-0168
bdo#618485
bnc#642309
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#648660
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-4076kernel-source-rt:Ignoremoderate ()CVE-2010-4076
MISC:git.kernel.org:CVE-2010-4077
MLIST:[linux-kernel] 20100915 [PATCH] drivers/char/amiserial.c: prevent reading uninitialized stack memory
MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures
RH:CVE-2010-4076
SMASH Issue 46125
UBUNTU:CVE-2010-4076
bnc#642309
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#648661
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-4077kernel-source-rt:Ignoremoderate ()BID:45059
CVE-2010-4077
MISC:git.kernel.org:CVE-2010-4077
MLIST:[linux-kernel] 20100915 [PATCH] drivers/char/nozomi.c: prevent reading uninitialized stackmemory
MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures
RH:CVE-2010-4077
RHSA-2010:0958
RHSA-2011:0007
SECUNIA:42890
SMASH Issue 46126
SREASON:8129
UBUNTU:CVE-2010-4077
bnc#642309
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#648663
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-4078kernel-source-rt:Not affectedlow ()BID:43810
CONFIRM:git.kernel.org:CVE-2010-4078
CONFIRM:www.kernel.org:CVE-2010-4081
CVE-2010-4078
DSA-2126
MANDRIVA:MDVSA-2011:051
MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures
RH:CVE-2010-4078
SECUNIA:42778
SECUNIA:42801
SMASH Issue 43688
SUSE:SUSE-SA:2010:060
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:002
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-4078
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0298
bnc#642311
rh#648665
CVE-2010-4080kernel-source-rt:Not affectedlow ()BID:45058
BID:45063
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-4081
CONFIRM:www.kernel.org:CVE-2010-4081
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-4080
DSA-2126
MLIST:[linux-kernel] 20100925 [PATCH] sound/pci/rme9652: prevent reading uninitialized stack memory
MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures
RH:CVE-2010-4080
RHSA-2010:0958
RHSA-2011:0007
RHSA-2011:0017
RHSA-2011:0162
SECUNIA:42778
SECUNIA:42801
SECUNIA:42884
SECUNIA:42890
SECUNIA:42963
SECUNIA:46397
SMASH Issue 43695
SUSE:SUSE-SA:2010:060
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:002
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-4080
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0168
VUPEN:ADV-2011-0298
rh#648669
CVE-2010-4081kernel-source-rt:Not affectedlow ()BID:45063
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-4081
CONFIRM:www.kernel.org:CVE-2010-4081
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-4081
DSA-2126
MLIST:[linux-kernel] 20100925 [PATCH] sound/pci/rme9652: prevent reading uninitialized stack memory
MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures
RH:CVE-2010-4081
RHSA-2011:0007
RHSA-2011:0017
SECUNIA:42778
SECUNIA:42801
SECUNIA:42884
SECUNIA:42890
SECUNIA:43291
SECUNIA:46397
SMASH Issue 43696
SUSE:SUSE-SA:2010:060
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:002
SUSE:SUSE-SA:2011:007
SUSE:SUSE-SA:2011:008
UBUNTU:CVE-2010-4081
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0298
VUPEN:ADV-2011-0375
rh#648670
CVE-2010-4083kernel-source-rt:Ignorelow ()BID:43809
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-4083
CONFIRM:www.kernel.org:CVE-2010-4655
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-4083
DSA-2126
MANDRIVA:MDVSA-2011:051
MLIST:[mm-commits] 20100923 + sys_semctl-fix-kernel-stack-leakage.patch added to -mm tree
MLIST:[oss-security] 20100925 CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101006 Re: CVE request: multiple kernel stack memory disclosures
MLIST:[oss-security] 20101025 Re: CVE request: multiple kernel stack memory disclosures
RH:CVE-2010-4083
RHSA-2010:0958
RHSA-2011:0004
RHSA-2011:0007
RHSA-2011:0162
SECUNIA:42778
SECUNIA:42789
SECUNIA:42890
SECUNIA:42932
SECUNIA:42963
SECUNIA:43291
SECUNIA:46397
SMASH Issue 43692
SUSE:SUSE-SA:2010:060
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:004
SUSE:SUSE-SA:2011:007
SUSE:SUSE-SA:2011:008
UBUNTU:CVE-2010-4083
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0024
VUPEN:ADV-2011-0124
VUPEN:ADV-2011-0168
VUPEN:ADV-2011-0298
VUPEN:ADV-2011-0375
bnc#642314
bnc#651216
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#648673
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-4158kernel-source-rt:Not affectedlow ()BID:44758
BUGTRAQ:20101109 Kernel 0-day
BUGTRAQ:20101118 Re: Kernel 0-day
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-4158
CONFIRM:www.kernel.org:CVE-2010-4347
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-4158
DSA-2153
FEDORA:FEDORA-2010-18983
FULLDISC:20101109 Kernel 0-day
MANDRIVA:MDVSA-2011:029
MLIST:[netdev] 20101109 [PATCH] Prevent reading uninitialized memory with socket filters
RH:CVE-2010-4158
RHSA-2010:0958
RHSA-2011:0004
RHSA-2011:0007
RHSA-2011:0017
RHSA-2011:0162
SECUNIA:42745
SECUNIA:42778
SECUNIA:42801
SECUNIA:42884
SECUNIA:42890
SECUNIA:42932
SECUNIA:42963
SECUNIA:43291
SECUNIA:46397
SMASH Issue 43685
SUSE:SUSE-SA:2010:060
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:002
SUSE:SUSE-SA:2011:004
SUSE:SUSE-SA:2011:007
SUSE:SUSE-SA:2011:008
UBUNTU:CVE-2010-4158
VUPEN:ADV-2010-3321
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0124
VUPEN:ADV-2011-0168
VUPEN:ADV-2011-0298
VUPEN:ADV-2011-0375
bnc#652563
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651698
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-4160kernel-source-rt:Not affectedmoderate ()BID:44762
CONFIRM:www.kernel.org:CVE-2010-4347
CVE-2010-4160
MISC:xorl.wordpress.com:CVE-2010-4160
MLIST:[netdev] 20101027 Re: [PATCH 1/4] tipc: Fix bugs in tipc_msg_calc_data_size()
MLIST:[netdev] 20101031 [SECURITY] L2TP send buffer allocation size overflows
MLIST:[oss-security] 20101110 CVE request: kernel: L2TP send buffer allocation size overflows
MLIST:[oss-security] 20101110 Re: CVE request: kernel: L2TP send buffer allocation size overflows
MLIST:[oss-security] 20101124 Re: CVE request: kernel: L2TP send buffer allocation size overflows
RH:CVE-2010-4160
RHSA-2011:0007
RHSA-2011:0330
SMASH Issue 46127
SUSE:SUSE-SA:2011:002
SUSE:SUSE-SA:2011:004
SUSE:SUSE-SA:2011:005
SUSE:SUSE-SA:2011:008
UBUNTU:CVE-2010-4160
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0124
VUPEN:ADV-2011-0213
VUPEN:ADV-2011-0375
bnc#652939
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=253eacc070b114c2ec1f81b067d2fed7305467b0
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8acfe468b0384e834a303f08ebc4953d72fb690a
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-4162kernel-source-rt:Not affectedmoderate ()BID:44793
CONFIRM:git.kernel.org:CVE-2010-4162
CONFIRM:www.kernel.org:CVE-2010-4347
CVE-2010-4162
DSA-2153
FEDORA:FEDORA-2010-18983
MANDRIVA:MDVSA-2011:029
MISC:git.kernel.org:/
MLIST:[oss-security] 20101110 CVE request: kernel: Multiple DoS issues in block layer
MLIST:[oss-security] 20101112 Re: CVE request: kernel: Multiple DoS issues in block layer
RH:CVE-2010-4162
RHSA-2011:0007
RHSA-2011:0330
SECUNIA:42745
SECUNIA:42778
SECUNIA:42801
SECUNIA:42890
SECUNIA:42932
SMASH Issue 43686
SUSE:SUSE-SA:2010:060
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:002
SUSE:SUSE-SA:2011:004
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-4162
VUPEN:ADV-2010-3321
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0124
VUPEN:ADV-2011-0298
bnc#652945
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-4163kernel-source-rt:Not affectedmoderate ()BID:44793
CONFIRM:git.kernel.org:CVE-2010-4163
CONFIRM:www.kernel.org:CVE-2010-4347
CVE-2010-4163
DSA-2153
MANDRIVA:MDVSA-2011:029
MLIST:[oss-security] 20101110 CVE request: kernel: Multiple DoS issues in block layer
MLIST:[oss-security] 20101112 Re: CVE request: kernel: Multiple DoS issues in block layer
MLIST:[oss-security] 20101129 Re: CVE request: kernel: Multiple DoS issues in block layer
RH:CVE-2010-4163
RHSA-2011:0007
RHSA-2011:0330
SMASH Issue 44059
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:002
SUSE:SUSE-SA:2011:004
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-4163
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0124
VUPEN:ADV-2011-0298
bnc#652945
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9284bcf4e335e5f18a8bc7b26461c33ab60d0689
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-4165kernel-source-rt:Not affectedmoderate ()BID:44830
CONFIRM:git.kernel.org:CVE-2010-4165
CONFIRM:www.kernel.org:CVE-2010-4248
CVE-2010-4165
MANDRIVA:MDVSA-2011:029
MANDRIVA:MDVSA-2011:051
MLIST:[netdev] 20101110 Re: possible kernel oops from user MSS
MLIST:[netdev] 20101110 possible kernel oops from user MSS
MLIST:[oss-security] 20101112 CVE request: kernel: possible kernel oops from user MSS
MLIST:[oss-security] 20101112 Re: CVE request: kernel: possible kernel oops from user MSS
OSVDB:69241
RH:CVE-2010-4165
RHSA-2011:0283
RHSA-2011:0330
SECUNIA:42778
SECUNIA:42801
SECUNIA:42932
SMASH Issue 44056
SREASON:8111
SREASON:8123
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:002
SUSE:SUSE-SA:2011:004
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-4165
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0124
VUPEN:ADV-2011-0298
bnc#653258
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7a1abd08d52fdeddb3e9a5a33f2f15cc6a5674d2
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-4169kernel-source-rt:Not affectedmoderate ()BID:44861
CONFIRM:git.kernel.org:CVE-2010-4169
CONFIRM:www.kernel.org:CVE-2010-4248
CVE-2010-4169
FEDORA:FEDORA-2010-18983
MLIST:[oss-security] 20101115 CVE request: kernel: perf bug
MLIST:[oss-security] 20101115 Re: CVE request: kernel: perf bug
RH:CVE-2010-4169
RHSA-2010:0958
RHSA-2011:0283
SECUNIA:42745
SECUNIA:42778
SECUNIA:42932
SMASH Issue 44058
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:004
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-4169
VUPEN:ADV-2010-3321
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0124
VUPEN:ADV-2011-0298
XF:kernel-perfeventmmap-dos(63316)
bnc#653930
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=63bfd7384b119409685a17d5c58f0b56e5dc03da
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651671
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-4238kernel-source-rt:Unsupportedmoderate ()BID:45795
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-4238
MISC:bugs.centos.org:CVE-2010-4238
RH:CVE-2010-4238
RHSA-2011:0017
SMASH Issue 66455
UBUNTU:CVE-2010-4238
XF:xen-vdbcreate-dos(64698)
bnc#667243
rh#655623
CVE-2010-4243kernel-source-rt:Not affectedmoderate ()BID:45004
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-4243
CONFIRM:www.kernel.org:CVE-2011-1044
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-4243
DSA-2153
EXPLOIT-DB:15619
MISC:grsecurity.net:CVE-2010-4243
MLIST:[linux-kernel] 20100827 [PATCH] exec argument expansion can inappropriately trigger OOM-killer
MLIST:[linux-kernel] 20100830 Re: [PATCH] exec argument expansion can inappropriately trigger OOM-killer
MLIST:[linux-kernel] 20101130 [PATCH 1/2] exec: make argv/envp memory visible to oom-killer
MLIST:[oss-security] 20101122 CVE request: kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads
MLIST:[oss-security] 20101122 Re: CVE request: kernel: mm: mem allocated invisible to oom_kill() when not attached to any threads
RH:CVE-2010-4243
RHSA-2011:0017
RHSA-2011:0283
RHSA-2011:1253
SMASH Issue 66456
UBUNTU:CVE-2010-4243
XF:linux-kernel-execve-dos(64700)
bnc#655220
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3c77f845722158206a7209c45ccddc264d19319c
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-4248kernel-source-rt:Not affectedmoderate ()BID:45028
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-4248
CONFIRM:www.kernel.org:CVE-2010-4248
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-4248
DSA-2153
MANDRIVA:MDVSA-2011:029
MLIST:[oss-security] 20101123 CVE request: kernel: posix-cpu-timers: workaround to suppress the problems with mt exec
MLIST:[oss-security] 20101124 Re: CVE request: kernel: posix-cpu-timers: workaround to suppress the problems with mt exec
RH:CVE-2010-4248
RHSA-2011:0004
RHSA-2011:0007
RHSA-2011:0330
SECUNIA:42789
SECUNIA:42890
SECUNIA:46397
SMASH Issue 46129
UBUNTU:CVE-2010-4248
VUPEN:ADV-2011-0024
bnc#655468
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0a70217107e6f9844628120412cb27bb4cea194
rh#656264
CVE-2010-4249kernel-source-rt:Not affectedmoderate ()BID:45037
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-4249
CONFIRM:www.kernel.org:CVE-2010-4249
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-4249
DSA-2153
EXPLOIT-DB:15622
FEDORA:FEDORA-2010-18983
MLIST:[linux-kernel] 20101123 Unix socket local DOS (OOM)
MLIST:[linux-kernel] 20101124 [PATCH net-next-2.6] scm: lower SCM_MAX_FD
MLIST:[linux-kernel] 20101125 Simple kernel attack using socketpair. easy, 100% reproductiblle, works under guest. no way to protect :(
MLIST:[netdev] 20101124 [PATCH] af_unix: limit unix_tot_inflight
MLIST:[oss-security] 20101124 CVE request: kernel: unix socket local dos
MLIST:[oss-security] 20101124 Re: CVE request: kernel: unix socket local dos
RH:CVE-2010-4249
RHSA-2011:0007
RHSA-2011:0162
RHSA-2011:0303
RHSA-2011:0330
SECUNIA:42354
SECUNIA:42745
SECUNIA:42890
SECUNIA:42963
SECUNIA:46397
SMASH Issue 46543
UBUNTU:CVE-2010-4249
VUPEN:ADV-2010-3321
VUPEN:ADV-2011-0168
bnc#655696
http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git%3Ba=commit%3Bh=9915672d41273f5b77f1b3c29b391ffb7732b84b
rh#656756
rh#814278
CVE-2010-4251kernel-source-rt:Not affectedimportant ()BID:46637
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-4251
CONFIRM:www.kernel.org:CVE-2010-4263
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-4251
MLIST:[netdev] 20100302 [PATCH 1/8] net: add limit for socket backlog
RH:CVE-2010-4251
RHSA-2011:0303
RHSA-2011:0542
RHSA-2011:0883
SECUNIA:46397
SMASH Issue 44685
UBUNTU:CVE-2010-4251
bnc#655973
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8eae939f1400326b06d0c9afe53d2a484a326871
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#657303
rh#822754
CVE-2010-4258kernel-source-rt:Not affectedimportant ()CONFIRM:code.google.com:CVE-2010-4258
CONFIRM:git.kernel.org:CVE-2010-4258
CONFIRM:googlechromereleases.blogspot.com:CVE-2011-1042
CONFIRM:www.kernel.org:CVE-2010-4347
CVE-2010-4258
DSA-2153
FEDORA:FEDORA-2010-18983
FULLDISC:20101207 Linux kernel exploit
MANDRIVA:MDVSA-2011:029
MISC:blog.nelhage.com:CVE-2010-4258
MLIST:[linux-kernel] 20101201 Re: [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.
MLIST:[linux-kernel] 20101201 [PATCH v2] do_exit(): Make sure we run with get_fs() == USER_DS.
MLIST:[oss-security] 20101202 CVE request: kernel: failure to revert address limit override in OOPS error path
MLIST:[oss-security] 20101202 Re: CVE request: kernel: failure to revert address limit override in OOPS error path
MLIST:[oss-security] 20101202 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses
MLIST:[oss-security] 20101202 kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses
MLIST:[oss-security] 20101208 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses
MLIST:[oss-security] 20101209 Re: kernel: Dangerous interaction between clear_child_tid, set_fs(), and kernel oopses
RH:CVE-2010-4258
SMASH Issue 43869
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:002
SUSE:SUSE-SA:2011:004
SUSE:SUSE-SA:2011:005
SUSE:SUSE-SA:2011:007
SUSE:SUSE-SA:2011:008
UBUNTU:CVE-2010-4258
VUPEN:ADV-2010-3321
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0124
VUPEN:ADV-2011-0213
VUPEN:ADV-2011-0298
VUPEN:ADV-2011-0375
bnc#657350
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=33dd94ae1ccbfb7bf0fb6c692bc3d1c4269e6177
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#659567
rh#822754
CVE-2010-4263kernel-source-rt:Not affectedimportant ()BID:45208
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:bugzilla.kernel.org:CVE-2010-4263
CONFIRM:git.kernel.org:CVE-2010-4263
CONFIRM:www.kernel.org:CVE-2010-4263
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-4263
MLIST:[oss-security] 20101206 CVE request: kernel: igb panics when receiving tag vlan packet
MLIST:[oss-security] 20101206 Re: CVE request: kernel: igb panics when receiving tag vlan packet
RH:CVE-2010-4263
RHSA-2011:0007
RHSA-2011:0017
SECUNIA:42884
SECUNIA:42890
SECUNIA:46397
SMASH Issue 66468
UBUNTU:CVE-2010-4263
bnc#657716
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=31b24b955c3ebbb6f3008a6374e61cf7c05a193c
rh#660188
CVE-2010-4343kernel-source-rt:Not affectedmoderate ()BID:45262
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-4343
CONFIRM:www.kernel.org:CVE-2010-4805
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-4343
MLIST:[linux-scsi] 20100521 [PATCH 1/2] bfa: fix system crash when reading sysfs fc_host statistics
MLIST:[oss-security] 20101208 CVE request: kernel: bfa driver sysfs crash
MLIST:[oss-security] 20101209 Re: CVE request: kernel: bfa driver sysfs crash
RH:CVE-2010-4343
RHSA-2011:0017
SMASH Issue 66523
UBUNTU:CVE-2010-4343
bnc#658178
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7873ca4e4401f0ecd8868bf1543113467e6bae61
rh#661182
CVE-2010-4346kernel-source-rt:Not affectedmoderate ()BID:45323
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-4346
CONFIRM:www.kernel.org:CVE-2010-4346
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-4346
DSA-2153
MANDRIVA:MDVSA-2011:029
MLIST:[linux-kernel] 20101209 [PATCH] install_special_mapping skips security_file_mmap check.
MLIST:[oss-security] 20101209 Re: [taviso@cmpxchg8b.com: [PATCH] install_special_mapping skips security_file_mmap check.]
MLIST:[oss-security] 20101209 [taviso@cmpxchg8b.com: [PATCH] install_special_mapping skips security_file_mmap check.]
MLIST:[oss-security] 20101210 Re: Subject: CVE request: kernel: install_special_mapping skips security_file_mmap check
MLIST:[oss-security] 20101210 Subject: CVE request: kernel: install_special_mapping skips security_file_mmap check
RH:CVE-2010-4346
RHSA-2011:0330
RHSA-2011:0421
RHSA-2011:0429
SECUNIA:42570
SECUNIA:46397
SMASH Issue 66524
UBUNTU:CVE-2010-4346
bnc#658720
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=462e635e5b73ba9a4c03913b77138cd57ce4b050
rh#662189
CVE-2010-4347kernel-source-rt:Not affectedimportant ()BID:45408
CONFIRM:git.kernel.org:CVE-2010-4347
CONFIRM:www.kernel.org:CVE-2010-4347
CVE-2010-4347
EXPLOIT-DB:15774
MLIST:[oss-security] 20101215 CVE Request: local privilege escalation via /sys/kernel/debug/acpi/custom_method
MLIST:[oss-security] 20101215 Re: CVE Request: local privilege escalation via /sys/kernel/debug/acpi/custom_method
RH:CVE-2010-4347
RHSA-2011:0330
SMASH Issue 44055
SUSE:SUSE-SA:2011:001
SUSE:SUSE-SA:2011:007
UBUNTU:CVE-2010-4347
VUPEN:ADV-2011-0012
VUPEN:ADV-2011-0298
XF:kernel-debugfs-privilege-esc(64155)
bnc#659076
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ed3aada1bf34c5a9e98af167f125f8a740fc726a
rh#663542
CVE-2010-4478openssh:Unsupportedimportant ()CONFIRM:www.openbsd.org:CVE-2010-4478
CVE-2010-4478
D:CVE-2010-4478
RH:CVE-2010-4478
SMASH Issue 66628
UBUNTU:CVE-2010-4478
bnc#660128
rh#659297
rh#660642
CVE-2010-4527kernel-source-rt:Not affectedmoderate ()BID:45629
CONFIRM:git.kernel.org:CVE-2010-4527
CONFIRM:www.kernel.org:CVE-2011-1044
CVE-2010-4527
DSA-2153
MISC:xorl.wordpress.com:CVE-2010-4527
MLIST:[oss-security] 20101230 CVE request: kernel: buffer overflow in OSS load_mixer_volumes
MLIST:[oss-security] 20101231 Re: CVE request: kernel: buffer overflow in OSS load_mixer_volumes
RH:CVE-2010-4527
RHSA-2011:0263
SECUNIA:42765
SECUNIA:43291
SMASH Issue 46132
SUSE:SUSE-SA:2011:008
UBUNTU:CVE-2010-4527
VUPEN:ADV-2011-0375
bnc#661945
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d81a12bc29ae4038770e05dce4ab7f26fd5880fb
rh#667615
CVE-2010-4563kernel-source-rt:Unsupportedmoderate ()CVE-2010-4563
RH:CVE-2010-4563
SMASH Issue 66695
UBUNTU:CVE-2010-4563
bnc#745296
rh#788930
CVE-2010-4565kernel-source-rt:Not affectedlow ()BID:44661
CVE-2010-4565
DSA-2153
MANDRIVA:MDVSA-2011:029
MLIST:[netdev] 20101102 Re: [SECURITY] CAN info leak/minor heap overflow
MLIST:[netdev] 20101102 [SECURITY] CAN info leak/minor heap overflow
MLIST:[netdev] 20101109 Re: [PATCH] Fix CAN info leak/minor heap overflow
MLIST:[netdev] 20101110 Re: [PATCH] Fix CAN info leak/minor heap overflow
MLIST:[oss-security] 20101103 CVE request: kernel: CAN information leak
MLIST:[oss-security] 20101104 Re: CVE request: kernel: CAN information leak
MLIST:[oss-security] 20101220 CVE request: kernel: CAN information leak, 2nd attempt
MLIST:[oss-security] 20101220 Re: CVE request: kernel: CAN information leak, 2nd attempt
RH:CVE-2010-4565
RHSA-2011:0330
RHSA-2011:0498
SMASH Issue 66696
UBUNTU:CVE-2010-4565
bnc#1161355
linux.git:commit:9f260e0efa4766e56d0ac14f1aeea6ee5eb8fe83
rh#664544
CVE-2010-4649kernel-source-rt:Not affectedmoderate ()BID:46073
CONFIRM:git.kernel.org:CVE-2011-1044
CONFIRM:www.kernel.org:CVE-2011-1044
CVE-2010-4649
DSA-2153
RH:CVE-2010-4649
RHSA-2011:0330
RHSA-2011:0498
RHSA-2011:0927
SMASH Issue 66774
UBUNTU:CVE-2010-4649
bnc#662953
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7182afea8d1afd432a17c18162cc3fd441d0da93
rh#667916
CVE-2010-4655kernel-source-rt:Unsupportedmoderate ()BID:45972
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2010-4655
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2010-4655
DSA-2264
MLIST:[linux-kernel] 20101007 [PATCH] net: clear heap allocations for privileged ethtool actions
MLIST:[oss-security] 20110124 CVE request: linux kernel heap issues
MLIST:[oss-security] 20110124 Re: CVE request: linux kernel heap issues
MLIST:[oss-security] 20110125 Re: CVE request: linux kernel heap issues
MLIST:[oss-security] 20110128 Re: CVE request: linux kernel heap issues
RH:CVE-2010-4655
RHSA-2011:0263
RHSA-2011:0303
RHSA-2011:0330
RHSA-2011:0421
SMASH Issue 46134
UBUNTU:CVE-2010-4655
UBUNTU:USN-1146-1
bdo#618485
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b00916b189d13a615ff05c9242201135992fcda3
rh#672428
CVE-2010-4656kernel-source-rt:Unsupportedimportant ()BID:46069
CONFIRM:git.kernel.org:CVE-2010-4656
CONFIRM:www.kernel.org:CVE-2011-1044
CVE-2010-4656
DSA-2153
MLIST:[oss-security] 20110124 CVE request: linux kernel heap issues
MLIST:[oss-security] 20110124 Re: CVE request: linux kernel heap issues
MLIST:[oss-security] 20110125 Re: CVE request: linux kernel heap issues
RH:CVE-2010-4656
RHSA-2011:0330
RHSA-2011:0421
SMASH Issue 66778
UBUNTU:CVE-2010-4656
UBUNTU:USN-1146-1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3ed780117dbe5acb64280d218f0347f238dafed0
rh#672420
CVE-2010-4668kernel-source-rt:Ignoremoderate ()BID:45660
CONFIRM:git.kernel.org:CVE-2010-4668
CONFIRM:patchwork.kernel.org:CVE-2010-4668
CONFIRM:www.kernel.org:CVE-2010-4668
CVE-2010-4668
DSA-2153
MLIST:[linux-kernel] 20101129 Re: [PATCH] block: check for proper length of iov entries earlier in blk_rq_map_user_iov()
MLIST:[linux-kernel] 20101129 [PATCH] block: check for proper length of iov entries earlier in blk_rq_map_user_iov()
MLIST:[oss-security] 20101129 Re: CVE request: kernel: Multiple DoS issues in block layer
MLIST:[oss-security] 20101130 Re: CVE request: kernel: Multiple DoS issues in block layer
RH:CVE-2010-4668
RHSA-2011:0007
RHSA-2011:0330
SECUNIA:42890
SMASH Issue 46135
UBUNTU:CVE-2010-4668
XF:linux-blkrqmapuseriov-dos(64496)
bnc#652945
bnc#662202
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
CVE-2010-4805kernel-source-rt:Not affectedimportant ()BID:46637
CONFIRM:git.kernel.org:CVE-2010-4805
CONFIRM:www.kernel.org:CVE-2010-4805
CVE-2010-4805
MLIST:[netdev] 20100302 [PATCH 1/8] net: add limit for socket backlog
RH:CVE-2010-4805
RHSA-2011:0303
RHSA-2011:0542
RHSA-2011:0883
SMASH Issue 66913
UBUNTU:CVE-2010-4805
bnc#698190
rh#657303
CVE-2010-5321kernel-source-rt:Not affectedmoderate ()CVE-2010-5321
MISC:bugzilla.kernel.org:CVE-2010-5321
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:linuxtv.org:CVE-2010-5329
MLIST:[oss-security] 20150208 Re: kernel: v4l: videobuf: hotfix a bug on multiple calls to mmap() - Linux kernel
RH:CVE-2010-5321
SMASH Issue 113652
UBUNTU:CVE-2010-5321
bdo#827340
bnc#916831
rh#620629
CVE-2010-5328kernel-source-rt:Unsupportedlow ()BID:97103
CONFIRM:ftp.naist.jp:CVE-2010-5328
CONFIRM:git.kernel.org:CVE-2010-5328
CONFIRM:github.com:CVE-2010-5328
CVE-2010-5328
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20170120 Re: CVE REQUEST: linux kernel: process with pgid zero able to crash
MLIST:[oss-security] 20170120 Re: CVE REQUEST: linux kernel: process with pgid zero able to crash
OSS:2017/Q1/160
RH:CVE-2010-5328
SMASH Issue 178952
SMASH Issue 178976
UBUNTU:CVE-2010-5328
bnc#1021109
rh#1358840
CVE-2010-5331kernel-source-rt:Not affectedcritical ()CONFIRM:support.f5.com:CVE-2010-5331
CVE-2010-5331
D:CVE-2010-5331
MISC:bugzilla.redhat.com:CVE-2010-5331
MISC:git.kernel.org:CVE-2010-5331
MISC:github.com:CVE-2010-5331
MISC:mirrors.edge.kernel.org:CVE-2010-5331
RH:CVE-2010-5331
SMASH Issue 238129
UBUNTU:CVE-2010-5331
bnc#1143173
https://support.f5.com/csp/article/K33183814?utm_source=f5support&%3Butm_medium=RSS
rh#1743598
CVE-2010-5332kernel-source-rt:Not affectedcritical ()CONFIRM:support.f5.com:CVE-2010-5332
CVE-2010-5332
D:CVE-2010-5332
MISC:git.kernel.org:CVE-2010-5332
MISC:github.com:CVE-2010-5332
MISC:mirrors.edge.kernel.org:CVE-2010-5332
RH:CVE-2010-5332
SMASH Issue 238130
UBUNTU:CVE-2010-5332
bnc#1143170
rh#1743604
CVE-2011-0463kernel-source-rt:Not affectedmoderate ()CONFIRM:bugzilla.novell.com:CVE-2011-0463
CONFIRM:git.kernel.org:CVE-2011-0463
CONFIRM:www.kernel.org:CVE-2011-0463
CVE-2011-0463
L3:35112
MLIST:[ocfs2-devel] 20110217 [PATCH] Treat writes as new when holes span across page boundaries
RH:CVE-2011-0463
SECUNIA:43966
SMASH Issue 33455
UBUNTU:CVE-2011-0463
UBUNTU:USN-1146-1
bnc#670595
bnc#673037
rh#1866254
CVE-2011-0521kernel-source-rt:Not affectedimportant ()BID:45986
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2011-0521
CONFIRM:www.kernel.org:CVE-2011-0521
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2011-0521
DSA-2153
MLIST:[oss-security] 20110125 Linux kernel av7110 negative array offset
MLIST:[oss-security] 20110125 Re: Linux kernel av7110 negative array offset
RH:CVE-2011-0521
RHSA-2011:0263
RHSA-2011:0330
RHSA-2011:0421
RHSA-2011:0429
SECTRACK:1025195
SECUNIA:43009
SECUNIA:46397
SMASH Issue 33511
UBUNTU:CVE-2011-0521
XF:kernel-av7110ca-privilege-escalation(64988)
bnc#666836
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cb26a24ee9706473f31d34cc259f4dcf45cd0644
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#672398
rh#822754
CVE-2011-0710kernel-source-rt:Not affectedmoderate ()BID:46421
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2011-0710
CONFIRM:www.kernel.org:CVE-2011-0710
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2011-0710
DSA-2264
MLIST:[oss-security] 20110216 CVE request - kernel: s390 task_show_regs infoleak
MLIST:[oss-security] 20110216 Re: CVE request - kernel: s390 task_show_regs infoleak
RH:CVE-2011-0710
RHSA-2011:0421
RHSA-2011:0429
SMASH Issue 33675
UBUNTU:CVE-2011-0710
XF:kernel-taskshowregs-info-disclosure(65464)
bdo#618485
bnc#672492
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=261cd298a8c363d7985e3482946edb4bfedacf98
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#677850
rh#822754
CVE-2011-0711kernel-source-rt:Not affectedmoderate ()BID:46417
CONFIRM:git.kernel.org:CVE-2011-0711
CONFIRM:patchwork.kernel.org:CVE-2011-0711
CONFIRM:www.kernel.org:CVE-2011-0711
CVE-2011-0711
DSA-2240
DSA-2264
MLIST:[oss-security] 20110216 CVE request - kernel: xfs infoleak
MLIST:[oss-security] 20110216 Re: CVE request - kernel: xfs infoleak
OSVDB:70950
RH:CVE-2011-0711
RHSA-2011:0498
RHSA-2011:0500
RHSA-2011:0927
SMASH Issue 33676
UBUNTU:CVE-2011-0711
bdo#618485
bnc#672505
bnc#672524
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3a3675b7f23f83ca8c67c9c2b6edf707fd28d1ba
rh#677260
CVE-2011-0712kernel-source-rt:Not affectedimportant ()BID:46419
CONFIRM:git.kernel.org:CVE-2011-0712
CONFIRM:www.kernel.org:CVE-2011-0712
CVE-2011-0712
DSA-2310
MISC:git.kernel.org:MLIST:[oss-security] 20110216 kernel: ALSA: caiaq - Fix possible string-buffer overflow
MLIST:[oss-security] 20110216 Re: kernel: ALSA: caiaq - Fix possible string-buffer overflow
MLIST:[oss-security] 20110216 kernel: ALSA: caiaq - Fix possible string-buffer overflow
RH:CVE-2011-0712
RHSA-2011:0498
SMASH Issue 33677
UBUNTU:CVE-2011-0712
UBUNTU:USN-1146-1
XF:kernel-usbdevice-bo(65461)
bdo#633738
bnc#672499
http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=eaae55dac6b64c0616046436b294e69fc5311581
rh#677881
CVE-2011-0726kernel-source-rt:Not affectedlow ()BID:47791
CONFIRM:downloads.avaya.com:CVE-2011-1763
CONFIRM:git.kernel.org:CVE-2011-0726
CONFIRM:www.kernel.org:CVE-2011-0726
CVE-2011-0726
DSA-2240
DSA-2264
MLIST:[linux-kernel] 20110311 [PATCH] proc: protect mm start_code/end_code in /proc/pid/stat
MLIST:[mm-commits] 20110314 + proc-protect-mm-start_code-end_code-in-proc-pid-stat.patch added to -mm tree
RH:CVE-2011-0726
RHSA-2011:0498
RHSA-2011:0500
RHSA-2011:0833
SMASH Issue 33691
UBUNTU:CVE-2011-0726
bdo#618485
bnc#701254
linux.git:commit:5883f57ca0008ffc93e09cbb9847a1928e50c6f3
rh#684569
CVE-2011-0999kernel-source-rt:Not affectedmoderate ()BID:46442
CONFIRM:git.kernel.org:CVE-2011-0999
CONFIRM:www.kernel.org:CVE-2011-1016
CVE-2011-0999
MLIST:[oss-security] 20110217 CVE request - kernel: thp: prevent hugepages during args/env copying into the user stack
MLIST:[oss-security] 20110217 Re: CVE request - kernel: thp: prevent hugepages during args/env copying into the user stack
RH:CVE-2011-0999
RHSA-2011:0542
RHSA-2011:0883
SMASH Issue 50086
UBUNTU:CVE-2011-0999
XF:kernel-hugepages-dos(65535)
bnc#673261
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a7d6e4ecdb7648478ddec76d30d87d03d6e22b31
rh#678209
CVE-2011-1010kernel-source-rt:Not affectedmoderate ()BID:46492
BUGTRAQ:20110223 [PRE-SA-2011-01] Multiple Linux kernel vulnerabilities in partition handling code of LDM and MAC partition tables
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2011-1010
CONFIRM:www.kernel.org:CVE-2011-1010
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2011-1010
DSA-2264
L3:35499
MISC:www.pre-cert.de:CVE-2011-1017
MLIST:[oss-security] 20110222 CVE request: kernel: fs/partitions: validate map_count in mac partition tables
MLIST:[oss-security] 20110222 Re: CVE request: kernel: fs/partitions: validate map_count in mac partition tables
RH:CVE-2011-1010
RHSA-2011:0429
RHSA-2011:0500
RHSA-2011:0542
RHSA-2011:0883
SECTRACK:1025126
SMASH Issue 44686
SREASON:8115
UBUNTU:CVE-2011-1010
XF:kernel-map-dos(65643)
bdo#618485
bnc#673929
bnc#690537
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fa7ea87a057958a8b7926c1a60a3ca6d696328ed
rh#679282
CVE-2011-1016kernel-source-rt:Not affectedmoderate ()BID:46557
CONFIRM:git.kernel.org:CVE-2011-1016
CONFIRM:www.kernel.org:CVE-2011-1016
CVE-2011-1016
DSA-2240
MLIST:[oss-security] 20110224 CVE request: kernel: drm/radeon/kms: check AA resolve registers on r300
MLIST:[oss-security] 20110224 Re: CVE request: kernel: drm/radeon/kms: check AA resolve registers on r300
MLIST:[oss-security] 20110225 Re: CVE request: kernel: drm/radeon/kms: check AA resolve registers on r300
RH:CVE-2011-1016
RHSA-2011:0498
SMASH Issue 44688
UBUNTU:CVE-2011-1016
XF:kernel-atiradeon-sec-bypass(65691)
bnc#674693
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fff1ce4dc6113b6fdc4e3a815ca5fd229408f8ef
rh#680000
CVE-2011-1017kernel-source-rt:Not affectedimportant ()BID:46512
BUGTRAQ:20110223 [PRE-SA-2011-01] Multiple Linux kernel vulnerabilities in partition handling code of LDM and MAC partition tables
CVE-2011-1017
DSA-2264
MISC:www.pre-cert.de:CVE-2011-1017
MLIST:[oss-security] 20110223 CVE request: kernel: fs/partitions: Kernel heap overflow via corrupted LDM partition tables
MLIST:[oss-security] 20110223 Re: CVE request: kernel: fs/partitions: Kernel heap overflow via corrupted LDM partition tables
MLIST:[oss-security] 20110224 Re: CVE request: kernel: fs/partitions: Kernel heap overflow via corrupted LDM partition tables
RH:CVE-2011-1017
SECTRACK:1025128
SECUNIA:43716
SECUNIA:43738
SMASH Issue 44689
SREASON:8115
UBUNTU:CVE-2011-1017
UBUNTU:USN-1146-1
bdo#618485
bnc#674648
bnc#698221
linux.git:commit:cae13fe4cc3f24820ffb990c09110626837e85d4
rh#1867455
CVE-2011-1020kernel-source-rt:Not affectedmoderate ()BID:46567
CVE-2011-1020
DSA-2303
DSA-2310
FULLDISC:20110122 Proc filesystem and SUID-Binaries
MISC:www.halfdog.net:CVE-2011-1020
MLIST:[linux-kernel] 20110207 Re: [SECURITY] /proc/$pid/ leaks contents across setuid exec
MLIST:[linux-kernel] 20110207 [SECURITY] /proc/$pid/ leaks contents across setuid exec
MLIST:[linux-kernel] 20110208 Re: [SECURITY] /proc/$pid/ leaks contents across setuid exec
MLIST:[linux-kernel] 20110209 Re: [SECURITY] /proc/$pid/ leaks contents across setuid exec
MLIST:[oss-security] 20110224 CVE request: kernel: /proc/$pid/ leaks contents across setuid exec
MLIST:[oss-security] 20110225 Re: CVE request: kernel: /proc/$pid/ leaks contents across setuid exec
RH:CVE-2011-1020
RHSA-2011:1253
RHSA-2011:1530
RHSA-2012:0007
RHSA-2012:0116
SECUNIA:43496
SMASH Issue 45000
SREASON:8107
UBUNTU:CVE-2011-1020
XF:kernel-procpid-security-bypass(65693)
bdo#633738
bnc#674982
rh#680358
CVE-2011-1023kernel-source-rt:Not affectedmoderate ()CONFIRM:ftp.osuosl.org:CVE-2011-1023
CONFIRM:git.kernel.org:CVE-2011-1023
CONFIRM:github.com:CVE-2011-1023
CVE-2011-1023
MLIST:[oss-security] 20110303 CVE-2011-1023 kernel: rds: prevent BUG_ON triggering on congestion map updates
RH:CVE-2011-1023
RHSA-2011:0542
SMASH Issue 50095
UBUNTU:CVE-2011-1023
bnc#676707
bnc#703752
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6094628bfd94323fc1cea05ec2c6affd98c18f7f
rh#680345
CVE-2011-1078kernel-source-rt:Not affectedlow ()CONFIRM:downloads.avaya.com:CVE-2011-1763
CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:git.kernel.org:CVE-2011-1078
CONFIRM:github.com:CVE-2011-1078
CVE-2011-1078
DSA-2240
DSA-2264
MLIST:[oss-security] 20110301 Re: CVE request: kernel: two bluetooth and one ebtables infoleaks/DoSes
RH:CVE-2011-1078
RHSA-2011:0500
RHSA-2011:0833
RHSA-2012:1156
SMASH Issue 45001
UBUNTU:CVE-2011-1078
bdo#618485
bnc#676601
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c4c896e1471aec3b004a693c689f60be3b17ac86
rh#681259
CVE-2011-1080kernel-source-rt:Not affectedlow ()CONFIRM:downloads.avaya.com:CVE-2011-1763
CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:git.kernel.org:CVE-2011-1080
CONFIRM:github.com:CVE-2011-1080
CVE-2011-1080
DSA-2240
DSA-2264
MLIST:[oss-security] 20110301 Re: CVE request: kernel: two bluetooth and one ebtables infoleaks/DoSes
RH:CVE-2011-1080
RHSA-2011:0498
RHSA-2011:0500
RHSA-2011:0833
SMASH Issue 45003
UBUNTU:CVE-2011-1080
bdo#618485
bnc#676602
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d846f71195d57b0bbb143382647c2c6638b04c5a
rh#681262
CVE-2011-1082kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2011-1082
CONFIRM:www.kernel.org:CVE-2011-1163
CVE-2011-1082
MLIST:[linux-kernel] 20110205 [PATCH] epoll: Prevent deadlock through unsafe ->f_op->poll() calls.
MLIST:[oss-security] 20110301 CVE request: kernel: Multiple DoS issues in epoll
MLIST:[oss-security] 20110302 Re: CVE request: kernel: Multiple DoS issues in epoll
RH:CVE-2011-1082
RHSA-2011:0500
RHSA-2011:0542
RHSA-2011:0883
SMASH Issue 50139
UBUNTU:CVE-2011-1082
bnc#676202
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=22bacca48a1755f79b7e0f192ddb9fbb7fc6e64e
rh#681575
CVE-2011-1083kernel-source-rt:Not affectedmoderate ()CVE-2011-1083
MLIST:[linux-kernel] 20110225 [PATCH] optimize epoll loop detection
MLIST:[linux-kernel] 20110226 Re: [PATCH] optimize epoll loop detection
MLIST:[linux-kernel] 20110228 Re: [PATCH] optimize epoll loop detection
MLIST:[oss-security] 20110301 CVE request: kernel: Multiple DoS issues in epoll
MLIST:[oss-security] 20110302 Re: CVE request: kernel: Multiple DoS issues in epoll
OSVDB:71265
RH:CVE-2011-1083
RHBA-2012:0496
RHSA-2012:0150
RHSA-2012:0862
RHSA-2012:1061
RHSA-2012:1129
RHSA-2012:1150
SECUNIA:43522
SECUNIA:48115
SECUNIA:48410
SECUNIA:48898
SECUNIA:48964
SMASH Issue 47232
SUSE:SUSE-SU-2012:0554
SUSE:SUSE-SU-2012:0616
UBUNTU:CVE-2011-1083
bnc#676204
rh#681578
rh#814278
rh#837502
CVE-2011-1090kernel-source-rt:Not affectedmoderate ()BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2011-1090
CONFIRM:www.kernel.org:CVE-2011-1163
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2011-1090
CVE-2023-2002
DSA-2240
DSA-2264
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20110307 CVE request - kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab
MLIST:[oss-security] 20110307 Re: CVE request - kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab
OSS:2023/04/16/3
RH:CVE-2011-1090
RHSA-2011:0429
RHSA-2011:0542
RHSA-2011:0883
RHSA-2011:1253
SECTRACK:1025336
SMASH Issue 46136
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2011-1090
bdo#618485
bnc#677286
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e9e3d724e2145f5039b423c290ce2b2c3d8f94bc
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#682641
rh#822754
CVE-2011-1093kernel-source-rt:Not affectedimportant ()BID:46793
CONFIRM:downloads.avaya.com:CVE-2011-1763
CONFIRM:git.kernel.org:CVE-2011-1093
CONFIRM:www.kernel.org:CVE-2011-1163
CVE-2011-1093
DSA-2264
MISC:git.kernel.org:/
MLIST:[oss-security] 20110308 CVE request: kernel: dccp: fix oops on Reset after close
MLIST:[oss-security] 20110308 Re: CVE request: kernel: dccp: fix oops on Reset after close
RH:CVE-2011-1093
RHSA-2011:0498
RHSA-2011:0500
RHSA-2011:0833
SMASH Issue 50142
UBUNTU:CVE-2011-1093
bdo#618485
bnc#677676
rh#682954
CVE-2011-1160kernel-source-rt:Not affectedlow ()CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:git.kernel.org:CVE-2011-1160
CONFIRM:github.com:CVE-2011-1160
CVE-2009-4067
CVE-2011-1160
CVE-2011-1162
DSA-2240
DSA-2264
MISC:labs.mwrinfosecurity.com:CVE-2009-4067
MISC:tpmdd.git.sourceforge.net:MLIST:[oss-security] 20110315 Re: CVE requests - kernel: tpm infoleaks
MLIST:[oss-security] 20110315 Re: CVE requests - kernel: tpm infoleaks
RH:CVE-2011-1160
RH:CVE-2011-1162
RHSA-2011:1253
RHSA-2011:1350
RHSA-2011:1386
RHSA-2011:1465
RHSA-2011:1479
RHSA-2012:0010
SMASH Issue 44690
UBUNTU:CVE-2011-1160
UBUNTU:CVE-2011-1162
bdo#618485
bnc#680040
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1309d7afbed112f0e8e90be9af975550caa0076b
linux.git:commit:3321c07ae5068568cd61ac9f4ba749006a7185c9
rh#684671
rh#722393
rh#732629
CVE-2011-1162kernel-source-rt:Not affectedlow ()CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:git.kernel.org:CVE-2011-1160
CONFIRM:github.com:CVE-2011-1160
CVE-2009-4067
CVE-2011-1160
CVE-2011-1162
DSA-2240
DSA-2264
MISC:labs.mwrinfosecurity.com:CVE-2009-4067
MISC:tpmdd.git.sourceforge.net:MLIST:[oss-security] 20110315 Re: CVE requests - kernel: tpm infoleaks
MLIST:[oss-security] 20110315 Re: CVE requests - kernel: tpm infoleaks
RH:CVE-2011-1160
RH:CVE-2011-1162
RHSA-2011:1253
RHSA-2011:1350
RHSA-2011:1386
RHSA-2011:1465
RHSA-2011:1479
RHSA-2012:0010
SMASH Issue 231761
SMASH Issue 44690
UBUNTU:CVE-2011-1160
UBUNTU:CVE-2011-1162
bdo#618485
bnc#680040
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1309d7afbed112f0e8e90be9af975550caa0076b
linux.git:commit:3321c07ae5068568cd61ac9f4ba749006a7185c9
rh#684671
rh#722393
rh#732629
CVE-2011-1163kernel-source-rt:Not affectedlow ()BID:46878
BUGTRAQ:20110317 [PRE-SA-2011-02] Information disclosure vulnerability in the OSF partition handling code of the Linux kernel
CONFIRM:downloads.avaya.com:CVE-2011-1763
CONFIRM:git.kernel.org:CVE-2011-1163
CONFIRM:www.kernel.org:CVE-2011-1163
CVE-2011-1163
CVE-2023-2002
DSA-2240
DSA-2264
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:www.pre-cert.de:CVE-2011-1163
MLIST:[mm-commits] 20110314 + fs-partitions-osfc-corrupted-osf-partition-table-can-cause-information-disclosure.patch added to -mm tree
MLIST:[oss-security] 20110315 CVE Request: kernel: fs/partitions: Corrupted OSF partition table can cause information disclosure
MLIST:[oss-security] 20110315 Re: CVE Request: kernel: fs/partitions: Corrupted OSF partition table can cause information disclosure
OSS:2023/04/16/3
RH:CVE-2011-1163
RHSA-2011:0500
RHSA-2011:0542
RHSA-2011:0833
RHSA-2011:0883
SECTRACK:1025225
SMASH Issue 44691
SREASON:8189
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2011-1163
bdo#618485
bnc#679812
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1eafbfeb7bdf59cfe173304c76188f3fd5f1fd05
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#688021
rh#822754
CVE-2011-1169kernel-source-rt:Not affectedimportant ()CONFIRM:git.kernel.org:CVE-2011-1169
CONFIRM:www.kernel.org:CVE-2011-1169
CVE-2011-1169
MLIST:[oss-security] 20110318 CVE request: kernel: AudioScience HPI driver
MLIST:[oss-security] 20110318 Re: CVE request: kernel: AudioScience HPI driver
RH:CVE-2011-1169
SMASH Issue 50189
UBUNTU:CVE-2011-1169
bnc#680816
http://git.kernel.org/?p=linux/kernel/git/tiwai/sound-2.6.git%3Ba=commit%3Bh=4a122c10fbfe9020df469f0f669da129c5757671
rh#688898
CVE-2011-1170kernel-source-rt:Not affectedlow ()CONFIRM:downloads.avaya.com:CVE-2011-1763
CONFIRM:git.kernel.org:CVE-2011-1170
CONFIRM:www.kernel.org:CVE-2011-2534
CVE-2011-1170
DSA-2240
DSA-2264
MISC:git.kernel.org:MLIST:[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks
MLIST:[netfilter-devel] 20110310 [PATCH] ipv4: netfilter: arp_tables: fix infoleak to userspace
MLIST:[oss-security] 20110318 CVE request: kernel: netfilter & econet infoleaks
MLIST:[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks
RH:CVE-2011-1170
RHSA-2011:0500
RHSA-2011:0542
RHSA-2011:0833
RHSA-2011:0883
SMASH Issue 45004
SREASON:8278
SREASON:8282
UBUNTU:CVE-2011-1170
bdo#618485
bnc#681180
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=42eab94fff18cb1091d3501cd284d6bd6cc9c143
rh#591815
rh#689321
rh#689327
rh#689337
rh#689345
CVE-2011-1171kernel-source-rt:Not affectedlow ()CONFIRM:downloads.avaya.com:CVE-2011-1763
CONFIRM:git.kernel.org:CVE-2011-1171
CONFIRM:www.kernel.org:CVE-2011-2534
CVE-2011-1171
DSA-2240
DSA-2264
MLIST:[linux-kernel] 20110310 [PATCH] ipv4: netfilter: ip_tables: fix infoleak to userspace
MLIST:[oss-security] 20110318 CVE request: kernel: netfilter & econet infoleaks
MLIST:[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks
RH:CVE-2011-1171
RHSA-2011:0500
RHSA-2011:0542
RHSA-2011:0833
RHSA-2011:0883
SMASH Issue 45005
SREASON:8278
SREASON:8283
UBUNTU:CVE-2011-1171
bdo#618485
bnc#681181
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=78b79876761b86653df89c48a7010b5cbd41a84a
rh#689327
CVE-2011-1172kernel-source-rt:Not affectedlow ()CONFIRM:downloads.avaya.com:CVE-2011-1763
CONFIRM:git.kernel.org:CVE-2011-1172
CONFIRM:www.kernel.org:CVE-2011-2534
CVE-2011-1172
DSA-2240
DSA-2264
MLIST:[linux-kernel] 20110310 [PATCH] ipv6: netfilter: ip6_tables: fix infoleak to userspace
MLIST:[oss-security] 20110318 CVE request: kernel: netfilter & econet infoleaks
MLIST:[oss-security] 20110321 Re: CVE request: kernel: netfilter & econet infoleaks
RH:CVE-2011-1172
RHSA-2011:0500
RHSA-2011:0542
RHSA-2011:0833
RHSA-2011:0883
SMASH Issue 45006
SREASON:8278
UBUNTU:CVE-2011-1172
bdo#618485
bnc#681185
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6a8ab060779779de8aea92ce3337ca348f973f54
rh#689345
CVE-2011-1182kernel-source-rt:Not affectedmoderate ()CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:git.kernel.org:CVE-2011-1182
CONFIRM:github.com:CVE-2011-1182
CVE-2011-1182
DSA-2240
DSA-2264
MLIST:[oss-security] 20110323 Re: Linux kernel signal spoofing vulnerability (CVE request)
RH:CVE-2011-1182
RHSA-2011:0883
RHSA-2011:0927
RHSA-2011:1189
SMASH Issue 44460
UBUNTU:CVE-2011-1182
bdo#618485
bnc#681826
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=da48524eb20662618854bb3df2db01fc65f3070c
rh#690028
CVE-2011-1478kernel-source-rt:Not affectedmoderate ()BID:48907
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2011-1478
CONFIRM:mirror.anl.gov:CVE-2011-1478
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2011-1478
CVE-2011-1576
DSA-2240
MLIST:[oss-security] 20110328 CVE-2011-1478 kernel: gro: reset dev and skb_iff on skb reuse
RH:CVE-2011-1478
RH:CVE-2011-1576
RHSA-2011:0421
RHSA-2011:0429
RHSA-2011:0439
RHSA-2011:0927
RHSA-2011:1090
RHSA-2011:1106
RHSA-2011:1189
RHSA-2011:1253
SECTRACK:1025853
SECUNIA:46397
SMASH Issue 50545
SREASON:8480
UBUNTU:CVE-2011-1478
UBUNTU:CVE-2011-1576
bnc#682965
bnc#698450
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=66c46d741e2e60f0e8b625b80edb0ab820c46d7a
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6d152e23ad1a7a5b40fef1f42e017d66e6115159
rh#691270
rh#695173
CVE-2011-1479kernel-source-rt:Not affectedmoderate ()CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:git.kernel.org:CVE-2011-1479
CONFIRM:github.com:CVE-2011-1479
CVE-2011-1479
MLIST:[oss-security] 20110411 Re: CVE request: kernel: inotify memory leak
RH:CVE-2011-1479
RHSA-2011:0330
RHSA-2011:0498
RHSA-2011:1253
SMASH Issue 50548
UBUNTU:CVE-2011-1479
bnc#655693
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d0de4dc584ec6aa3b26fffea320a8457827768fc
rh#656830
rh#691793
CVE-2011-1493kernel-source-rt:Not affectedimportant ()BID:71990
CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:git.kernel.org:CVE-2011-4913
CONFIRM:git.kernel.org:CVE-2014-3610
CONFIRM:git.kernel.org:CVE-2014-3611
CONFIRM:git.kernel.org:CVE-2014-3645
CONFIRM:git.kernel.org:CVE-2014-3646
CONFIRM:git.kernel.org:CVE-2014-3647
CONFIRM:git.kernel.org:CVE-2014-3673
CONFIRM:git.kernel.org:CVE-2014-3687
CONFIRM:git.kernel.org:CVE-2014-7822
CONFIRM:git.kernel.org:CVE-2014-7841
CONFIRM:git.kernel.org:CVE-2014-8160
CONFIRM:git.kernel.org:CVE-2014-9419
CONFIRM:git.kernel.org:CVE-2014-9529
CONFIRM:git.kernel.org:CVE-2014-9584
CONFIRM:git.kernel.org:CVE-2014-9585
CONFIRM:git.kernel.org:CVE-2015-1465
CONFIRM:git.kernel.org:CVE-2015-2041
CONFIRM:git.kernel.org:CVE-2015-2042
CONFIRM:git.kernel.org:CVE-2015-2830
CONFIRM:git.kernel.org:CVE-2015-3339
CONFIRM:git.kernel.org:CVE-2015-3636
CONFIRM:github.com:CVE-2011-4913
CVE-2011-1493
CVE-2014-9585
DSA-2240
DSA-2264
DSA-3170
FEDORA:FEDORA-2015-0937
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:CVE-2014-9585
MISC:git.kernel.org:MLIST:[oss-security] 20150109 Re: PIE bypass using VDSO ASLR weakness - Linux kernel
MISC:v0ids3curity.blogspot.in:CVE-2014-9585
MLIST:[oss-security] 20110405 Re: CVE request: kernel: multiple issues in ROSE
MLIST:[oss-security] 20141209 PIE bypass using VDSO ASLR weakness
MLIST:[oss-security] 20150109 Re: PIE bypass using VDSO ASLR weakness - Linux kernel
RH:CVE-2011-1493
RH:CVE-2014-9585
RHSA-2015:1081
RHSA-2015:1778
RHSA-2015:1787
RHSA-2015:1788
SMASH Issue 44695
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:0812
SUSE:openSUSE-SU-2015:0566
SUSE:openSUSE-SU-2015:0714
UBUNTU:CVE-2011-1493
UBUNTU:CVE-2014-9585
UBUNTU:USN-2513-1
UBUNTU:USN-2514-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
bdo#618485
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=be20250c13f88375345ad99950190685eda51eb8
rh#1181054
rh#770777
CVE-2011-1494kernel-source-rt:Not affectedmoderate ()BID:47185
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:downloads.avaya.com:CVE-2011-1763
CONFIRM:patchwork.kernel.org:CVE-2011-1495
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2011-1494
CVE-2023-2002
DSA-2240
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-kernel] 20110405 [PATCH] drivers/scsi/mpt2sas: prevent heap overflows and unchecked reads
MLIST:[oss-security] 20110405 CVE request: kernel: two issues in mpt2sas
MLIST:[oss-security] 20110406 Re: CVE request: kernel: two issues in mpt2sas
OSS:2023/04/16/3
RH:CVE-2011-1494
RHSA-2011:0542
RHSA-2011:0833
RHSA-2011:0883
RHSA-2011:1253
SECUNIA:46397
SMASH Issue 46137
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2011-1494
bnc#685402
rh#694021
CVE-2011-1495kernel-source-rt:Not affectedimportant ()BID:47185
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:downloads.avaya.com:CVE-2011-1763
CONFIRM:patchwork.kernel.org:CVE-2011-1495
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2011-1495
CVE-2023-2002
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-kernel] 20110405 [PATCH] drivers/scsi/mpt2sas: prevent heap overflows and unchecked reads
MLIST:[oss-security] 20110405 CVE request: kernel: two issues in mpt2sas
MLIST:[oss-security] 20110406 Re: CVE request: kernel: two issues in mpt2sas
OSS:2023/04/16/3
RH:CVE-2011-1495
RHSA-2011:0542
RHSA-2011:0833
RHSA-2011:0883
RHSA-2011:1253
SECUNIA:46397
SMASH Issue 46138
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2011-1495
bnc#685402
rh#694021
CVE-2011-1573kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2011-1573
CONFIRM:mirror.anl.gov:CVE-2011-1573
CVE-2011-1573
MLIST:[oss-security] 20110411 CVE request - kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set
MLIST:[oss-security] 20110411 Re: CVE request - kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set
RH:CVE-2011-1573
RHSA-2011:0498
RHSA-2011:0927
SMASH Issue 44696
UBUNTU:CVE-2011-1573
bnc#686813
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a8170c35e738d62e9919ce5b109cf4ed66e95bde
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#695383
rh#822754
CVE-2011-1576kernel-source-rt:Not affectedmoderate ()BID:48907
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:git.kernel.org:CVE-2011-1478
CONFIRM:mirror.anl.gov:CVE-2011-1478
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2011-1478
CVE-2011-1576
DSA-2240
MLIST:[oss-security] 20110328 CVE-2011-1478 kernel: gro: reset dev and skb_iff on skb reuse
RH:CVE-2011-1478
RH:CVE-2011-1576
RHSA-2011:0421
RHSA-2011:0429
RHSA-2011:0439
RHSA-2011:0927
RHSA-2011:1090
RHSA-2011:1106
RHSA-2011:1189
RHSA-2011:1253
SECTRACK:1025853
SECUNIA:46397
SMASH Issue 231008
SMASH Issue 46254
SMASH Issue 50545
SREASON:8480
UBUNTU:CVE-2011-1478
UBUNTU:CVE-2011-1576
bnc#682965
bnc#698450
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=66c46d741e2e60f0e8b625b80edb0ab820c46d7a
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6d152e23ad1a7a5b40fef1f42e017d66e6115159
rh#691270
rh#695173
CVE-2011-1577kernel-source-rt:Not affectedmoderate ()BUGTRAQ:20110413 [PRE-SA-2011-03] Denial-of-service vulnerability in EFI partition handling code of the Linux kernel
CVE-2011-1577
RH:CVE-2011-1577
RHSA-2011:0833
RHSA-2011:1253
RHSA-2011:1465
SMASH Issue 44697
UBUNTU:CVE-2011-1577
XF:kernel-guid-dos(66773)
bdo#618485
bnc#687113
bnc#692784
rh#695976
CVE-2011-1585kernel-source-rt:Not affectedlow ()CONFIRM:ftp.osuosl.org:CVE-2012-4444
CONFIRM:git.kernel.org:CVE-2011-1585
CONFIRM:github.com:CVE-2011-1585
CVE-2009-4067
CVE-2011-1585
CVE-2023-2002
DSA-2240
MISC:git.kernel.org:MLIST:[oss-security] 20110415 Re: CVE Request: cifs session reuse
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:labs.mwrinfosecurity.com:CVE-2009-4067
MLIST:[oss-security] 20110415 Re: CVE Request: cifs session reuse
OSS:2023/04/16/3
RH:CVE-2011-1585
RHSA-2011:1253
RHSA-2011:1386
SMASH Issue 44698
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2011-1585
bnc#687812
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4ff67b720c02c36e54d55b88c2931879b7db1cd2
rh#697394
rh#722393
CVE-2011-1598kernel-source-rt:Not affectedmoderate ()BID:47503
BID:71883
BID:74450
CONFIRM:git.kernel.org:CVE-2011-1598
CONFIRM:git.kernel.org:CVE-2014-9584
CONFIRM:github.com:CVE-2014-9584
CONFIRM:www.kernel.org:CVE-2011-1748
CONFIRM:www.kernel.org:CVE-2014-9731
CONFIRM:www.kernel.org:CVE-2015-2830
CONFIRM:www.kernel.org:CVE-2015-8950
CONFIRM:www.oracle.com:CVE-2015-1351
CONFIRM:www.oracle.com:CVE-2016-2802
CVE-2011-1598
CVE-2014-9584
CVE-2015-3636
DSA-2240
DSA-2264
DSA-3128
FEDORA:FEDORA-2015-7784
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:github.com:MLIST:[oss-security] 20150502 Re: CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam
MLIST:[netdev] 20110420 Add missing socket check in can/bcm release.
MLIST:[oss-security] 20110420 CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20110420 Re: CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20110421 Re: CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20110422 Re: CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20110425 Re: CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20150109 Re: CVE request Linux kernel: isofs: unchecked printing of ER records
MLIST:[oss-security] 20150502 CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam
RH:CVE-2011-1598
RH:CVE-2014-9584
RH:CVE-2015-3636
RHSA-2011:0836
RHSA-2011:1253
RHSA-2015:0864
RHSA-2015:1137
RHSA-2015:1138
RHSA-2015:1139
RHSA-2015:1221
RHSA-2015:1534
RHSA-2015:1564
RHSA-2015:1565
RHSA-2015:1583
RHSA-2015:1643
SECTRACK:1033186
SMASH Issue 45008
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0529
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:0812
SUSE:openSUSE-SU-2015:0566
SUSE:openSUSE-SU-2015:0714
UBUNTU:CVE-2011-1598
UBUNTU:CVE-2014-9584
UBUNTU:CVE-2015-3636
UBUNTU:USN-2511-1
UBUNTU:USN-2512-1
UBUNTU:USN-2513-1
UBUNTU:USN-2514-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
UBUNTU:USN-2633-1
UBUNTU:USN-2634-1
bdo#618485
bnc#688685
bnc#689038
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e2024624e678f0ebb916e6192bd23c1f9fdf696
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c6914a6f261aca0c9f715f883a353ae7ff51fe83
rh#1180119
rh#1218074
rh#698057
CVE-2011-1745kernel-source-rt:Not affectedmoderate ()BID:47534
CONFIRM:git.kernel.org:CVE-2011-2022
CONFIRM:www.kernel.org:CVE-2011-2022
CVE-2011-1745
DSA-2240
DSA-2264
MLIST:[linux-kernel] 20110414 [PATCH] char: agp: fix arbitrary kernel memory writes
MLIST:[oss-security] 20110421 CVE request: kernel: buffer overflow and DoS issues in agp
MLIST:[oss-security] 20110422 Re: CVE request: kernel: buffer overflow and DoS issues in agp
RH:CVE-2011-1745
RHSA-2011:0927
RHSA-2011:1253
RHSA-2011:1350
SMASH Issue 45009
UBUNTU:CVE-2011-1745
bdo#618485
bnc#689797
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=194b3da873fd334ef183806db751473512af29ce
rh#698996
rh#698998
CVE-2011-1747kernel-source-rt:Not affectedmoderate ()BID:47832
CONFIRM:www.kernel.org:CVE-2011-2022
CVE-2011-1747
MLIST:[linux-kernel] 20110414 [PATCH] char: agp: fix OOM and buffer overflow
MLIST:[oss-security] 20110421 CVE request: kernel: buffer overflow and DoS issues in agp
MLIST:[oss-security] 20110422 Re: CVE request: kernel: buffer overflow and DoS issues in agp
RH:CVE-2011-1747
SECTRACK:1025441
SMASH Issue 50975
UBUNTU:CVE-2011-1747
bnc#689797
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b522f02184b413955f3bc952e3776ce41edc6355
rh#698996
rh#698998
rh#698999
CVE-2011-1748kernel-source-rt:Unsupportedmoderate ()BID:47835
CONFIRM:git.kernel.org:CVE-2011-1748
CONFIRM:www.kernel.org:CVE-2011-1748
CVE-2011-1748
DSA-2240
DSA-2264
MLIST:[netdev] 20110420 [PATCH v2] can: add missing socket check in can/raw release
MLIST:[oss-security] 20110421 Re: CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20110422 Re: CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20110425 Re: CVE request: kernel: missing socket check in can/bcm release
RH:CVE-2011-1748
RHSA-2011:0836
RHSA-2011:1253
SMASH Issue 45011
UBUNTU:CVE-2011-1748
bdo#618485
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=10022a6c66e199d8f61d9044543f38785713cbbd
rh#698057
CVE-2011-1763kernel-source-rt:Unsupportedimportant ()CVE-2011-1763
RH:CVE-2011-1763
RHSA-2011:0833
SMASH Issue 71672
UBUNTU:CVE-2011-1763
bnc#698254
rh#701240
CVE-2011-1767kernel-source-rt:Not affectedmoderate ()CONFIRM:ftp.osuosl.org:CVE-2013-2128
CONFIRM:git.kernel.org:CVE-2011-1767
CONFIRM:github.com:CVE-2011-1767
CVE-2011-1767
DSA-2240
DSA-2264
MISC:patchwork.ozlabs.org:MLIST:[oss-security] 20110505 Re: CVE requests - kernel network vulns
MLIST:[oss-security] 20110505 Re: CVE requests - kernel network vulns
RH:CVE-2011-1767
RHSA-2011:0928
RHSA-2011:1253
SMASH Issue 51016
UBUNTU:CVE-2011-1767
bdo#618485
bnc#692239
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c2892f02712e9516d72841d5c019ed6916329794
rh#702303
CVE-2011-1768kernel-source-rt:Unsupportedmoderate ()CONFIRM:ftp.osuosl.org:CVE-2013-2128
CONFIRM:git.kernel.org:CVE-2011-1768
CONFIRM:github.com:CVE-2011-1768
CVE-2011-1768
DSA-2264
MLIST:[oss-security] 20110505 Re: CVE requests - kernel network vulns
RH:CVE-2011-1768
RHSA-2011:0928
RHSA-2011:1253
SMASH Issue 51020
UBUNTU:CVE-2011-1768
bdo#618485
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d5aa407f59f5b83d2c50ec88f5bf56d40f1f8978
rh#702303
CVE-2011-1771kernel-source-rt:Not affectedimportant ()CONFIRM:git.kernel.org:CVE-2011-1771
CONFIRM:www.kernel.org:CVE-2011-2534
CVE-2011-1771
MLIST:[linux-cifs] 20110405 Re: Repeatable crash in 2.6.38 related to O_DIRECT
MLIST:[linux-cifs] 20110405 Repeatable crash in 2.6.38 related to O_DIRECT
MLIST:[oss-security] 20110509 CVE-2011-1771 kernel: cifs oops when creating file with O_DIRECT set
RH:CVE-2011-1771
RHSA-2011:0836
SMASH Issue 51029
SREASON:8367
UBUNTU:CVE-2011-1771
bnc#692497
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7797069305d13252fd66cf722aa8f2cbeb3c95cd
rh#703016
CVE-2011-1776kernel-source-rt:Not affectedmoderate ()BID:47796
CONFIRM:git.kernel.org:CVE-2011-1776
CONFIRM:www.kernel.org:CVE-2011-2534
CVE-2011-1776
DSA-2240
DSA-2264
MISC:www.pre-cert.de:CVE-2011-1776
MLIST:[oss-security] 20110510 Re: CVE request: kernel: validate size of EFI GUID partition entries
RH:CVE-2011-1776
RHSA-2011:0927
RHSA-2011:1189
RHSA-2011:1253
SMASH Issue 45514
SREASON:8369
UBUNTU:CVE-2011-1776
bdo#618485
bnc#692784
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fa039d5f6b126fbd65eefa05db2f67e44df8f121
rh#703026
CVE-2011-1833kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2011-1833
CONFIRM:github.com:CVE-2011-1833
CONFIRM:www.kernel.org:CVE-2011-4594
CVE-2009-4067
CVE-2011-1833
DSA-2443
MISC:labs.mwrinfosecurity.com:CVE-2009-4067
RH:CVE-2011-1833
RHSA-2011:1241
RHSA-2011:1350
RHSA-2011:1386
SMASH Issue 45394
UBUNTU:CVE-2011-1833
bnc#709771
bnc#711539
rh#722393
rh#729465
rh#731172
CVE-2011-2189kernel-source-rt:Not affectedimportant ()CONFIRM:bugs.debian.org
CONFIRM:bugs.launchpad.net:CVE-2011-2189
CONFIRM:git.kernel.org:CVE-2011-2189
CONFIRM:ie.archive.ubuntu.com:CVE-2011-2189
CONFIRM:neil.brown.name:CVE-2011-2189
CONFIRM:patchwork.ozlabs.org:CVE-2011-2189
CVE-2011-2189
DSA-2305
MISC:bugs.launchpad.net:MLIST:[oss-security] 20110606 Re: CVE Request -- vsftpd -- Do not create network namespace per connection
MLIST:[git-commits-head] 20091208 net: Automatically allocate per namespace data.
MLIST:[oss-security] 20110606 Re: CVE Request -- vsftpd -- Do not create network namespace per connection
RH:CVE-2011-2189
SMASH Issue 71907
UBUNTU:CVE-2011-2189
UBUNTU:USN-1288-1
bdo#622741
bdo#629373
bnc#698449
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2b035b39970740722598f7a9d548835f9bdd730f
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f875bae065334907796da12523f9df85c89f5712
http://neil.brown.name/git?p=linux-2.6%3Ba=patch%3Bh=2b035b39970740722598f7a9d548835f9bdd730f
http://www.debian.org/security/2011/dsa-2305
rh#711134
rh#711245
CVE-2011-2213kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2011-2213
CONFIRM:patchwork.ozlabs.org:CVE-2011-2213
CONFIRM:www.kernel.org:CVE-2011-2213
CVE-2011-2213
DSA-2310
DSA-2389
HP:HPSBGN02970
MLIST:[netdev] 20110601 Re: inet_diag insufficient validation?
MLIST:[netdev] 20110601 inet_diag insufficient validation?
MLIST:[netdev] 20110603 Re: inet_diag insufficient validation?
MLIST:[netdev] 20110617 [PATCH] inet_diag: fix inet_diag_bc_audit()
MLIST:[oss-security] 20110620 CVE request: kernel: inet_diag: fix inet_diag_bc_audit()
MLIST:[oss-security] 20110620 Re: CVE request: kernel: inet_diag: fix inet_diag_bc_audit()
RH:CVE-2011-2213
RHSA-2011:0927
RHSA-2011:1189
RHSA-2011:1253
SMASH Issue 46141
UBUNTU:CVE-2011-2213
bdo#633738
bnc#700879
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=eeb1497277d6b1a0a34ed36b97e18f2bd7d6de0d
rh#714536
CVE-2011-2482kernel-source-rt:Not affectedimportant ()CONFIRM:ftp.osuosl.org:CVE-2011-2482
CONFIRM:git.kernel.org:CVE-2011-2482
CONFIRM:github.com:CVE-2011-2482
CVE-2011-2482
MISC:git.kernel.org:/
MLIST:[oss-security] 20130830 kernel: CVE-2011-2482/2519
RH:CVE-2011-2482
RHSA-2011:1212
RHSA-2011:1813
RHSA-2012:0007
SMASH Issue 72141
UBUNTU:CVE-2011-2482
bnc#735611
bnc#750395
rh#714867
rh#718882
rh#757143
CVE-2011-2484kernel-source-rt:Not affectedmoderate ()BID:48383
CVE-2009-4067
CVE-2011-2484
DSA-2303
DSA-2310
MISC:labs.mwrinfosecurity.com:CVE-2009-4067
MLIST:[linux-kernel] 20110616 [PATCH] taskstats: don't allow duplicate entries in listener mode
MLIST:[oss-security] 20110622 CVE request: kernel: taskstats local DoS
MLIST:[oss-security] 20110622 Re: CVE request: kernel: taskstats local DoS
RH:CVE-2011-2484
RHSA-2011:1253
RHSA-2011:1350
RHSA-2011:1386
SMASH Issue 46142
UBUNTU:CVE-2011-2484
XF:kernel-taskstats-dos(68150)
bdo#633738
bnc#701492
bnc#703153
rh#715436
rh#722393
CVE-2011-2491kernel-source-rt:Not affectedmoderate ()CONFIRM:ftp.osuosl.org:CVE-2012-3552
CONFIRM:git.kernel.org:CVE-2011-2491
CONFIRM:github.com:CVE-2011-2491
CVE-2011-2491
DSA-2303
DSA-2310
MLIST:[oss-security] 20110623 Re: CVE request: kernel: NLM: Don't hang forever on NLM unlock requests
RH:CVE-2011-2491
RHSA-2011:1189
RHSA-2011:1212
RHSA-2011:1253
RHSA-2011:1813
SMASH Issue 46143
UBUNTU:CVE-2011-2491
bdo#633738
bnc#702013
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b760113a3a155269a3fba93a409c640031dd68f
rh#709393
CVE-2011-2492kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2011-2492
CONFIRM:www.kernel.org:CVE-2011-2492
CVE-2011-2492
DSA-2303
DSA-2310
HP:HPSBGN02970
MLIST:[linux-bluetooth] 20110508 Bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace.
MLIST:[oss-security] 20110624 CVE request: kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace
MLIST:[oss-security] 20110624 Re: CVE request: kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace
RH:CVE-2011-2492
RHSA-2011:0927
RHSA-2011:1189
RHSA-2011:1253
SECTRACK:1025778
SMASH Issue 46144
UBUNTU:CVE-2011-2492
bdo#633738
bnc#702014
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d03e971cf403305217b8e62db3a2e5ad2d6263f
rh#703019
CVE-2011-2494kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2011-2494
CONFIRM:github.com:CVE-2011-2494
CONFIRM:www.kernel.org:CVE-2011-4594
CVE-2011-2494
MLIST:[oss-security] 20110627 Re: CVE request: kernel: taskstats/procfs io infoleak
RH:CVE-2011-2494
RHSA-2011:1189
RHSA-2011:1212
RHSA-2011:1253
RHSA-2011:1465
RHSA-2011:1479
RHSA-2011:1813
RHSA-2012:0010
SMASH Issue 46967
SUSE:SUSE-SU-2012:0554
UBUNTU:CVE-2011-2494
bnc#703156
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1a51410abe7d0ee4b1d112780f46df87d3621043
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#716825
rh#716842
rh#822754
CVE-2011-2495kernel-source-rt:Unsupportedlow ()CONFIRM:ftp.osuosl.org:CVE-2011-2495
CONFIRM:git.kernel.org:CVE-2011-2495
CONFIRM:github.com:CVE-2011-2495
CVE-2011-2495
DSA-2303
DSA-2310
MLIST:[oss-security] 20110627 Re: CVE request: kernel: taskstats/procfs io infoleak
RH:CVE-2011-2495
RHSA-2011:1189
RHSA-2011:1212
RHSA-2011:1253
RHSA-2011:1465
RHSA-2011:1479
RHSA-2011:1813
RHSA-2012:0010
SMASH Issue 45314
UBUNTU:CVE-2011-2495
bdo#633738
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1d1221f375c94ef961ba8574ac4f85c8870ddd51
rh#716825
rh#716842
CVE-2011-2497kernel-source-rt:Not affectedimportant ()BID:48472
CONFIRM:git.kernel.org:CVE-2011-2497
CONFIRM:www.kernel.org:CVE-2011-2497
CVE-2011-2497
DSA-2303
DSA-2310
MISC:git.kernel.org:/
MLIST:[linux-kernel] 20110624 [PATCH] Bluetooth: Prevent buffer overflow in l2cap config request
MLIST:[oss-security] 20110624 CVE request: kernel: remote buffer overflow in bluetooth
MLIST:[oss-security] 20110627 Re: CVE request: kernel: remote buffer overflow in bluetooth
OSVDB:74679
RH:CVE-2011-2497
RHSA-2011:1189
RHSA-2011:1253
SMASH Issue 72147
SREASON:8359
UBUNTU:CVE-2011-2497
bdo#633738
bnc#702286
rh#716805
CVE-2011-2517kernel-source-rt:Not affectedimportant ()CONFIRM:ftp.osuosl.org:CVE-2011-2518
CONFIRM:git.kernel.org:CVE-2011-2517
CONFIRM:github.com:CVE-2011-2517
CVE-2011-2517
DSA-2303
MLIST:[oss-security] 20110701 Re: CVE request: kernel: nl80211: missing check for valid SSID size in scan operations
RH:CVE-2011-2517
RHSA-2011:1189
RHSA-2011:1212
RHSA-2011:1253
RHSA-2011:1813
SMASH Issue 72161
UBUNTU:CVE-2011-2517
bnc#703410
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=208c72f4fe44fe09577e7975ba0e7fa0278f3d03
rh#718152
rh#814278
CVE-2011-2519kernel-source-rt:Unsupportedmoderate ()CVE-2011-2519
D:CVE-2011-2519
MISC:xenbits.xen.org:CVE-2011-2519
MLIST:[oss-security] 20130830 kernel: CVE-2011-2482/2519
RH:CVE-2011-2519
RHSA-2011:1212
RHSA-2011:1813
SMASH Issue 72163
UBUNTU:CVE-2011-2519
bnc#735615
rh#714867
rh#718882
CVE-2011-2521kernel-source-rt:Unsupportedmoderate ()CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:git.kernel.org:CVE-2011-2521
CONFIRM:github.com:CVE-2011-2521
CVE-2011-2521
MLIST:[oss-security] 20110706 Re: CVE request: kernel: perf, x86: fix Intel fixed counters base initialization
RH:CVE-2011-2521
RHSA-2011:1350
SMASH Issue 72165
UBUNTU:CVE-2011-2521
bnc#704050
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fc66c5210ec2539e800e87d7b3a985323c7be96e
rh#719228
CVE-2011-2525kernel-source-rt:Not affectedimportant ()CONFIRM:git.kernel.org:CVE-2011-2525
CONFIRM:mirror.anl.gov:CVE-2011-2525
CVE-2011-2525
DSA-2303
DSA-2310
MLIST:[netdev] 20100521 tc: RTM_GETQDISC causes kernel OOPS
MLIST:[oss-security] 20110712 CVE-2011-2525 kernel: kernel: net_sched: fix qdisc_notify()
RH:CVE-2011-2525
RHSA-2011:1065
RHSA-2011:1163
SMASH Issue 46542
UBUNTU:CVE-2011-2525
bdo#633738
bnc#735612
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=53b0f08042f04813cd1a7473dacd3edfacb28eb3
rh#720552
CVE-2011-2689kernel-source-rt:Not affectedmoderate ()BID:48677
CONFIRM:git.kernel.org:CVE-2011-2689
CONFIRM:www.kernel.org:CVE-2011-2689
CVE-2011-2689
HP:HPSBGN02970
MLIST:[oss-security] 20110713 CVE-2011-2689 kernel: gfs2: make sure fallocate bytes is a multiple of blksize
RH:CVE-2011-2689
RHSA-2011:1065
RHSA-2011:1189
SECTRACK:1025776
SECUNIA:45193
SMASH Issue 72314
UBUNTU:CVE-2011-2689
XF:linux-kernel-gfs2-dos(68557)
bnc#710672
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6905d9e4dda6112f007e9090bca80507da158e63
rh#720861
CVE-2011-2695kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2011-2695
CONFIRM:www.kernel.org:CVE-2011-2695
CVE-2009-4067
CVE-2011-2695
MISC:labs.mwrinfosecurity.com:CVE-2009-4067
MLIST:[linux-ext4] 20110603 [PATCH 1/2] ext4: Fix max file size and logical block counting of extent format file
MLIST:[oss-security] 20110715 CVE Request -- kernel: ext4: kernel panic when writing data to the last block of sparse file
MLIST:[oss-security] 20110715 Re: CVE Request -- kernel: ext4: kernel panic when writing data to the last block of sparse file
RH:CVE-2011-2695
RHSA-2011:1189
RHSA-2011:1253
RHSA-2011:1386
SECUNIA:45193
SMASH Issue 72317
UBUNTU:CVE-2011-2695
bnc#706374
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f17722f917b2f21497deb6edc62fb1683daa08e6
rh#722393
rh#722557
CVE-2011-2699kernel-source-rt:Not affectedimportant ()CONFIRM:git.kernel.org:CVE-2011-2699
CONFIRM:github.com:CVE-2011-2699
CONFIRM:www.kernel.org:CVE-2011-4594
CVE-2009-4067
CVE-2011-2699
MANDRIVA:MDVSA-2013:150
MISC:labs.mwrinfosecurity.com:CVE-2009-4067
MLIST:[oss-security] 20110720 Re: CVE request: kernel: ipv6: make fragment identifications less predictable
Oracle:CVE-2011-2699
RH:CVE-2011-2699
RHSA-2011:1386
RHSA-2011:1465
RHSA-2012:0358
SECTRACK:1027274
SMASH Issue 46253
UBUNTU:CVE-2011-2699
bnc#707288
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c
rh#722393
rh#723429
CVE-2011-2707kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2011-2707
CONFIRM:github.com:CVE-2011-2707
CONFIRM:www.kernel.org:CVE-2011-4594
CVE-2011-2707
MLIST:[oss-security] 20110720 Re: CVE request: kernel: arbitrary kernel read in xtensa
RH:CVE-2011-2707
SMASH Issue 72323
bnc#707337
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0d0138ebe24b94065580bd2601f8bb7eb6152f56
rh#1861851
CVE-2011-2898kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2011-2898
CONFIRM:github.com:CVE-2011-2898
CVE-2011-2898
DSA-2389
MISC:git.kernel.org:MLIST:[oss-security] 20110803 Re: CVE request: Linux kernel af_packet information leak
MLIST:[oss-security] 20110803 Re: CVE request: Linux kernel af_packet information leak
RH:CVE-2011-2898
RHSA-2011:1350
RHSA-2012:0010
SMASH Issue 72500
UBUNTU:CVE-2011-2898
bnc#710235
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13fcb7bd322164c67926ffe272846d4860196dc6
rh#728023
CVE-2011-2905kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2011-2905
CONFIRM:github.com:CVE-2011-2905
CONFIRM:www.kernel.org:CVE-2011-4594
CVE-2011-2905
DSA-2303
MLIST:[oss-security] 20110809 Re: CVE request: perf: may parse user-controlled config file
RH:CVE-2011-2905
RHSA-2011:1465
SMASH Issue 45789
UBUNTU:CVE-2011-2905
bdo#632923
bnc#711414
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=aba8d056078e47350d85b06a9cabd5afcc4b72ea
rh#729808
CVE-2011-2918kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2011-2918
CONFIRM:git.kernel.org:CVE-2012-0810
CONFIRM:github.com:CVE-2011-2918
CONFIRM:www.kernel.org:CVE-2011-4594
CVE-2011-2918
CVE-2012-0810
DSA-2303
MLIST:[oss-security] 20110816 Re: CVE request -- kernel: perf: fix software event overflow
RH:CVE-2011-2918
RHSA-2011:1350
RHSA-2012:0333
SMASH Issue 45517
UBUNTU:CVE-2011-2918
bnc#712366
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a8b0ca17b80e92faab46ee7179ba9e99ccb61233
rh#730706
rh#794557
CVE-2011-2942kernel-source-rt:Not affectedmoderate ()CVE-2009-4067
CVE-2011-2942
MISC:labs.mwrinfosecurity.com:CVE-2009-4067
MISC:www.redhat.com:MLIST:[oss-security] 20111024 kernel; CVE-2011-2942 and CVE-2011-3209
MLIST:[oss-security] 20111024 kernel; CVE-2011-2942 and CVE-2011-3209
RH:CVE-2011-2942
RHSA-2011:1386
RHSA-2011:1408
RHSA-2011:1418
RHSA-2011:1419
SMASH Issue 72529
UBUNTU:CVE-2011-2942
bnc#726064
rh#722393
rh#730917
rh#732878
CVE-2011-3188kernel-source-rt:Not affectedcritical ()CONFIRM:git.kernel.org:CVE-2011-3188
CONFIRM:github.com:CVE-2011-3188
CONFIRM:support.f5.com:CVE-2011-3188
CONFIRM:www.kernel.org:CVE-2011-4594
CVE-2009-4067
CVE-2011-3188
DSA-2303
DSA-2310
HP:HPSBGN02970
MISC:labs.mwrinfosecurity.com:CVE-2009-4067
MLIST:[oss-security] 20110823 Re: CVE request: kernel: change in how tcp seq numbers are generated
RH:CVE-2011-3188
RHSA-2011:1386
RHSA-2011:1408
RHSA-2011:1419
RHSA-2011:1465
RHSA-2012:0010
SMASH Issue 46252
UBUNTU:CVE-2011-3188
bdo#633738
bnc#737874
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6e5714eaf77d79ae1c8b47e3e040ff5411b717ec
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bc0b96b54a21246e377122d54569eef71cec535f
https://support.f5.com/csp/article/K15301?utm_source=f5support&%3Butm_medium=RSS
rh#722393
rh#732658
CVE-2011-3359kernel-source-rt:Not affectedimportant ()CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:git.kernel.org:CVE-2011-3359
CONFIRM:github.com:CVE-2011-3359
CVE-2011-3359
MISC:bugzilla.kernel.org:MLIST:[oss-security] 20110914 Re: CVE request -- kernel: b43: allocate receive buffers big enough for max frame len + offset
MISC:github.com:MLIST:[oss-security] 20110914 Re: CVE request -- kernel: b43: allocate receive buffers big enough for max frame len + offset
MLIST:[oss-security] 20110914 Re: CVE request -- kernel: b43: allocate receive buffers big enough for max frame len + offset
RH:CVE-2011-3359
RHSA-2011:1465
RHSA-2012:0010
SMASH Issue 72906
UBUNTU:CVE-2011-3359
bnc#717749
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c85ce65ecac078ab1a1835c87c4a6319cf74660a
rh#738202
rh#814278
CVE-2011-3363kernel-source-rt:Not affectedmoderate ()CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:git.kernel.org:CVE-2011-3363
CONFIRM:github.com:CVE-2011-3363
CVE-2011-3363
MISC:github.com:MLIST:[oss-security] 20110914 Re: CVE request -- kernel: cifs: always do is_path_accessible check in cifs_mount
MLIST:[oss-security] 20110914 Re: CVE request -- kernel: cifs: always do is_path_accessible check in cifs_mount
RH:CVE-2011-3363
RHSA-2011:1465
RHSA-2011:1479
RHSA-2012:0010
SMASH Issue 45984
UBUNTU:CVE-2011-3363
bnc#718028
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=70945643722ffeac779d2529a348f99567fa5c33
rh#682829
rh#738291
CVE-2011-3593kernel-source-rt:Not affectedmoderate ()CONFIRM:oss.oracle.com:CVE-2011-3593
CVE-2011-3593
MLIST:[oss-security] 20120305 CVE-2011-3593 kernel: vlan: fix panic when handling priority tagged frames
RH:CVE-2011-3593
RHSA-2011:1465
SMASH Issue 73105
UBUNTU:CVE-2011-3593
bnc#735347
https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=0e48f8daac293335e16e007663b9f4d248f89f0c
https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=fadca7bdc43b02f518585d9547019966415cadfd
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2011-3597perl:Unsupportedimportant ()BID:49911
CONFIRM:aix.software.ibm.com:CVE-2011-3597
CONFIRM:cpansearch.perl.org:CVE-2011-3597
CVE-2011-3597
MANDRIVA:MDVSA-2012:009
RH:CVE-2011-3597
RHSA-2011:1424
RHSA-2011:1797
SECUNIA:46279
SMASH Issue 73108
UBUNTU:CVE-2011-3597
bnc#721975
rh#743010
CVE-2011-3637kernel-source-rt:Unsupportedmoderate ()CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:git.kernel.org:CVE-2011-3637
CONFIRM:github.com:CVE-2011-3637
CVE-2011-3637
MISC:git.kernel.org:MLIST:[oss-security] 20120206 CVE-2011-3637 Linux kernel: proc: fix Oops on invalid /proc//maps access
MLIST:[oss-security] 20120206 CVE-2011-3637 Linux kernel: proc: fix Oops on invalid /proc//maps access
RH:CVE-2011-3637
RHSA-2012:0007
RHSA-2012:0010
SMASH Issue 73140
UBUNTU:CVE-2011-3637
bnc#740729
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=76597cd31470fa130784c78fadb4dab2e624a723
rh#747848
CVE-2011-4081kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2011-4081
CONFIRM:github.com:CVE-2011-4081
CONFIRM:www.kernel.org:CVE-2011-4594
CVE-2011-4081
MISC:bugs.gentoo.org:MLIST:[oss-security] 20111027 Re: CVE request: kernel: crypto: ghash: null pointer deref if no key is set
MISC:git.kernel.org:/
MISC:secunia.com:MLIST:[oss-security] 20111027 Re: CVE request: kernel: crypto: ghash: null pointer deref if no key is set
MLIST:[oss-security] 20111027 Re: CVE request: kernel: crypto: ghash: null pointer deref if no key is set
RH:CVE-2011-4081
RHSA-2012:0010
RHSA-2012:0350
SMASH Issue 73559
UBUNTU:CVE-2011-4081
bnc#726788
rh#749475
CVE-2011-4086kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2011-4086
CONFIRM:github.com:CVE-2011-4086
CONFIRM:www.kernel.org:CVE-2012-1179
CVE-2011-4086
DSA-2469
RH:CVE-2011-4086
RHSA-2012:0107
RHSA-2012:0571
RHSA-2012:0670
SMASH Issue 47233
SUSE:SUSE-SU-2012:0554
SUSE:SUSE-SU-2012:0616
UBUNTU:CVE-2011-4086
bnc#745832
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=15291164b22a357cb211b618adfef4fa82fc0de3
rh#749143
rh#814278
CVE-2011-4089bzip2:Analysismoderate ()CVE-2011-4089
EXPLOIT-DB:18147
FULLDISC:20111025 Re: Symlink vulnerabilities
MLIST:[oss-security] 20111028 Re: Request for CVE Identifier: bzexe insecure temporary file
RH:CVE-2011-4089
SMASH Issue 73565
UBUNTU:CVE-2011-4089
UBUNTU:USN-1308-1
bdo#632862
bnc#739136
CVE-2011-4110kernel-source-rt:Not affectedmoderate ()BID:50755
CONFIRM:git.kernel.org:CVE-2012-0810
CVE-2011-4110
CVE-2012-0810
DSA-2389
HP:HPSBGN02970
MLIST:[linux-kernel] 20111115 [PATCH] KEYS: Fix a NULL pointer deref in the user-defined key type
MLIST:[oss-security] 20111121 CVE-2011-4110 kernel: keys: NULL pointer deref in the user-defined key type
MLIST:[oss-security] 20111121 Re: CVE-2011-4110 kernel: keys: NULL pointer deref in the user-defined key type
MLIST:[oss-security] 20111122 Re: CVE-2011-4110 kernel: keys: NULL pointer deref in the user-defined key type
RH:CVE-2011-4110
RHSA-2011:1479
RHSA-2011:1530
RHSA-2012:0010
RHSA-2012:0116
RHSA-2012:0333
SECUNIA:47754
SMASH Issue 73578
UBUNTU:CVE-2011-4110
UBUNTU:USN-1324-1
UBUNTU:USN-1328-1
UBUNTU:USN-1344-1
bnc#734056
rh#751297
rh#794557
rh#814278
CVE-2011-4112kernel-source-rt:Unsupportedmoderate ()CONFIRM:downloads.avaya.com:CVE-2011-4326
CONFIRM:git.kernel.org:CVE-2011-4112
CONFIRM:github.com:CVE-2011-4112
CONFIRM:www.kernel.org:CVE-2011-4594
CVE-2011-4112
MLIST:[oss-security] 20111121 CVE-2011-4112 kernel: null ptr deref at dev_queue_xmit+0x35/0x4d0
RH:CVE-2011-4112
SMASH Issue 73580
UBUNTU:CVE-2011-4112
bnc#731649
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=550fd08c2cebad61c548def135f67aba284c6162
rh#751006
CVE-2011-4131kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2011-4131
CONFIRM:git.kernel.org:CVE-2012-0810
CONFIRM:github.com:CVE-2011-4131
CONFIRM:www.kernel.org:CVE-2012-2100
CVE-2011-4131
CVE-2012-0810
FEDORA:FEDORA-2012-8359
MLIST:[oss-security] 20111111 Re: CVE Request -- kernel: nfs4_getfacl decoding kernel oops
RH:CVE-2011-4131
RHSA-2012:0333
RHSA-2012:0862
RHSA-2012:1541
RHSA-2012:1580
RHSA-2013:0566
SECUNIA:48898
SMASH Issue 2062
SUSE:SUSE-SU-2012:0554
SUSE:openSUSE-SU-2013:0925
UBUNTU:CVE-2011-4131
bnc#653148
bnc#730117
bnc#762992
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bf118a342f10dafe44b14451a1392c3254629a1f
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#736425
rh#747106
rh#794557
rh#814278
rh#822754
rh#822869
rh#917012
rh#917013
rh#917017
CVE-2011-4132kernel-source-rt:Not affectedlow ()BID:50663
CONFIRM:git.kernel.org:CVE-2011-4132
CONFIRM:git.kernel.org:CVE-2012-0810
CVE-2011-4132
CVE-2012-0810
CVE-2023-2002
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:xorl.wordpress.com:CVE-2011-4132
MLIST:[oss-security] 20111111 CVE Request -- kernel: jbd/jbd2: invalid value of first log block leads to oops
MLIST:[oss-security] 20111113 Re: CVE Request -- kernel: jbd/jbd2: invalid value of first log block leads to oops
OSS:2023/04/16/3
RH:CVE-2011-4132
RHSA-2012:0007
RHSA-2012:0010
RHSA-2012:0333
RHSA-2012:0350
SECTRACK:1026325
SMASH Issue 47905
SUSE:SUSE-SU-2012:0554
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2011-4132
bnc#730118
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=8762202dd0d6e46854f786bdb6fb3780a1625efe
rh#753341
rh#794557
rh#814278
CVE-2011-4324kernel-source-rt:Not affectedmoderate ()CONFIRM:ftp.osuosl.org:CVE-2011-4348
CONFIRM:git.kernel.org:CVE-2011-4324
CONFIRM:github.com:CVE-2011-4324
CVE-2011-4324
MLIST:[oss-security] 20120206 Re: CVE-2011-4324 kernel: nfsv4: mknod(2) DoS
RH:CVE-2011-4324
RHSA-2012:0007
SMASH Issue 73775
UBUNTU:CVE-2011-4324
bnc#732613
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dc0b027dfadfcb8a5504f7d8052754bf8d501ab9
rh#755440
CVE-2011-4326kernel-source-rt:Not affectedimportant ()BID:50751
CONFIRM:downloads.avaya.com:CVE-2011-4326
CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:git.kernel.org:CVE-2011-4326
CONFIRM:github.com:CVE-2011-4326
CVE-2011-4326
MISC:git.kernel.org:/
MLIST:[oss-security] 20111121 Re: CVE Request -- kernel: wrong headroom check in udp6_ufo_fragment()
RH:CVE-2011-4326
RHSA-2011:1465
RHSA-2012:0010
SMASH Issue 46256
UBUNTU:CVE-2011-4326
bnc#732021
rh#682066
rh#755584
CVE-2011-4327openssh:Unsupportedmoderate ()CONFIRM:www.openssh.com:CVE-2011-4327
CVE-2011-4327
RH:CVE-2011-4327
SMASH Issue 73777
UBUNTU:CVE-2011-4327
bnc#691400
rh#755640
CVE-2011-4348kernel-source-rt:Not affectedimportant ()CONFIRM:ftp.osuosl.org:CVE-2011-4348
CONFIRM:git.kernel.org:CVE-2011-4348
CONFIRM:github.com:CVE-2011-4348
CVE-2011-4348
MISC:git.kernel.org:/
MLIST:[oss-security] 20120305 CVE-2011-4348 kernel: incomplete fix for CVE-2011-2482
RH:CVE-2011-4348
RHSA-2012:0007
SMASH Issue 73793
UBUNTU:CVE-2011-4348
bnc#750395
rh#757143
CVE-2011-4594kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2011-4594
CONFIRM:github.com:CVE-2011-4594
CONFIRM:www.kernel.org:CVE-2011-4594
CVE-2011-4594
MLIST:[oss-security] 20111208 Re: CVE Request -- kernel: send(m)msg: user pointer dereferences
RH:CVE-2011-4594
RHSA-2012:0350
SMASH Issue 74030
UBUNTU:CVE-2011-4594
bnc#735810
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bc909d9ddbf7778371e36a651d6e4194b1cc7d4c
rh#761646
CVE-2011-4604kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2011-4604
CONFIRM:github.com:CVE-2011-4604
CONFIRM:www.kernel.org:CVE-2013-1773
CVE-2011-4604
MISC:lists.open-mesh.org:MLIST:[oss-security] 20111211 Fwd: Re: cve request: bat_socket_read memory corruption
MLIST:[b.a.t.m.a.n] 20111210 bat_socket_read missing checks
MLIST:[oss-security] 20111211 Fwd: Re: cve request: bat_socket_read memory corruption
RH:CVE-2011-4604
SMASH Issue 2063
SUSE:openSUSE-SU-2013:0925
UBUNTU:CVE-2011-4604
bnc#736149
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b5a1eeef04cc7859f34dec9b72ea1b28e4aba07c
rh#767495
rh#814278
rh#917012
rh#917013
rh#917017
CVE-2011-4611kernel-source-rt:Not affectedmoderate ()CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:git.kernel.org:CVE-2011-4611
CONFIRM:github.com:CVE-2011-4611
CVE-2011-4611
DSA-2389
MLIST:[oss-security] 20111215 Re: CVE request - kernel: perf, powerpc: Handle events that raise an exception without overflowing
RH:CVE-2011-4611
RHSA-2012:0350
SMASH Issue 74041
UBUNTU:CVE-2011-4611
bnc#744023
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0837e3242c73566fc1c0196b4ec61779c25ffc93
rh#740465
rh#767914
CVE-2011-4913kernel-source-rt:Unsupportedimportant ()CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:github.com:CVE-2011-4913
CVE-2011-4913
MLIST:[oss-security] 20111227 Re: CVE request: kernel: multiple issues in ROSE
RH:CVE-2011-4913
SMASH Issue 74329
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2011-4913
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=be20250c13f88375345ad99950190685eda51eb8
rh#770777
CVE-2011-4914kernel-source-rt:Unsupportedmoderate ()CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:git.kernel.org:CVE-2011-4914
CONFIRM:github.com:CVE-2011-4914
CVE-2011-4914
DSA-2389
MLIST:[oss-security] 20111227 Re: CVE request: kernel: multiple issues in ROSE
RH:CVE-2011-4914
SMASH Issue 74330
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2011-4914
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0bccd315db0c2f919e7fcf9cb60db21d9986f52
rh#770777
CVE-2011-5321kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2011-5321
CONFIRM:github.com:CVE-2011-5321
CONFIRM:www.kernel.org:CVE-2011-5321
CVE-2011-5321
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20150313 Re: CVE request: Linux kernel: tty: kobject reference leakage in tty_open
RH:CVE-2011-5321
RHSA-2015:1221
SMASH Issue 114768
UBUNTU:CVE-2011-5321
bnc#922447
rh#1201887
CVE-2011-5325busybox:Releasedmoderate ()BUGTRAQ:20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
CVE-2011-5325
FULLDISC:20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
FULLDISC:20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S
MISC:bugs.busybox.net:MLIST:[oss-security] 20151021 Re: CVE Request: BusyBox tar directory traversal
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.busybox.net:MLIST:[oss-security] 20151021 Re: CVE Request: BusyBox tar directory traversal
MISC:packetstormsecurity.com:CVE-2010-0296
MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update
MLIST:[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update
MLIST:[oss-security] 20151021 Re: CVE Request: BusyBox tar directory traversal
OSS:2015/Q4/121
RH:CVE-2011-5325
SMASH Issue 158040
UBUNTU:CVE-2011-5325
USN-3935-1
bnc#951562
rh#1274215
CVE-2012-0028kernel-source-rt:Not affectedimportant ()CONFIRM:ftp.osuosl.org:CVE-2012-0028
CONFIRM:git.kernel.org:CVE-2012-0028
CONFIRM:github.com:CVE-2012-0028
CVE-2012-0028
MLIST:[oss-security] 20120508 Re: CVE Request -- kernel: futex: clear robust_list on execve
RH:CVE-2012-0028
RHSA-2012:0107
RHSA-2012:0358
SMASH Issue 50397
UBUNTU:CVE-2012-0028
bnc#739721
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8141c7f3e7aee618312fa1c15109e1219de784a7
rh#771764
CVE-2012-0056kernel-source-rt:Not affectedmoderate ()BID:51625
CERT-VN:VU#470151
CONFIRM:git.kernel.org:CVE-2012-0056
CONFIRM:www.kernel.org:CVE-2012-2100
CVE-2012-0056
MISC:blog.zx2c4.com:CVE-2012-0056
MISC:git.kernel.org:/
MLIST:[oss-security] 20120117 Re: CVE request: kernel: proc: clean up and fix /proc//mem handling
MLIST:[oss-security] 20120118 CVE request: kernel: proc: clean up and fix /proc//mem handling
MLIST:[oss-security] 20120119 Re: CVE request: kernel: proc: clean up and fix /proc//mem handling
MLIST:[oss-security] 20120122 Re: CVE request: kernel: proc: clean up and fix /proc//mem handling
RH:CVE-2012-0056
RHSA-2012:0052
RHSA-2012:0061
SECUNIA:47708
SMASH Issue 50436
UBUNTU:CVE-2012-0056
UBUNTU:USN-1336-1
bnc#742028
bnc#742279
bnc#743048
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#782642
rh#822754
CVE-2012-0058kernel-source-rt:Not affectedmoderate ()CONFIRM:github.com:CVE-2012-0058
CONFIRM:www.kernel.org:CVE-2012-2100
CVE-2012-0058
HP:HPSBGN02970
MLIST:[oss-security] 20120117 Re: CVE request: kernel: Unused iocbs in a batch should not be accounted as active
RH:CVE-2012-0058
SECTRACK:1027085
SMASH Issue 50442
UBUNTU:CVE-2012-0058
bnc#742030
rh#782696
CVE-2012-0207kernel-source-rt:Ignoreimportant ()CONFIRM:bugs.debian.org
CONFIRM:git.kernel.org:CVE-2012-0207
CONFIRM:git.kernel.org:CVE-2012-0810
CONFIRM:github.com:CVE-2012-0207
CONFIRM:www.kernel.org:CVE-2012-0207
CVE-2012-0207
CVE-2012-0810
MLIST:[oss-security] 20120110 CVE-2012-0207 kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries
RH:CVE-2012-0207
RHSA-2012:0107
RHSA-2012:0168
RHSA-2012:0333
RHSA-2012:0350
RHSA-2012:0422
SMASH Issue 50651
UBUNTU:CVE-2012-0207
bdo#654876
bnc#740448
rh#772867
rh#794557
rh#814278
CVE-2012-0810kernel-source-rt:Not affectedmoderate ()BID:50663
BID:50755
BID:51371
CONFIRM:bugs.debian.org
CONFIRM:git.kernel.org:CVE-2011-2918
CONFIRM:git.kernel.org:CVE-2011-4127
CONFIRM:git.kernel.org:CVE-2011-4131
CONFIRM:git.kernel.org:CVE-2011-4132
CONFIRM:git.kernel.org:CVE-2012-0038
CONFIRM:git.kernel.org:CVE-2012-0044
CONFIRM:git.kernel.org:CVE-2012-0207
CONFIRM:git.kernel.org:CVE-2012-0810
CONFIRM:github.com:CVE-2011-2918
CONFIRM:github.com:CVE-2011-4097
CONFIRM:github.com:CVE-2011-4127
CONFIRM:github.com:CVE-2011-4131
CONFIRM:github.com:CVE-2012-0038
CONFIRM:github.com:CVE-2012-0044
CONFIRM:github.com:CVE-2012-0207
CONFIRM:www.kernel.org:CVE-2011-4594
CONFIRM:www.kernel.org:CVE-2012-0038
CONFIRM:www.kernel.org:CVE-2012-0044
CONFIRM:www.kernel.org:CVE-2012-0207
CONFIRM:www.kernel.org:CVE-2012-2100
CONFIRM:www.kernel.org:CVE-2014-2889
CVE-2011-2918
CVE-2011-4077
CVE-2011-4097
CVE-2011-4110
CVE-2011-4127
CVE-2011-4131
CVE-2011-4132
CVE-2012-0038
CVE-2012-0044
CVE-2012-0207
CVE-2012-0810
CVE-2023-2002
DSA-2303
DSA-2389
FEDORA:FEDORA-2012-8359
HP:HPSBGN02970
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:xorl.wordpress.com:CVE-2011-4077
MISC:xorl.wordpress.com:CVE-2011-4132
MLIST:[linux-kernel] 20111115 [PATCH] KEYS: Fix a NULL pointer deref in the user-defined key type
MLIST:[oss-security] 20110816 Re: CVE request -- kernel: perf: fix software event overflow
MLIST:[oss-security] 20111026 CVE Request -- kernel: xfs: potential buffer overflow in xfs_readlink()
MLIST:[oss-security] 20111026 Re: CVE Request -- kernel: xfs: potential buffer overflow in xfs_readlink()
MLIST:[oss-security] 20111031 Re: CVE request: kernel: oom: fix integer overflow of points in oom_badness
MLIST:[oss-security] 20111111 CVE Request -- kernel: jbd/jbd2: invalid value of first log block leads to oops
MLIST:[oss-security] 20111111 Re: CVE Request -- kernel: nfs4_getfacl decoding kernel oops
MLIST:[oss-security] 20111113 Re: CVE Request -- kernel: jbd/jbd2: invalid value of first log block leads to oops
MLIST:[oss-security] 20111121 CVE-2011-4110 kernel: keys: NULL pointer deref in the user-defined key type
MLIST:[oss-security] 20111121 Re: CVE-2011-4110 kernel: keys: NULL pointer deref in the user-defined key type
MLIST:[oss-security] 20111122 Re: CVE-2011-4110 kernel: keys: NULL pointer deref in the user-defined key type
MLIST:[oss-security] 20111222 CVE-2011-4127 kernel: possible privilege escalation via SG_IO ioctl
MLIST:[oss-security] 20120110 CVE-2012-0207 kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries
MLIST:[oss-security] 20120110 Re: CVE request: kernel: xfs heap overflow
MLIST:[oss-security] 20120111 Re: CVE request - kernel: drm: integer overflow in drm_mode_dirtyfb_ioctl()
MLIST:[xfs] 20111018 [PATCH] Fix possible memory corruption in xfs_readlink
OSS:2023/04/16/3
RH:CVE-2011-2918
RH:CVE-2011-4077
RH:CVE-2011-4097
RH:CVE-2011-4110
RH:CVE-2011-4127
RH:CVE-2011-4131
RH:CVE-2011-4132
RH:CVE-2012-0038
RH:CVE-2012-0044
RH:CVE-2012-0207
RH:CVE-2012-0810
RHSA-2011:1350
RHSA-2011:1479
RHSA-2011:1530
RHSA-2011:1849
RHSA-2011:1850
RHSA-2012:0007
RHSA-2012:0010
RHSA-2012:0107
RHSA-2012:0116
RHSA-2012:0168
RHSA-2012:0333
RHSA-2012:0350
RHSA-2012:0358
RHSA-2012:0422
RHSA-2012:0743
RHSA-2012:0862
RHSA-2012:1042
RHSA-2012:1541
RHSA-2012:1580
RHSA-2013:0566
SECTRACK:1026325
SECUNIA:47754
SECUNIA:48898
SMASH Issue 2062
SMASH Issue 2979
SMASH Issue 45517
SMASH Issue 47904
SMASH Issue 47905
SMASH Issue 47906
SMASH Issue 47907
SMASH Issue 50416
SMASH Issue 50651
SMASH Issue 73570
SMASH Issue 73578
SMASH Issue 73595
SUSE:SUSE-SU-2012:0554
SUSE:SUSE-SU-2015:0812
SUSE:openSUSE-SU-2013:0925
UBUNTU:CVE-2011-2918
UBUNTU:CVE-2011-4077
UBUNTU:CVE-2011-4097
UBUNTU:CVE-2011-4110
UBUNTU:CVE-2011-4127
UBUNTU:CVE-2011-4131
UBUNTU:CVE-2011-4132
UBUNTU:CVE-2012-0038
UBUNTU:CVE-2012-0044
UBUNTU:CVE-2012-0207
UBUNTU:CVE-2012-0810
UBUNTU:USN-1324-1
UBUNTU:USN-1328-1
UBUNTU:USN-1344-1
UBUNTU:USN-1555-1
UBUNTU:USN-1556-1
bdo#654876
bnc#653148
bnc#712366
bnc#726600
bnc#727493
bnc#730117
bnc#730118
bnc#734056
bnc#738400
bnc#740448
bnc#740703
bnc#740745
bnc#749118
bnc#762992
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=093019cf1b18dd31b2c3b77acce4e000e2cbc9ce
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a8b0ca17b80e92faab46ee7179ba9e99ccb61233
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bf118a342f10dafe44b14451a1392c3254629a1f
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fa8b18edd752a8b4e9d1ee2cd615b82c93cf8bba
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=8762202dd0d6e46854f786bdb6fb3780a1625efe
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#730706
rh#736425
rh#747106
rh#749156
rh#750399
rh#751297
rh#752375
rh#753341
rh#772867
rh#772894
rh#773280
rh#794557
rh#814278
rh#822754
rh#822869
rh#917012
rh#917013
rh#917017
CVE-2012-0879kernel-source-rt:Not affectedmoderate ()CONFIRM:ftp.osuosl.org:CVE-2012-0879
CONFIRM:git.kernel.org:CVE-2012-0879
CONFIRM:github.com:CVE-2012-0879
CVE-2012-0879
DSA-2469
HP:HPSBGN02970
MLIST:[oss-security] 20120223 Re: CVE request -- kernel: block: CLONE_IO io_context refcounting issues
RH:CVE-2012-0879
RHSA-2012:0481
RHSA-2012:0531
SECTRACK:1027086
SECUNIA:48545
SECUNIA:48842
SMASH Issue 47235
SUSE:SUSE-SU-2012:0616
UBUNTU:CVE-2012-0879
UBUNTU:USN-1408-1
UBUNTU:USN-1410-1
UBUNTU:USN-1411-1
bnc#748812
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=61cc74fbb87af6aa551a06a370590c9bc07e29d9
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b69f2292063d2caf37ca9aec7d63ded203701bf3
rh#796829
CVE-2012-0957kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2012-0957
CONFIRM:www.kernel.org:CVE-2012-4508
CVE-2012-0957
FEDORA:FEDORA-2012-17479
MLIST:[oss-security] 20121009 Linux kernel stack memory content leak via UNAME26
RH:CVE-2012-0957
RHSA-2012:1491
SECUNIA:51409
SMASH Issue 2067
UBUNTU:CVE-2012-0957
UBUNTU:USN-1644-1
UBUNTU:USN-1645-1
UBUNTU:USN-1646-1
UBUNTU:USN-1647-1
UBUNTU:USN-1648-1
UBUNTU:USN-1649-1
UBUNTU:USN-1652-1
bnc#783515
bnc#783606
linux.git:commit:2702b1526c7278c4d65d78de209a465d4de2885e
rh#862877
CVE-2012-1088iproute2:Unsupportedlow ()CONFIRM:git.kernel.org:CVE-2012-1088
CVE-2012-1088
D:CVE-2012-1088
HP:HPSBGN02970
RH:CVE-2012-1088
SMASH Issue 74830
UBUNTU:CVE-2012-1088
bnc#749293
http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git%3Ba=commit%3Bh=20ed7b24df05eadf83168d1d0ce0052a31380928
http://git.kernel.org/?p=linux/kernel/git/shemminger/iproute2.git%3Ba=commit%3Bh=e557d1ac3a156ba7521ba44b0b412af4542f83f8
rh#797878
CVE-2012-1090kernel-source-rt:Not affectedmoderate ()CONFIRM:github.com:CVE-2012-1090
CONFIRM:www.kernel.org:CVE-2012-1146
CVE-2012-1090
DSA-2443
MLIST:[oss-security] 20120228 Re: CVE request -- kernel: cifs: dentry refcount leak when opening a FIFO on lookup leads to panic on unmount
RH:CVE-2012-1090
RHSA-2012:0481
RHSA-2012:0531
SECUNIA:48842
SECUNIA:48964
SMASH Issue 47236
SUSE:SUSE-SU-2012:0554
SUSE:SUSE-SU-2012:0616
UBUNTU:CVE-2012-1090
bnc#749569
rh#798293
rh#814278
CVE-2012-1097kernel-source-rt:Ignoreimportant ()CONFIRM:git.kernel.org:CVE-2012-1097
CONFIRM:github.com:CVE-2012-1097
CONFIRM:www.kernel.org:CVE-2012-1146
CVE-2012-1097
DSA-2443
MLIST:[oss-security] 20120305 CVE-2012-1097 kernel: regset: Prevent null pointer reference on readonly regsets
RH:CVE-2012-1097
RHSA-2012:0481
RHSA-2012:0531
RHSA-2012:1042
SECUNIA:48842
SECUNIA:48898
SECUNIA:48964
SMASH Issue 47237
SUSE:SUSE-SU-2012:0554
SUSE:SUSE-SU-2012:0616
UBUNTU:CVE-2012-1097
bnc#750079
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c8e252586f8d5de906385d8cf6385fee289a825e
rh#799209
rh#814278
CVE-2012-1583kernel-source-rt:Not affectedmoderate ()BID:53139
CONFIRM:ftp.osuosl.org:CVE-2012-1583
CONFIRM:git.kernel.org:CVE-2012-1583
CONFIRM:github.com:CVE-2012-1583
CVE-2012-1583
HP:HPSBMU02776
MISC:git.kernel.org:/
RH:CVE-2012-1583
RHSA-2012:0480
RHSA-2012:0488
RHSA-2012:0720
SECTRACK:1026930
SECUNIA:48881
SMASH Issue 51895
UBUNTU:CVE-2012-1583
bnc#757707
rh#752304
CVE-2012-2119kernel-source-rt:Not affectedmoderate ()CONFIRM:bugzilla.redhat.com:CVE-2012-2119
CONFIRM:git.kernel.org:CVE-2012-2119
CONFIRM:github.com:CVE-2012-2119
CONFIRM:oss.oracle.com:CVE-2012-2119
CONFIRM:oss.oracle.com:CVE-2012-2372
CONFIRM:www.kernel.org:CVE-2012-3511
CVE-2012-2119
MLIST:[linux-netdev] 20120416 [PATCH 3/6] macvtap: zerocopy: validate vector length before pinning user pages
MLIST:[oss-security] 20120419 Re: CVE request -- kernel: macvtap: zerocopy: vector length is not validated before pinning user pages
RH:CVE-2012-2119
RHSA-2012:0743
SMASH Issue 2090
SUSE:openSUSE-SU-2013:0925
UBUNTU:CVE-2012-2119
UBUNTU:USN-1529-1
bnc#758243
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=814278
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b92946e2919134ebe2a4083e4302236295ea2a73
https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=4aae94d1c7b32316911c86176c0ed4f8ed62da73
rh#736425
rh#814278
rh#917012
rh#917013
rh#917017
CVE-2012-2121kernel-source-rt:Not affectedmoderate ()CONFIRM:github.com:CVE-2012-2121
CONFIRM:www.kernel.org:CVE-2012-2121
CVE-2012-2121
DSA-2668
MISC:git.kernel.org:MLIST:[oss-security] 20120419 Re: CVE request -- kernel: kvm: device assignment page leak
MLIST:[oss-security] 20120419 Re: CVE request -- kernel: kvm: device assignment page leak
RH:CVE-2012-2121
RHSA-2012:0676
RHSA-2012:0743
SECTRACK:1027083
SECUNIA:50732
SMASH Issue 52343
UBUNTU:CVE-2012-2121
UBUNTU:USN-1577-1
UBUNTU:USN-2036-1
UBUNTU:USN-2037-1
bnc#758355
rh#814149
CVE-2012-2123kernel-source-rt:Not affectedimportant ()BID:53166
CONFIRM:git.kernel.org:CVE-2012-2123
CONFIRM:github.com:CVE-2012-2123
CONFIRM:www.kernel.org:CVE-2012-2123
CVE-2012-2123
DSA-2469
MLIST:[oss-security] 20120419 Re: CVE request: kernel: fcaps: clear the same personality flags as suid when fcaps are used
RH:CVE-2012-2123
RHSA-2012:0670
RHSA-2012:0743
SECTRACK:1027072
SMASH Issue 47908
UBUNTU:CVE-2012-2123
XF:linux-kernel-fcaps-sec-bypass(75043)
bnc#758260
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d52fc5dde171f030170a6cb78034d166b13c9445
rh#736425
rh#806722
rh#814278
CVE-2012-2127kernel-source-rt:Not affectedimportant ()BID:55774
CONFIRM:git.kernel.org:CVE-2012-2127
CONFIRM:github.com:CVE-2012-2127
CONFIRM:www.kernel.org:CVE-2012-2127
CONFIRM:www.kernel.org:CVE-2012-5517
CVE-2012-2127
MLIST:[oss-security] 20120420 Re: CVE request: pid namespace leak in kernel 3.0 and 3.1
MLIST:[oss-security] 20120422 Re: Re: CVE request: pid namespace leak in kernel 3.0 and 3.1
RH:CVE-2012-2127
SMASH Issue 52345
UBUNTU:CVE-2012-2127
UBUNTU:USN-1594-1
UBUNTU:USN-1607-1
bnc#757783
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=905ad269c55fc62bee3da29f7b1d1efeba8aa1e1
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#736425
rh#814278
rh#815188
rh#822754
CVE-2012-2133kernel-source-rt:Not affectedmoderate ()BID:53233
CONFIRM:git.kernel.org:CVE-2012-2133
CONFIRM:github.com:CVE-2012-2133
CONFIRM:www.kernel.org:CVE-2012-2133
CVE-2012-2133
DSA-2469
MISC:git.kernel.org:/
MISC:git.kernel.org:MLIST:[oss-security] 20120424 Re: CVE Request: use after free bug in "quota" handling in hugetlb code
MLIST:[oss-security] 20120424 Re: CVE Request: use after free bug in "quota" handling in hugetlb code
RH:CVE-2012-2133
RHSA-2012:1426
RHSA-2012:1491
RHSA-2013:0741
SMASH Issue 47238
SUSE:SUSE-SU-2012:0616
UBUNTU:CVE-2012-2133
XF:linux-kernel-hugepages-dos(75168)
bnc#758532
bnc#760855
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#815065
rh#817430
rh#822754
CVE-2012-2136kernel-source-rt:Not affectedimportant ()BID:53721
CONFIRM:git.kernel.org:CVE-2012-2136
CONFIRM:github.com:CVE-2012-2136
CONFIRM:www.kernel.org:CVE-2012-3511
CVE-2012-2136
MISC:git.kernel.org:/
RH:CVE-2012-2136
RHSA-2012:0690
RHSA-2012:0743
RHSA-2012:1087
SECUNIA:50807
SMASH Issue 52350
UBUNTU:CVE-2012-2136
UBUNTU:USN-1529-1
UBUNTU:USN-1535-1
bnc#765320
rh#736425
rh#814278
rh#816289
CVE-2012-2137kernel-source-rt:Not affectedmoderate ()BID:54063
CONFIRM:git.kernel.org:CVE-2012-2137
CONFIRM:www.kernel.org:CVE-2012-6638
CVE-2012-2137
HP:HPSBGN02970
MISC:ubuntu.5.n6.nabble.com:CVE-2012-2137
RH:CVE-2012-2137
RHSA-2012:0743
SECUNIA:50952
SECUNIA:50961
SMASH Issue 2091
SUSE:openSUSE-SU-2013:0925
UBUNTU:CVE-2012-2137
UBUNTU:USN-1529-1
UBUNTU:USN-1594-1
UBUNTU:USN-1606-1
UBUNTU:USN-1607-1
UBUNTU:USN-1609-1
bnc#767612
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=f2ebd422f71cda9c791f76f85d2ca102ae34a1ed
rh#1007690
rh#742846
rh#814278
rh#816151
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2012-2313kernel-source-rt:Not affectedmoderate ()BID:53965
CONFIRM:git.kernel.org:CVE-2012-2313
CONFIRM:github.com:CVE-2012-2313
CONFIRM:www.kernel.org:CVE-2012-2313
CVE-2012-2313
CVE-2023-2002
HP:HPSBGN02970
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20120504 Re: CVE Request: more tight ioctl permissions in dl2k driver
OSS:2023/04/16/3
RH:CVE-2012-2313
RHSA-2012:1174
RHSA-2012:1282
RHSA-2012:1304
RHSA-2012:1481
RHSA-2012:1541
RHSA-2012:1589
SMASH Issue 52470
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2012-2313
bnc#758813
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1bb57e940e1958e40d51f2078f50c3a96a9b2d75
rh#1007690
rh#1067558
rh#1094232
rh#736425
rh#814278
rh#818820
CVE-2012-2372kernel-source-rt:Not affectedmoderate ()BID:54062
CVE-2012-2372
HP:HPSBGN02970
RH:CVE-2012-2372
RHSA-2012:0743
RHSA-2012:1540
SMASH Issue 102971
SUSE:SUSE-SU-2012:1679
UBUNTU:CVE-2012-2372
UBUNTU:USN-1529-1
UBUNTU:USN-1555-1
UBUNTU:USN-1556-1
bnc#767610
https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=c7b6a0a1d8d636852be130fa15fa8be10d4704e8
rh#1007690
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2012-2375kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2012-2375
CONFIRM:github.com:CVE-2012-2375
CONFIRM:www.kernel.org:CVE-2012-2745
CVE-2012-2375
HP:HPSBGN02970
MISC:git.kernel.org:/
MLIST:[oss-security] 20120518 Re: CVE Request -- kernel: incomplete fix for CVE-2011-4131
RH:CVE-2012-2375
RHSA-2012:1580
RHSA-2013:0566
RHSA-2013:1645
RHSA-2014:0284
SMASH Issue 52522
UBUNTU:CVE-2012-2375
bnc#851103
rh#1007690
rh#1031678
rh#742846
rh#822754
rh#822869
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2012-2383kernel-source-rt:Not affectedmoderate ()BID:53971
CONFIRM:git.kernel.org:CVE-2012-2383
CONFIRM:github.com:CVE-2012-2383
CONFIRM:www.kernel.org:CVE-2012-2384
CVE-2012-2383
HP:HPSBGN02970
MISC:git.kernel.org:/
MLIST:[oss-security] 20120522 Re: CVE Request: some drm overflow checks
RH:CVE-2012-2383
RHSA-2012:1156
SMASH Issue 47909
UBUNTU:CVE-2012-2383
bnc#763194
rh#824176
CVE-2012-2384kernel-source-rt:Not affectedmoderate ()BID:53971
CONFIRM:git.kernel.org:CVE-2012-2384
CONFIRM:github.com:CVE-2012-2384
CONFIRM:www.kernel.org:CVE-2012-2384
CVE-2012-2384
HP:HPSBGN02970
MISC:git.kernel.org:/
MLIST:[oss-security] 20120522 Re: CVE Request: some drm overflow checks
RH:CVE-2012-2384
RHSA-2012:1304
SMASH Issue 47910
UBUNTU:CVE-2012-2384
bnc#763194
rh#824178
CVE-2012-2390kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2012-2390
CONFIRM:github.com:CVE-2012-2390
CONFIRM:www.kernel.org:CVE-2012-2390
CVE-2012-2390
MISC:git.kernel.org:/
MLIST:[oss-security] 20120523 Re: CVE Request -- kernel: huge pages: memory leak on mmap failure
RH:CVE-2012-2390
RHSA-2012:1150
RHSA-2012:1304
SMASH Issue 47911
UBUNTU:CVE-2012-2390
UBUNTU:USN-1515-1
UBUNTU:USN-1535-1
bnc#764150
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#822754
rh#824345
CVE-2012-2744kernel-source-rt:Not affectedimportant ()BID:54367
CONFIRM:ftp.osuosl.org:CVE-2013-2128
CONFIRM:git.kernel.org:CVE-2012-2744
CONFIRM:github.com:CVE-2012-2744
CVE-2012-2744
MISC:git.kernel.org:/
RH:CVE-2012-2744
RHSA-2012:1064
RHSA-2012:1114
RHSA-2012:1129
RHSA-2012:1148
SECTRACK:1027235
SECUNIA:49928
SMASH Issue 48302
UBUNTU:CVE-2012-2744
bnc#770697
rh#833402
CVE-2012-2745kernel-source-rt:Not affectedmoderate ()BID:54365
CONFIRM:git.kernel.org:CVE-2012-2745
CONFIRM:github.com:CVE-2012-2745
CONFIRM:www.kernel.org:CVE-2012-2745
CVE-2012-2745
RH:CVE-2012-2745
RHSA-2012:1064
SECTRACK:1027236
SECUNIA:50633
SECUNIA:50853
SMASH Issue 48204
UBUNTU:CVE-2012-2745
UBUNTU:USN-1567-1
UBUNTU:USN-1597-1
UBUNTU:USN-1606-1
bnc#770695
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=79549c6dfda0603dba9a70a53467ce62d9335c33
rh#1007690
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#742846
rh#822754
rh#833428
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2012-3375kernel-source-rt:Not affectedmoderate ()CONFIRM:downloads.avaya.com:CVE-2012-3375
CONFIRM:git.kernel.org:CVE-2012-3375
CONFIRM:github.com:CVE-2012-3375
CONFIRM:www.kernel.org:CVE-2012-6638
CVE-2012-3375
MLIST:[oss-security] 20120704 Re: CVE Request -- kernel: epoll: can leak file descriptors when returning -ELOOP
RH:CVE-2012-3375
RHSA-2012:1061
RHSA-2012:1150
SECTRACK:1027237
SECUNIA:51164
SMASH Issue 53213
UBUNTU:CVE-2012-3375
UBUNTU:USN-1529-1
bnc#769896
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13d518074a952d33d47c428419693f63389547e9
rh#1007690
rh#742846
rh#814278
rh#822754
rh#837502
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2012-3400kernel-source-rt:Ignoreimportant ()CONFIRM:git.kernel.org:CVE-2012-3400
CONFIRM:github.com:CVE-2012-3400
CONFIRM:kb.juniper.net:CVE-2012-3400
CONFIRM:www.kernel.org:CVE-2012-3511
CVE-2012-3400
CVE-2023-2002
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20120709 Re: CVE Request: Stability fixes in UDF Logical Volume Descriptor handling
OSS:2023/04/16/3
RH:CVE-2012-3400
RHSA-2012:1426
RHSA-2012:1491
RHSA-2013:0594
SECUNIA:50506
SMASH Issue 53236
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2012-3400
UBUNTU:USN-1529-1
UBUNTU:USN-1555-1
UBUNTU:USN-1556-1
UBUNTU:USN-1557-1
bnc#769784
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1df2ae31c724e57be9d7ac00d78db8a5dabdd050
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=adee11b2085bee90bd8f4f52123ffb07882d6256
rh#814278
rh#843139
CVE-2012-3412kernel-source-rt:Ignoreimportant ()CONFIRM:github.com:CVE-2012-3412
CONFIRM:www.kernel.org:CVE-2012-3520
CVE-2012-3412
MLIST:[oss-security] 20120803 Remote DoS in Linux sfc driver through TCP MSS option (CVE-2012-3412)
RH:CVE-2012-3412
RHSA-2012:1323
RHSA-2012:1324
RHSA-2012:1347
RHSA-2012:1366
RHSA-2012:1375
RHSA-2012:1401
RHSA-2012:1430
SECUNIA:50633
SECUNIA:50732
SECUNIA:50811
SECUNIA:51193
SMASH Issue 48587
SMASH Issue 91283
SUSE:SUSE-SU-2012:1679
SUSE:openSUSE-SU-2012:1330
UBUNTU:CVE-2012-3412
UBUNTU:USN-1567-1
UBUNTU:USN-1568-1
UBUNTU:USN-1572-1
UBUNTU:USN-1575-1
UBUNTU:USN-1577-1
UBUNTU:USN-1578-1
UBUNTU:USN-1579-1
UBUNTU:USN-1580-1
bnc#774523
linux.git:commit:30b678d844af3305cda5953467005cebb5d7b687
linux.git:commit:7e6d06f0de3f74ca929441add094518ae332257c
rh#1007690
rh#1667782
rh#1686136
rh#742846
rh#822754
rh#844714
rh#850449
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2012-3430kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2012-3430
CONFIRM:github.com:CVE-2012-3430
CONFIRM:www.kernel.org:CVE-2012-3430
CVE-2012-3430
MLIST:[oss-security] 20120726 Re: CVE Request -- kernel: recv{from,msg}() on an rds socket can leak kernel memory
RH:CVE-2012-3430
RHSA-2012:1304
RHSA-2012:1323
RHSA-2012:1491
SMASH Issue 48434
SMASH Issue 48438
SUSE:SUSE-SU-2012:1679
UBUNTU:CVE-2012-3430
UBUNTU:USN-1567-1
UBUNTU:USN-1568-1
UBUNTU:USN-1572-1
UBUNTU:USN-1575-1
UBUNTU:USN-1577-1
UBUNTU:USN-1578-1
UBUNTU:USN-1579-1
UBUNTU:USN-1580-1
bnc#773383
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06b6a1cf6e776426766298d055bb3991957d90a7
rh#1007690
rh#1667782
rh#1686136
rh#562582
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#742846
rh#820039
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2012-3520kernel-source-rt:Not affectedlow ()BID:55152
CONFIRM:git.kernel.org:CVE-2012-3520
CONFIRM:www.kernel.org:CVE-2012-3520
CONFIRM:www.oracle.com:CVE-2015-1351
CVE-2012-3520
MISC:git.kernel.org:MLIST:[oss-security] 20120822 CVE-2012-3520 kernel: af_netlink: invalid handling of SCM_CREDENTIALS passing
MLIST:[oss-security] 20120822 CVE-2012-3520 kernel: af_netlink: invalid handling of SCM_CREDENTIALS passing
RH:CVE-2012-3520
RHSA-2012:1491
SECUNIA:50848
SMASH Issue 53316
SUSE:openSUSE-SU-2012:1330
SUSE:openSUSE-SU-2013:0261
UBUNTU:CVE-2012-3520
UBUNTU:USN-1599-1
UBUNTU:USN-1610-1
bnc#776925
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea
linux.git:commit:8f8ba75ee2065738644382667f833a4eb6f6db1d
linux.git:commit:e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea
rh#850449
CVE-2012-3552kernel-source-rt:Not affectedimportant ()CONFIRM:ftp.osuosl.org:CVE-2012-3552
CONFIRM:git.kernel.org:CVE-2012-3552
CONFIRM:github.com:CVE-2012-3552
CVE-2012-3552
DSA-2668
MISC:git.kernel.org:MLIST:[oss-security] 20120831 Re: CVE Request -- kernel: net: slab corruption due to improper synchronization around inet->opt
MLIST:[oss-security] 20120831 Re: CVE Request -- kernel: net: slab corruption due to improper synchronization around inet->opt
RH:CVE-2012-3552
RHSA-2012:1304
RHSA-2012:1540
RHSA-2013:1166
RHSA-2013:1173
RHSA-2013:1195
RHSA-2013:1450
SMASH Issue 53339
UBUNTU:CVE-2012-3552
bnc#778460
bnc#827565
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f6d8bd051c391c1c0458a30b2a7abcd939329259
rh#853465
rh#979936
CVE-2012-4398kernel-source-rt:Not affectedmoderate ()BID:55361
CONFIRM:www.kernel.org:CVE-2012-4398
CVE-2012-4398
CVE-2023-2002
MISC:bugs.launchpad.net:MLIST:[oss-security] 20120902 CVE Request -- kernel: request_module() OOM local DoS
MISC:git.kernel.org:MLIST:[oss-security] 20141024 kvm issues
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-kernel] 20120207 [PATCH 5/5] kmod: make __request_module() killable
MLIST:[oss-security] 20120902 CVE Request -- kernel: request_module() OOM local DoS
OSS:2023/04/16/3
RH:CVE-2012-4398
RHSA-2012:1282
RHSA-2013:0223
RHSA-2013:1348
RHSA-2015:2152
SECUNIA:55077
SMASH Issue 53878
UBUNTU:CVE-2012-4398
UBUNTU:CVE-2014-3646
UBUNTU:CVE-2014-3647
UBUNTU:CVE-2014-3673
UBUNTU:CVE-2014-7841
bnc#778463
bnc#779488
linux.git:commit:786235eeba0e1e85e5cbbb9f97d1087ad03dfa21
rh#1113899
rh#1163762
rh#853474
CVE-2012-4444kernel-source-rt:Not affectedmoderate ()CONFIRM:ftp.osuosl.org:CVE-2012-4444
CONFIRM:git.kernel.org:CVE-2012-4444
CONFIRM:github.com:CVE-2012-4444
CVE-2012-4444
MISC:git.kernel.org:MLIST:[oss-security] 20121109 Re: CVE request --- acceptation of overlapping ipv6 fragments
MISC:media.blackhat.com:CVE-2012-4444
MLIST:[oss-security] 20121109 Re: CVE request --- acceptation of overlapping ipv6 fragments
RH:CVE-2012-4444
RHSA-2012:1580
RHSA-2013:0168
SMASH Issue 49980
SUSE:SUSE-SU-2013:0856
UBUNTU:CVE-2012-4444
UBUNTU:USN-1660-1
UBUNTU:USN-1661-1
bnc#789831
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=70789d7052239992824628db8133de08dc78e593
rh#1007690
rh#742846
rh#822754
rh#874835
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2012-4461kernel-source-rt:Not affectedlow ()BID:56414
CONFIRM:git.kernel.org:CVE-2012-4461
CONFIRM:www.kernel.org:CVE-2012-4461
CVE-2012-4461
DSA-2668
MISC:article.gmane.org:CVE-2012-4461
MLIST:[oss-security] 20121106 CVE-2012-4461 -- kernel: kvm: invalid opcode oops on SET_SREGS with OSXSAVE bit set
RH:CVE-2012-4461
RHSA-2013:0223
RHSA-2013:0882
SECUNIA:51160
SMASH Issue 2158
SUSE:SUSE-SU-2012:1679
SUSE:openSUSE-SU-2013:0925
UBUNTU:CVE-2012-4461
bnc#787821
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux.git%3Ba=commit%3Bh=6d1068b3a98519247d8ba4ec85cd40ac136dbdf9
linux.git:commit:6d1068b3a98519247d8ba4ec85cd40ac136dbdf9
linux.git:commit:9924a1992a86ebdb7ca36ef790d2ba0da506296c
rh#814278
rh#862900
rh#917012
rh#917013
rh#917017
CVE-2012-4508kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2012-4508
CONFIRM:github.com:CVE-2012-4508
CONFIRM:www.kernel.org:CVE-2012-4508
CVE-2012-4508
DSA-2668
FEDORA:FEDORA-2012-17479
MISC:git.kernel.org:MLIST:[oss-security] 20121025 CVE-2012-4508 -- kernel: ext4: AIO vs fallocate stale data exposure
MLIST:[oss-security] 20121025 CVE-2012-4508 -- kernel: ext4: AIO vs fallocate stale data exposure
RH:CVE-2012-4508
RHSA-2012:1491
RHSA-2012:1540
RHSA-2013:0496
RHSA-2013:1519
RHSA-2013:1783
SMASH Issue 75662
SUSE:SUSE-SU-2012:1679
UBUNTU:CVE-2012-4508
UBUNTU:USN-1645-1
UBUNTU:USN-1899-1
UBUNTU:USN-1900-1
bnc#784192
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dee1f973ca341c266229faa5a1a5bb268bed3531
linux.git:commit:e589db7a6a9c8f1557007f2cc765ee28ad7a1edd
rh#850449
rh#869904
CVE-2012-4530kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2012-4530
CONFIRM:github.com:CVE-2012-4530
CONFIRM:www.kernel.org:CVE-2013-4591
CVE-2012-4530
L3:42372
MLIST:[oss-security] 20121019 Re: CVE Request -- kernel stack disclosure in binfmt_script load_script()
RH:CVE-2012-4530
RHSA-2013:0223
RHSA-2013:0566
SMASH Issue 49701
SUSE:SUSE-SU-2013:0674
UBUNTU:CVE-2012-4530
bnc#786013
bnc#915881
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b66c5984017533316fd1951770302649baf1aa33
rh#1007690
rh#742846
rh#822754
rh#868285
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2012-4542kernel-source-rt:Not affectedmoderate ()CONFIRM:oss.oracle.com:CVE-2012-4542
CVE-2012-4542
MLIST:[linux-kernel] 20130124 [PATCH 00/13] Corrections and customization of the SG_IO command whitelist (CVE-2012-4542)
MLIST:[linux-kernel] 20130124 [PATCH 04/13] sg_io: resolve conflicts between commands assigned to multiple classes (CVE-2012-4542)
RH:CVE-2012-4542
RHSA-2013:0496
RHSA-2013:0579
RHSA-2013:0622
RHSA-2013:0882
RHSA-2013:0928
SMASH Issue 2164
UBUNTU:CVE-2012-4542
bnc#807154
https://oss.oracle.com/git/?p=redpatch.git%3Ba=commit%3Bh=76a274e17114abf1a77de6b651424648ce9e10c8
rh#875360
CVE-2012-4565kernel-source-rt:Not affectedmoderate ()BID:56346
CONFIRM:git.kernel.org:CVE-2012-4565
CONFIRM:github.com:CVE-2012-4565
CONFIRM:www.kernel.org:CVE-2012-4565
CVE-2012-4565
FEDORA:FEDORA-2012-17479
MLIST:[oss-security] 20121031 Re: CVE Request -- kernel: net: divide by zero in tcp algorithm illinois
RH:CVE-2012-4565
RHSA-2012:1491
RHSA-2012:1580
SMASH Issue 2167
UBUNTU:CVE-2012-4565
UBUNTU:USN-1644-1
UBUNTU:USN-1645-1
UBUNTU:USN-1646-1
UBUNTU:USN-1647-1
UBUNTU:USN-1648-1
UBUNTU:USN-1649-1
UBUNTU:USN-1650-1
UBUNTU:USN-1651-1
UBUNTU:USN-1652-1
bnc#787576
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664
rh#1007690
rh#742846
rh#822754
rh#871848
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2012-5195perl:Unsupportedimportant ()BID:56287
CONFIRM:perl5.git.perl.org:CVE-2012-5195
CONFIRM:wiki.mageia.org:CVE-2012-5195
CVE-2012-5195
DSA-2586
MANDRIVA:MDVSA-2013:113
MLIST:[oss-security] 20121026 Medium severity flaw with Perl 5
MLIST:[oss-security] 20121027 Re: Medium severity flaw with Perl 5
RH:CVE-2012-5195
RHSA-2013:0685
SECUNIA:51457
SMASH Issue 76256
UBUNTU:CVE-2012-5195
UBUNTU:USN-1643-1
bdo#689314
bdo#693420
bdo#695223
bnc#794535
rh#862413
CVE-2012-6539kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2012-6539
CONFIRM:github.com:CVE-2012-6539
CVE-2012-6539
DSA-2668
RH:CVE-2012-6539
SMASH Issue 77497
UBUNTU:CVE-2012-6539
bnc#809891
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#922133
CVE-2012-6542kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2012-6542
CONFIRM:github.com:CVE-2012-6542
CVE-2012-6542
DSA-2668
RH:CVE-2012-6542
RHSA-2013:0747
RHSA-2013:1645
SMASH Issue 77500
UBUNTU:CVE-2012-6542
bnc#809894
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#922322
CVE-2012-6543kernel-source-rt:Unsupportedlow ()CONFIRM:git.kernel.org:CVE-2012-6543
CONFIRM:github.com:CVE-2012-6543
CVE-2012-6543
RH:CVE-2012-6543
SMASH Issue 77501
UBUNTU:CVE-2012-6543
bnc#809896
rh#922341
CVE-2012-6544kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2012-6544
CONFIRM:github.com:CVE-2012-6544
CVE-2012-6544
DSA-2668
RH:CVE-2012-6544
RHSA-2013:1034
RHSA-2013:1173
RHSA-2013:1195
SMASH Issue 77502
UBUNTU:CVE-2012-6544
bnc#809898
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#922414
CVE-2012-6545kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2012-6545
CONFIRM:github.com:CVE-2012-6545
CVE-2012-6545
DSA-2668
RH:CVE-2012-6545
RHSA-2013:1034
RHSA-2013:1645
SMASH Issue 77503
UBUNTU:CVE-2012-6545
bnc#809899
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#922404
CVE-2012-6546kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2012-6546
CONFIRM:github.com:CVE-2012-6546
CVE-2012-6546
DSA-2668
RH:CVE-2012-6546
RHSA-2013:0744
RHSA-2013:0747
SMASH Issue 77504
UBUNTU:CVE-2012-6546
bnc#809900
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#922383
CVE-2012-6547kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2012-6547
CONFIRM:github.com:CVE-2012-6547
CVE-2012-6547
RH:CVE-2012-6547
RHSA-2013:0744
RHSA-2013:0747
SMASH Issue 77505
UBUNTU:CVE-2012-6547
bnc#809901
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#922344
CVE-2012-6548kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2012-6548
CONFIRM:github.com:CVE-2012-6548
CVE-2012-6548
DSA-2668
RH:CVE-2012-6548
RHSA-2013:1051
RHSA-2013:1080
SMASH Issue 77506
SUSE:openSUSE-SU-2013:1187
UBUNTU:CVE-2012-6548
bnc#809902
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#922353
CVE-2012-6549kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2012-6549
CONFIRM:github.com:CVE-2012-6549
CVE-2012-6549
DSA-2668
RH:CVE-2012-6549
SMASH Issue 77507
UBUNTU:CVE-2012-6549
bnc#809903
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#922359
CVE-2012-6638kernel-source-rt:Unsupportedimportant ()CONFIRM:git.kernel.org:CVE-2012-6638
CONFIRM:github.com:CVE-2012-6638
CONFIRM:www.kernel.org:CVE-2012-6638
CVE-2012-6638
D:CVE-2012-6638
RH:CVE-2012-6638
RHSA-2014:0433
RHSA-2014:0772
SMASH Issue 96328
UBUNTU:CVE-2012-6638
rh#1066055
rh#826702
CVE-2012-6647kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2012-6647
CONFIRM:github.com:CVE-2012-6647
CONFIRM:www.kernel.org:CVE-2012-6647
CVE-2012-6647
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20140514 Re: CVE request Linux kernel: forbid uaddr == uaddr2 in futex_wait_requeue_pi() to avoid null dereference
RH:CVE-2012-6647
RHSA-2014:0981
SMASH Issue 98811
UBUNTU:CVE-2012-6647
bnc#878289
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f7b0a2a5c0fb03be7c25bd1745baa50582348ef
rh#1094232
rh#1097746
CVE-2012-6657kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2012-6657
CONFIRM:github.com:CVE-2012-6657
CONFIRM:www.kernel.org:CVE-2013-1826
CVE-2012-6657
CVE-2023-2002
HP:HPSBGN03282
HP:HPSBGN03285
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20140915 Re: CVE request Linux kernel: net: guard tcp_set_keepalive against crash
OSS:2023/04/16/3
RH:CVE-2012-6657
RHSA-2014:1997
SMASH Issue 106206
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2012-6657
bnc#896779
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3e10986d1d698140747fcfc2761ec9cb64c1d582
rh#1141742
rh#1163762
CVE-2012-6689kernel-source-rt:Unsupportedmoderate ()BID:72739
CONFIRM:git.kernel.org:CVE-2012-6689
CONFIRM:github.com:CVE-2012-6689
CONFIRM:www.kernel.org:CVE-2013-6282
CVE-2012-6689
MISC:git.kernel.org:MLIST:[oss-security] 20150222 Re: libmnl: incorrect validation of netlink message origin allows attackers to spoof netlink messages
MLIST:[linux-kernel] 20120817 [PATCH 0/2] netlink patches
MLIST:[linux-kernel] 20120817 [PATCH 2/2] [RFC] netlink: fix possible spoofing from non-root processes
MLIST:[oss-security] 20150222 Re: libmnl: incorrect validation of netlink message origin allows attackers to spoof netlink messages
RH:CVE-2012-6689
RHSA-2014:1392
SMASH Issue 114326
UBUNTU:CVE-2012-6689
bnc#920170
rh#848949
CVE-2012-6701kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2012-6701
CONFIRM:github.com:CVE-2012-6701
CONFIRM:www.kernel.org:CVE-2012-6701
CVE-2012-6701
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20160302 Re: CVE Request: Linux: aio write triggers integer overflow in some network protocols
MLIST:[oss-security] 20160302 Re: CVE Request: Linux: aio write triggers integer overflow in some network protocols
OSS:2016/Q1/491
Oracle:CVE-2016-5244
RH:CVE-2012-6701
RHSA-2018:1854
SMASH Issue 162482
UBUNTU:CVE-2012-6701
bnc#969354
rh#1314288
rh#1324749
CVE-2012-6703kernel-source-rt:Not affectedlow ()BID:91502
CONFIRM:git.kernel.org:CVE-2012-6703
CONFIRM:github.com:CVE-2012-6703
CONFIRM:www.kernel.org:CVE-2012-6703
CVE-2012-6703
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20160628 Re: CVE Request: integer overflow in ALSA snd_compress_check_input
OSS:2016/Q2/616
RH:CVE-2012-6703
SECTRACK:1036190
SMASH Issue 170551
UBUNTU:CVE-2012-6703
bnc#986941
rh#1351076
CVE-2012-6704kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)BID:95135
CONFIRM:git.kernel.org:CVE-2012-6704
CONFIRM:github.com:CVE-2012-6704
CVE-2012-6704
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20161202 Re: CVE Request: Linux: signed overflows for SO_{SND|RCV}BUFFORCE
OSS:2016/Q4/574
RH:CVE-2012-6704
RHSA-2017:0931
RHSA-2017:0932
RHSA-2017:0933
SMASH Issue 177085
UBUNTU:CVE-2012-6704
bnc#1013542
rh#1402013
rh#1402024
CVE-2012-6712kernel-source-rt:Unsupportedcritical ()CVE-2012-6712
D:CVE-2012-6712
MISC:git.kernel.org:CVE-2012-6712
MISC:github.com:CVE-2012-6712
MISC:mirrors.edge.kernel.org:CVE-2012-6712
RH:CVE-2012-6712
SMASH Issue 238132
UBUNTU:CVE-2012-6712
bnc#1143176
rh#1735642
CVE-2013-0211libarchive:Not affectedmoderate ()BID:58926
CONFIRM:github.com:CVE-2013-0211
CVE-2013-0211
FEDORA:FEDORA-2013-4522
FEDORA:FEDORA-2013-4537
FEDORA:FEDORA-2013-4576
FEDORA:FEDORA-2013-4592
FREEBSD:FreeBSD-SA-16:23
MANDRIVA:MDVSA-2013:147
RH:CVE-2013-0211
SECTRACK:1035995
SMASH Issue 90994
SUSE:openSUSE-SU-2015:0568
UBUNTU:CVE-2013-0211
UBUNTU:USN-2549-1
bnc#800024
rh#902998
CVE-2013-0216kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-0216
CONFIRM:git.kernel.org:CVE-2013-0217
CONFIRM:github.com:CVE-2013-0216
CONFIRM:github.com:CVE-2013-0217
CONFIRM:www.kernel.org:CVE-2013-0217
CVE-2013-0216
CVE-2013-0217
L3:42372
MANDRIVA:MDVSA-2013:176
MLIST:[oss-security] 20130205 Xen Security Advisory 39 (CVE-2013-0216,CVE-2013-0217) - Linux netback DoS via malicious guest ring.
RH:CVE-2013-0216
RH:CVE-2013-0217
RHSA-2013:0747
SMASH Issue 2238
SUSE:SUSE-SU-2013:0674
SUSE:openSUSE-SU-2013:0395
SUSE:openSUSE-SU-2013:0925
UBUNTU:CVE-2013-0216
UBUNTU:CVE-2013-0217
bnc#800280
bnc#800801
bnc#915881
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=48856286b64e4b66ec62b94e504d0b29c1ade664
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7d5145d8eb2b9791533ffe4dc003b129b9696c48
linux.git:commit:0c35565b460ff99f973fb4a9ec63fbcb4176d2e6
rh#1007690
rh#1667782
rh#1686136
rh#742846
rh#814278
rh#822754
rh#910883
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2013-0217kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-0216
CONFIRM:git.kernel.org:CVE-2013-0217
CONFIRM:github.com:CVE-2013-0216
CONFIRM:github.com:CVE-2013-0217
CONFIRM:www.kernel.org:CVE-2013-0217
CVE-2013-0216
CVE-2013-0217
L3:42372
MANDRIVA:MDVSA-2013:176
MLIST:[oss-security] 20130205 Xen Security Advisory 39 (CVE-2013-0216,CVE-2013-0217) - Linux netback DoS via malicious guest ring.
RH:CVE-2013-0216
RH:CVE-2013-0217
RHSA-2013:0747
SMASH Issue 2238
SMASH Issue 54043
SUSE:SUSE-SU-2013:0674
SUSE:openSUSE-SU-2013:0395
SUSE:openSUSE-SU-2013:0925
UBUNTU:CVE-2013-0216
UBUNTU:CVE-2013-0217
bnc#800280
bnc#800801
bnc#915881
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=48856286b64e4b66ec62b94e504d0b29c1ade664
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7d5145d8eb2b9791533ffe4dc003b129b9696c48
linux.git:commit:0c35565b460ff99f973fb4a9ec63fbcb4176d2e6
rh#1007690
rh#1667782
rh#1686136
rh#742846
rh#814278
rh#822754
rh#910883
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2013-0228kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-0228
CONFIRM:www.kernel.org:CVE-2013-0228
CVE-2013-0228
MANDRIVA:MDVSA-2013:176
MLIST:[oss-security] 20130213 Xen Security Advisory 42 (CVE-2013-0228) - Linux kernel hits general protection if %ds is corrupt for 32-bit PVOPS.
RH:CVE-2013-0228
RHSA-2013:0630
SMASH Issue 54051
UBUNTU:CVE-2013-0228
UBUNTU:USN-1795-1
UBUNTU:USN-1796-1
UBUNTU:USN-1797-1
UBUNTU:USN-1805-1
UBUNTU:USN-1808-1
bnc#801179
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=13d2b4d11d69a92574a55bfd985cfb0ca77aebdc
linux.git:commit:13d2b4d11d69a92574a55bfd985cfb0ca77aebdc
linux.git:commit:f741656d646f7a5b56ba86765205b954237e7956
rh#906309
CVE-2013-0290kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-0290
CONFIRM:github.com:CVE-2013-0290
CONFIRM:www.kernel.org:CVE-2013-0290
CVE-2013-0290
MANDRIVA:MDVSA-2013:176
MISC:git.kernel.org:/
MLIST:[oss-security] 20130214 Re: CVE Request: kernel -- local DOS (endless loop with interrupts disabled)
RH:CVE-2013-0290
RHSA-2013:0622
SMASH Issue 2240
SUSE:openSUSE-SU-2013:0951
SUSE:openSUSE-SU-2013:1042
UBUNTU:CVE-2013-0290
bnc#803931
rh#911473
CVE-2013-0309kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-0309
CONFIRM:github.com:CVE-2013-0309
CONFIRM:www.kernel.org:CVE-2013-0309
CVE-2013-0309
MISC:git.kernel.org:MLIST:[oss-security] 20130219 Re: CVE request -- Linux kernel: mm: thp: pmd_present and PROT_NONE local DoS
MLIST:[oss-security] 20130219 Re: CVE request -- Linux kernel: mm: thp: pmd_present and PROT_NONE local DoS
RH:CVE-2013-0309
RHSA-2013:0496
SMASH Issue 54085
UBUNTU:CVE-2013-0309
bnc#804652
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=027ef6c87853b0a9df53175063028edb4950d476
rh#912898
CVE-2013-0310kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-0310
CONFIRM:github.com:CVE-2013-0310
CONFIRM:www.kernel.org:CVE-2013-0310
CVE-2013-0310
MISC:git.kernel.org:/
MLIST:[oss-security] 20130219 Re: CVE request -- Linux kernel: net: CIPSO_V4_TAG_LOCAL tag NULL pointer dereference
RH:CVE-2013-0310
RHSA-2013:0496
SMASH Issue 49503
UBUNTU:CVE-2013-0310
bnc#804653
rh#1007690
rh#1706097
rh#742846
rh#822754
rh#912900
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2013-0340expat:Ignoremoderate ()BID:58233
CONFIRM:support.apple.com:CVE-2013-0340
CONFIRM:support.apple.com:CVE-2021-22925
CONFIRM:support.apple.com:CVE-2021-30847
CONFIRM:support.apple.com:CVE-2021-30897
CVE-2013-0340
CVE-2013-0341
FULLDISC:20210921 APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15
FULLDISC:20210921 APPLE-SA-2021-09-20-2 watchOS 8
FULLDISC:20210921 APPLE-SA-2021-09-20-3 tvOS 15
FULLDISC:20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8
FULLDISC:20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6
FULLDISC:20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina
FULLDISC:20211027 APPLE-SA-2021-10-26-10 Additional information for APPLE-SA-2021-09-20-2 watchOS 8
FULLDISC:20211027 APPLE-SA-2021-10-26-11 Additional information for APPLE-SA-2021-09-20-3 tvOS 15
FULLDISC:20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15
GENTOO:GLSA-201701-21
MISC:lists.apache.org:CVE-2021-40439
MLIST:[announce] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs
MLIST:[openoffice-users] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs
MLIST:[oss-security] 20130221 CVEs for libxml2 and expat internal and external XML entity expansion
MLIST:[oss-security] 20130412 Re-evaluating expat/libxml2 CVE assignments
OSS:2021/10/07/4
OSS:2021/Q4/15
OSVDB:90634
RH:CVE-2013-0340
RH:CVE-2013-0341
SECTRACK:1028213
SMASH Issue 91263
UBUNTU:CVE-2013-0340
UBUNTU:CVE-2013-0341
bnc#805236
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d%40%3Cannounce.apache.org%3E
rh#1000109
rh#1000110
CVE-2013-0341expat:Ignoremoderate ()BID:58233
CONFIRM:support.apple.com:CVE-2013-0340
CONFIRM:support.apple.com:CVE-2021-22925
CONFIRM:support.apple.com:CVE-2021-30847
CONFIRM:support.apple.com:CVE-2021-30897
CVE-2013-0340
CVE-2013-0341
FULLDISC:20210921 APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15
FULLDISC:20210921 APPLE-SA-2021-09-20-2 watchOS 8
FULLDISC:20210921 APPLE-SA-2021-09-20-3 tvOS 15
FULLDISC:20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8
FULLDISC:20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6
FULLDISC:20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina
FULLDISC:20211027 APPLE-SA-2021-10-26-10 Additional information for APPLE-SA-2021-09-20-2 watchOS 8
FULLDISC:20211027 APPLE-SA-2021-10-26-11 Additional information for APPLE-SA-2021-09-20-3 tvOS 15
FULLDISC:20211027 APPLE-SA-2021-10-26-9 Additional information for APPLE-SA-2021-09-20-1 iOS 15 and iPadOS 15
GENTOO:GLSA-201701-21
MISC:lists.apache.org:CVE-2021-40439
MLIST:[announce] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs
MLIST:[openoffice-users] 20211007 CVE-2021-40439: Apache OpenOffice: Billion Laughs
MLIST:[oss-security] 20130221 CVEs for libxml2 and expat internal and external XML entity expansion
MLIST:[oss-security] 20130412 Re-evaluating expat/libxml2 CVE assignments
OSS:2021/10/07/4
OSS:2021/Q4/15
OSVDB:90634
RH:CVE-2013-0340
RH:CVE-2013-0341
SECTRACK:1028213
SMASH Issue 91263
UBUNTU:CVE-2013-0340
UBUNTU:CVE-2013-0341
bnc#805236
https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d%40%3Cannounce.apache.org%3E
rh#1000109
rh#1000110
CVE-2013-0343kernel-source-rt:Not affectedlow ()CVE-2013-0343
DSA-2906
MISC:git.kernel.org
MLIST:[oss-security] 20121205 Re: Linux kernel handling of IPv6 temporary addresses
MLIST:[oss-security] 20130116 Re: Linux kernel handling of IPv6 temporary addresses
MLIST:[oss-security] 20130121 Re: Linux kernel handling of IPv6 temporary addresses
MLIST:[oss-security] 20130222 Re: Linux kernel handling of IPv6 temporary addresses
OSS:10930
RH:CVE-2013-0343
RHSA-2013:1449
RHSA-2013:1490
RHSA-2013:1645
SMASH Issue 54108
SUSE:openSUSE-SU-2014:0204
UBUNTU:CVE-2013-0343
UBUNTU:USN-1976-1
UBUNTU:USN-1977-1
UBUNTU:USN-2019-1
UBUNTU:USN-2020-1
UBUNTU:USN-2021-1
UBUNTU:USN-2022-1
UBUNTU:USN-2023-1
UBUNTU:USN-2024-1
UBUNTU:USN-2038-1
UBUNTU:USN-2039-1
UBUNTU:USN-2050-1
bnc#805226
linux.git:commit:4b08a8f1bd8cb4541c93ec170027b4d0782dab52
rh#1007690
rh#1007939
rh#742846
rh#822754
rh#914664
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2013-0871kernel-source-rt:Not affectedimportant ()CONFIRM:git.kernel.org:CVE-2013-0871
CONFIRM:github.com:CVE-2013-0871
CONFIRM:www.kernel.org:CVE-2013-0871
CVE-2013-0871
L3:42372
MLIST:[oss-security] 20130215 Linux kernel race condition with PTRACE_SETREGS (CVE-2013-0871)
RH:CVE-2013-0871
RHSA-2013:0567
RHSA-2013:0621
RHSA-2013:0622
RHSA-2013:0661
RHSA-2013:0662
RHSA-2013:0695
RHSA-2013:0741
SMASH Issue 2252
SUSE:SUSE-SU-2013:0341
SUSE:SUSE-SU-2013:0674
SUSE:openSUSE-SU-2013:0925
UBUNTU:CVE-2013-0871
UBUNTU:USN-1736-1
UBUNTU:USN-1737-1
UBUNTU:USN-1738-1
UBUNTU:USN-1739-1
UBUNTU:USN-1740-1
UBUNTU:USN-1741-1
UBUNTU:USN-1742-1
UBUNTU:USN-1743-1
UBUNTU:USN-1744-1
UBUNTU:USN-1745-1
bnc#804154
bnc#804227
bnc#915881
http://www.debian.org/security/2013/dsa-2632
rh#1007690
rh#742846
rh#814278
rh#822754
rh#911937
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2013-0914kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2013-0914
CONFIRM:github.com:CVE-2013-0914
CVE-2013-0914
DSA-2668
MLIST:[oss-security] 20130311 CVE-2013-0914 Linux kernel sa_restorer information leak
RH:CVE-2013-0914
RHSA-2013:0829
RHSA-2013:1034
RHSA-2013:1051
RHSA-2013:1080
SMASH Issue 54406
SUSE:openSUSE-SU-2013:1971
UBUNTU:CVE-2013-0914
bnc#808827
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#920499
CVE-2013-1059kernel-source-rt:Ignoreimportant ()CONFIRM:bugzilla.redhat.com
CVE-2013-1059
DSA-2745
MISC:git.kernel.org:MLIST:[oss-security] 20130709 Linux kernel libceph NULL function pointer dereference (CVE-2013-1059)
MISC:hkpco.kr:CVE-2013-1059
MLIST:[oss-security] 20130709 Linux kernel libceph NULL function pointer dereference (CVE-2013-1059)
OSS:10569
RH:CVE-2013-1059
RHSA-2013:1029
RHSA-2013:1411
RHSA-2013:1605
RHSA-2013:1784
RHSA-2013:1785
RHSA-2013:1786
RHSA-2014:0029
RHSA-2014:0245
RHSA-2014:0254
RHSA-2014:0400
RHSA-2014:0401
RHSA-2014:1290
RHSA-2014:1291
RHSA-2014:1904
RHSA-2014:1995
RHSA-2015:0034
SMASH Issue 55328
SUSE:SUSE-SU-2013:1161
SUSE:SUSE-SU-2013:1473
SUSE:SUSE-SU-2013:1474
SUSE:openSUSE-SU-2013:1971
UBUNTU:CVE-2013-1059
UBUNTU:USN-1941-1
UBUNTU:USN-1942-1
bdo#701744
bnc#826350
bnc#882913
linux.git:commit:2cb33cac622afde897aa02d3dcd9fbba8bae839e
rh#1006505
rh#1007545
rh#108711
rh#958618
rh#977356
rh#978485
CVE-2013-1772kernel-source-rt:Not affectedlow ()CONFIRM:github.com:CVE-2013-1772
CONFIRM:www.kernel.org:CVE-2013-1772
CVE-2013-1772
MISC:bugs.gentoo.org:MLIST:[oss-security] 20130226 Re: CVE request -- Linux kernel: call_console_drivers() Function Log Prefix Stripping buffer overflow
MISC:secunia.com:MLIST:[oss-security] 20130226 Re: CVE request -- Linux kernel: call_console_drivers() Function Log Prefix Stripping buffer overflow
MLIST:[oss-security] 20130226 Re: CVE request -- Linux kernel: call_console_drivers() Function Log Prefix Stripping buffer overflow
RH:CVE-2013-1772
RHSA-2013:0566
SMASH Issue 54884
UBUNTU:CVE-2013-1772
bnc#806238
bnc#807441
rh#916075
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2013-1773kernel-source-rt:Not affectedmoderate ()BID:58200
CONFIRM:git.kernel.org:CVE-2013-1773
CONFIRM:github.com:CVE-2013-1773
CONFIRM:www.kernel.org:CVE-2013-1773
CVE-2013-1773
DSA-2668
EXPLOIT-DB:23248
MISC:git.kernel.org:MLIST:[oss-security] 20130226 Re: CVE request - Linux kernel: VFAT slab-based buffer overflow
MLIST:[oss-security] 20130226 Re: CVE request - Linux kernel: VFAT slab-based buffer overflow
OSVDB:88310
RH:CVE-2013-1773
RHSA-2013:0566
RHSA-2013:0744
RHSA-2013:0928
RHSA-2013:1026
SMASH Issue 2277
UBUNTU:CVE-2013-1773
bnc#806977
bnc#807452
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0720a06a7518c9d0c0125bd5d1f3b6264c55c3dd
rh#1007690
rh#742846
rh#822754
rh#916115
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2013-1774kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-1774
CONFIRM:github.com:CVE-2013-1774
CONFIRM:www.kernel.org:CVE-2013-2058
CVE-2013-1774
DSA-2668
MISC:git.kernel.org:/
MISC:xorl.wordpress.com:CVE-2013-1774
MLIST:[oss-security] 20130227 Re: CVE request: Linux kernel: USB: io_ti: NULL pointer dereference
RH:CVE-2013-1774
RHSA-2013:0744
RHSA-2013:0829
SMASH Issue 2278
SUSE:SUSE-SU-2013:1182
SUSE:SUSE-SU-2013:1474
SUSE:openSUSE-SU-2013:0847
SUSE:openSUSE-SU-2013:0925
UBUNTU:CVE-2013-1774
UBUNTU:USN-1805-1
UBUNTU:USN-1808-1
bnc#806976
bnc#807455
rh#1007690
rh#742846
rh#814278
rh#822754
rh#916191
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2013-1798kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2013-1798
CVE-2013-1798
DSA-2668
MANDRIVA:MDVSA-2013:176
MISC:packetstormsecurity.com:CVE-2020-8428
MLIST:[oss-security] 20130320 linux kernel: kvm: CVE-2013-179[6..8]
RH:CVE-2013-1798
RHSA-2013:0727
RHSA-2013:0744
RHSA-2013:0746
RHSA-2013:0928
RHSA-2013:1026
SMASH Issue 2281
SUSE:openSUSE-SU-2013:0847
SUSE:openSUSE-SU-2013:0925
SUSE:openSUSE-SU-2013:1187
UBUNTU:CVE-2013-1798
UBUNTU:USN-1809-1
UBUNTU:USN-1812-1
UBUNTU:USN-1813-1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2c118bfab8bc6b8bb213abfc35201e441693d55
linux.git:commit:2ae33b389601b86a3d0cfe2d09f5e3189d5322fd
linux.git:commit:8c86405f606ca8508b8d9280680166ca26723695
linux.git:commit:a2c118bfab8bc6b8bb213abfc35201e441693d55
linux.git:commit:ea4a0ce11160200410abbabd44ec9e75e93a95be
rh#917017
CVE-2013-1819kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-1819
CONFIRM:github.com:CVE-2013-1819
CONFIRM:www.kernel.org:CVE-2013-1819
CVE-2013-1819
MISC:git.kernel.org:/
MLIST:[oss-security] 20130305 Re: CVE request: Linux kernel: xfs: _xfs_buf_find NULL pointer dereference
RH:CVE-2013-1819
RHSA-2013:0829
SMASH Issue 54906
SUSE:SUSE-SU-2013:1473
SUSE:SUSE-SU-2013:1474
SUSE:openSUSE-SU-2013:1971
UBUNTU:CVE-2013-1819
UBUNTU:USN-1968-1
UBUNTU:USN-1969-1
UBUNTU:USN-1970-1
UBUNTU:USN-1972-1
UBUNTU:USN-1973-1
UBUNTU:USN-1975-1
bnc#807471
rh#918009
CVE-2013-1826kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-1826
CONFIRM:github.com:CVE-2013-1826
CONFIRM:www.kernel.org:CVE-2013-1826
CVE-2013-1826
DSA-2668
MLIST:[oss-security] 20130307 Re: CVE Requests (maybe): Linux kernel: various info leaks, some NULL ptr derefs
RH:CVE-2013-1826
RHSA-2013:0744
RHSA-2013:0747
SMASH Issue 54910
UBUNTU:CVE-2013-1826
UBUNTU:USN-1829-1
bnc#809889
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=864745d291b5ba80ea0bd0edcbe67273de368836
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#919384
CVE-2013-1827kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-1827
CONFIRM:github.com:CVE-2013-1827
CONFIRM:www.kernel.org:CVE-2013-1827
CVE-2013-1827
MLIST:[oss-security] 20130307 Re: CVE Requests (maybe): Linux kernel: various info leaks, some NULL ptr derefs
RH:CVE-2013-1827
RHSA-2013:0744
SMASH Issue 54911
UBUNTU:CVE-2013-1827
bnc#811354
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=276bdb82dedb290511467a5a4fdbe9f0b52dce6f
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#919164
CVE-2013-1858kernel-source-rt:Unsupportedimportant ()CONFIRM:git.kernel.org:CVE-2013-1858
CONFIRM:github.com:CVE-2013-1858
CONFIRM:www.kernel.org:CVE-2013-1858
CVE-2013-1858
MISC:stealth.openwall.net:CVE-2013-1858
MLIST:[oss-security] 20130314 Re: CLONE_NEWUSER|CLONE_FS root exploit
RH:CVE-2013-1858
SMASH Issue 54927
UBUNTU:CVE-2013-1858
bnc#809296
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e66eded8309ebf679d3d3c1f5820d1f2ca332c71
rh#921448
CVE-2013-1860kernel-source-rt:Not affectedmoderate ()BID:58510
CONFIRM:git.kernel.org:CVE-2013-1860
CONFIRM:github.com:CVE-2013-1860
CONFIRM:www.kernel.org:CVE-2013-2636
CVE-2013-1860
DSA-2668
MANDRIVA:MDVSA-2013:176
MLIST:[oss-security] 20130314 Re: CVE Request/Guidance: Linux kernel cdc-wdm buffer overflow triggered by device
RH:CVE-2013-1860
RHSA-2013:0829
RHSA-2014:0328
RHSA-2014:0339
SMASH Issue 54929
UBUNTU:CVE-2013-1860
UBUNTU:USN-1809-1
UBUNTU:USN-1811-1
UBUNTU:USN-1812-1
UBUNTU:USN-1813-1
UBUNTU:USN-1814-1
UBUNTU:USN-1829-1
bnc#806431
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c0f5ecee4e741667b2493c742b60b6218d40b3aa
rh#814278
rh#917012
rh#917013
rh#917017
rh#921970
CVE-2013-1873kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2013-2634
CONFIRM:git.kernel.org:CVE-2013-2635
CONFIRM:git.kernel.org:CVE-2013-2636
CONFIRM:github.com:CVE-2013-2634
CONFIRM:github.com:CVE-2013-2635
CONFIRM:github.com:CVE-2013-2636
CVE-2013-1873
CVE-2013-2634
CVE-2013-2635
CVE-2013-2636
DSA-2668
MLIST:[oss-security] 20130320 Re: Linux kernel: net - three info leaks in rtnl
RH:CVE-2013-1873
RH:CVE-2013-2634
RH:CVE-2013-2635
RH:CVE-2013-2636
RHSA-2013:0829
RHSA-2013:1051
RHSA-2013:1080
SMASH Issue 49815
SMASH Issue 54933
SMASH Issue 55091
SMASH Issue 55092
SMASH Issue 55093
UBUNTU:CVE-2013-1873
UBUNTU:CVE-2013-2634
UBUNTU:CVE-2013-2635
UBUNTU:CVE-2013-2636
bnc#810473
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#923652
rh#924689
rh#924690
rh#924693
CVE-2013-1928kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-1928
CONFIRM:github.com:CVE-2013-1928
CONFIRM:www.kernel.org:CVE-2013-1928
CVE-2013-1928
DSA-2668
MLIST:[oss-security] 20130405 Re: CVE Request: kernel information leak in fs/compat_ioctl.c VIDEO_SET_SPU_PALETTE
MLIST:[oss-security] 20130409 Re: CVE Request: kernel information leak in fs/compat_ioctl.c VIDEO_SET_SPU_PALETTE
RH:CVE-2013-1928
RHSA-2013:1645
SMASH Issue 54946
SUSE:SUSE-SU-2013:0856
SUSE:openSUSE-SU-2013:0847
UBUNTU:CVE-2013-1928
UBUNTU:USN-1829-1
bnc#813735
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=12176503366885edd542389eed3aaf94be163fdb
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#949567
CVE-2013-1929kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-1929
CONFIRM:github.com:CVE-2013-1929
CONFIRM:www.kernel.org:CVE-2013-1958
CVE-2013-1929
DSA-2668
DSA-2669
FEDORA:FEDORA-2013-5368
MANDRIVA:MDVSA-2013:176
MISC:cansecwest.com:CVE-2013-1929
MISC:git.kernel.org:MLIST:[oss-security] 20130405 Re: CVE Request: tg3 VPD firmware -> driver injection
MLIST:[oss-security] 20130405 Re: CVE Request: tg3 VPD firmware -> driver injection
RH:CVE-2013-1929
RHSA-2013:0829
RHSA-2013:1034
RHSA-2013:1645
SMASH Issue 2293
SUSE:SUSE-SU-2013:1473
SUSE:SUSE-SU-2013:1474
SUSE:openSUSE-SU-2013:1971
UBUNTU:CVE-2013-1929
UBUNTU:USN-1834-1
UBUNTU:USN-1835-1
UBUNTU:USN-1836-1
UBUNTU:USN-1838-1
bnc#813733
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=715230a44310a8cf66fbfb5a46f9a62a9b2de424
rh#1007690
rh#1067558
rh#1094232
rh#949932
CVE-2013-1935kernel-source-rt:Unsupportedimportant ()CONFIRM:ftp.osuosl.org:CVE-2013-2128
CONFIRM:git.kernel.org:CVE-2013-2017
CONFIRM:github.com:CVE-2013-2017
CONFIRM:support.f5.com:CVE-2013-2017
CVE-2013-1935
CVE-2013-2017
MISC:git.kernel.org:MLIST:[oss-security] 20130429 Re: CVE request -- Linux kernel: veth: double-free in case of congestion
MLIST:[oss-security] 20130429 Re: CVE request -- Linux kernel: veth: double-free in case of congestion
RH:CVE-2013-1935
RH:CVE-2013-2017
RHSA-2013:0907
RHSA-2013:0911
SMASH Issue 54959
UBUNTU:CVE-2013-1935
UBUNTU:CVE-2013-2017
bnc#817643
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6ec82562ffc6f297d0de36d65776cff8e5704867
rh#949981
rh#957705
CVE-2013-1943kernel-source-rt:Ignoreimportant ()CONFIRM:git.kernel.org:CVE-2013-1943
CONFIRM:github.com:CVE-2013-1943
CONFIRM:web.archive.org:CVE-2013-1943
CVE-2013-1943
MISC:git.kernel.org:/
RH:CVE-2013-1943
RHSA-2013:0911
SMASH Issue 90441
UBUNTU:CVE-2013-1943
UBUNTU:USN-1939-1
rh#950490
CVE-2013-1950libtirpc:Analysismoderate ()CONFIRM:git.infradead.org:CVE-2013-1950
CVE-2013-1950
RH:CVE-2013-1950
RHSA-2013:0884
SMASH Issue 90354
UBUNTU:CVE-2013-1950
rh#948378
CVE-2013-1969libxml2:Unsupportedimportant ()CONFIRM:bugzilla.gnome.org:CVE-2013-1969
CONFIRM:git.gnome.org:CVE-2013-1969
CVE-2013-1969
MISC:secunia.com:MLIST:[oss-security] 20130418 Re: CVE request : libxml2 Multiple Use-After-Free Vulnerabilities
MLIST:[oss-security] 20130417 CVE request : libxml2 Multiple Use-After-Free Vulnerabilities
MLIST:[oss-security] 20130418 Re: CVE request : libxml2 Multiple Use-After-Free Vulnerabilities
RH:CVE-2013-1969
SECUNIA:53061
SMASH Issue 2298
SUSE:openSUSE-SU-2013:0729
SUSE:openSUSE-SU-2013:0945
UBUNTU:CVE-2013-1969
UBUNTU:USN-1817-1
bnc#815665
rh#953722
CVE-2013-1979kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-1979
CONFIRM:github.com:CVE-2013-1979
CONFIRM:www.kernel.org:CVE-2013-1979
CVE-2013-1979
DSA-2669
FEDORA:FEDORA-2013-6537
FEDORA:FEDORA-2013-6999
MANDRIVA:MDVSA-2013:176
MLIST:[oss-security] 20130428 Multiple Linux setuid output redirection vulnerabilities
RH:CVE-2013-1979
RHSA-2013:0829
SMASH Issue 50013
SUSE:SUSE-SU-2013:1182
SUSE:SUSE-SU-2014:1316
SUSE:SUSE-SU-2014:1319
SUSE:openSUSE-SU-2013:1187
SUSE:openSUSE-SU-2013:1971
UBUNTU:CVE-2013-1979
bnc#816708
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=83f1b4ba917db5dc5a061a44b3403ddb6e783494
rh#1667782
rh#1686136
rh#955629
CVE-2013-2015kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2013-2015
CONFIRM:github.com:CVE-2013-2015
CONFIRM:www.kernel.org:CVE-2013-2015
CVE-2013-2015
DSA-2668
DSA-2669
MLIST:[oss-security] 20130426 Re: CVE request: Linux kernel: ext4: hang during mount(8)
RH:CVE-2013-2015
SMASH Issue 54958
SUSE:SUSE-SU-2016:2074
UBUNTU:CVE-2013-2015
bnc#817377
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0e9a9a1ad619e7e987815d20262d36a2f95717ca
rh#1007690
rh#1067558
rh#1094232
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#957123
CVE-2013-2017kernel-source-rt:Unsupportedimportant ()CONFIRM:ftp.osuosl.org:CVE-2013-2128
CONFIRM:git.kernel.org:CVE-2013-2017
CONFIRM:github.com:CVE-2013-2017
CONFIRM:support.f5.com:CVE-2013-2017
CVE-2013-1935
CVE-2013-2017
MISC:git.kernel.org:MLIST:[oss-security] 20130429 Re: CVE request -- Linux kernel: veth: double-free in case of congestion
MLIST:[oss-security] 20130429 Re: CVE request -- Linux kernel: veth: double-free in case of congestion
RH:CVE-2013-1935
RH:CVE-2013-2017
RHSA-2013:0907
RHSA-2013:0911
SMASH Issue 54959
UBUNTU:CVE-2013-1935
UBUNTU:CVE-2013-2017
bnc#817643
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6ec82562ffc6f297d0de36d65776cff8e5704867
rh#949981
rh#957705
CVE-2013-2058kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2013-2058
CONFIRM:github.com:CVE-2013-2058
CONFIRM:www.kernel.org:CVE-2013-2058
CVE-2013-2058
MLIST:[oss-security] 20130505 Re: CVE request: Linux kernel: chipidea: allow disabling streaming in host mode
RH:CVE-2013-2058
RHSA-2013:1264
SMASH Issue 90955
UBUNTU:CVE-2013-2058
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=929473ea05db455ad88cdc081f2adc556b8dc48f
rh#959210
CVE-2013-2094kernel-source-rt:Not affectedimportant ()CONFIRM:git.kernel.org:CVE-2013-2094
CONFIRM:github.com:CVE-2013-2094
CONFIRM:www.kernel.org:CVE-2013-2596
CVE-2013-2094
DSA-2669
EXPLOIT-DB:33589
L3:39110
L3:39146
MANDRIVA:MDVSA-2013:176
MISC:git.kernel.org:/
MISC:news.ycombinator.com:CVE-2013-2094
MISC:packetstormsecurity.com:CVE-2013-2094
MISC:twitter.com:CVE-2013-2094
MISC:www.reddit.com:CVE-2013-2094
MLIST:[CentOS-announce] 20130515 CentOS-6 CVE-2013-2094 Kernel Issue
MLIST:[CentOS-announce] 20130517 CESA-2013:0830 Important CentOS 6 kernel Update
MLIST:[linux-kernel] 20130412 Re: sw_perf_event_destroy() oops while fuzzing
MLIST:[linux-kernel] 20130412 sw_perf_event_destroy() oops while fuzzing
MLIST:[linux-kernel] 20130413 Re: sw_perf_event_destroy() oops while fuzzing
MLIST:[oss-security] 20130514 Re: CVE Request: linux kernel perf out-of-bounds access
OSVDB:93361
RH:CVE-2013-2094
RHSA-2013:0829
RHSA-2013:0830
RHSA-2013:0832
RHSA-2013:0840
RHSA-2013:0841
SMASH Issue 2332
SUSE:SUSE-SU-2013:0819
SUSE:openSUSE-SU-2013:0847
SUSE:openSUSE-SU-2013:0925
SUSE:openSUSE-SU-2013:0951
SUSE:openSUSE-SU-2013:1042
UBUNTU:CVE-2013-2094
UBUNTU:USN-1825-1
UBUNTU:USN-1826-1
UBUNTU:USN-1827-1
UBUNTU:USN-1828-1
UBUNTU:USN-1836-1
UBUNTU:USN-1838-1
bnc#819789
bnc#820202
rh#814278
rh#917012
rh#917013
rh#917017
rh#962792
CVE-2013-2099python3:Unsupportedmoderate ()CONFIRM:bugs.python.org:CVE-2013-2099
CVE-2013-2098
CVE-2013-2099
MLIST:[oss-security] 20130515 Re: CVE Request (minor) -- Python 3.2: DoS when matching certificate with many '*' wildcard characters {was: CVE Request (minor) -- python-backports-ssl_match_hostn...
RH:CVE-2013-2099
RHBA-2016:1500
RHSA-2014:1263
RHSA-2014:1690
RHSA-2015:0042
RHSA-2016:1166
SECUNIA:55107
SECUNIA:55116
SMASH Issue 90980
UBUNTU:CVE-2013-2098
UBUNTU:CVE-2013-2099
UBUNTU:USN-1983-1
UBUNTU:USN-1984-1
UBUNTU:USN-1985-1
bnc#886001
rh#963186
rh#963260
CVE-2013-2128kernel-source-rt:Not affectedmoderate ()CONFIRM:ftp.osuosl.org:CVE-2013-2128
CONFIRM:git.kernel.org:CVE-2013-2128
CONFIRM:github.com:CVE-2013-2128
CVE-2013-2128
MLIST:[oss-security] 20130529 Re: CVE request: Linux kernel: net: oops from tcp_collapse() when using splice(2)
RH:CVE-2013-2128
RHSA-2013:1051
RHSA-2013:1080
SMASH Issue 54967
UBUNTU:CVE-2013-2128
bnc#822583
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=baff42ab1494528907bf4d5870359e31711746ae
rh#968484
CVE-2013-2140kernel-source-rt:Unsupportedlow ()CONFIRM:git.kernel.org:CVE-2013-2140
CONFIRM:www.kernel.org:CVE-2013-2140
CVE-2013-2140
MLIST:[oss-security] 20130605 Re: xen/blkback: Check device permissions before allowing OP_DISCARD
RH:CVE-2013-2140
SMASH Issue 91004
UBUNTU:CVE-2013-2140
UBUNTU:USN-1938-1
UBUNTU:USN-1943-1
UBUNTU:USN-1944-1
UBUNTU:USN-1945-1
UBUNTU:USN-1946-1
UBUNTU:USN-1947-1
UBUNTU:USN-2038-1
UBUNTU:USN-2039-1
bnc#844107
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=604c499cbbcc3d5fe5fb8d53306aa0fae1990109
linux.git:commit:604c499cbbcc3d5fe5fb8d53306aa0fae1990109
rh#971146
CVE-2013-2141kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2013-2141
CONFIRM:github.com:CVE-2013-2141
CONFIRM:www.kernel.org:CVE-2013-2596
CVE-2013-2141
DSA-2766
MANDRIVA:MDVSA-2013:176
MISC:git.kernel.org:/
MLIST:[oss-security] 20130604 Re: CVE Request: kernel info leak in tkill/tgkill
RH:CVE-2013-2141
RHSA-2013:1264
RHSA-2013:1292
RHSA-2013:1801
SECUNIA:55055
SMASH Issue 50017
SUSE:openSUSE-SU-2013:1971
UBUNTU:CVE-2013-2141
UBUNTU:USN-1899-1
UBUNTU:USN-1900-1
bnc#823267
linux.git:commit:c61f13eaa1ee17728c41370100d2d45c254ce76f
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#970873
CVE-2013-2146kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-2146
CONFIRM:github.com:CVE-2013-2146
CONFIRM:www.kernel.org:CVE-2013-2596
CVE-2013-2146
MANDRIVA:MDVSA-2013:176
MISC:git.kernel.org:MLIST:[oss-security] 20130605 Re: CVE Request: More perf security fixes
MLIST:[oss-security] 20130605 Re: CVE Request: More perf security fixes
RH:CVE-2013-2146
RHSA-2013:1173
RHSA-2013:1195
RHSA-2013:1264
SMASH Issue 54968
UBUNTU:CVE-2013-2146
bnc#825006
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f1923820c447e986a9da0fc6bf60c1dccdf0408e
rh#1007690
rh#1007939
rh#916646
rh#971309
CVE-2013-2147kernel-source-rt:Already fixedmoderate ()BID:63889
BID:64952
BID:64953
BID:64954
BID:65459
BID:65943
CONFIRM:git.kernel.org:CVE-2014-0101
CONFIRM:git.kernel.org:CVE-2014-1874
CONFIRM:github.com:CVE-2014-0101
CONFIRM:github.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-3153
CONFIRM:support.f5.com:CVE-2014-0101
CONFIRM:www.kernel.org:CVE-2014-1874
CVE-2013-2147
CVE-2013-4299
CVE-2013-6382
CVE-2014-0101
CVE-2014-1444
CVE-2014-1445
CVE-2014-1446
CVE-2014-1874
CVE-2023-2002
DSA-2906
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru()
MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS
MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk
MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle()
OSS:12052
OSS:2023/04/16/3
RH:CVE-2013-2147
RH:CVE-2013-4299
RH:CVE-2013-6382
RH:CVE-2014-0101
RH:CVE-2014-1444
RH:CVE-2014-1445
RH:CVE-2014-1446
RH:CVE-2014-1874
RHSA-2013:1166
RHSA-2013:1264
RHSA-2013:1436
RHSA-2013:1449
RHSA-2013:1450
RHSA-2013:1460
RHSA-2013:1490
RHSA-2013:1519
RHSA-2013:1520
RHSA-2013:1783
RHSA-2013:1860
RHSA-2014:0328
RHSA-2014:0419
RHSA-2014:0432
RHSA-2014:0439
RHSA-2014:0520
RHSA-2014:0771
SECUNIA:59216
SECUNIA:59262
SECUNIA:59309
SECUNIA:59406
SMASH Issue 54969
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2013-2147
UBUNTU:CVE-2013-4299
UBUNTU:CVE-2013-6382
UBUNTU:CVE-2014-0101
UBUNTU:CVE-2014-1444
UBUNTU:CVE-2014-1445
UBUNTU:CVE-2014-1446
UBUNTU:CVE-2014-1874
UBUNTU:USN-1994-1
UBUNTU:USN-1996-1
UBUNTU:USN-1997-1
UBUNTU:USN-1999-1
UBUNTU:USN-2015-1
UBUNTU:USN-2016-1
UBUNTU:USN-2040-1
UBUNTU:USN-2041-1
UBUNTU:USN-2042-1
UBUNTU:USN-2043-1
UBUNTU:USN-2044-1
UBUNTU:USN-2045-1
UBUNTU:USN-2046-1
UBUNTU:USN-2066-1
UBUNTU:USN-2067-1
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
UBUNTU:USN-2133-1
UBUNTU:USN-2134-1
UBUNTU:USN-2135-1
UBUNTU:USN-2136-1
UBUNTU:USN-2137-1
UBUNTU:USN-2138-1
UBUNTU:USN-2139-1
UBUNTU:USN-2140-1
UBUNTU:USN-2141-1
UBUNTU:USN-2173-1
UBUNTU:USN-2174-1
XF:linux-kernel-cve20141444-info-disc(90443)
XF:linux-kernel-cve20141445-info-disc(90444)
XF:linux-kernel-cve20141446-info-disc(90445)
bnc#823260
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98
linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e
linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a
linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca
rh#1004233
rh#1007690
rh#1033603
rh#1053610
rh#1053613
rh#1053620
rh#1062356
rh#1067558
rh#1070705
rh#1094232
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#971242
CVE-2013-2206kernel-source-rt:Not affectedimportant ()CONFIRM:git.kernel.org:CVE-2013-2206
CONFIRM:github.com:CVE-2013-2206
CONFIRM:www.kernel.org:CVE-2013-2206
CVE-2013-2206
DSA-2766
MISC:git.kernel.org:/
MISC:git.kernel.org:MLIST:[oss-security] 20130620 Re: CVE Request -- Linux kernel: sctp: duplicate cookie handling NULL pointer dereference
MLIST:[oss-security] 20130620 Re: CVE Request -- Linux kernel: sctp: duplicate cookie handling NULL pointer dereference
RH:CVE-2013-2206
RHSA-2013:1166
RHSA-2013:1173
RHSA-2013:1195
SMASH Issue 55714
SUSE:SUSE-SU-2013:1744
SUSE:SUSE-SU-2013:1748
SUSE:SUSE-SU-2013:1749
SUSE:SUSE-SU-2013:1750
SUSE:openSUSE-SU-2013:1971
UBUNTU:CVE-2013-2206
UBUNTU:USN-1939-1
bnc#826102
rh#976562
CVE-2013-2224kernel-source-rt:Unsupportedmoderate ()CVE-2013-2224
MLIST:[oss-security] 20130630 Re: CVE request: Kernel 2.6.32+ IP_RETOPTS Buffer Poisoning DoS
RH:CVE-2013-2224
RHSA-2013:1166
RHSA-2013:1173
RHSA-2013:1195
RHSA-2013:1450
SMASH Issue 55715
UBUNTU:CVE-2013-2224
bnc#827565
rh#853465
rh#979936
CVE-2013-2232kernel-source-rt:Not affectedimportant ()CONFIRM:git.kernel.org:CVE-2013-2232
CONFIRM:github.com:CVE-2013-2232
CONFIRM:www.kernel.org:CVE-2013-5634
CONFIRM:www.kernel.org:CVE-2013-7026
CONFIRM:www.kernel.org:CVE-2014-1874
CONFIRM:www.kernel.org:CVE-2014-3122
CVE-2013-2232
DSA-2745
DSA-2766
MLIST:[oss-security] 20130702 Re: CVE Request: kernel: ipv6: using ipv4 vs ipv6 structure during routing lookup in sendmsg
RH:CVE-2013-2232
RHSA-2013:1166
RHSA-2013:1173
RHSA-2013:1195
RHSA-2013:1264
SMASH Issue 55510
SMASH Issue 55716
SUSE:SUSE-SU-2013:1473
SUSE:SUSE-SU-2013:1474
SUSE:openSUSE-SU-2013:1971
UBUNTU:CVE-2013-2232
UBUNTU:USN-1912-1
UBUNTU:USN-1913-1
UBUNTU:USN-1938-1
UBUNTU:USN-1941-1
UBUNTU:USN-1942-1
UBUNTU:USN-1943-1
UBUNTU:USN-1944-1
UBUNTU:USN-1945-1
UBUNTU:USN-1946-1
UBUNTU:USN-1947-1
bdo#701744
bnc#827750
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a963a37d384d71ad43b3e9e79d68d42fbe0901f3
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#981552
CVE-2013-2234kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2013-2234
CONFIRM:github.com:CVE-2013-2234
CONFIRM:github.com:CVE-2014-0101
CONFIRM:github.com:CVE-2014-0131
CONFIRM:github.com:CVE-2014-1444
CONFIRM:github.com:CVE-2014-1445
CONFIRM:github.com:CVE-2014-1446
CONFIRM:github.com:CVE-2014-1874
CONFIRM:github.com:CVE-2014-3122
CONFIRM:github.com:CVE-2014-3145
CONFIRM:www.kernel.org:CVE-2013-5634
CVE-2013-2234
DSA-2745
DSA-2766
MISC:git.kernel.org:MLIST:[oss-security] 20130702 Re: CVE Request: information leak in AF_KEY notify messages
MLIST:[oss-security] 20130702 Re: CVE Request: information leak in AF_KEY notify messages
RH:CVE-2013-2234
RHSA-2013:1166
RHSA-2013:1264
RHSA-2013:1645
SMASH Issue 55717
SUSE:SUSE-SU-2013:1473
SUSE:SUSE-SU-2013:1474
SUSE:openSUSE-SU-2013:1971
UBUNTU:CVE-2013-2234
UBUNTU:USN-1912-1
UBUNTU:USN-1913-1
UBUNTU:USN-1938-1
UBUNTU:USN-1941-1
UBUNTU:USN-1942-1
UBUNTU:USN-1943-1
UBUNTU:USN-1944-1
UBUNTU:USN-1945-1
UBUNTU:USN-1946-1
UBUNTU:USN-1947-1
bdo#701744
bnc#827749
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a5cc68f3d63306d0d288f31edfc2ae6ef8ecd887
linux.git:commit:d049f74f2dbe71354d43d393ac3a188947811348
linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#980995
CVE-2013-2237kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-2237
CONFIRM:github.com:CVE-2013-2237
CONFIRM:www.kernel.org:CVE-2013-4592
CVE-2013-2237
DSA-2745
DSA-2766
MLIST:[oss-security] 20130703 Re: CVE Request: Earlier AF_KEY in key_notify_policy_flush
RH:CVE-2013-2237
RHSA-2013:1166
RHSA-2013:1173
RHSA-2013:1195
RHSA-2013:1264
SMASH Issue 55718
SUSE:SUSE-SU-2013:1473
SUSE:SUSE-SU-2013:1474
SUSE:openSUSE-SU-2013:1971
UBUNTU:CVE-2013-2237
UBUNTU:USN-1912-1
UBUNTU:USN-1913-1
UBUNTU:USN-1970-1
UBUNTU:USN-1972-1
UBUNTU:USN-1973-1
UBUNTU:USN-1992-1
UBUNTU:USN-1993-1
UBUNTU:USN-1995-1
UBUNTU:USN-1998-1
bdo#701744
bnc#828119
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=85dfb745ee40232876663ae206cba35f24ab2a40
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#981220
CVE-2013-2546kernel-source-rt:Unsupportedlow ()CONFIRM:git.kernel.org:CVE-2013-2548
CONFIRM:github.com:CVE-2013-2548
CVE-2013-2546
RH:CVE-2013-2546
RHSA-2013:0829
SMASH Issue 55073
UBUNTU:CVE-2013-2546
bnc#809906
rh#918512
CVE-2013-2548kernel-source-rt:Unsupportedlow ()CVE-2013-2548
RH:CVE-2013-2548
RHSA-2013:0829
SMASH Issue 231722
UBUNTU:CVE-2013-2548
rh#918512
CVE-2013-2634kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2013-2634
CONFIRM:github.com:CVE-2013-2634
CVE-2013-1873
CVE-2013-2634
DSA-2668
MLIST:[oss-security] 20130320 Re: Linux kernel: net - three info leaks in rtnl
RH:CVE-2013-1873
RH:CVE-2013-2634
RHSA-2013:0829
RHSA-2013:1051
RHSA-2013:1080
SMASH Issue 55091
UBUNTU:CVE-2013-2634
bnc#810473
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#923652
rh#924689
CVE-2013-2635kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2013-2635
CONFIRM:github.com:CVE-2013-2635
CVE-2013-1873
CVE-2013-2635
RH:CVE-2013-1873
RH:CVE-2013-2635
RHSA-2013:0829
RHSA-2013:1051
RHSA-2013:1080
SMASH Issue 55092
UBUNTU:CVE-2013-2635
bnc#810473
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#923652
rh#924690
CVE-2013-2888kernel-source-rt:Not affectedmoderate ()BID:62042
BID:62044
BID:62049
BID:62050
CONFIRM:www.kernel.org:CVE-2013-2899
CONFIRM:www.kernel.org:CVE-2013-6367
CVE-2013-2888
CVE-2013-2889
CVE-2013-2890
CVE-2013-2891
CVE-2013-2892
CVE-2013-2893
CVE-2013-2894
CVE-2013-2895
CVE-2013-2896
CVE-2013-2897
CVE-2013-2898
CVE-2013-2899
CVE-2023-2002
DSA-2906
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size
MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details
MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details
MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details
MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details
MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details
MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details
MLIST:[oss-security] 20130828 Linux HID security flaws
OSS:11016
OSS:2023/04/16/3
RH:CVE-2013-2888
RH:CVE-2013-2889
RH:CVE-2013-2890
RH:CVE-2013-2891
RH:CVE-2013-2892
RH:CVE-2013-2893
RH:CVE-2013-2894
RH:CVE-2013-2895
RH:CVE-2013-2896
RH:CVE-2013-2897
RH:CVE-2013-2898
RH:CVE-2013-2899
RHSA-2013:1490
RHSA-2013:1527
RHSA-2013:1645
RHSA-2014:0433
SMASH Issue 91755
SMASH Issue 91997
UBUNTU:CVE-2013-2888
UBUNTU:CVE-2013-2889
UBUNTU:CVE-2013-2890
UBUNTU:CVE-2013-2891
UBUNTU:CVE-2013-2892
UBUNTU:CVE-2013-2893
UBUNTU:CVE-2013-2894
UBUNTU:CVE-2013-2895
UBUNTU:CVE-2013-2896
UBUNTU:CVE-2013-2897
UBUNTU:CVE-2013-2898
UBUNTU:CVE-2013-2899
bnc#835839
linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26
linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528
linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792
linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d
linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a
linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4
linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456
linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1
linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07
linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83
linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95
linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b
linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a
linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a
linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4
linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb
rh#1000137
rh#1000360
rh#1000373
rh#1000414
rh#1000429
rh#1000451
rh#1000474
rh#1000494
rh#1000519
rh#1000536
rh#1007690
rh#1113899
rh#1163762
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#999890
rh#999960
CVE-2013-2889kernel-source-rt:Not affectedmoderate ()BID:62042
BID:62044
BID:62049
BID:62050
CONFIRM:www.kernel.org:CVE-2013-2899
CONFIRM:www.kernel.org:CVE-2013-6367
CVE-2013-2888
CVE-2013-2889
CVE-2013-2890
CVE-2013-2891
CVE-2013-2892
CVE-2013-2893
CVE-2013-2894
CVE-2013-2895
CVE-2013-2896
CVE-2013-2897
CVE-2013-2898
CVE-2013-2899
CVE-2023-2002
DSA-2906
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size
MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details
MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details
MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details
MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details
MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details
MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details
MLIST:[oss-security] 20130828 Linux HID security flaws
OSS:11016
OSS:2023/04/16/3
RH:CVE-2013-2888
RH:CVE-2013-2889
RH:CVE-2013-2890
RH:CVE-2013-2891
RH:CVE-2013-2892
RH:CVE-2013-2893
RH:CVE-2013-2894
RH:CVE-2013-2895
RH:CVE-2013-2896
RH:CVE-2013-2897
RH:CVE-2013-2898
RH:CVE-2013-2899
RHSA-2013:1490
RHSA-2013:1527
RHSA-2013:1645
RHSA-2014:0433
SMASH Issue 91755
SMASH Issue 92002
UBUNTU:CVE-2013-2888
UBUNTU:CVE-2013-2889
UBUNTU:CVE-2013-2890
UBUNTU:CVE-2013-2891
UBUNTU:CVE-2013-2892
UBUNTU:CVE-2013-2893
UBUNTU:CVE-2013-2894
UBUNTU:CVE-2013-2895
UBUNTU:CVE-2013-2896
UBUNTU:CVE-2013-2897
UBUNTU:CVE-2013-2898
UBUNTU:CVE-2013-2899
bnc#835839
linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26
linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528
linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792
linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d
linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a
linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4
linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456
linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1
linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07
linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83
linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95
linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b
linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a
linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a
linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4
linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb
rh#1000137
rh#1000360
rh#1000373
rh#1000414
rh#1000429
rh#1000451
rh#1000474
rh#1000494
rh#1000519
rh#1000536
rh#1007690
rh#1113899
rh#1163762
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#999890
rh#999960
CVE-2013-2890kernel-source-rt:Not affectedmoderate ()BID:62042
BID:62044
BID:62049
BID:62050
CONFIRM:www.kernel.org:CVE-2013-2899
CONFIRM:www.kernel.org:CVE-2013-6367
CVE-2013-2888
CVE-2013-2889
CVE-2013-2890
CVE-2013-2891
CVE-2013-2892
CVE-2013-2893
CVE-2013-2894
CVE-2013-2895
CVE-2013-2896
CVE-2013-2897
CVE-2013-2898
CVE-2013-2899
CVE-2023-2002
DSA-2906
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size
MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details
MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details
MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details
MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details
MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details
MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details
MLIST:[oss-security] 20130828 Linux HID security flaws
OSS:11016
OSS:2023/04/16/3
RH:CVE-2013-2888
RH:CVE-2013-2889
RH:CVE-2013-2890
RH:CVE-2013-2891
RH:CVE-2013-2892
RH:CVE-2013-2893
RH:CVE-2013-2894
RH:CVE-2013-2895
RH:CVE-2013-2896
RH:CVE-2013-2897
RH:CVE-2013-2898
RH:CVE-2013-2899
RHSA-2013:1490
RHSA-2013:1527
RHSA-2013:1645
RHSA-2014:0433
SMASH Issue 91755
SMASH Issue 91998
UBUNTU:CVE-2013-2888
UBUNTU:CVE-2013-2889
UBUNTU:CVE-2013-2890
UBUNTU:CVE-2013-2891
UBUNTU:CVE-2013-2892
UBUNTU:CVE-2013-2893
UBUNTU:CVE-2013-2894
UBUNTU:CVE-2013-2895
UBUNTU:CVE-2013-2896
UBUNTU:CVE-2013-2897
UBUNTU:CVE-2013-2898
UBUNTU:CVE-2013-2899
bnc#835839
linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26
linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528
linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792
linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d
linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a
linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4
linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456
linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1
linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07
linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83
linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95
linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b
linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a
linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a
linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4
linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb
rh#1000137
rh#1000360
rh#1000373
rh#1000414
rh#1000429
rh#1000451
rh#1000474
rh#1000494
rh#1000519
rh#1000536
rh#1007690
rh#1113899
rh#1163762
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#999890
rh#999960
CVE-2013-2891kernel-source-rt:Not affectedmoderate ()BID:62042
BID:62044
BID:62049
BID:62050
CONFIRM:www.kernel.org:CVE-2013-2899
CONFIRM:www.kernel.org:CVE-2013-6367
CVE-2013-2888
CVE-2013-2889
CVE-2013-2890
CVE-2013-2891
CVE-2013-2892
CVE-2013-2893
CVE-2013-2894
CVE-2013-2895
CVE-2013-2896
CVE-2013-2897
CVE-2013-2898
CVE-2013-2899
CVE-2023-2002
DSA-2906
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size
MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details
MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details
MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details
MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details
MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details
MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details
MLIST:[oss-security] 20130828 Linux HID security flaws
OSS:11016
OSS:2023/04/16/3
RH:CVE-2013-2888
RH:CVE-2013-2889
RH:CVE-2013-2890
RH:CVE-2013-2891
RH:CVE-2013-2892
RH:CVE-2013-2893
RH:CVE-2013-2894
RH:CVE-2013-2895
RH:CVE-2013-2896
RH:CVE-2013-2897
RH:CVE-2013-2898
RH:CVE-2013-2899
RHSA-2013:1490
RHSA-2013:1527
RHSA-2013:1645
RHSA-2014:0433
SMASH Issue 91755
SMASH Issue 92003
UBUNTU:CVE-2013-2888
UBUNTU:CVE-2013-2889
UBUNTU:CVE-2013-2890
UBUNTU:CVE-2013-2891
UBUNTU:CVE-2013-2892
UBUNTU:CVE-2013-2893
UBUNTU:CVE-2013-2894
UBUNTU:CVE-2013-2895
UBUNTU:CVE-2013-2896
UBUNTU:CVE-2013-2897
UBUNTU:CVE-2013-2898
UBUNTU:CVE-2013-2899
bnc#835839
linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26
linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528
linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792
linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d
linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a
linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4
linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456
linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1
linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07
linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83
linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95
linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b
linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a
linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a
linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4
linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb
rh#1000137
rh#1000360
rh#1000373
rh#1000414
rh#1000429
rh#1000451
rh#1000474
rh#1000494
rh#1000519
rh#1000536
rh#1007690
rh#1113899
rh#1163762
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#999890
rh#999960
CVE-2013-2892kernel-source-rt:Not affectedmoderate ()BID:62042
BID:62044
BID:62049
BID:62050
CONFIRM:www.kernel.org:CVE-2013-2899
CONFIRM:www.kernel.org:CVE-2013-6367
CVE-2013-2888
CVE-2013-2889
CVE-2013-2890
CVE-2013-2891
CVE-2013-2892
CVE-2013-2893
CVE-2013-2894
CVE-2013-2895
CVE-2013-2896
CVE-2013-2897
CVE-2013-2898
CVE-2013-2899
CVE-2023-2002
DSA-2906
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size
MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details
MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details
MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details
MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details
MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details
MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details
MLIST:[oss-security] 20130828 Linux HID security flaws
OSS:11016
OSS:2023/04/16/3
RH:CVE-2013-2888
RH:CVE-2013-2889
RH:CVE-2013-2890
RH:CVE-2013-2891
RH:CVE-2013-2892
RH:CVE-2013-2893
RH:CVE-2013-2894
RH:CVE-2013-2895
RH:CVE-2013-2896
RH:CVE-2013-2897
RH:CVE-2013-2898
RH:CVE-2013-2899
RHSA-2013:1490
RHSA-2013:1527
RHSA-2013:1645
RHSA-2014:0433
SMASH Issue 91755
SMASH Issue 92001
UBUNTU:CVE-2013-2888
UBUNTU:CVE-2013-2889
UBUNTU:CVE-2013-2890
UBUNTU:CVE-2013-2891
UBUNTU:CVE-2013-2892
UBUNTU:CVE-2013-2893
UBUNTU:CVE-2013-2894
UBUNTU:CVE-2013-2895
UBUNTU:CVE-2013-2896
UBUNTU:CVE-2013-2897
UBUNTU:CVE-2013-2898
UBUNTU:CVE-2013-2899
bnc#835839
linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26
linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528
linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792
linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d
linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a
linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4
linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456
linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1
linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07
linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83
linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95
linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b
linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a
linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a
linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4
linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb
rh#1000137
rh#1000360
rh#1000373
rh#1000414
rh#1000429
rh#1000451
rh#1000474
rh#1000494
rh#1000519
rh#1000536
rh#1007690
rh#1113899
rh#1163762
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#999890
rh#999960
CVE-2013-2893kernel-source-rt:Not affectedmoderate ()BID:62042
BID:62044
BID:62049
BID:62050
CONFIRM:www.kernel.org:CVE-2013-2899
CONFIRM:www.kernel.org:CVE-2013-6367
CVE-2013-2888
CVE-2013-2889
CVE-2013-2890
CVE-2013-2891
CVE-2013-2892
CVE-2013-2893
CVE-2013-2894
CVE-2013-2895
CVE-2013-2896
CVE-2013-2897
CVE-2013-2898
CVE-2013-2899
CVE-2023-2002
DSA-2906
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size
MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details
MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details
MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details
MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details
MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details
MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details
MLIST:[oss-security] 20130828 Linux HID security flaws
OSS:11016
OSS:2023/04/16/3
RH:CVE-2013-2888
RH:CVE-2013-2889
RH:CVE-2013-2890
RH:CVE-2013-2891
RH:CVE-2013-2892
RH:CVE-2013-2893
RH:CVE-2013-2894
RH:CVE-2013-2895
RH:CVE-2013-2896
RH:CVE-2013-2897
RH:CVE-2013-2898
RH:CVE-2013-2899
RHSA-2013:1490
RHSA-2013:1527
RHSA-2013:1645
RHSA-2014:0433
SMASH Issue 91755
SMASH Issue 92004
UBUNTU:CVE-2013-2888
UBUNTU:CVE-2013-2889
UBUNTU:CVE-2013-2890
UBUNTU:CVE-2013-2891
UBUNTU:CVE-2013-2892
UBUNTU:CVE-2013-2893
UBUNTU:CVE-2013-2894
UBUNTU:CVE-2013-2895
UBUNTU:CVE-2013-2896
UBUNTU:CVE-2013-2897
UBUNTU:CVE-2013-2898
UBUNTU:CVE-2013-2899
bnc#835839
linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26
linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528
linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792
linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d
linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a
linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4
linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456
linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1
linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07
linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83
linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95
linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b
linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a
linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a
linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4
linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb
rh#1000137
rh#1000360
rh#1000373
rh#1000414
rh#1000429
rh#1000451
rh#1000474
rh#1000494
rh#1000519
rh#1000536
rh#1007690
rh#1113899
rh#1163762
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#999890
rh#999960
CVE-2013-2894kernel-source-rt:Not affectedmoderate ()BID:62042
BID:62044
BID:62049
BID:62050
CONFIRM:www.kernel.org:CVE-2013-2899
CONFIRM:www.kernel.org:CVE-2013-6367
CVE-2013-2888
CVE-2013-2889
CVE-2013-2890
CVE-2013-2891
CVE-2013-2892
CVE-2013-2893
CVE-2013-2894
CVE-2013-2895
CVE-2013-2896
CVE-2013-2897
CVE-2013-2898
CVE-2013-2899
CVE-2023-2002
DSA-2906
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size
MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details
MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details
MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details
MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details
MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details
MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details
MLIST:[oss-security] 20130828 Linux HID security flaws
OSS:11016
OSS:2023/04/16/3
RH:CVE-2013-2888
RH:CVE-2013-2889
RH:CVE-2013-2890
RH:CVE-2013-2891
RH:CVE-2013-2892
RH:CVE-2013-2893
RH:CVE-2013-2894
RH:CVE-2013-2895
RH:CVE-2013-2896
RH:CVE-2013-2897
RH:CVE-2013-2898
RH:CVE-2013-2899
RHSA-2013:1490
RHSA-2013:1527
RHSA-2013:1645
RHSA-2014:0433
SMASH Issue 91755
SMASH Issue 91915
SMASH Issue 92000
UBUNTU:CVE-2013-2888
UBUNTU:CVE-2013-2889
UBUNTU:CVE-2013-2890
UBUNTU:CVE-2013-2891
UBUNTU:CVE-2013-2892
UBUNTU:CVE-2013-2893
UBUNTU:CVE-2013-2894
UBUNTU:CVE-2013-2895
UBUNTU:CVE-2013-2896
UBUNTU:CVE-2013-2897
UBUNTU:CVE-2013-2898
UBUNTU:CVE-2013-2899
UBUNTU:USN-2020-1
UBUNTU:USN-2023-1
bnc#835839
linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26
linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528
linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792
linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d
linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a
linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4
linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456
linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1
linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07
linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83
linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95
linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b
linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a
linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a
linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4
linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb
rh#1000137
rh#1000360
rh#1000373
rh#1000414
rh#1000429
rh#1000451
rh#1000474
rh#1000494
rh#1000519
rh#1000536
rh#1007690
rh#1113899
rh#1163762
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#999890
rh#999960
CVE-2013-2895kernel-source-rt:Not affectedmoderate ()BID:62042
BID:62044
BID:62049
BID:62050
CONFIRM:www.kernel.org:CVE-2013-2899
CONFIRM:www.kernel.org:CVE-2013-6367
CVE-2013-2888
CVE-2013-2889
CVE-2013-2890
CVE-2013-2891
CVE-2013-2892
CVE-2013-2893
CVE-2013-2894
CVE-2013-2895
CVE-2013-2896
CVE-2013-2897
CVE-2013-2898
CVE-2013-2899
CVE-2023-2002
DSA-2906
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size
MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details
MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details
MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details
MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details
MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details
MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details
MLIST:[oss-security] 20130828 Linux HID security flaws
OSS:11016
OSS:2023/04/16/3
RH:CVE-2013-2888
RH:CVE-2013-2889
RH:CVE-2013-2890
RH:CVE-2013-2891
RH:CVE-2013-2892
RH:CVE-2013-2893
RH:CVE-2013-2894
RH:CVE-2013-2895
RH:CVE-2013-2896
RH:CVE-2013-2897
RH:CVE-2013-2898
RH:CVE-2013-2899
RHSA-2013:1490
RHSA-2013:1527
RHSA-2013:1645
RHSA-2014:0433
SMASH Issue 91755
SMASH Issue 91999
UBUNTU:CVE-2013-2888
UBUNTU:CVE-2013-2889
UBUNTU:CVE-2013-2890
UBUNTU:CVE-2013-2891
UBUNTU:CVE-2013-2892
UBUNTU:CVE-2013-2893
UBUNTU:CVE-2013-2894
UBUNTU:CVE-2013-2895
UBUNTU:CVE-2013-2896
UBUNTU:CVE-2013-2897
UBUNTU:CVE-2013-2898
UBUNTU:CVE-2013-2899
UBUNTU:USN-2019-1
UBUNTU:USN-2020-1
UBUNTU:USN-2021-1
UBUNTU:USN-2022-1
UBUNTU:USN-2023-1
UBUNTU:USN-2024-1
UBUNTU:USN-2038-1
UBUNTU:USN-2039-1
UBUNTU:USN-2050-1
bnc#835839
linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26
linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528
linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792
linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d
linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a
linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4
linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456
linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1
linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07
linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83
linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95
linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b
linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a
linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a
linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4
linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb
rh#1000137
rh#1000360
rh#1000373
rh#1000414
rh#1000429
rh#1000451
rh#1000474
rh#1000494
rh#1000519
rh#1000536
rh#1007690
rh#1113899
rh#1163762
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#999890
rh#999960
CVE-2013-2896kernel-source-rt:Not affectedmoderate ()BID:62042
BID:62044
BID:62049
BID:62050
CONFIRM:www.kernel.org:CVE-2013-2899
CONFIRM:www.kernel.org:CVE-2013-6367
CVE-2013-2888
CVE-2013-2889
CVE-2013-2890
CVE-2013-2891
CVE-2013-2892
CVE-2013-2893
CVE-2013-2894
CVE-2013-2895
CVE-2013-2896
CVE-2013-2897
CVE-2013-2898
CVE-2013-2899
CVE-2023-2002
DSA-2906
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size
MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details
MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details
MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details
MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details
MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details
MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details
MLIST:[oss-security] 20130828 Linux HID security flaws
OSS:11016
OSS:2023/04/16/3
RH:CVE-2013-2888
RH:CVE-2013-2889
RH:CVE-2013-2890
RH:CVE-2013-2891
RH:CVE-2013-2892
RH:CVE-2013-2893
RH:CVE-2013-2894
RH:CVE-2013-2895
RH:CVE-2013-2896
RH:CVE-2013-2897
RH:CVE-2013-2898
RH:CVE-2013-2899
RHSA-2013:1490
RHSA-2013:1527
RHSA-2013:1645
RHSA-2014:0433
SMASH Issue 91755
UBUNTU:CVE-2013-2888
UBUNTU:CVE-2013-2889
UBUNTU:CVE-2013-2890
UBUNTU:CVE-2013-2891
UBUNTU:CVE-2013-2892
UBUNTU:CVE-2013-2893
UBUNTU:CVE-2013-2894
UBUNTU:CVE-2013-2895
UBUNTU:CVE-2013-2896
UBUNTU:CVE-2013-2897
UBUNTU:CVE-2013-2898
UBUNTU:CVE-2013-2899
bnc#835839
linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26
linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528
linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792
linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d
linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a
linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4
linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456
linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1
linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07
linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83
linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95
linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b
linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a
linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a
linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4
linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb
rh#1000137
rh#1000360
rh#1000373
rh#1000414
rh#1000429
rh#1000451
rh#1000474
rh#1000494
rh#1000519
rh#1000536
rh#1007690
rh#1113899
rh#1163762
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#999890
rh#999960
CVE-2013-2897kernel-source-rt:Not affectedmoderate ()BID:62042
BID:62044
BID:62049
BID:62050
CONFIRM:www.kernel.org:CVE-2013-2899
CONFIRM:www.kernel.org:CVE-2013-6367
CVE-2013-2888
CVE-2013-2889
CVE-2013-2890
CVE-2013-2891
CVE-2013-2892
CVE-2013-2893
CVE-2013-2894
CVE-2013-2895
CVE-2013-2896
CVE-2013-2897
CVE-2013-2898
CVE-2013-2899
CVE-2023-2002
DSA-2906
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size
MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details
MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details
MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details
MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details
MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details
MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details
MLIST:[oss-security] 20130828 Linux HID security flaws
OSS:11016
OSS:2023/04/16/3
RH:CVE-2013-2888
RH:CVE-2013-2889
RH:CVE-2013-2890
RH:CVE-2013-2891
RH:CVE-2013-2892
RH:CVE-2013-2893
RH:CVE-2013-2894
RH:CVE-2013-2895
RH:CVE-2013-2896
RH:CVE-2013-2897
RH:CVE-2013-2898
RH:CVE-2013-2899
RHSA-2013:1490
RHSA-2013:1527
RHSA-2013:1645
RHSA-2014:0433
SMASH Issue 91755
UBUNTU:CVE-2013-2888
UBUNTU:CVE-2013-2889
UBUNTU:CVE-2013-2890
UBUNTU:CVE-2013-2891
UBUNTU:CVE-2013-2892
UBUNTU:CVE-2013-2893
UBUNTU:CVE-2013-2894
UBUNTU:CVE-2013-2895
UBUNTU:CVE-2013-2896
UBUNTU:CVE-2013-2897
UBUNTU:CVE-2013-2898
UBUNTU:CVE-2013-2899
bnc#835839
linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26
linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528
linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792
linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d
linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a
linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4
linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456
linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1
linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07
linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83
linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95
linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b
linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a
linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a
linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4
linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb
rh#1000137
rh#1000360
rh#1000373
rh#1000414
rh#1000429
rh#1000451
rh#1000474
rh#1000494
rh#1000519
rh#1000536
rh#1007690
rh#1113899
rh#1163762
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#999890
rh#999960
CVE-2013-2898kernel-source-rt:Not affectedmoderate ()BID:62042
BID:62044
BID:62049
BID:62050
CONFIRM:www.kernel.org:CVE-2013-2899
CONFIRM:www.kernel.org:CVE-2013-6367
CVE-2013-2888
CVE-2013-2889
CVE-2013-2890
CVE-2013-2891
CVE-2013-2892
CVE-2013-2893
CVE-2013-2894
CVE-2013-2895
CVE-2013-2896
CVE-2013-2897
CVE-2013-2898
CVE-2013-2899
CVE-2023-2002
DSA-2906
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size
MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details
MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details
MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details
MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details
MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details
MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details
MLIST:[oss-security] 20130828 Linux HID security flaws
OSS:11016
OSS:2023/04/16/3
RH:CVE-2013-2888
RH:CVE-2013-2889
RH:CVE-2013-2890
RH:CVE-2013-2891
RH:CVE-2013-2892
RH:CVE-2013-2893
RH:CVE-2013-2894
RH:CVE-2013-2895
RH:CVE-2013-2896
RH:CVE-2013-2897
RH:CVE-2013-2898
RH:CVE-2013-2899
RHSA-2013:1490
RHSA-2013:1527
RHSA-2013:1645
RHSA-2014:0433
SMASH Issue 91755
UBUNTU:CVE-2013-2888
UBUNTU:CVE-2013-2889
UBUNTU:CVE-2013-2890
UBUNTU:CVE-2013-2891
UBUNTU:CVE-2013-2892
UBUNTU:CVE-2013-2893
UBUNTU:CVE-2013-2894
UBUNTU:CVE-2013-2895
UBUNTU:CVE-2013-2896
UBUNTU:CVE-2013-2897
UBUNTU:CVE-2013-2898
UBUNTU:CVE-2013-2899
bnc#835839
linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26
linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528
linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792
linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d
linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a
linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4
linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456
linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1
linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07
linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83
linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95
linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b
linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a
linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a
linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4
linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb
rh#1000137
rh#1000360
rh#1000373
rh#1000414
rh#1000429
rh#1000451
rh#1000474
rh#1000494
rh#1000519
rh#1000536
rh#1007690
rh#1113899
rh#1163762
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#999890
rh#999960
CVE-2013-2899kernel-source-rt:Not affectedmoderate ()BID:62042
BID:62044
BID:62049
BID:62050
CONFIRM:www.kernel.org:CVE-2013-2899
CONFIRM:www.kernel.org:CVE-2013-6367
CVE-2013-2888
CVE-2013-2889
CVE-2013-2890
CVE-2013-2891
CVE-2013-2892
CVE-2013-2893
CVE-2013-2894
CVE-2013-2895
CVE-2013-2896
CVE-2013-2897
CVE-2013-2898
CVE-2013-2899
CVE-2023-2002
DSA-2906
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size
MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details
MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details
MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details
MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details
MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details
MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details
MLIST:[oss-security] 20130828 Linux HID security flaws
OSS:11016
OSS:2023/04/16/3
RH:CVE-2013-2888
RH:CVE-2013-2889
RH:CVE-2013-2890
RH:CVE-2013-2891
RH:CVE-2013-2892
RH:CVE-2013-2893
RH:CVE-2013-2894
RH:CVE-2013-2895
RH:CVE-2013-2896
RH:CVE-2013-2897
RH:CVE-2013-2898
RH:CVE-2013-2899
RHSA-2013:1490
RHSA-2013:1527
RHSA-2013:1645
RHSA-2014:0433
SMASH Issue 91755
UBUNTU:CVE-2013-2888
UBUNTU:CVE-2013-2889
UBUNTU:CVE-2013-2890
UBUNTU:CVE-2013-2891
UBUNTU:CVE-2013-2892
UBUNTU:CVE-2013-2893
UBUNTU:CVE-2013-2894
UBUNTU:CVE-2013-2895
UBUNTU:CVE-2013-2896
UBUNTU:CVE-2013-2897
UBUNTU:CVE-2013-2898
UBUNTU:CVE-2013-2899
bnc#835839
linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26
linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528
linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792
linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d
linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a
linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4
linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456
linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1
linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07
linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83
linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95
linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b
linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a
linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a
linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4
linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb
rh#1000137
rh#1000360
rh#1000373
rh#1000414
rh#1000429
rh#1000451
rh#1000474
rh#1000494
rh#1000519
rh#1000536
rh#1007690
rh#1113899
rh#1163762
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#999890
rh#999960
CVE-2013-3076kernel-source-rt:Not affectedmoderate ()CONFIRM:github.com:CVE-2013-3076
CVE-2013-3076
DSA-2669
MISC:git.kernel.org:MLIST:[oss-security] 20130414 Linux kernel: more net info leak fixes for v3.9
MLIST:[oss-security] 20130414 Linux kernel: more net info leak fixes for v3.9
RH:CVE-2013-3076
RHSA-2013:0829
SMASH Issue 49834
UBUNTU:CVE-2013-3076
UBUNTU:USN-1837-1
bnc#816668
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#956162
CVE-2013-3222kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-3222
CONFIRM:github.com:CVE-2013-3222
CVE-2013-3222
DSA-2668
DSA-2669
MLIST:[linux-kernel] 20130414 Linux 3.9-rc7
RH:CVE-2013-3222
RHSA-2013:0829
RHSA-2013:1034
RHSA-2013:1051
RHSA-2013:1080
SMASH Issue 49818
UBUNTU:CVE-2013-3222
bnc#816668
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#955216
CVE-2013-3223kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-3223
CONFIRM:github.com:CVE-2013-3223
CVE-2013-3223
DSA-2668
DSA-2669
RH:CVE-2013-3223
SMASH Issue 49819
UBUNTU:CVE-2013-3223
bnc#816668
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#955662
CVE-2013-3224kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-3224
CONFIRM:github.com:CVE-2013-3224
CVE-2013-3224
DSA-2668
DSA-2669
RH:CVE-2013-3224
RHSA-2013:0829
RHSA-2013:1034
RHSA-2013:1051
RHSA-2013:1080
SMASH Issue 49820
UBUNTU:CVE-2013-3224
bnc#816668
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#955599
CVE-2013-3226kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-3226
CONFIRM:github.com:CVE-2013-3226
CVE-2013-3226
RH:CVE-2013-3226
SMASH Issue 49822
UBUNTU:CVE-2013-3226
rh#956048
CVE-2013-3227kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-3227
CONFIRM:github.com:CVE-2013-3227
CVE-2013-3227
DSA-2669
RH:CVE-2013-3227
SMASH Issue 49823
UBUNTU:CVE-2013-3227
bnc#816668
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#956061
CVE-2013-3228kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-3228
CONFIRM:github.com:CVE-2013-3228
CVE-2013-3228
DSA-2668
DSA-2669
RH:CVE-2013-3228
SMASH Issue 49824
UBUNTU:CVE-2013-3228
bnc#816668
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#956069
CVE-2013-3229kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-3229
CONFIRM:github.com:CVE-2013-3229
CVE-2013-3229
DSA-2668
DSA-2669
RH:CVE-2013-3229
SMASH Issue 49825
UBUNTU:CVE-2013-3229
bnc#816668
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#956079
CVE-2013-3230kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-3230
CONFIRM:github.com:CVE-2013-3230
CVE-2013-3230
RH:CVE-2013-3230
SMASH Issue 49826
UBUNTU:CVE-2013-3230
rh#956088
CVE-2013-3231kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-3231
CONFIRM:github.com:CVE-2013-3231
CVE-2013-3231
DSA-2668
DSA-2669
RH:CVE-2013-3231
RHSA-2013:0829
RHSA-2013:1034
RHSA-2013:1645
SMASH Issue 49827
UBUNTU:CVE-2013-3231
bnc#816668
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#956094
CVE-2013-3232kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-3232
CONFIRM:github.com:CVE-2013-3232
CVE-2013-3232
RH:CVE-2013-3232
SMASH Issue 49828
UBUNTU:CVE-2013-3232
bnc#816668
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#956110
CVE-2013-3233kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-3233
CONFIRM:github.com:CVE-2013-3233
CVE-2013-3233
RH:CVE-2013-3233
SMASH Issue 49829
UBUNTU:CVE-2013-3233
rh#956125
CVE-2013-3234kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-3234
CONFIRM:github.com:CVE-2013-3234
CVE-2013-3234
DSA-2668
DSA-2669
RH:CVE-2013-3234
SMASH Issue 49830
UBUNTU:CVE-2013-3234
bnc#816668
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#956135
CVE-2013-3235kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-3235
CONFIRM:github.com:CVE-2013-3235
CVE-2013-3235
DSA-2668
DSA-2669
RH:CVE-2013-3235
RHSA-2013:1034
SMASH Issue 49831
UBUNTU:CVE-2013-3235
bnc#816668
rh#1007690
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#956145
CVE-2013-3301kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-3301
CONFIRM:github.com:CVE-2013-3301
CONFIRM:www.kernel.org:CVE-2013-3301
CVE-2013-3301
DSA-2669
MISC:git.kernel.org:/
MLIST:[oss-security] 20130415 CVE request - Linux kernel: tracing NULL pointer dereference
RH:CVE-2013-3301
RHSA-2013:1051
RHSA-2013:1080
RHSA-2013:1264
SMASH Issue 2392
SUSE:SUSE-SU-2013:1473
SUSE:openSUSE-SU-2013:1971
UBUNTU:CVE-2013-3301
UBUNTU:USN-1834-1
UBUNTU:USN-1835-1
UBUNTU:USN-1836-1
UBUNTU:USN-1838-1
bnc#815256
rh#952197
CVE-2013-3302kernel-source-rt:Unsupportedmoderate ()BID:59064
CONFIRM:git.kernel.org:CVE-2013-3302
CONFIRM:github.com:CVE-2013-3302
CONFIRM:www.kernel.org:CVE-2013-4591
CVE-2013-3302
MLIST:[oss-security] 20130415 CVE request: Linux kernel: cifs: NULL pointer dereference
RH:CVE-2013-3302
SMASH Issue 55220
UBUNTU:CVE-2013-3302
bnc#815266
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea702b80e0bbb2448e201472127288beb82ca2fe
rh#952260
CVE-2013-3713aaa_base:Analysismoderate ()CONFIRM:bugzilla.novell.com:CVE-2013-3713
CVE-2013-3713
D:CVE-2013-3713
SMASH Issue 92746
SUSE:openSUSE-SU-2013:1955
bnc#843230
CVE-2013-4162kernel-source-rt:Not affectedmoderate ()BID:61411
CONFIRM:git.kernel.org:CVE-2013-4162
CONFIRM:github.com:CVE-2013-4162
CVE-2013-4162
DSA-2745
DSA-2906
MLIST:[oss-security] 20130723 Re: CVE Request: Linux kernel: panic while pushing pending data out of an IPv6 socket with UDP_CORK enabled.
OSS:10680
OSS:10681
RH:CVE-2013-4162
RHSA-2013:1264
RHSA-2013:1292
RHSA-2013:1436
RHSA-2013:1460
RHSA-2013:1520
SECUNIA:54148
SMASH Issue 90556
SUSE:SUSE-SU-2013:1473
SUSE:SUSE-SU-2013:1474
SUSE:openSUSE-SU-2013:1971
UBUNTU:CVE-2013-4162
UBUNTU:USN-1938-1
UBUNTU:USN-1939-1
UBUNTU:USN-1941-1
UBUNTU:USN-1942-1
UBUNTU:USN-1943-1
UBUNTU:USN-1944-1
UBUNTU:USN-1945-1
UBUNTU:USN-1946-1
UBUNTU:USN-1947-1
bdo#701744
bnc#831058
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1
rh#987627
rh#987633
CVE-2013-4163kernel-source-rt:Not affectedmoderate ()BID:61412
CONFIRM:git.kernel.org:CVE-2013-4163
CONFIRM:github.com:CVE-2013-4163
CVE-2013-4163
DSA-2745
MLIST:[oss-security] 20130723 Re: CVE request: Linux kernel: panic while appending data to a corked IPv6 socket in ip6_append_data_mtu
OSS:10681
RH:CVE-2013-4163
RHSA-2013:1264
SMASH Issue 90553
SMASH Issue 90555
SUSE:SUSE-SU-2013:1473
SUSE:SUSE-SU-2013:1474
UBUNTU:CVE-2013-4163
UBUNTU:USN-1938-1
UBUNTU:USN-1941-1
UBUNTU:USN-1942-1
UBUNTU:USN-1943-1
UBUNTU:USN-1944-1
UBUNTU:USN-1945-1
UBUNTU:USN-1946-1
UBUNTU:USN-1947-1
bdo#701744
bnc#831055
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75a493e60ac4bbe2e977e7129d6d8cbb0dd236be
rh#987633
CVE-2013-4220kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2013-4220
CONFIRM:github.com:CVE-2013-4220
CONFIRM:www.kernel.org:CVE-2013-4220
CVE-2013-4220
MLIST:[oss-security] 20130808 Re: CVE Request: Linux kernel: arm64: unhandled el0 traps
OSS:10824
RH:CVE-2013-4220
SMASH Issue 91530
UBUNTU:CVE-2013-4220
bnc#837109
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9955ac47f4ba1c95ecb6092aeaefb40a22e99268
rh#996380
CVE-2013-4254kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2013-4254
CONFIRM:github.com:CVE-2013-4254
CONFIRM:www.kernel.org:CVE-2013-4254
CVE-2013-4254
MISC:www.arm.linux.org.uk:MLIST:[oss-security] 20130816 Re: CVE Request: linux-kernel priviledge escalation on ARM/perf
MLIST:[oss-security] 20130816 Re: CVE Request: linux-kernel priviledge escalation on ARM/perf
OSS:10889
RH:CVE-2013-4254
SECUNIA:54494
SMASH Issue 91673
UBUNTU:CVE-2013-4254
UBUNTU:USN-1968-1
UBUNTU:USN-1969-1
UBUNTU:USN-1970-1
UBUNTU:USN-1971-1
UBUNTU:USN-1972-1
UBUNTU:USN-1973-1
UBUNTU:USN-1974-1
UBUNTU:USN-1975-1
bnc#837111
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c95eb3184ea1a3a2551df57190c81da695e2144b
rh#1094232
rh#998878
CVE-2013-4270kernel-source-rt:Not affectedlow ()CONFIRM:git.kernel.org:CVE-2013-4270
CONFIRM:github.com:CVE-2013-4270
CONFIRM:www.kernel.org:CVE-2013-6431
CVE-2013-4270
RH:CVE-2013-4270
RHSA-2014:0100
SMASH Issue 91886
UBUNTU:CVE-2013-4270
UBUNTU:USN-2049-1
bnc#836949
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2433c8f094a008895e66f25bd1773cdb01c91d01
rh#1027752
CVE-2013-4299kernel-source-rt:Already fixedmoderate ()BID:63889
BID:64952
BID:64953
BID:64954
BID:65459
BID:65943
CONFIRM:git.kernel.org:CVE-2014-0101
CONFIRM:git.kernel.org:CVE-2014-1874
CONFIRM:github.com:CVE-2014-0101
CONFIRM:github.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-3153
CONFIRM:support.f5.com:CVE-2014-0101
CONFIRM:www.kernel.org:CVE-2014-1874
CVE-2013-2147
CVE-2013-4299
CVE-2013-6382
CVE-2014-0101
CVE-2014-1444
CVE-2014-1445
CVE-2014-1446
CVE-2014-1874
CVE-2023-2002
DSA-2906
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru()
MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS
MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk
MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle()
OSS:12052
OSS:2023/04/16/3
RH:CVE-2013-2147
RH:CVE-2013-4299
RH:CVE-2013-6382
RH:CVE-2014-0101
RH:CVE-2014-1444
RH:CVE-2014-1445
RH:CVE-2014-1446
RH:CVE-2014-1874
RHSA-2013:1166
RHSA-2013:1264
RHSA-2013:1436
RHSA-2013:1449
RHSA-2013:1450
RHSA-2013:1460
RHSA-2013:1490
RHSA-2013:1519
RHSA-2013:1520
RHSA-2013:1783
RHSA-2013:1860
RHSA-2014:0328
RHSA-2014:0419
RHSA-2014:0432
RHSA-2014:0439
RHSA-2014:0520
RHSA-2014:0771
SECUNIA:59216
SECUNIA:59262
SECUNIA:59309
SECUNIA:59406
SMASH Issue 54969
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2013-2147
UBUNTU:CVE-2013-4299
UBUNTU:CVE-2013-6382
UBUNTU:CVE-2014-0101
UBUNTU:CVE-2014-1444
UBUNTU:CVE-2014-1445
UBUNTU:CVE-2014-1446
UBUNTU:CVE-2014-1874
UBUNTU:USN-1994-1
UBUNTU:USN-1996-1
UBUNTU:USN-1997-1
UBUNTU:USN-1999-1
UBUNTU:USN-2015-1
UBUNTU:USN-2016-1
UBUNTU:USN-2040-1
UBUNTU:USN-2041-1
UBUNTU:USN-2042-1
UBUNTU:USN-2043-1
UBUNTU:USN-2044-1
UBUNTU:USN-2045-1
UBUNTU:USN-2046-1
UBUNTU:USN-2066-1
UBUNTU:USN-2067-1
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
UBUNTU:USN-2133-1
UBUNTU:USN-2134-1
UBUNTU:USN-2135-1
UBUNTU:USN-2136-1
UBUNTU:USN-2137-1
UBUNTU:USN-2138-1
UBUNTU:USN-2139-1
UBUNTU:USN-2140-1
UBUNTU:USN-2141-1
UBUNTU:USN-2173-1
UBUNTU:USN-2174-1
XF:linux-kernel-cve20141444-info-disc(90443)
XF:linux-kernel-cve20141445-info-disc(90444)
XF:linux-kernel-cve20141446-info-disc(90445)
bnc#823260
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98
linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e
linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a
linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca
rh#1004233
rh#1007690
rh#1033603
rh#1053610
rh#1053613
rh#1053620
rh#1062356
rh#1067558
rh#1070705
rh#1094232
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#971242
CVE-2013-4300kernel-source-rt:Unsupportedimportant ()CONFIRM:git.kernel.org:CVE-2013-4300
CONFIRM:github.com:CVE-2013-4300
CONFIRM:www.kernel.org:CVE-2013-4300
CVE-2013-4300
MISC:git.kernel.org:MLIST:[oss-security] 20130904 Re: CVE request: Kernel PID Spoofing Privilege Escalation Vulnerability
MISC:secunia.com:MLIST:[oss-security] 20130904 Re: CVE request: Kernel PID Spoofing Privilege Escalation Vulnerability
MLIST:[oss-security] 20130904 Re: CVE request: Kernel PID Spoofing Privilege Escalation Vulnerability
OSS:11053
RH:CVE-2013-4300
SMASH Issue 92149
UBUNTU:CVE-2013-4300
UBUNTU:USN-1995-1
UBUNTU:USN-1998-1
bnc#838676
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d661684cf6820331feae71146c35da83d794467e
rh#1004736
CVE-2013-4312kernel-source-rt:Releasedmoderate ()BID:82986
BID:83870
CONFIRM:git.kernel.org:CVE-2013-4312
CONFIRM:git.kernel.org:CVE-2016-2847
CONFIRM:security-tracker.debian.org:CVE-2013-4312
CONFIRM:www.kernel.org:CVE-2016-2549
CONFIRM:www.oracle.com:CVE-2015-8391
CONFIRM:www.oracle.com:CVE-2016-5240
CONFIRM:www.oracle.com:CVE-2016-5386
CONFIRM:www.oracle.com:CVE-2016-6304
CVE-2013-4312
CVE-2016-2847
D:CVE-2016-2847
D:CVE-2022-2590
DSA-3448
DSA-3503
FEDORA:FEDORA-2016-2f25d12c51
FEDORA:FEDORA-2016-5d43766e33
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20160301 CVE request -- linux kernel: pipe: limit the per-user amount of pages allocated in pipes
MLIST:[oss-security] 20160301 CVE request -- linux kernel: pipe: limit the per-user amount of pages allocated in pipes
OSS:2016/Q1/401
OSS:2016/Q1/467
OSS:2016/Q1/492
OSS:2016/Q1/493
OSS:2016/Q1/538
OSS:2016/Q1/733
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2013-4312
RH:CVE-2016-2847
RHSA-2016:0855
RHSA-2016:2574
RHSA-2016:2584
RHSA-2017:0217
SMASH Issue 162725
SMASH Issue 96145
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1690
SUSE:SUSE-SU-2016:1696
SUSE:SUSE-SU-2016:1707
SUSE:SUSE-SU-2016:1937
SUSE:SUSE-SU-2016:2074
SUSE:openSUSE-SU-2016:1382
UBUNTU:CVE-2013-4312
UBUNTU:CVE-2016-2847
UBUNTU:USN-2929-1
UBUNTU:USN-2929-2
UBUNTU:USN-2931-1
UBUNTU:USN-2932-1
UBUNTU:USN-2946-1
UBUNTU:USN-2946-2
UBUNTU:USN-2947-1
UBUNTU:USN-2947-2
UBUNTU:USN-2947-3
UBUNTU:USN-2948-1
UBUNTU:USN-2948-2
UBUNTU:USN-2949-1
UBUNTU:USN-2967-1
UBUNTU:USN-2967-2
bnc#839104
bnc#970948
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:712f4aad406bb1ed67f3f98d04c044191f0ff593
linux.git:commit:759c01142a5d0f364a462346168a56de28a80f52
rh#1297813
rh#1311517
rh#1313428
rh#1324749
rh#1384344
rh#2116175
CVE-2013-4327systemd:Unsupportedmoderate ()CVE-2013-4327
D:CVE-2013-4327
DSA-2777
MLIST:[oss-security] 20130918 Re: Fwd: [vs-plain] polkit races
OSS:12427
RH:CVE-2013-4327
SMASH Issue 91883
UBUNTU:CVE-2013-4327
UBUNTU:USN-1961-1
bdo#725357
bnc#836932
bnc#864716
rh#1002375
rh#1006680
CVE-2013-4343kernel-source-rt:Unsupportedmoderate ()CVE-2013-4343
MLIST:[linux-kernel] 20130911 [PATCH net V2] tuntap: correctly handle error in tun_set_iff()
MLIST:[netdev] 20130911 Use-after-free in TUNSETIFF
MLIST:[oss-security] 20130912 Fwd: Use-after-free in TUNSETIFF
OSS:11103
RH:CVE-2013-4343
RHSA-2013:1490
RHSA-2020:1016
RHSA-2020:1070
RHSA-2020:2522
RHSA-2020:2851
SMASH Issue 92307
SUSE:openSUSE-SU-2019:1479
SUSE:openSUSE-SU-2019:1570
SUSE:openSUSE-SU-2019:1579
UBUNTU:CVE-2013-4343
UBUNTU:USN-2020-1
UBUNTU:USN-2023-1
UBUNTU:USN-2049-1
bnc#839965
rh#1007733
rh#1716328
CVE-2013-4348kernel-source-rt:Unsupportedimportant ()CONFIRM:git.kernel.org:CVE-2013-4348
CVE-2013-4348
RH:CVE-2013-4348
RHSA-2013:1490
SMASH Issue 93460
SUSE:openSUSE-SU-2014:0204
UBUNTU:CVE-2013-4348
UBUNTU:USN-2070-1
UBUNTU:USN-2075-1
bnc#848079
linux.git:commit:105bc1306e9b29c2aa2783b9524f7aec9b5a5b1f
linux.git:commit:4a9f42c9dcbfb8da40bfeaa923b6a740a64a889b
rh#1007939
rh#916646
CVE-2013-4350kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-4350
CONFIRM:github.com:CVE-2013-4350
CVE-2013-4350
MISC:bugzilla.kernel.org:MLIST:[oss-security] 20130913 Re: CVE request -- Linux kernel: net: sctp: ipv6 ipsec encryption bug in sctp_v6_xmit
MISC:git.kernel.org:MLIST:[oss-security] 20130913 Re: CVE request -- Linux kernel: net: sctp: ipv6 ipsec encryption bug in sctp_v6_xmit
MLIST:[oss-security] 20130913 Re: CVE request -- Linux kernel: net: sctp: ipv6 ipsec encryption bug in sctp_v6_xmit
OSS:11109
RH:CVE-2013-4350
RHSA-2013:1490
SMASH Issue 92362
UBUNTU:CVE-2013-4350
UBUNTU:USN-2019-1
UBUNTU:USN-2021-1
UBUNTU:USN-2022-1
UBUNTU:USN-2024-1
UBUNTU:USN-2038-1
UBUNTU:USN-2039-1
UBUNTU:USN-2041-1
UBUNTU:USN-2045-1
UBUNTU:USN-2049-1
UBUNTU:USN-2050-1
bnc#840506
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=95ee62083cb6453e056562d91f597552021e6ae7
rh#1007872
CVE-2013-4387kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-4387
CONFIRM:github.com:CVE-2013-4387
CVE-2013-4387
MISC:git.kernel.org:/
MLIST:[oss-security] 20130928 Re: linux kernel memory corruption with ipv6 udp offloading
RH:CVE-2013-4387
RHSA-2013:1490
RHSA-2013:1645
RHSA-2014:0284
SMASH Issue 92758
UBUNTU:CVE-2013-4387
UBUNTU:USN-2019-1
UBUNTU:USN-2021-1
UBUNTU:USN-2022-1
UBUNTU:USN-2024-1
UBUNTU:USN-2038-1
UBUNTU:USN-2039-1
UBUNTU:USN-2041-1
UBUNTU:USN-2045-1
UBUNTU:USN-2049-1
UBUNTU:USN-2050-1
bnc#843430
rh#1011927
CVE-2013-4391systemd:Unsupportedimportant ()CONFIRM:bugs.debian.org
CONFIRM:cgit.freedesktop.org:CVE-2013-4391
CVE-2013-4391
CVE-2013-4392
CVE-2013-4393
CVE-2013-4394
DSA-2777
GENTOO:GLSA-201612-34
MLIST:[oss-security] 20131001 Re: [CVE request] systemd
OSS:2015/Q4/487
RH:CVE-2013-4391
RH:CVE-2013-4392
RH:CVE-2013-4394
SMASH Issue 92765
UBUNTU:CVE-2013-4391
UBUNTU:CVE-2013-4392
UBUNTU:CVE-2013-4393
UBUNTU:CVE-2013-4394
bdo#725357
bnc#843507
rh#859051
rh#859060
rh#859104
rh#862324
CVE-2013-4392systemd:Unsupportedimportant ()CONFIRM:bugs.debian.org
CONFIRM:cgit.freedesktop.org:CVE-2013-4391
CVE-2013-4391
CVE-2013-4392
CVE-2013-4393
CVE-2013-4394
DSA-2777
GENTOO:GLSA-201612-34
MLIST:[oss-security] 20131001 Re: [CVE request] systemd
OSS:2015/Q4/487
RH:CVE-2013-4391
RH:CVE-2013-4392
RH:CVE-2013-4394
SMASH Issue 92765
UBUNTU:CVE-2013-4391
UBUNTU:CVE-2013-4392
UBUNTU:CVE-2013-4393
UBUNTU:CVE-2013-4394
bdo#725357
bnc#843507
rh#859051
rh#859060
rh#859104
rh#862324
CVE-2013-4393systemd:Unsupportedimportant ()CONFIRM:bugs.debian.org
CONFIRM:cgit.freedesktop.org:CVE-2013-4391
CVE-2013-4391
CVE-2013-4392
CVE-2013-4393
CVE-2013-4394
DSA-2777
GENTOO:GLSA-201612-34
MLIST:[oss-security] 20131001 Re: [CVE request] systemd
OSS:2015/Q4/487
RH:CVE-2013-4391
RH:CVE-2013-4392
RH:CVE-2013-4394
SMASH Issue 92765
UBUNTU:CVE-2013-4391
UBUNTU:CVE-2013-4392
UBUNTU:CVE-2013-4393
UBUNTU:CVE-2013-4394
bdo#725357
bnc#843507
rh#859051
rh#859060
rh#859104
rh#862324
CVE-2013-4394systemd:Unsupportedimportant ()CONFIRM:bugs.debian.org
CONFIRM:cgit.freedesktop.org:CVE-2013-4391
CVE-2013-4391
CVE-2013-4392
CVE-2013-4393
CVE-2013-4394
DSA-2777
GENTOO:GLSA-201612-34
MLIST:[oss-security] 20131001 Re: [CVE request] systemd
OSS:2015/Q4/487
RH:CVE-2013-4391
RH:CVE-2013-4392
RH:CVE-2013-4394
SMASH Issue 92765
UBUNTU:CVE-2013-4391
UBUNTU:CVE-2013-4392
UBUNTU:CVE-2013-4393
UBUNTU:CVE-2013-4394
bdo#725357
bnc#843507
rh#859051
rh#859060
rh#859104
rh#862324
CVE-2013-4466gnutls:Unsupportedmoderate ()CONFIRM:www.gnutls.org:CVE-2013-4466
CVE-2013-4466
MISC:gitorious.org:MLIST:[oss-security] 20131024 Re: CVE Request: gnutls/libdane buffer overflow
MLIST:[gnutls-devel] 20131023 gnutls 3.1.15
MLIST:[gnutls-devel] 20131023 gnutls 3.2.5
MLIST:[oss-security] 20131024 Re: CVE Request: gnutls/libdane buffer overflow
OSS:11372
RH:CVE-2013-4466
SMASH Issue 93390
UBUNTU:CVE-2013-4466
bnc#847484
rh#1022913
rh#1025637
CVE-2013-4483kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2013-4483
CONFIRM:github.com:CVE-2013-4483
CONFIRM:www.kernel.org:CVE-2013-5634
CVE-2013-4483
MISC:git.kernel.org:MLIST:[oss-security] 20131030 Re: CVE Request -- Linux kernel: ipc: ipc_rcu_putref refcount races
MLIST:[oss-security] 20131030 Re: CVE Request -- Linux kernel: ipc: ipc_rcu_putref refcount races
OSS:11393
RH:CVE-2013-4483
RHSA-2014:0285
RHSA-2014:0439
RHSA-2014:1392
RHSA-2015:0284
SMASH Issue 93496
SUSE:openSUSE-SU-2014:0247
UBUNTU:CVE-2013-4483
bnc#848321
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6062a8dc0517bce23e3c2f7d2fea5e22411269a3
rh#1007690
rh#1024854
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2013-4487gnutls:Unsupportedmoderate ()CONFIRM:gitorious.org:CVE-2013-4487
CVE-2013-4487
MLIST:[oss-security] 20131031 Re: CVE Request: gnutls/libdane buffer overflow
RH:CVE-2013-4487
SMASH Issue 93547
SUSE:openSUSE-SU-2013:1714
UBUNTU:CVE-2013-4487
bnc#848510
bnc#848621
rh#1025637
CVE-2013-4512kernel-source-rt:Unsupportedmoderate ()BID:63508
BID:63510
CONFIRM:git.kernel.org:CVE-2013-4512
CONFIRM:git.kernel.org:CVE-2013-4513
CONFIRM:github.com:CVE-2013-4512
CONFIRM:github.com:CVE-2013-4513
CONFIRM:www.kernel.org:CVE-2013-6763
CVE-2013-4512
CVE-2013-4513
DSA-2906
MLIST:[oss-security] 20131104 Re: some unstracked linux kernel security fixes
RH:CVE-2013-4512
RH:CVE-2013-4513
SMASH Issue 93639
SUSE:openSUSE-SU-2014:0204
UBUNTU:CVE-2013-4512
UBUNTU:CVE-2013-4513
UBUNTU:USN-2068-1
UBUNTU:USN-2069-1
UBUNTU:USN-2070-1
UBUNTU:USN-2071-1
UBUNTU:USN-2072-1
UBUNTU:USN-2073-1
UBUNTU:USN-2074-1
UBUNTU:USN-2075-1
UBUNTU:USN-2076-1
bnc#849023
bnc#849027
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=201f99f170df14ba52ea4c52847779042b7a623b
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c2c65cd2e14ada6de44cb527e7f1990bede24e15
rh#1007939
rh#1033582
rh#916646
CVE-2013-4513kernel-source-rt:Unsupportedmoderate ()BID:63508
BID:63510
CONFIRM:git.kernel.org:CVE-2013-4512
CONFIRM:git.kernel.org:CVE-2013-4513
CONFIRM:github.com:CVE-2013-4512
CONFIRM:github.com:CVE-2013-4513
CONFIRM:www.kernel.org:CVE-2013-6763
CVE-2013-4512
CVE-2013-4513
DSA-2906
MLIST:[oss-security] 20131104 Re: some unstracked linux kernel security fixes
RH:CVE-2013-4512
RH:CVE-2013-4513
SMASH Issue 93639
SUSE:openSUSE-SU-2014:0204
UBUNTU:CVE-2013-4512
UBUNTU:CVE-2013-4513
UBUNTU:USN-2068-1
UBUNTU:USN-2069-1
UBUNTU:USN-2070-1
UBUNTU:USN-2071-1
UBUNTU:USN-2072-1
UBUNTU:USN-2073-1
UBUNTU:USN-2074-1
UBUNTU:USN-2075-1
UBUNTU:USN-2076-1
bnc#849023
bnc#849027
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=201f99f170df14ba52ea4c52847779042b7a623b
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c2c65cd2e14ada6de44cb527e7f1990bede24e15
rh#1007939
rh#1033582
rh#916646
CVE-2013-4548openssh:Unsupportedimportant ()CONFIRM:www.openssh.com:CVE-2013-4548
CVE-2013-4548
HP:SSRT101487
MLIST:[oss-security] 20131107 Re: CVE Request - OpenSSH
OSS:11446
RH:CVE-2013-4548
SMASH Issue 93734
SUSE:openSUSE-SU-2013:1726
UBUNTU:CVE-2013-4548
UBUNTU:USN-2014-1
bnc#849536
rh#1028418
CVE-2013-4563kernel-source-rt:Unsupportedimportant ()CONFIRM:git.kernel.org:CVE-2013-4563
CONFIRM:github.com:CVE-2013-4563
CVE-2013-4563
MISC:git.kernel.org:MLIST:[oss-security] 20131113 CVE-2013-4563 -- Linux kernel: net: large udp packet over IPv6 over UFO-enabled device with TBF qdisc panic
MLIST:[oss-security] 20131113 CVE-2013-4563 -- Linux kernel: net: large udp packet over IPv6 over UFO-enabled device with TBF qdisc panic
OSS:11474
RH:CVE-2013-4563
SMASH Issue 93857
SUSE:openSUSE-SU-2014:0205
UBUNTU:CVE-2013-4563
UBUNTU:USN-2113-1
UBUNTU:USN-2117-1
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0e033e04c2678dbbe74a46b23fffb7bb918c288e
rh#1030015
CVE-2013-4579kernel-source-rt:Not affectedmoderate ()CVE-2013-4579
MISC:www.mathyvanhoef.com:CVE-2013-4579
MLIST:[ath9k-devel] 20131110 Security Bug: MAC address not properly configured
MLIST:[oss-security] 20131114 Re: CVE request: ath9k_htc improperly updates MAC address
RH:CVE-2013-4579
SMASH Issue 103043
UBUNTU:CVE-2013-4579
bnc#851426
linux.git:commit:657eb17d87852c42b55c4b06d5425baa08b2ddb3
linux.git:commit:6eb3c2822e2c5ef8f1a215c44ac451653aec0c09
rh#1007690
rh#1032753
rh#1067558
rh#1094232
rh#822754
CVE-2013-4587kernel-source-rt:Not affectedimportant ()CONFIRM:git.kernel.org:CVE-2013-4587
CONFIRM:www.kernel.org:CVE-2013-6367
CVE-2013-4587
DSA-2906
MLIST:[oss-security] 20131212 Re: [vs-plain] kvm issues
RH:CVE-2013-4587
SMASH Issue 94314
SUSE:openSUSE-SU-2014:0204
SUSE:openSUSE-SU-2014:0205
SUSE:openSUSE-SU-2014:0247
UBUNTU:CVE-2013-4587
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2113-1
UBUNTU:USN-2117-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
UBUNTU:USN-2135-1
UBUNTU:USN-2136-1
UBUNTU:USN-2138-1
UBUNTU:USN-2139-1
UBUNTU:USN-2141-1
bnc#853050
bnc#882914
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=338c7dbadd2671189cec7faf64c84d01071b3f96
linux.git:commit:338c7dbadd2671189cec7faf64c84d01071b3f96
linux.git:commit:54fb723cc48db2fde964fb9bb0eaaccf2cf31a9f
rh#1007690
rh#1007939
rh#1030986
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2013-4738kernel-source-rt:Analysisimportant ()CVE-2013-4738
CVE-2013-4739
RH:CVE-2013-4738
RH:CVE-2013-4739
SMASH Issue 231569
SMASH Issue 95910
UBUNTU:CVE-2013-4738
bnc#861828
CVE-2013-4739kernel-source-rt:Analysisimportant ()CONFIRM:www.codeaurora.org:CVE-2013-4739
CVE-2013-4738
CVE-2013-4739
D:CVE-2013-4739
MLIST:[oss-security] 20131015 Report - Stack-based buffer overflow and memory disclosure in camera driver (CVE-2013-4748 CVE-2013-4739)
RH:CVE-2013-4739
SMASH Issue 95910
SMASH Issue 95911
UBUNTU:CVE-2013-4738
UBUNTU:CVE-2013-4739
bnc#861828
CVE-2013-6368kernel-source-rt:Already fixedmoderate ()BID:64291
CONFIRM:git.kernel.org:CVE-2013-6368
CVE-2013-6368
MLIST:[oss-security] 20131212 Re: [vs-plain] kvm issues
RH:CVE-2013-6368
RHSA-2013:1801
RHSA-2014:0163
RHSA-2014:0284
SMASH Issue 94316
SUSE:openSUSE-SU-2014:0204
SUSE:openSUSE-SU-2014:0205
SUSE:openSUSE-SU-2014:0247
UBUNTU:CVE-2013-6368
UBUNTU:USN-2113-1
UBUNTU:USN-2117-1
UBUNTU:USN-2133-1
UBUNTU:USN-2134-1
UBUNTU:USN-2135-1
UBUNTU:USN-2136-1
UBUNTU:USN-2138-1
UBUNTU:USN-2139-1
UBUNTU:USN-2141-1
bnc#853052
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fda4e2e85589191b123d31cdc21fd33ee70f50fd
linux.git:commit:54fb723cc48db2fde964fb9bb0eaaccf2cf31a9f
linux.git:commit:fda4e2e85589191b123d31cdc21fd33ee70f50fd
rh#1007690
rh#1007939
rh#1032210
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
CVE-2013-6376kernel-source-rt:Not affectedmoderate ()BID:64319
CONFIRM:git.kernel.org:CVE-2013-6376
CVE-2013-6376
D:CVE-2013-6376
MLIST:[oss-security] 20131212 Re: [vs-plain] kvm issues
RH:CVE-2013-6376
SMASH Issue 94317
SUSE:openSUSE-SU-2014:0204
SUSE:openSUSE-SU-2014:0205
UBUNTU:CVE-2013-6376
UBUNTU:USN-2113-1
UBUNTU:USN-2117-1
UBUNTU:USN-2136-1
bnc#853053
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=17d68b763f09a9ce824ae23eb62c9efc57b69271
linux.git:commit:17d68b763f09a9ce824ae23eb62c9efc57b69271
linux.git:commit:45c3094a6424614e6fea135e4e1afd8e0a65f468
linux.git:commit:54fb723cc48db2fde964fb9bb0eaaccf2cf31a9f
rh#1007690
rh#1007939
rh#1033106
rh#916646
CVE-2013-6379kernel-source-rt:Unsupportedmoderate ()CVE-2013-6379
SMASH Issue 94156
bnc#852556
rh#1033582
CVE-2013-6381kernel-source-rt:Not affectedmoderate ()BID:63890
CONFIRM:git.kernel.org:CVE-2013-6381
CONFIRM:github.com:CVE-2013-6381
CVE-2013-6381
D:CVE-2013-6381
DSA-2906
MISC:git.kernel.org:/
MLIST:[oss-security] 20131122 Linux kernel CVE fixes
RH:CVE-2013-6381
RHSA-2014:0159
RHSA-2014:0284
RHSA-2014:0285
RHSA-2014:0476
SMASH Issue 94153
UBUNTU:CVE-2013-6381
bnc#852552
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6fb392b1a63ae36c31f62bc3fc8630b49d602b62
rh#1033600
CVE-2013-6382kernel-source-rt:Already fixedmoderate ()BID:63889
BID:64952
BID:64953
BID:64954
BID:65459
BID:65943
CONFIRM:git.kernel.org:CVE-2014-0101
CONFIRM:git.kernel.org:CVE-2014-1874
CONFIRM:github.com:CVE-2014-0101
CONFIRM:github.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-3153
CONFIRM:support.f5.com:CVE-2014-0101
CONFIRM:www.kernel.org:CVE-2014-1874
CVE-2013-2147
CVE-2013-4299
CVE-2013-6382
CVE-2014-0101
CVE-2014-1444
CVE-2014-1445
CVE-2014-1446
CVE-2014-1874
CVE-2023-2002
DSA-2906
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru()
MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS
MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk
MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle()
OSS:12052
OSS:2023/04/16/3
RH:CVE-2013-2147
RH:CVE-2013-4299
RH:CVE-2013-6382
RH:CVE-2014-0101
RH:CVE-2014-1444
RH:CVE-2014-1445
RH:CVE-2014-1446
RH:CVE-2014-1874
RHSA-2013:1166
RHSA-2013:1264
RHSA-2013:1436
RHSA-2013:1449
RHSA-2013:1450
RHSA-2013:1460
RHSA-2013:1490
RHSA-2013:1519
RHSA-2013:1520
RHSA-2013:1783
RHSA-2013:1860
RHSA-2014:0328
RHSA-2014:0419
RHSA-2014:0432
RHSA-2014:0439
RHSA-2014:0520
RHSA-2014:0771
SECUNIA:59216
SECUNIA:59262
SECUNIA:59309
SECUNIA:59406
SMASH Issue 54969
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2013-2147
UBUNTU:CVE-2013-4299
UBUNTU:CVE-2013-6382
UBUNTU:CVE-2014-0101
UBUNTU:CVE-2014-1444
UBUNTU:CVE-2014-1445
UBUNTU:CVE-2014-1446
UBUNTU:CVE-2014-1874
UBUNTU:USN-1994-1
UBUNTU:USN-1996-1
UBUNTU:USN-1997-1
UBUNTU:USN-1999-1
UBUNTU:USN-2015-1
UBUNTU:USN-2016-1
UBUNTU:USN-2040-1
UBUNTU:USN-2041-1
UBUNTU:USN-2042-1
UBUNTU:USN-2043-1
UBUNTU:USN-2044-1
UBUNTU:USN-2045-1
UBUNTU:USN-2046-1
UBUNTU:USN-2066-1
UBUNTU:USN-2067-1
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
UBUNTU:USN-2133-1
UBUNTU:USN-2134-1
UBUNTU:USN-2135-1
UBUNTU:USN-2136-1
UBUNTU:USN-2137-1
UBUNTU:USN-2138-1
UBUNTU:USN-2139-1
UBUNTU:USN-2140-1
UBUNTU:USN-2141-1
UBUNTU:USN-2173-1
UBUNTU:USN-2174-1
XF:linux-kernel-cve20141444-info-disc(90443)
XF:linux-kernel-cve20141445-info-disc(90444)
XF:linux-kernel-cve20141446-info-disc(90445)
bnc#823260
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98
linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e
linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a
linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca
rh#1004233
rh#1007690
rh#1033603
rh#1053610
rh#1053613
rh#1053620
rh#1062356
rh#1067558
rh#1070705
rh#1094232
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#971242
CVE-2013-6422curl:Unsupportedlow ()CONFIRM:curl.haxx.se:CVE-2013-6422
CVE-2013-6422
DSA-2824
RH:CVE-2013-6422
SMASH Issue 94789
UBUNTU:CVE-2013-6422
UBUNTU:USN-2058-1
bnc#856069
rh#1037918
CVE-2013-6431kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2013-6431
CONFIRM:github.com:CVE-2013-6431
CONFIRM:www.kernel.org:CVE-2013-6431
CVE-2013-6431
MISC:git.kernel.org:/
MLIST:[oss-security] 20131206 Re: CVE request: Linux kernel: net: fib: fib6_add: potential NULL pointer dereference
OSS:11624
RH:CVE-2013-6431
RHSA-2014:0100
SMASH Issue 94458
SUSE:openSUSE-SU-2014:0204
UBUNTU:CVE-2013-6431
bnc#854173
rh#1007939
rh#1039054
rh#916646
CVE-2013-6432kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2013-6432
CONFIRM:github.com:CVE-2013-6432
CONFIRM:www.kernel.org:CVE-2013-7348
CVE-2013-6432
MLIST:[oss-security] 20131206 Re: CVE request: Kernel: ping: NULL pointer dereference on write to msg_name
OSS:11623
RH:CVE-2013-6432
SMASH Issue 94459
SUSE:openSUSE-SU-2014:0205
UBUNTU:CVE-2013-6432
UBUNTU:USN-2113-1
UBUNTU:USN-2117-1
bnc#854175
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cf970c002d270c36202bd5b9c2804d3097a52da0
rh#1039046
CVE-2013-6449openssl:Unsupported, openssl-1_1:Unsupportedmoderate ()BID:64530
CONFIRM:git.openssl.org:CVE-2013-6449
CONFIRM:issues.apache.org:CVE-2013-6449
CONFIRM:rt.openssl.org:CVE-2013-6449
CONFIRM:rt.openssl.org:CVE-2015-0288
CONFIRM:rt.openssl.org:CVE-2015-0292
CVE-2013-6449
D:CVE-2013-6449
DSA-2833
FEDORA:FEDORA-2013-23768
FEDORA:FEDORA-2013-23788
FEDORA:FEDORA-2013-23794
GENTOO:GLSA-201412-39
RH:CVE-2013-6449
RHSA-2014:0015
RHSA-2014:0041
SECTRACK:1029548
SMASH Issue 94908
SUSE:openSUSE-SU-2014:0012
SUSE:openSUSE-SU-2014:0015
SUSE:openSUSE-SU-2014:0018
SUSE:openSUSE-SU-2014:0048
UBUNTU:CVE-2013-6449
bdo#732710
bdo#732754
bnc#856687
rh#1045363
CVE-2013-6450openssl:Unsupported, openssl-1_1:Unsupportedmoderate ()BID:64618
CONFIRM:git.openssl.org:CVE-2013-6450
CONFIRM:puppet.com:CVE-2013-6450
CONFIRM:security-tracker.debian.org:CVE-2013-6450
CVE-2013-6450
D:CVE-2013-6450
Oracle:CVE-2013-6450
RH:CVE-2013-6450
RHSA-2014:0015
SECTRACK:1029549
SECTRACK:1031594
SMASH Issue 95061
SUSE:openSUSE-SU-2014:0049
UBUNTU:CVE-2013-6450
bdo#732710
bdo#732754
bnc#857203
bnc#861384
openssl.git:commit:20b82b514d81a64f5b240788e5051167456af379
rh#1047840
CVE-2013-6999kernel-source-rt:Not affectedimportant ()BID:64057
BID:65255
CONFIRM:git.kernel.org:CVE-2014-0038
CONFIRM:www.kernel.org:CVE-2014-0038
CVE-2013-6999
CVE-2014-0038
D:CVE-2014-0038
EXPLOIT-DB:31346
EXPLOIT-DB:31347
EXPLOIT-DB:40503
MANDRIVA:MDVSA-2014:038
MISC:code.google.com:CVE-2014-0038
MISC:git.kernel.org:MLIST:[oss-security] 20140131 Linux 3.4+: arbitrary write with CONFIG_X86_X32 (CVE-2014-0038)
MISC:github.com:CVE-2013-2765
MISC:github.com:CVE-2014-0038
MISC:pastebin.com:CVE-2013-6999
MISC:pastebin.com:CVE-2014-0038
MLIST:[oss-security] 20140131 Linux 3.4+: arbitrary write with CONFIG_X86_X32 (CVE-2014-0038)
OSS:11968
RH:CVE-2014-0038
SECUNIA:55633
SECUNIA:56669
SMASH Issue 95767
SUSE:openSUSE-SU-2014:0204
SUSE:openSUSE-SU-2014:0205
UBUNTU:CVE-2014-0038
UBUNTU:USN-2094-1
UBUNTU:USN-2095-1
UBUNTU:USN-2096-1
bnc#860993
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2def2ef2ae5f3990aabdbe8a755911902707d268
linux.git:commit:2def2ef2ae5f3990aabdbe8a755911902707d268
rh#1007939
rh#1060023
rh#916646
CVE-2013-7026kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2013-7026
CONFIRM:github.com:CVE-2013-7026
CVE-2013-7026
D:CVE-2013-7026
RH:CVE-2013-7026
SMASH Issue 94550
UBUNTU:CVE-2013-7026
UBUNTU:USN-2070-1
UBUNTU:USN-2075-1
bnc#854633
rh#1039951
CVE-2013-7041pam:Not affectedmoderate ()BID:64180
CVE-2013-7041
GENTOO:GLSA-201605-05
L3:66743
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20141209 CVE request: pam: password hashes aren't compared case-sensitively
MLIST:[oss-security] 20141209 Re: CVE request: pam: password hashes aren't compared case-sensitively
OSS:11640
RH:CVE-2013-7041
SMASH Issue 94516
UBUNTU:CVE-2013-7041
UBUNTU:USN-2935-1
UBUNTU:USN-2935-2
UBUNTU:USN-2935-3
bdo#731368
bnc#854480
rh#1038555
CVE-2013-7263kernel-source-rt:Not affectedimportant ()BID:68214
BID:72061
CONFIRM:git.kernel.org:CVE-2013-7281
CONFIRM:git.kernel.org:CVE-2014-4608
CONFIRM:git.kernel.org:CVE-2014-8160
CONFIRM:github.com:CVE-2013-7281
CONFIRM:github.com:CVE-2014-4608
CONFIRM:github.com:CVE-2014-8160
CONFIRM:www.kernel.org:CVE-2014-9914
CVE-2013-7263
CVE-2014-4608
CVE-2014-8160
CVE-2023-2002
D:CVE-2013-7263
DSA-2906
DSA-3170
MANDRIVA:MDVSA-2015:057
MANDRIVA:MDVSA-2015:058
MISC:blog.securitymouse.com:CVE-2014-4611
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:www.oberhumer.com:CVE-2014-4608
MISC:www.securitymouse.com:CVE-2014-4608
MLIST:[netfilter-devel] 20140925 [PATCH nf] netfilter: conntrack: disable generic protocol tracking
MLIST:[oss-security] 20131128 Re: CVE Request: Linux kernel: net: uninitialised memory leakage
MLIST:[oss-security] 20140107 oss-sec: CVE split and a missed file
MLIST:[oss-security] 20140626 LMS-2014-06-16-2: Linux Kernel LZO
MLIST:[oss-security] 20150114 CVE-2014-8160 Linux Kernel: SCTP firewalling fails until SCTP module is loaded
OSS:2023/04/16/3
RH:CVE-2013-7263
RH:CVE-2014-4608
RH:CVE-2014-8160
RHSA-2014:0159
RHSA-2014:0285
RHSA-2014:0439
RHSA-2014:1392
RHSA-2015:0062
RHSA-2015:0284
RHSA-2015:0290
RHSA-2015:0674
SECUNIA:55882
SECUNIA:56036
SECUNIA:60011
SECUNIA:60174
SECUNIA:62633
SMASH Issue 95116
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0529
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:openSUSE-SU-2015:0566
SUSE:openSUSE-SU-2015:0714
UBUNTU:CVE-2013-7263
UBUNTU:CVE-2014-4608
UBUNTU:CVE-2014-8160
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2416-1
UBUNTU:USN-2417-1
UBUNTU:USN-2418-1
UBUNTU:USN-2419-1
UBUNTU:USN-2420-1
UBUNTU:USN-2421-1
UBUNTU:USN-2513-1
UBUNTU:USN-2514-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
bnc#857643
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=db29a9508a9246e77087c5531e45b2c88ec6988b
rh#1007690
rh#1035875
rh#1067558
rh#1094232
rh#1113899
rh#1163762
rh#1182059
CVE-2013-7264kernel-source-rt:Not affectedmoderate ()CVE-2013-7264
D:CVE-2013-7264
DSA-2906
RH:CVE-2013-7264
RHSA-2014:0159
RHSA-2014:0285
RHSA-2014:0439
SMASH Issue 95117
UBUNTU:CVE-2013-7264
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
rh#1035875
CVE-2013-7265kernel-source-rt:Not affectedmoderate ()CVE-2013-7265
D:CVE-2013-7265
DSA-2906
RH:CVE-2013-7265
RHSA-2014:0159
RHSA-2014:0285
RHSA-2014:0439
SMASH Issue 95118
UBUNTU:CVE-2013-7265
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
rh#1035875
CVE-2013-7267kernel-source-rt:Not affectedmoderate ()CVE-2013-7267
D:CVE-2013-7267
RH:CVE-2013-7267
RHSA-2014:0328
SMASH Issue 95120
UBUNTU:CVE-2013-7267
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
rh#1039845
CVE-2013-7268kernel-source-rt:Not affectedmoderate ()CVE-2013-7268
D:CVE-2013-7268
RH:CVE-2013-7268
RHSA-2014:0328
SMASH Issue 95121
UBUNTU:CVE-2013-7268
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
rh#1039845
CVE-2013-7269kernel-source-rt:Not affectedmoderate ()BID:64742
CVE-2013-7269
D:CVE-2013-7269
RH:CVE-2013-7269
RHSA-2014:0328
SMASH Issue 95122
UBUNTU:CVE-2013-7269
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
XF:linux-kernel-cve20137269-info-disc(90130)
rh#1039845
CVE-2013-7270kernel-source-rt:Not affectedmoderate ()BID:64744
CVE-2013-7270
D:CVE-2013-7270
RH:CVE-2013-7270
RHSA-2014:0328
SMASH Issue 95123
UBUNTU:CVE-2013-7270
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
XF:linux-kernel-cve20137270-info-disc(90131)
rh#1039845
CVE-2013-7271kernel-source-rt:Not affectedmoderate ()BID:64746
CVE-2013-7271
D:CVE-2013-7271
RH:CVE-2013-7271
RHSA-2014:0328
SMASH Issue 95124
UBUNTU:CVE-2013-7271
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
XF:linux-kernel-cve20137271-info-disc(90132)
rh#1039845
CVE-2013-7281kernel-source-rt:Unsupportedmoderate ()BID:64747
CVE-2013-7281
D:CVE-2013-7281
RH:CVE-2013-7281
RHSA-2014:0159
RHSA-2014:0285
RHSA-2014:0439
SECTRACK:1029566
SMASH Issue 95166
UBUNTU:CVE-2013-7281
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
XF:linux-kernel-cve20137281-info-disc(90222)
rh#1035875
CVE-2013-7338python3:Unsupportedimportant ()APPLE:APPLE-SA-2015-08-13-2
BID:65179
CONFIRM:bugs.python.org:CVE-2013-7338
CONFIRM:docs.python.org:CVE-2013-7338
CONFIRM:hg.python.org:CVE-2013-7338
CONFIRM:support.apple.com:CVE-2015-5784
CVE-2013-7338
GENTOO:GLSA-201503-10
MLIST:[oss-security] 20140318 CVE request for python/zipfile
MLIST:[oss-security] 20140319 Re: CVE request for python/zipfile
RH:CVE-2013-7338
SECTRACK:1029973
SMASH Issue 97153
SMASH Issue 98127
SUSE:openSUSE-SU-2014:0597
UBUNTU:CVE-2013-7338
bnc#869222
rh#1078014
CVE-2013-7339kernel-source-rt:Not affectedmoderate ()BID:66351
CONFIRM:git.kernel.org:CVE-2013-7339
CONFIRM:github.com:CVE-2013-7339
CONFIRM:www.kernel.org:CVE-2014-1690
CVE-2013-7339
DSA-2906
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20140320 CVE-2013-7339 Linux kernel - rds: prevent dereference of a NULL device
RH:CVE-2013-7339
RHSA-2014:0439
RHSA-2014:0740
RHSA-2014:0981
RHSA-2014:1101
SECUNIA:59386
SMASH Issue 103058
SMASH Issue 97533
UBUNTU:CVE-2013-7339
bnc#869563
rh#1007690
rh#1067558
rh#1079214
rh#1094232
rh#822754
CVE-2013-7348kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2013-7348
CONFIRM:github.com:CVE-2013-7348
CVE-2013-7348
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20140331 CVE-2013-7348 CVE-2014-2678 Linux kernel aio and rds issues
MLIST:[oss-security] 20140331 CVE-2013-7348 CVE-2014-2678 Linux kernel aio and rds issues
RH:CVE-2013-7348
SMASH Issue 97508
UBUNTU:CVE-2013-7348
bnc#871556
rh#1083270
CVE-2013-7421kernel-source-rt:Already fixedmoderate ()BID:72320
BID:72322
BID:72324
CONFIRM:git.busybox.net:CVE-2014-9645
CONFIRM:git.kernel.org:CVE-2013-7421
CONFIRM:git.kernel.org:CVE-2014-9644
CONFIRM:github.com:CVE-2013-7421
CONFIRM:github.com:CVE-2014-9644
CONFIRM:github.com:CVE-2017-6429
CONFIRM:www.kernel.org:CVE-2015-1573
CONFIRM:www.oracle.com:CVE-2015-8472
CONFIRM:www.oracle.com:CVE-2016-2802
CVE-2013-7421
CVE-2014-9644
CVE-2014-9645
CVE-2023-2002
D:CVE-2013-7421
D:CVE-2014-9644
D:CVE-2014-9645
DSA-3170
GENTOO:GLSA-201503-13
MANDRIVA:MDVSA-2015:057
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:plus.google.com:CVE-2014-9645
MLIST:[linux-kernel] 20130304 Re: user ns: arbitrary module loading
MLIST:[oss-security] 20150124 Re: CVE Request: Linux kernel crypto api unprivileged arbitrary module load
OSS:2023/04/16/3
RH:CVE-2013-7421
RH:CVE-2014-9644
RH:CVE-2014-9645
RHSA-2015:2152
RHSA-2015:2411
RHSA-2016:0068
SMASH Issue 113136
SMASH Issue 113165
UBUNTU:CVE-2013-7421
UBUNTU:CVE-2014-9644
UBUNTU:CVE-2014-9645
UBUNTU:USN-2513-1
UBUNTU:USN-2514-1
UBUNTU:USN-2543-1
UBUNTU:USN-2544-1
UBUNTU:USN-2545-1
UBUNTU:USN-2546-1
bnc#914423
rh#1113899
rh#1163762
rh#1163792
rh#1185469
rh#1185707
rh#1190546
CVE-2013-7422perl:Not affectedimportant ()APPLE:APPLE-SA-2015-08-13-2
BID:75704
CONFIRM:perl5.git.perl.org:CVE-2013-7422
CONFIRM:support.apple.com:CVE-2015-5784
CVE-2013-7422
GENTOO:GLSA-201507-11
RH:CVE-2013-7422
SMASH Issue 113238
UBUNTU:CVE-2013-7422
UBUNTU:USN-2916-1
bnc#915514
rh#1187149
rh#323571
CVE-2013-7445kernel-source-rt:Unsupportedmoderate ()CVE-2013-7445
MISC:bugzilla.kernel.org:CVE-2013-7445
RH:CVE-2013-7445
SMASH Issue 157835
UBUNTU:CVE-2013-7445
bnc#950755
bnc#950947
rh#1272995
CVE-2013-7446kernel-source-rt:Not affectedmoderate ()BID:77638
CONFIRM:git.kernel.org:CVE-2013-7446
CONFIRM:github.com:CVE-2013-7446
CONFIRM:groups.google.com:CVE-2013-7446
CONFIRM:www.kernel.org:CVE-2016-3841
CVE-2013-7446
D:CVE-2022-2590
DSA-3426
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:forums.grsecurity.net:CVE-2013-7446
MLIST:[linux-kernel] 20131014 Re: epoll oops.
MLIST:[linux-kernel] 20140515 eventpoll __list_del_entry corruption (was: perf: use after free in perf_remove_from_context)
MLIST:[linux-kernel] 20150913 List corruption on epoll_ctl(EPOLL_CTL_DEL) an AF_UNIX socket
MLIST:[netdev] 20150304 [PATCH net] af_unix: don't poll dead peers
MLIST:[oss-security] 20151118 Re: CVE request - Linux kernel - Unix sockets use after free - peer_wait_queue prematurely freed
OSS:2015/Q4/321
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2013-7446
SECTRACK:1034557
SMASH Issue 158921
SMASH Issue 158970
SUSE:SUSE-SU-2016:0745
SUSE:SUSE-SU-2016:0746
SUSE:SUSE-SU-2016:0747
SUSE:SUSE-SU-2016:0749
SUSE:SUSE-SU-2016:0750
SUSE:SUSE-SU-2016:0751
SUSE:SUSE-SU-2016:0752
SUSE:SUSE-SU-2016:0753
SUSE:SUSE-SU-2016:0754
SUSE:SUSE-SU-2016:0755
SUSE:SUSE-SU-2016:0756
SUSE:SUSE-SU-2016:0757
SUSE:SUSE-SU-2016:0911
SUSE:SUSE-SU-2016:1102
SUSE:SUSE-SU-2016:1961
SUSE:SUSE-SU-2016:1994
SUSE:SUSE-SU-2016:1995
SUSE:SUSE-SU-2016:2000
SUSE:SUSE-SU-2016:2001
SUSE:SUSE-SU-2016:2002
SUSE:SUSE-SU-2016:2003
SUSE:SUSE-SU-2016:2005
SUSE:SUSE-SU-2016:2006
SUSE:SUSE-SU-2016:2007
SUSE:SUSE-SU-2016:2009
SUSE:SUSE-SU-2016:2010
SUSE:SUSE-SU-2016:2011
SUSE:SUSE-SU-2016:2014
SUSE:openSUSE-SU-2016:1641
UBUNTU:CVE-2013-7446
UBUNTU:USN-2886-1
UBUNTU:USN-2887-1
UBUNTU:USN-2887-2
UBUNTU:USN-2888-1
UBUNTU:USN-2889-1
UBUNTU:USN-2889-2
UBUNTU:USN-2890-1
UBUNTU:USN-2890-2
UBUNTU:USN-2890-3
bdo#813406
bnc#955654
bnc#955837
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1282688
rh#1324749
rh#1384344
rh#2116175
CVE-2014-0038kernel-source-rt:Not affectedimportant ()BID:64057
BID:65255
CONFIRM:git.kernel.org:CVE-2014-0038
CONFIRM:www.kernel.org:CVE-2014-0038
CVE-2013-6999
CVE-2014-0038
D:CVE-2014-0038
EXPLOIT-DB:31346
EXPLOIT-DB:31347
EXPLOIT-DB:40503
MANDRIVA:MDVSA-2014:038
MISC:code.google.com:CVE-2014-0038
MISC:git.kernel.org:MLIST:[oss-security] 20140131 Linux 3.4+: arbitrary write with CONFIG_X86_X32 (CVE-2014-0038)
MISC:github.com:CVE-2013-2765
MISC:github.com:CVE-2014-0038
MISC:pastebin.com:CVE-2013-6999
MISC:pastebin.com:CVE-2014-0038
MLIST:[oss-security] 20140131 Linux 3.4+: arbitrary write with CONFIG_X86_X32 (CVE-2014-0038)
OSS:11968
RH:CVE-2014-0038
SECUNIA:55633
SECUNIA:56669
SMASH Issue 95767
SUSE:openSUSE-SU-2014:0204
SUSE:openSUSE-SU-2014:0205
UBUNTU:CVE-2014-0038
UBUNTU:USN-2094-1
UBUNTU:USN-2095-1
UBUNTU:USN-2096-1
bnc#860993
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2def2ef2ae5f3990aabdbe8a755911902707d268
linux.git:commit:2def2ef2ae5f3990aabdbe8a755911902707d268
rh#1007939
rh#1060023
rh#916646
CVE-2014-0069kernel-source-rt:Not affectedimportant ()BID:65588
CONFIRM:git.kernel.org:CVE-2014-0069
CVE-2014-0069
D:CVE-2014-0069
MLIST:[linux-cifs] 20140214 [PATCH] cifs: ensure that uncached writes handle unmapped areas correctly
MLIST:[oss-security] 20140217 CVE-2014-0069 -- kernel: cifs: incorrect handling of bogus user pointers during uncached writes
OSS:12155
RH:CVE-2014-0069
RHSA-2014:0328
RHSA-2014:0439
SMASH Issue 96200
SUSE:SUSE-SU-2014:0459
UBUNTU:CVE-2014-0069
bnc#864025
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5d81de8e8667da7135d3a32a964087c0faf5483f
linux.git:commit:33807f4f0daec3b00565c2932d95f614f5833adf
linux.git:commit:351a7934c0e788262f83380188f18e575f6bc63f
linux.git:commit:5d81de8e8667da7135d3a32a964087c0faf5483f
rh#1007690
rh#1064253
rh#1067558
rh#1094232
CVE-2014-0101kernel-source-rt:Already fixedmoderate ()BID:63889
BID:64952
BID:64953
BID:64954
BID:65459
BID:65943
CONFIRM:git.kernel.org:CVE-2014-0101
CONFIRM:git.kernel.org:CVE-2014-1874
CONFIRM:github.com:CVE-2014-0101
CONFIRM:github.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-3153
CONFIRM:support.f5.com:CVE-2014-0101
CONFIRM:www.kernel.org:CVE-2014-1874
CVE-2013-2147
CVE-2013-4299
CVE-2013-6382
CVE-2014-0101
CVE-2014-1444
CVE-2014-1445
CVE-2014-1446
CVE-2014-1874
CVE-2023-2002
DSA-2906
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru()
MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS
MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk
MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle()
OSS:12052
OSS:2023/04/16/3
RH:CVE-2013-2147
RH:CVE-2013-4299
RH:CVE-2013-6382
RH:CVE-2014-0101
RH:CVE-2014-1444
RH:CVE-2014-1445
RH:CVE-2014-1446
RH:CVE-2014-1874
RHSA-2013:1166
RHSA-2013:1264
RHSA-2013:1436
RHSA-2013:1449
RHSA-2013:1450
RHSA-2013:1460
RHSA-2013:1490
RHSA-2013:1519
RHSA-2013:1520
RHSA-2013:1783
RHSA-2013:1860
RHSA-2014:0328
RHSA-2014:0419
RHSA-2014:0432
RHSA-2014:0439
RHSA-2014:0520
RHSA-2014:0771
SECUNIA:59216
SECUNIA:59262
SECUNIA:59309
SECUNIA:59406
SMASH Issue 54969
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2013-2147
UBUNTU:CVE-2013-4299
UBUNTU:CVE-2013-6382
UBUNTU:CVE-2014-0101
UBUNTU:CVE-2014-1444
UBUNTU:CVE-2014-1445
UBUNTU:CVE-2014-1446
UBUNTU:CVE-2014-1874
UBUNTU:USN-1994-1
UBUNTU:USN-1996-1
UBUNTU:USN-1997-1
UBUNTU:USN-1999-1
UBUNTU:USN-2015-1
UBUNTU:USN-2016-1
UBUNTU:USN-2040-1
UBUNTU:USN-2041-1
UBUNTU:USN-2042-1
UBUNTU:USN-2043-1
UBUNTU:USN-2044-1
UBUNTU:USN-2045-1
UBUNTU:USN-2046-1
UBUNTU:USN-2066-1
UBUNTU:USN-2067-1
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
UBUNTU:USN-2133-1
UBUNTU:USN-2134-1
UBUNTU:USN-2135-1
UBUNTU:USN-2136-1
UBUNTU:USN-2137-1
UBUNTU:USN-2138-1
UBUNTU:USN-2139-1
UBUNTU:USN-2140-1
UBUNTU:USN-2141-1
UBUNTU:USN-2173-1
UBUNTU:USN-2174-1
XF:linux-kernel-cve20141444-info-disc(90443)
XF:linux-kernel-cve20141445-info-disc(90444)
XF:linux-kernel-cve20141446-info-disc(90445)
bnc#823260
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98
linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e
linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a
linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca
rh#1004233
rh#1007690
rh#1033603
rh#1053610
rh#1053613
rh#1053620
rh#1062356
rh#1067558
rh#1070705
rh#1094232
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#971242
CVE-2014-0155kernel-source-rt:Not affectedmoderate6.8 (CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)CONFIRM:git.kernel.org:CVE-2014-0155
CVE-2014-0155
MLIST:[oss-security] 20140407 CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest ioapic redirection table
RH:CVE-2014-0155
SMASH Issue 102981
SMASH Issue 240291
UBUNTU:CVE-2014-0155
bnc#872540
linux.git:commit:55101e2d6ce1c780f6ee8fee5f37306971aac6cd
linux.git:commit:5678de3f15010b9022ee45673f33bcfc71d47b60
rh#1081589
rh#822754
CVE-2014-0172elfutils:Unsupportedmoderate ()BID:66714
CVE-2014-0172
GENTOO:GLSA-201612-32
MLIST:[elfutils-devel] 20140409 [PATCH] CVE-2014-0172 Check for overflow before calling malloc to uncompress data.
MLIST:[oss-security] 20140409 Heap-based buffer overflow in libdw/elfutils (CVE-2014-0172)
RH:CVE-2014-0172
RHEA-2015:0369
SMASH Issue 97712
UBUNTU:CVE-2014-0172
UBUNTU:USN-2188-1
bnc#872785
rh#1085663
CVE-2014-0181kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2014-0181
CONFIRM:www.kernel.org:CVE-2014-0181
CVE-2014-0181
CVE-2023-2002
D:CVE-2014-0181
L3:41357
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[netdev] 20140423 [PATCH 0/5]: Preventing abuse when passing file descriptors
MLIST:[oss-security] 20140423 Re: CVE-2014-0181: Linux network reconfiguration due to incorrect netlink checks
OSS:2014/Q2/162
OSS:2014/Q2/163
OSS:2014/Q2/168
OSS:2014/Q2/169
OSS:2014/Q2/170
OSS:2023/04/16/3
RH:CVE-2014-0181
RHSA-2014:0913
RHSA-2014:1023
RHSA-2014:1392
RHSA-2014:1959
SMASH Issue 98234
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:0812
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-0181
bnc#875051
linux.git:commit:29e8f59cf1ff91f2854563faddc5f61098cf4958
linux.git:commit:2d7a85f4b06e9c27ff629f07a524c48074f07f81
rh#1094265
rh#1113899
rh#1163762
rh#1163792
CVE-2014-0196kernel-source-rt:Not affectedmoderate ()BID:74820
CONFIRM:bugzilla.novell.com:CVE-2014-0196
CONFIRM:git.kernel.org:CVE-2014-0196
CONFIRM:git.kernel.org:CVE-2015-4170
CONFIRM:github.com:CVE-2015-4170
CONFIRM:linux.oracle.com:CVE-2014-3153
CONFIRM:source.android.com:CVE-2016-3818
CONFIRM:support.f5.com:CVE-2014-0196
CONFIRM:www.kernel.org:CVE-2015-4170
CVE-2014-0196
CVE-2015-4170
D:CVE-2014-0196
DSA-2926
DSA-2928
EXPLOIT-DB:33516
L3:40865
MISC:pastebin.com:CVE-2014-0196
MLIST:[oss-security] 20140429 CVE-2014-0196: Linux kernel pty layer race condition memory corruption
MLIST:[oss-security] 20150526 CVE request: vulnerability in the kernel tty subsystem.
OSS:2015/Q2/613
OSVDB:106646
RH:CVE-2014-0196
RH:CVE-2015-4170
RHSA-2013:0744
RHSA-2014:0512
RHSA-2014:0520
RHSA-2014:0557
RHSA-2014:0678
RHSA-2015:2152
RHSA-2015:2411
RHSA-2016:1395
SECUNIA:59218
SECUNIA:59262
SECUNIA:59599
SMASH Issue 117299
SMASH Issue 98400
SUSE:SUSE-SU-2014:0667
SUSE:SUSE-SU-2014:0683
UBUNTU:CVE-2014-0196
UBUNTU:CVE-2015-4170
UBUNTU:USN-2196-1
UBUNTU:USN-2197-1
UBUNTU:USN-2198-1
UBUNTU:USN-2199-1
UBUNTU:USN-2200-1
UBUNTU:USN-2201-1
UBUNTU:USN-2202-1
UBUNTU:USN-2203-1
UBUNTU:USN-2204-1
bnc#875690
bnc#877345
bnc#878696
bnc#879878
bnc#933423
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4291086b1f081b869c6d79e5b7441633dc3ace00
http://www.debian.org/security/2014/dsa-2926
http://www.debian.org/security/2014/dsa-2928
linux.git:commit:4291086b1f081b869c6d79e5b7441633dc3ace00
rh#1007690
rh#1067558
rh#1094232
rh#1202855
rh#1218879
CVE-2014-0203kernel-source-rt:Not affectedmoderate ()BID:68125
CONFIRM:git.kernel.org:CVE-2014-0203
CONFIRM:github.com:CVE-2014-0203
CONFIRM:linux.oracle.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-3153
CONFIRM:mirror.linux.org.au:CVE-2015-3214
CVE-2014-0203
D:CVE-2014-0203
RH:CVE-2014-0203
RHSA-2014:0771
SECUNIA:59262
SECUNIA:59309
SECUNIA:59406
SECUNIA:59560
SMASH Issue 99796
UBUNTU:CVE-2014-0203
bnc#883526
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=86acdca1b63e6890540fa19495cfc708beff3d8b
rh#1094363
CVE-2014-0205kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2014-0205
CONFIRM:github.com:CVE-2014-0205
CONFIRM:mirror.linux.org.au:CVE-2014-0205
CVE-2014-0205
MISC:git.kernel.org:/
RH:CVE-2014-0205
RHSA-2014:1167
RHSA-2014:1365
RHSA-2014:1763
SMASH Issue 105973
UBUNTU:CVE-2014-0205
bnc#895955
rh#1094455
CVE-2014-0206kernel-source-rt:Unsupportedlow ()BID:68176
CONFIRM:git.kernel.org:CVE-2014-0206
CONFIRM:source.android.com:CVE-2017-6426
CONFIRM:www.kernel.org:CVE-2014-0206
CVE-2014-0206
CVE-2023-2002
MISC:git.kernel.org:OSS:2023/04/16/3
OSS:2014/Q2/638
OSS:2023/04/16/3
RH:CVE-2014-0206
RHSA-2014:0786
RHSA-2014:0913
SECTRACK:1030479
SECTRACK:1038201
SECUNIA:59278
SMASH Issue 100007
SMASH Issue 99998
UBUNTU:CVE-2014-0206
bnc#884324
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=edfbbf388f293d70bf4b7c0bc38774d05e6f711a
linux.git:commit:10b5b5361a3c2a7fff9dbfa0f127adc2531e7732
linux.git:commit:edfbbf388f293d70bf4b7c0bc38774d05e6f711a
linux.git:commit:f8567a3845ac05bb28f3c1b478ef752762bd39ef
rh#1094602
rh#1113899
CVE-2014-0236file:Unsupportedimportant ()CONFIRM:bugs.php.net:CVE-2014-0236
CONFIRM:git.php.net:CVE-2014-0236
CONFIRM:php.net:CVE-2017-16642
CVE-2014-0236
RH:CVE-2014-0236
SMASH Issue 102932
UBUNTU:CVE-2014-0236
bnc#885196
http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=f3f22ff5c697aef854ffc1918bce708b37481b0f
rh#1098209
CVE-2014-0333libpng16:Unsupportedmoderate ()CERT-VN:VU#684412
CONFIRM:ftp.simplesystems.org:CVE-2014-0333
CONFIRM:sourceforge.net:CVE-2014-0333
CVE-2014-0333
RH:CVE-2014-0333
SMASH Issue 96678
SUSE:openSUSE-SU-2014:0358
UBUNTU:CVE-2014-0333
bnc#866298
rh#1070985
CVE-2014-1444kernel-source-rt:Already fixedmoderate ()BID:63889
BID:64952
BID:64953
BID:64954
BID:65459
BID:65943
CONFIRM:git.kernel.org:CVE-2014-0101
CONFIRM:git.kernel.org:CVE-2014-1874
CONFIRM:github.com:CVE-2014-0101
CONFIRM:github.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-3153
CONFIRM:support.f5.com:CVE-2014-0101
CONFIRM:www.kernel.org:CVE-2014-1874
CVE-2013-2147
CVE-2013-4299
CVE-2013-6382
CVE-2014-0101
CVE-2014-1444
CVE-2014-1445
CVE-2014-1446
CVE-2014-1874
CVE-2023-2002
DSA-2906
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru()
MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS
MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk
MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle()
OSS:12052
OSS:2023/04/16/3
RH:CVE-2013-2147
RH:CVE-2013-4299
RH:CVE-2013-6382
RH:CVE-2014-0101
RH:CVE-2014-1444
RH:CVE-2014-1445
RH:CVE-2014-1446
RH:CVE-2014-1874
RHSA-2013:1166
RHSA-2013:1264
RHSA-2013:1436
RHSA-2013:1449
RHSA-2013:1450
RHSA-2013:1460
RHSA-2013:1490
RHSA-2013:1519
RHSA-2013:1520
RHSA-2013:1783
RHSA-2013:1860
RHSA-2014:0328
RHSA-2014:0419
RHSA-2014:0432
RHSA-2014:0439
RHSA-2014:0520
RHSA-2014:0771
SECUNIA:59216
SECUNIA:59262
SECUNIA:59309
SECUNIA:59406
SMASH Issue 54969
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2013-2147
UBUNTU:CVE-2013-4299
UBUNTU:CVE-2013-6382
UBUNTU:CVE-2014-0101
UBUNTU:CVE-2014-1444
UBUNTU:CVE-2014-1445
UBUNTU:CVE-2014-1446
UBUNTU:CVE-2014-1874
UBUNTU:USN-1994-1
UBUNTU:USN-1996-1
UBUNTU:USN-1997-1
UBUNTU:USN-1999-1
UBUNTU:USN-2015-1
UBUNTU:USN-2016-1
UBUNTU:USN-2040-1
UBUNTU:USN-2041-1
UBUNTU:USN-2042-1
UBUNTU:USN-2043-1
UBUNTU:USN-2044-1
UBUNTU:USN-2045-1
UBUNTU:USN-2046-1
UBUNTU:USN-2066-1
UBUNTU:USN-2067-1
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
UBUNTU:USN-2133-1
UBUNTU:USN-2134-1
UBUNTU:USN-2135-1
UBUNTU:USN-2136-1
UBUNTU:USN-2137-1
UBUNTU:USN-2138-1
UBUNTU:USN-2139-1
UBUNTU:USN-2140-1
UBUNTU:USN-2141-1
UBUNTU:USN-2173-1
UBUNTU:USN-2174-1
XF:linux-kernel-cve20141444-info-disc(90443)
XF:linux-kernel-cve20141445-info-disc(90444)
XF:linux-kernel-cve20141446-info-disc(90445)
bnc#823260
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98
linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e
linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a
linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca
rh#1004233
rh#1007690
rh#1033603
rh#1053610
rh#1053613
rh#1053620
rh#1062356
rh#1067558
rh#1070705
rh#1094232
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#971242
CVE-2014-1445kernel-source-rt:Already fixedmoderate ()BID:63889
BID:64952
BID:64953
BID:64954
BID:65459
BID:65943
CONFIRM:git.kernel.org:CVE-2014-0101
CONFIRM:git.kernel.org:CVE-2014-1874
CONFIRM:github.com:CVE-2014-0101
CONFIRM:github.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-3153
CONFIRM:support.f5.com:CVE-2014-0101
CONFIRM:www.kernel.org:CVE-2014-1874
CVE-2013-2147
CVE-2013-4299
CVE-2013-6382
CVE-2014-0101
CVE-2014-1444
CVE-2014-1445
CVE-2014-1446
CVE-2014-1874
CVE-2023-2002
DSA-2906
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru()
MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS
MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk
MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle()
OSS:12052
OSS:2023/04/16/3
RH:CVE-2013-2147
RH:CVE-2013-4299
RH:CVE-2013-6382
RH:CVE-2014-0101
RH:CVE-2014-1444
RH:CVE-2014-1445
RH:CVE-2014-1446
RH:CVE-2014-1874
RHSA-2013:1166
RHSA-2013:1264
RHSA-2013:1436
RHSA-2013:1449
RHSA-2013:1450
RHSA-2013:1460
RHSA-2013:1490
RHSA-2013:1519
RHSA-2013:1520
RHSA-2013:1783
RHSA-2013:1860
RHSA-2014:0328
RHSA-2014:0419
RHSA-2014:0432
RHSA-2014:0439
RHSA-2014:0520
RHSA-2014:0771
SECUNIA:59216
SECUNIA:59262
SECUNIA:59309
SECUNIA:59406
SMASH Issue 54969
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2013-2147
UBUNTU:CVE-2013-4299
UBUNTU:CVE-2013-6382
UBUNTU:CVE-2014-0101
UBUNTU:CVE-2014-1444
UBUNTU:CVE-2014-1445
UBUNTU:CVE-2014-1446
UBUNTU:CVE-2014-1874
UBUNTU:USN-1994-1
UBUNTU:USN-1996-1
UBUNTU:USN-1997-1
UBUNTU:USN-1999-1
UBUNTU:USN-2015-1
UBUNTU:USN-2016-1
UBUNTU:USN-2040-1
UBUNTU:USN-2041-1
UBUNTU:USN-2042-1
UBUNTU:USN-2043-1
UBUNTU:USN-2044-1
UBUNTU:USN-2045-1
UBUNTU:USN-2046-1
UBUNTU:USN-2066-1
UBUNTU:USN-2067-1
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
UBUNTU:USN-2133-1
UBUNTU:USN-2134-1
UBUNTU:USN-2135-1
UBUNTU:USN-2136-1
UBUNTU:USN-2137-1
UBUNTU:USN-2138-1
UBUNTU:USN-2139-1
UBUNTU:USN-2140-1
UBUNTU:USN-2141-1
UBUNTU:USN-2173-1
UBUNTU:USN-2174-1
XF:linux-kernel-cve20141444-info-disc(90443)
XF:linux-kernel-cve20141445-info-disc(90444)
XF:linux-kernel-cve20141446-info-disc(90445)
bnc#823260
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98
linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e
linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a
linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca
rh#1004233
rh#1007690
rh#1033603
rh#1053610
rh#1053613
rh#1053620
rh#1062356
rh#1067558
rh#1070705
rh#1094232
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#971242
CVE-2014-1446kernel-source-rt:Already fixedmoderate ()BID:63889
BID:64952
BID:64953
BID:64954
BID:65459
BID:65943
CONFIRM:git.kernel.org:CVE-2014-0101
CONFIRM:git.kernel.org:CVE-2014-1874
CONFIRM:github.com:CVE-2014-0101
CONFIRM:github.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-3153
CONFIRM:support.f5.com:CVE-2014-0101
CONFIRM:www.kernel.org:CVE-2014-1874
CVE-2013-2147
CVE-2013-4299
CVE-2013-6382
CVE-2014-0101
CVE-2014-1444
CVE-2014-1445
CVE-2014-1446
CVE-2014-1874
CVE-2023-2002
DSA-2906
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru()
MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS
MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk
MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle()
OSS:12052
OSS:2023/04/16/3
RH:CVE-2013-2147
RH:CVE-2013-4299
RH:CVE-2013-6382
RH:CVE-2014-0101
RH:CVE-2014-1444
RH:CVE-2014-1445
RH:CVE-2014-1446
RH:CVE-2014-1874
RHSA-2013:1166
RHSA-2013:1264
RHSA-2013:1436
RHSA-2013:1449
RHSA-2013:1450
RHSA-2013:1460
RHSA-2013:1490
RHSA-2013:1519
RHSA-2013:1520
RHSA-2013:1783
RHSA-2013:1860
RHSA-2014:0328
RHSA-2014:0419
RHSA-2014:0432
RHSA-2014:0439
RHSA-2014:0520
RHSA-2014:0771
SECUNIA:59216
SECUNIA:59262
SECUNIA:59309
SECUNIA:59406
SMASH Issue 54969
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2013-2147
UBUNTU:CVE-2013-4299
UBUNTU:CVE-2013-6382
UBUNTU:CVE-2014-0101
UBUNTU:CVE-2014-1444
UBUNTU:CVE-2014-1445
UBUNTU:CVE-2014-1446
UBUNTU:CVE-2014-1874
UBUNTU:USN-1994-1
UBUNTU:USN-1996-1
UBUNTU:USN-1997-1
UBUNTU:USN-1999-1
UBUNTU:USN-2015-1
UBUNTU:USN-2016-1
UBUNTU:USN-2040-1
UBUNTU:USN-2041-1
UBUNTU:USN-2042-1
UBUNTU:USN-2043-1
UBUNTU:USN-2044-1
UBUNTU:USN-2045-1
UBUNTU:USN-2046-1
UBUNTU:USN-2066-1
UBUNTU:USN-2067-1
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
UBUNTU:USN-2133-1
UBUNTU:USN-2134-1
UBUNTU:USN-2135-1
UBUNTU:USN-2136-1
UBUNTU:USN-2137-1
UBUNTU:USN-2138-1
UBUNTU:USN-2139-1
UBUNTU:USN-2140-1
UBUNTU:USN-2141-1
UBUNTU:USN-2173-1
UBUNTU:USN-2174-1
XF:linux-kernel-cve20141444-info-disc(90443)
XF:linux-kernel-cve20141445-info-disc(90444)
XF:linux-kernel-cve20141446-info-disc(90445)
bnc#823260
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98
linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e
linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a
linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca
rh#1004233
rh#1007690
rh#1033603
rh#1053610
rh#1053613
rh#1053620
rh#1062356
rh#1067558
rh#1070705
rh#1094232
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#971242
CVE-2014-1690kernel-source-rt:Unsupportedlow ()CONFIRM:git.kernel.org:CVE-2014-1690
CONFIRM:github.com:CVE-2014-1690
CONFIRM:www.kernel.org:CVE-2014-1690
CVE-2014-1690
D:CVE-2014-1690
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20140128 Re: CVE request Linux kernel: netfilter: nf_nat: leakage of uninitialized buffer in IRC NAT helper
OSS:11935
RH:CVE-2014-1690
RHSA-2014:0439
SMASH Issue 95732
UBUNTU:CVE-2014-1690
UBUNTU:USN-2137-1
UBUNTU:USN-2140-1
UBUNTU:USN-2158-1
bnc#860835
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2690d97ade05c5325cbf7c72b94b90d265659886
rh#1058748
rh#1094232
CVE-2014-1692openssh:Unsupportedimportant ()BID:65230
CONFIRM:www-01.ibm.com:CVE-2014-1692
CVE-2014-1692
D:CVE-2014-1692
HP:HPSBMU03409
HP:SSRT101487
MISC:www.openbsd.org:CVE-2014-1692
MLIST:[oss-security] 20140128 OpenSSH J-PAKE vulnerability (no cause for panic! remain calm!)
MLIST:[oss-security] 20140129 Re: OpenSSH J-PAKE vulnerability (no cause for panic! remain calm!)
OSS:2015/Q2/563
OSVDB:102611
RH:CVE-2014-1692
SECUNIA:60184
SMASH Issue 95805
UBUNTU:CVE-2014-1692
XF:openssh-cve20141692-code-exec(90819)
bnc#861566
http://www.openbsd.org/cgi-bin/cvsweb/src/usr.bin/ssh/Attic/schnorr.c.diff?r1=1.9%3Br2=1.10%3Bf=h
rh#1059052
CVE-2014-1737kernel-source-rt:Not affectedimportant ()BID:67300
BID:67302
CONFIRM:git.kernel.org:CVE-2014-1737
CONFIRM:git.kernel.org:CVE-2014-1738
CONFIRM:github.com:CVE-2014-1737
CONFIRM:github.com:CVE-2014-1738
CONFIRM:linux.oracle.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-3153
CVE-2014-1737
CVE-2014-1738
D:CVE-2014-1738
DSA-2926
DSA-2928
L3:40865
MLIST:[oss-security] 20140509 Linux kernel floppy ioctl kernel code execution
RH:CVE-2014-1737
RH:CVE-2014-1738
RHSA-2014:0557
RHSA-2014:0740
RHSA-2014:0771
RHSA-2014:0772
RHSA-2014:0786
RHSA-2014:0800
RHSA-2014:0801
RHSA-2014:0900
SECTRACK:1030474
SECUNIA:59262
SECUNIA:59309
SECUNIA:59406
SECUNIA:59599
SMASH Issue 98430
SUSE:SUSE-SU-2014:0667
SUSE:SUSE-SU-2014:0683
UBUNTU:CVE-2014-1737
UBUNTU:CVE-2014-1738
bnc#875798
bnc#877345
bnc#878696
http://www.debian.org/security/2014/dsa-2926
http://www.debian.org/security/2014/dsa-2928
rh#1007690
rh#1067558
rh#1094232
rh#1094299
CVE-2014-1738kernel-source-rt:Not affectedimportant ()BID:67300
BID:67302
CONFIRM:git.kernel.org:CVE-2014-1737
CONFIRM:git.kernel.org:CVE-2014-1738
CONFIRM:github.com:CVE-2014-1737
CONFIRM:github.com:CVE-2014-1738
CONFIRM:linux.oracle.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-3153
CVE-2014-1737
CVE-2014-1738
D:CVE-2014-1738
DSA-2926
DSA-2928
L3:40865
MLIST:[oss-security] 20140509 Linux kernel floppy ioctl kernel code execution
RH:CVE-2014-1737
RH:CVE-2014-1738
RHSA-2014:0557
RHSA-2014:0740
RHSA-2014:0771
RHSA-2014:0772
RHSA-2014:0786
RHSA-2014:0800
RHSA-2014:0801
RHSA-2014:0900
SECTRACK:1030474
SECUNIA:59262
SECUNIA:59309
SECUNIA:59406
SECUNIA:59599
SMASH Issue 98430
SUSE:SUSE-SU-2014:0667
SUSE:SUSE-SU-2014:0683
UBUNTU:CVE-2014-1737
UBUNTU:CVE-2014-1738
bnc#875798
bnc#877345
bnc#878696
http://www.debian.org/security/2014/dsa-2926
http://www.debian.org/security/2014/dsa-2928
rh#1007690
rh#1067558
rh#1094232
rh#1094299
CVE-2014-1874kernel-source-rt:Already fixedmoderate ()BID:63889
BID:64952
BID:64953
BID:64954
BID:65459
BID:65943
CONFIRM:git.kernel.org:CVE-2014-0101
CONFIRM:git.kernel.org:CVE-2014-1874
CONFIRM:github.com:CVE-2014-0101
CONFIRM:github.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-3153
CONFIRM:support.f5.com:CVE-2014-0101
CONFIRM:www.kernel.org:CVE-2014-1874
CVE-2013-2147
CVE-2013-4299
CVE-2013-6382
CVE-2014-0101
CVE-2014-1444
CVE-2014-1445
CVE-2014-1446
CVE-2014-1874
CVE-2023-2002
DSA-2906
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru()
MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS
MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk
MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle()
OSS:12052
OSS:2023/04/16/3
RH:CVE-2013-2147
RH:CVE-2013-4299
RH:CVE-2013-6382
RH:CVE-2014-0101
RH:CVE-2014-1444
RH:CVE-2014-1445
RH:CVE-2014-1446
RH:CVE-2014-1874
RHSA-2013:1166
RHSA-2013:1264
RHSA-2013:1436
RHSA-2013:1449
RHSA-2013:1450
RHSA-2013:1460
RHSA-2013:1490
RHSA-2013:1519
RHSA-2013:1520
RHSA-2013:1783
RHSA-2013:1860
RHSA-2014:0328
RHSA-2014:0419
RHSA-2014:0432
RHSA-2014:0439
RHSA-2014:0520
RHSA-2014:0771
SECUNIA:59216
SECUNIA:59262
SECUNIA:59309
SECUNIA:59406
SMASH Issue 54969
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2013-2147
UBUNTU:CVE-2013-4299
UBUNTU:CVE-2013-6382
UBUNTU:CVE-2014-0101
UBUNTU:CVE-2014-1444
UBUNTU:CVE-2014-1445
UBUNTU:CVE-2014-1446
UBUNTU:CVE-2014-1874
UBUNTU:USN-1994-1
UBUNTU:USN-1996-1
UBUNTU:USN-1997-1
UBUNTU:USN-1999-1
UBUNTU:USN-2015-1
UBUNTU:USN-2016-1
UBUNTU:USN-2040-1
UBUNTU:USN-2041-1
UBUNTU:USN-2042-1
UBUNTU:USN-2043-1
UBUNTU:USN-2044-1
UBUNTU:USN-2045-1
UBUNTU:USN-2046-1
UBUNTU:USN-2066-1
UBUNTU:USN-2067-1
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
UBUNTU:USN-2133-1
UBUNTU:USN-2134-1
UBUNTU:USN-2135-1
UBUNTU:USN-2136-1
UBUNTU:USN-2137-1
UBUNTU:USN-2138-1
UBUNTU:USN-2139-1
UBUNTU:USN-2140-1
UBUNTU:USN-2141-1
UBUNTU:USN-2173-1
UBUNTU:USN-2174-1
XF:linux-kernel-cve20141444-info-disc(90443)
XF:linux-kernel-cve20141445-info-disc(90444)
XF:linux-kernel-cve20141446-info-disc(90445)
bnc#823260
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98
linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e
linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a
linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca
rh#1004233
rh#1007690
rh#1033603
rh#1053610
rh#1053613
rh#1053620
rh#1062356
rh#1067558
rh#1070705
rh#1094232
rh#742846
rh#822754
rh#916646
rh#917012
rh#917013
rh#917017
rh#971242
CVE-2014-1959gnutls:Unsupportedmoderate ()BID:65559
CONFIRM:www.gitorious.org:CVE-2014-1959
CONFIRM:www.gnutls.org:CVE-2015-0282
CVE-2014-1959
D:CVE-2014-1959
DSA-2866
MISC:www.gitorious.org
MLIST:[oss-security] 20140213 CVE Request - GnuTLS corrects flaw in certificate verification (3.1.x/3.2.x)
MLIST:[oss-security] 20140213 Re: CVE Request - GnuTLS corrects flaw in certificate verification (3.1.x/3.2.x)
OSS:12127
RH:CVE-2014-1959
RHSA-2014:0247
SMASH Issue 96187
UBUNTU:CVE-2014-1959
UBUNTU:USN-2121-1
bnc#863989
rh#1065092
rh#1069301
CVE-2014-2038kernel-source-rt:Unsupportedlow ()CONFIRM:git.kernel.org:CVE-2014-2038
CONFIRM:github.com:CVE-2014-2038
CONFIRM:www.kernel.org:CVE-2014-2038
CVE-2014-2038
D:CVE-2014-2038
MLIST:[oss-security] 20140221 Re: Re: CVE request: Linux kernel: nfs: information leakage
OSS:12189
RH:CVE-2014-2038
RHSA-2014:0328
SMASH Issue 96467
UBUNTU:CVE-2014-2038
UBUNTU:USN-2137-1
UBUNTU:USN-2140-1
bnc#865075
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=263b4509ec4d47e0da3e753f85a39ea12d1eff24
rh#1066939
rh#1067341
rh#1094232
CVE-2014-2039kernel-source-rt:Not affectedmoderate ()BID:65700
CONFIRM:git.kernel.org:CVE-2014-2039
CONFIRM:github.com:CVE-2014-2039
CONFIRM:linux.oracle.com:CVE-2014-3153
CONFIRM:www.kernel.org:CVE-2014-8709
CVE-2014-2039
D:CVE-2014-2039
DSA-2906
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20140220 Re: CVE Request: Linux kernel: s390: crash due to linkage stack instruction
RH:CVE-2014-2039
RHSA-2014:0771
SECUNIA:59262
SECUNIA:59309
SMASH Issue 96532
UBUNTU:CVE-2014-2039
bnc#862796
bnc#865307
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d7f6690cedb83456edd41c9bd583783f0703bf0
rh#1007690
rh#1067558
rh#1094232
CVE-2014-2309kernel-source-rt:Not affectedimportant ()BID:64111
BID:66095
BID:66779
BID:67162
BID:67309
BID:67321
BID:68214
CONFIRM:git.kernel.org:CVE-2013-2929
CONFIRM:git.kernel.org:CVE-2013-4299
CONFIRM:git.kernel.org:CVE-2014-0101
CONFIRM:git.kernel.org:CVE-2014-0131
CONFIRM:git.kernel.org:CVE-2014-0155
CONFIRM:git.kernel.org:CVE-2014-1444
CONFIRM:git.kernel.org:CVE-2014-1445
CONFIRM:git.kernel.org:CVE-2014-1446
CONFIRM:git.kernel.org:CVE-2014-1874
CONFIRM:git.kernel.org:CVE-2014-2309
CONFIRM:git.kernel.org:CVE-2014-2851
CONFIRM:git.kernel.org:CVE-2014-3122
CONFIRM:git.kernel.org:CVE-2014-3145
CONFIRM:git.kernel.org:CVE-2014-4608
CONFIRM:github.com:CVE-2014-0131
CONFIRM:github.com:CVE-2014-4608
CONFIRM:www.kernel.org:CVE-2014-9914
CVE-2014-0131
CVE-2014-2309
CVE-2014-2851
CVE-2014-3145
CVE-2014-4608
CVE-2023-2002
L3:41261
MISC:blog.securitymouse.com:CVE-2014-4611
MISC:git.kernel.org
MISC:git.kernel.org:MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding
MISC:git.kernel.org:MLIST:[oss-security] 20140407 CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest ioapic redirection table
MISC:git.kernel.org:MLIST:[oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:patchwork.ozlabs.org:MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding
MISC:www.oberhumer.com:CVE-2014-4608
MISC:www.openwall.com:MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding
MISC:www.securitymouse.com:CVE-2014-4608
MLIST:[linux-kernel] 20140411 net: ipv4: current group_info should be put after using.
MLIST:[netdev] 20140310 [PATCH 0/5] skbuff: fix skb_segment with zero copy skbs
MLIST:[netdev] 20140310 [PATCH 5/5] skbuff: skb_segment: orphan frags before copying
MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding
MLIST:[oss-security] 20140310 CVE-2014-0131 -- kernel: net: use-after-free during segmentation with zerocopy
MLIST:[oss-security] 20140407 CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest ioapic redirection table
MLIST:[oss-security] 20140411 Re: CVE request -- Linux kernel: net: ping: refcount issue in ping_init_sock() function
MLIST:[oss-security] 20140430 Re: CVE request Linux kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking
MLIST:[oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message
MLIST:[oss-security] 20140626 LMS-2014-06-16-2: Linux Kernel LZO
OSS:12309
OSS:2023/04/16/3
RH:CVE-2014-0131
RH:CVE-2014-2309
RH:CVE-2014-2851
RH:CVE-2014-3122
RH:CVE-2014-4608
RHSA-2014:0100
RHSA-2014:0159
RHSA-2014:0285
RHSA-2014:0439
RHSA-2014:0557
RHSA-2014:0786
RHSA-2014:0981
RHSA-2014:1101
RHSA-2014:1392
RHSA-2015:0062
RHSA-2018:1252
SECTRACK:1029894
SECTRACK:1030769
SECUNIA:57250
SECUNIA:59311
SECUNIA:60011
SECUNIA:60174
SECUNIA:62633
SMASH Issue 103001
SMASH Issue 240292
SMASH Issue 55713
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0736
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-0131
UBUNTU:CVE-2014-2309
UBUNTU:CVE-2014-4608
UBUNTU:USN-2070-1
UBUNTU:USN-2075-1
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2111-1
UBUNTU:USN-2112-1
UBUNTU:USN-2114-1
UBUNTU:USN-2115-1
UBUNTU:USN-2116-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
UBUNTU:USN-2251-1
UBUNTU:USN-2252-1
UBUNTU:USN-2262-1
UBUNTU:USN-2416-1
UBUNTU:USN-2417-1
UBUNTU:USN-2418-1
UBUNTU:USN-2419-1
UBUNTU:USN-2420-1
UBUNTU:USN-2421-1
bnc#867531
bnc#889071
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1fd819ecb90cc9b822cd84d3056ddba315d3340f
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce
rh#1070618
rh#1074471
rh#1074589
rh#1081589
rh#1086730
rh#1113899
rh#1163762
rh#822754
CVE-2014-2523kernel-source-rt:Already fixedcritical ()BID:66279
CONFIRM:git.kernel.org:CVE-2014-2523
CONFIRM:github.com:CVE-2014-2523
CVE-2014-2523
DSA-2906
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20140317 Re: CVE Request: netfilter: remote memory corruption in nf_conntrack_proto_dccp.c
MISC:twitter.com:CVE-2014-2523
MLIST:[oss-security] 20140317 Re: CVE Request: netfilter: remote memory corruption in nf_conntrack_proto_dccp.c
RH:CVE-2014-2523
RHSA-2014:0439
RHSA-2014:0475
RHSA-2014:0520
RHSA-2014:0593
RHSA-2014:0634
SECTRACK:1029945
SECUNIA:57446
SMASH Issue 97432
UBUNTU:CVE-2014-2523
UBUNTU:USN-2173-1
UBUNTU:USN-2174-1
XF:linux-kernel-cve20142523-code-exec(91910)
bnc#868653
rh#1007690
rh#1067558
rh#1077343
rh#1094232
rh#822754
CVE-2014-2524bash:Unsupported, crash:Releasedlow ()CONFIRM:advisories.mageia.org:CVE-2014-2524
CVE-2014-2524
D:CVE-2014-2524
FEDORA:FEDORA-2014-7523
MANDRIVA:MDVSA-2014:154
MANDRIVA:MDVSA-2015:132
MISC:gitlab.com
MLIST:[Bug-readline] 20140331 Readline-6.3 Official Patch 3
MLIST:[oss-security] 20140314 Insecure usage of temporary files in GNU Readline
MLIST:[oss-security] 20140317 Re: Insecure usage of temporary files in GNU Readline
OSS:12364
RH:CVE-2014-2524
SMASH Issue 97089
SUSE:openSUSE-SU-2014:1226
UBUNTU:CVE-2014-2524
bnc#868822
rh#1077023
rh#1141597
rh#1146319
CVE-2014-2568kernel-source-rt:Unsupportedlow ()BID:66348
CVE-2014-2568
D:CVE-2014-2568
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[linux-kernel] 20140320 [PATCH v3] core, nfqueue, openvswitch: Orphan frags in skb_zerocopy and handle errors
MLIST:[oss-sec] 20140320 CVE request -- kernel: net: potential information leak when ubuf backed skbs are skb_zerocopy()ied
MLIST:[oss-security] 20140320 Re: CVE request -- kernel: net: potential information leak when ubuf backed skbs are skb_zerocopy()ied
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2014-2568
RHSA-2014:0786
SECUNIA:59599
SMASH Issue 97169
SMASH Issue 97349
SMASH Issue 97435
UBUNTU:CVE-2014-2568
UBUNTU:USN-2240-1
XF:linux-kernel-cve20142568-info-disclosure(91922)
bnc#869564
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1079012
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2014-2580kernel-source-rt:Unsupportedmoderate ()BID:66386
CONFIRM:xenbits.xen.org:CVE-2014-2580
CVE-2014-2580
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:lists.xen.org:MLIST:[oss-security] 20140324 Re: Xen Security Advisory 90 - Linux netback crash trying to disable due to malformed packet
MLIST:[oss-security] 20140324 Re: Xen Security Advisory 90 - Linux netback crash trying to disable due to malformed packet
MLIST:[oss-security] 20140324 Xen Security Advisory 90 - Linux netback crash trying to disable due to malformed packet
OSS:12431
RH:CVE-2014-2580
SECTRACK:1029949
SMASH Issue 97282
SMASH Issue 98014
UBUNTU:CVE-2014-2580
bnc#869925
rh#1080084
CVE-2014-2672kernel-source-rt:Not affectedimportant ()BID:66492
CONFIRM:bugzilla.kernel.org:CVE-2014-2706
CONFIRM:git.kernel.org:CVE-2014-2672
CONFIRM:github.com:CVE-2014-2672
CONFIRM:www.kernel.org:CVE-2014-2673
CONFIRM:www.kernel.org:CVE-2014-2706
CVE-2014-2672
D:CVE-2014-2672
MLIST:[oss-security] 20140330 Re: CVE request: Linux Kernel, two security issues
RH:CVE-2014-2672
RHSA-2014:0557
RHSA-2014:0981
RHSA-2014:1023
RHSA-2014:1101
SECUNIA:57468
SMASH Issue 97504
UBUNTU:CVE-2014-2672
bnc#871148
rh#1083246
rh#1094232
CVE-2014-2673kernel-source-rt:Unsupportedmoderate ()BID:66477
CONFIRM:git.kernel.org:CVE-2014-2673
CONFIRM:github.com:CVE-2014-2673
CONFIRM:www.kernel.org:CVE-2014-2673
CONFIRM:www.kernel.org:CVE-2014-2706
CVE-2014-2673
D:CVE-2014-2673
MLIST:[oss-security] 20140330 Re: CVE request: Linux Kernel, two security issues
RH:CVE-2014-2673
RHSA-2014:1023
SECUNIA:57436
SMASH Issue 97505
UBUNTU:CVE-2014-2673
XF:linux-kernel-cve20142673-dos(92113)
bnc#871149
rh#1083213
CVE-2014-2678kernel-source-rt:Not affectedmoderate ()BID:66543
CONFIRM:linux.oracle.com:CVE-2014-4021
CVE-2014-2678
FEDORA:FEDORA-2014-4844
MLIST:[linux-kernel] 20140329 [PATCH v2] rds: prevent dereference of a NULL device in rds_iw_laddr_check
MLIST:[oss-security] 20140331 CVE-2013-7348 CVE-2014-2678 Linux kernel aio and rds issues
RH:CVE-2014-2678
RHSA-2014:0557
RHSA-2014:0926
RHSA-2014:0981
RHSA-2014:1101
SECUNIA:59386
SECUNIA:60130
SECUNIA:60471
SMASH Issue 103065
UBUNTU:CVE-2014-2678
bnc#871561
rh#1007690
rh#1067558
rh#1083274
rh#1094232
rh#822754
CVE-2014-2706kernel-source-rt:Not affectedimportant ()BID:66591
CONFIRM:bugzilla.kernel.org:CVE-2014-2706
CONFIRM:git.kernel.org:CVE-2014-2706
CONFIRM:github.com:CVE-2014-2706
CONFIRM:linux.oracle.com:CVE-2014-3145
CONFIRM:source.android.com:CVE-2017-6426
CONFIRM:www.kernel.org:CVE-2014-2706
CVE-2014-2706
D:CVE-2014-2706
MLIST:[oss-security] 20140401 Re: CVE request: Linux Kernel, two security issues
RH:CVE-2014-2706
RHSA-2014:0557
RHSA-2014:0981
RHSA-2014:1023
RHSA-2014:1101
SECTRACK:1038201
SECUNIA:60613
SMASH Issue 97565
SMASH Issue 97880
SUSE:SUSE-SU-2014:1316
SUSE:SUSE-SU-2014:1319
UBUNTU:CVE-2014-2706
bnc#871797
rh#1083512
CVE-2014-2739kernel-source-rt:Unsupportedmoderate ()BID:66716
CONFIRM:git.kernel.org:CVE-2014-2739
CONFIRM:github.com:CVE-2014-2739
CVE-2014-2739
D:CVE-2014-2739
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20140410 Re: CVE request Linux kernel: IB/core: crash while resolving passive side RoCE L2 address in cma_req_handler
MISC:patchwork.kernel.org:MLIST:[oss-security] 20140410 Re: CVE request Linux kernel: IB/core: crash while resolving passive side RoCE L2 address in cma_req_handler
MLIST:[oss-security] 20140410 Re: CVE request Linux kernel: IB/core: crash while resolving passive side RoCE L2 address in cma_req_handler
RH:CVE-2014-2739
SMASH Issue 97770
UBUNTU:CVE-2014-2739
bnc#873128
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b2853fd6c2d0f383dbdf7427e263eb576a633867
rh#1085415
CVE-2014-2855rsync:Unsupportedimportant ()CONFIRM:advisories.mageia.org:CVE-2014-2855
CONFIRM:bugs.launchpad.net:CVE-2014-2855
CONFIRM:bugzilla.samba.org:CVE-2014-2855
CONFIRM:git.samba.org:CVE-2014-2855
CVE-2014-2855
FEDORA:FEDORA-2014-5315
MANDRIVA:MDVSA-2015:131
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.samba.org:MLIST:[oss-security] 20140414 CVE Request: rsync denial of service
MLIST:[oss-security] 20140414 CVE Request: rsync denial of service
MLIST:[oss-security] 20140415 Re: CVE Request: rsync denial of service
RH:CVE-2014-2855
SECUNIA:57948
SMASH Issue 97899
SUSE:openSUSE-SU-2014:0595
UBUNTU:CVE-2014-2855
UBUNTU:USN-2171-1
bnc#873740
rh#1087841
CVE-2014-3122kernel-source-rt:Not affectedmoderate ()BID:67162
CONFIRM:git.kernel.org:CVE-2014-3122
CONFIRM:github.com:CVE-2014-3122
CONFIRM:www.kernel.org:CVE-2014-3122
CVE-2014-3122
DSA-2926
MLIST:[oss-security] 20140430 Re: CVE request Linux kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking
RH:CVE-2014-3122
RHSA-2014:0557
RHSA-2014:1392
SECUNIA:59386
SECUNIA:59599
SMASH Issue 103039
SMASH Issue 240295
UBUNTU:CVE-2014-3122
UBUNTU:USN-2240-1
bnc#876102
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57e68e9cd65b4b8eb4045a1e0d0746458502554c
http://www.debian.org/security/2014/dsa-2926
rh#1007690
rh#1067558
rh#1093076
rh#1094232
rh#822754
CVE-2014-3144kernel-source-rt:Not affectedmoderate ()BID:67309
BID:67321
CONFIRM:github.com:CVE-2014-3145
CONFIRM:linux.oracle.com:CVE-2014-3145
CONFIRM:source.android.com:CVE-2017-6426
CVE-2014-3144
CVE-2014-3145
L3:41071
MLIST:[oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message
RH:CVE-2014-3144
RH:CVE-2014-3145
RHSA-2014:0786
RHSA-2014:0913
RHSA-2014:0981
SECTRACK:1038201
SECUNIA:59311
SECUNIA:60613
SMASH Issue 103018
SMASH Issue 103078
SMASH Issue 240298
UBUNTU:CVE-2014-3144
UBUNTU:CVE-2014-3145
UBUNTU:USN-2251-1
UBUNTU:USN-2252-1
UBUNTU:USN-2259-1
UBUNTU:USN-2261-1
UBUNTU:USN-2262-1
UBUNTU:USN-2263-1
UBUNTU:USN-2264-1
bnc#877257
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05ab8f2647e4221cbdb3856dd7d32bd5407316b3
http://www.debian.org/security/2014/dsa-2949
rh#1096775
rh#822754
CVE-2014-3145kernel-source-rt:Not affectedimportant ()BID:64111
BID:66095
BID:66779
BID:67162
BID:67309
BID:67321
BID:68214
CONFIRM:git.kernel.org:CVE-2013-2929
CONFIRM:git.kernel.org:CVE-2013-4299
CONFIRM:git.kernel.org:CVE-2014-0101
CONFIRM:git.kernel.org:CVE-2014-0131
CONFIRM:git.kernel.org:CVE-2014-0155
CONFIRM:git.kernel.org:CVE-2014-1444
CONFIRM:git.kernel.org:CVE-2014-1445
CONFIRM:git.kernel.org:CVE-2014-1446
CONFIRM:git.kernel.org:CVE-2014-1874
CONFIRM:git.kernel.org:CVE-2014-2309
CONFIRM:git.kernel.org:CVE-2014-2851
CONFIRM:git.kernel.org:CVE-2014-3122
CONFIRM:git.kernel.org:CVE-2014-3145
CONFIRM:git.kernel.org:CVE-2014-4608
CONFIRM:github.com:CVE-2014-0131
CONFIRM:github.com:CVE-2014-3145
CONFIRM:github.com:CVE-2014-4608
CONFIRM:linux.oracle.com:CVE-2014-3145
CONFIRM:source.android.com:CVE-2017-6426
CONFIRM:www.kernel.org:CVE-2014-9914
CVE-2014-0131
CVE-2014-2309
CVE-2014-2851
CVE-2014-3144
CVE-2014-3145
CVE-2014-4608
L3:41071
L3:41261
MISC:blog.securitymouse.com:CVE-2014-4611
MISC:git.kernel.org:MLIST:[oss-security] 20140407 CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest ioapic redirection table
MISC:git.kernel.org:MLIST:[oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message
MISC:www.oberhumer.com:CVE-2014-4608
MISC:www.openwall.com:MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding
MISC:www.securitymouse.com:CVE-2014-4608
MLIST:[linux-kernel] 20140411 net: ipv4: current group_info should be put after using.
MLIST:[netdev] 20140310 [PATCH 0/5] skbuff: fix skb_segment with zero copy skbs
MLIST:[netdev] 20140310 [PATCH 5/5] skbuff: skb_segment: orphan frags before copying
MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding
MLIST:[oss-security] 20140310 CVE-2014-0131 -- kernel: net: use-after-free during segmentation with zerocopy
MLIST:[oss-security] 20140407 CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest ioapic redirection table
MLIST:[oss-security] 20140411 Re: CVE request -- Linux kernel: net: ping: refcount issue in ping_init_sock() function
MLIST:[oss-security] 20140430 Re: CVE request Linux kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking
MLIST:[oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message
MLIST:[oss-security] 20140626 LMS-2014-06-16-2: Linux Kernel LZO
RH:CVE-2014-0131
RH:CVE-2014-2309
RH:CVE-2014-2851
RH:CVE-2014-3122
RH:CVE-2014-3144
RH:CVE-2014-3145
RH:CVE-2014-4608
RHSA-2014:0100
RHSA-2014:0159
RHSA-2014:0285
RHSA-2014:0439
RHSA-2014:0557
RHSA-2014:0786
RHSA-2014:0913
RHSA-2014:0981
RHSA-2014:1101
RHSA-2014:1392
RHSA-2015:0062
RHSA-2018:1252
SECTRACK:1029894
SECTRACK:1030769
SECTRACK:1038201
SECUNIA:59311
SECUNIA:60011
SECUNIA:60174
SECUNIA:60613
SECUNIA:62633
SMASH Issue 103018
SMASH Issue 103080
SMASH Issue 240299
SMASH Issue 55713
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0736
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-0131
UBUNTU:CVE-2014-3144
UBUNTU:CVE-2014-3145
UBUNTU:CVE-2014-4608
UBUNTU:USN-2070-1
UBUNTU:USN-2075-1
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2111-1
UBUNTU:USN-2112-1
UBUNTU:USN-2114-1
UBUNTU:USN-2115-1
UBUNTU:USN-2116-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
UBUNTU:USN-2251-1
UBUNTU:USN-2252-1
UBUNTU:USN-2259-1
UBUNTU:USN-2261-1
UBUNTU:USN-2262-1
UBUNTU:USN-2263-1
UBUNTU:USN-2264-1
UBUNTU:USN-2416-1
UBUNTU:USN-2417-1
UBUNTU:USN-2418-1
UBUNTU:USN-2419-1
UBUNTU:USN-2420-1
UBUNTU:USN-2421-1
bnc#877257
bnc#889071
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=05ab8f2647e4221cbdb3856dd7d32bd5407316b3
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1fd819ecb90cc9b822cd84d3056ddba315d3340f
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce
http://www.debian.org/security/2014/dsa-2949
rh#1074589
rh#1081589
rh#1086730
rh#1096775
rh#1113899
rh#822754
CVE-2014-3153kernel-source-rt:Not affectedimportant ()BID:67906
CONFIRM:git.kernel.org:CVE-2014-3153
CONFIRM:linux.oracle.com:CVE-2014-3153
CVE-2014-3153
CVE-2023-2002
D:CVE-2014-3153
DSA-2949
EXPLOIT-DB:35370
L3:41048
L3:41049
MISC:elongl.github.io:MISC:www.openwall.com:CVE-2014-3153
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:github.com:MISC:www.openwall.com:CVE-2014-3153
MISC:lists.debian.org:MLIST:[oss-security] 20140605 Linux kernel futex local privilege escalation (CVE-2014-3153)
MISC:www.openwall.com:CVE-2014-3153
MLIST:[oss-security] 20140605 Linux kernel futex local privilege escalation (CVE-2014-3153)
MLIST:[oss-security] 20140605 Re: Linux kernel futex local privilege escalation (CVE-2014-3153)
MLIST:[oss-security] 20140606 Re: Linux kernel futex local privilege escalation (CVE-2014-3153)
MLIST:[oss-security] 20210201 Re: Linux Kernel: local priv escalation via futexes
OSS:2021/Q1/95
OSS:2023/04/16/3
RH:CVE-2014-3153
RHSA-2014:0771
RHSA-2014:0786
RHSA-2014:0800
RHSA-2014:0900
RHSA-2014:0913
SECTRACK:1030451
SECUNIA:58500
SECUNIA:58990
SECUNIA:59029
SECUNIA:59092
SECUNIA:59153
SECUNIA:59262
SECUNIA:59309
SECUNIA:59386
SECUNIA:59599
SMASH Issue 99230
SUSE:SUSE-SU-2014:0775
SUSE:SUSE-SU-2014:0796
SUSE:SUSE-SU-2014:0837
SUSE:SUSE-SU-2014:1316
SUSE:SUSE-SU-2014:1319
SUSE:openSUSE-SU-2014:0878
UBUNTU:CVE-2014-3153
UBUNTU:USN-2237-1
UBUNTU:USN-2240-1
bnc#880892
bnc#882228
http://www.debian.org/security/2014/dsa-2949
linux.git:commit:e9c243a5a6de0be8e584c604d353412584b592f8
rh#1094232
rh#1103626
rh#1113899
rh#1163762
CVE-2014-3181kernel-source-rt:Not affectedmoderate ()BID:69779
CONFIRM:git.kernel.org:CVE-2014-3181
CONFIRM:github.com:CVE-2014-3181
CVE-2014-3181
CVE-2023-2002
MISC:code.google.com:CVE-2014-3181
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20140911 Multiple Linux USB driver CVE assignment
OSS:2023/04/16/3
RH:CVE-2014-3181
RHSA-2014:1318
RHSA-2014:1971
SMASH Issue 106132
SUSE:SUSE-SU-2015:0481
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-3181
UBUNTU:USN-2376-1
UBUNTU:USN-2377-1
UBUNTU:USN-2378-1
UBUNTU:USN-2379-1
bnc#896382
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c54def7bd64d7c0b6993336abcffb8444795bf38
rh#1113899
rh#1141173
rh#1163762
CVE-2014-3182kernel-source-rt:Unsupportedmoderate ()BID:69770
CONFIRM:git.kernel.org:CVE-2014-3182
CONFIRM:github.com:CVE-2014-3182
CONFIRM:www.kernel.org:CVE-2014-3185
CVE-2014-3182
CVE-2023-2002
MISC:code.google.com:CVE-2014-3182
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20140911 Multiple Linux USB driver CVE assignment
OSS:2023/04/16/3
RH:CVE-2014-3182
RHSA-2014:1318
RHSA-2014:1971
SMASH Issue 106127
UBUNTU:CVE-2014-3182
bnc#896385
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ad3e14d7c5268c2e24477c6ef54bbdf88add5d36
rh#1113899
rh#1141210
CVE-2014-3183kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2014-3183
CONFIRM:github.com:CVE-2014-3183
CONFIRM:www.kernel.org:CVE-2014-3185
CVE-2014-3183
MISC:code.google.com:CVE-2014-3183
MLIST:[oss-security] 20140911 Multiple Linux USB driver CVE assignment
RH:CVE-2014-3183
SMASH Issue 106128
UBUNTU:CVE-2014-3183
bnc#896387
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=51217e69697fba92a06e07e16f55c9a52d8e8945
rh#1141344
CVE-2014-3184kernel-source-rt:Not affectedmoderate ()BID:69768
CONFIRM:git.kernel.org:CVE-2014-3184
CONFIRM:github.com:CVE-2014-3184
CVE-2014-3184
CVE-2023-2002
MISC:code.google.com:CVE-2014-3184
MISC:git.kernel.org:OSS:2023/04/16/3
OSS:2023/04/16/3
RH:CVE-2014-3184
RHSA-2014:1318
RHSA-2014:1971
RHSA-2015:1272
SMASH Issue 106129
UBUNTU:CVE-2014-3184
UBUNTU:USN-2374-1
UBUNTU:USN-2375-1
bnc#896390
rh#1113899
rh#1141391
rh#1163762
CVE-2014-3465gnutls:Unsupportedmoderate ()CONFIRM:www.gitorious.org:CVE-2014-3465
CVE-2014-3465
D:CVE-2014-3465
MLIST:[gnutls-help] 20140131 gnutls 3.1.20
MLIST:[gnutls-help] 20140131 gnutls 3.2.10
RH:CVE-2014-3465
RHSA-2014:0684
SECUNIA:59086
SMASH Issue 99187
SUSE:openSUSE-SU-2014:0763
SUSE:openSUSE-SU-2014:0767
UBUNTU:CVE-2014-3465
bnc#880733
rh#1101734
CVE-2014-3534kernel-source-rt:Unsupportedimportant ()BID:68940
CONFIRM:git.kernel.org:CVE-2014-3534
CONFIRM:www.kernel.org:CVE-2014-5045
CVE-2014-3534
D:CVE-2014-3534
DSA-2992
MISC:git.kernel.org:/
OSVDB:109546
RH:CVE-2014-3534
RHSA-2014:1023
SECTRACK:1030683
SECUNIA:59790
SECUNIA:60351
SMASH Issue 103207
UBUNTU:CVE-2014-3534
XF:linux-cve20143534-priv-esc(95069)
bdo#728705
bnc#885460
linux.git:commit:dab6cf55f81a6e16b8147aed9a843e1691dcd318
rh#1114089
CVE-2014-3535kernel-source-rt:Unsupportedimportant ()BID:69721
CONFIRM:git.kernel.org:CVE-2014-3535
CONFIRM:github.com:CVE-2014-3535
CONFIRM:mirror.linux.org.au:CVE-2014-3535
CVE-2014-3535
MISC:git.kernel.org:/
RH:CVE-2014-3535
RHSA-2014:1167
RHSA-2014:1168
SMASH Issue 105971
UBUNTU:CVE-2014-3535
bnc#896015
rh#1114540
CVE-2014-3601kernel-source-rt:Not affectedmoderate ()BID:69489
CONFIRM:git.kernel.org:CVE-2014-3601
CVE-2014-3601
CVE-2023-2002
D:CVE-2014-3601
MISC:git.kernel.org:OSS:2023/04/16/3
OSS:2023/04/16/3
RH:CVE-2014-3601
RHSA-2014:1392
RHSA-2015:0674
SECUNIA:60830
SMASH Issue 105212
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0736
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-3601
UBUNTU:USN-2356-1
UBUNTU:USN-2357-1
UBUNTU:USN-2358-1
UBUNTU:USN-2359-1
XF:linux-kernel-cve20143601-dos(95689)
bnc#892782
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7
linux.git:commit:350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7
linux.git:commit:3d32e4dbe71374a6780eaf51d719d76f9a9bf22f
linux.git:commit:e9de42d8eeffdc23af0144cafa9e3deacc489fb9
rh#1113899
rh#1131951
rh#1156518
rh#1163762
CVE-2014-3610kernel-source-rt:Not affectedmoderate ()BID:70742
CONFIRM:git.kernel.org:CVE-2014-3610
CONFIRM:git.kernel.org:CVE-2014-3646
CVE-2014-3610
CVE-2014-3646
CVE-2023-2002
DSA-3060
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20141024 kvm issues
OSS:2023/04/16/3
RH:CVE-2014-3610
RH:CVE-2014-3646
RHSA-2014:1724
RHSA-2014:1843
RHSA-2015:0126
RHSA-2015:0284
RHSA-2015:0869
SMASH Issue 155986
SMASH Issue 232569
SUSE:SUSE-SU-2015:0481
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-3610
UBUNTU:CVE-2014-3646
UBUNTU:USN-2394-1
UBUNTU:USN-2417-1
UBUNTU:USN-2418-1
UBUNTU:USN-2491-1
bdo#766195
bnc#899192
linux.git:commit:854e8bb1aa06c578c2c9145fa6bfe3680ef63b23
linux.git:commit:a642fc305053cc1c6e47e4f4df327895747ab485
rh#1113899
rh#1144825
rh#1144883
rh#1163762
rh#1183744
CVE-2014-3620curl:Unsupportedmoderate ()APPLE:APPLE-SA-2015-08-13-2
BID:69742
CONFIRM:curl.haxx.se:CVE-2014-3620
CONFIRM:kb.juniper.net:CVE-2015-3153
CONFIRM:support.apple.com:CVE-2015-5784
CVE-2014-3620
DSA-3022
MISC:curl.se:OSS:2022/05/11/2
MISC:curl.se:OSS:2022/Q2/93
MISC:github.com:OSS:2022/05/11/2
OSS:2022/05/11/2
RH:CVE-2014-3620
SMASH Issue 106018
SUSE:openSUSE-SU-2014:1139
UBUNTU:CVE-2014-3620
bnc#895991
rh#1138846
CVE-2014-3631kernel-source-rt:Not affectedimportant ()BID:70095
BID:75142
CONFIRM:git.kernel.org:CVE-2014-3631
CONFIRM:git.kernel.org:CVE-2015-1805
CONFIRM:git.kernel.org:CVE-2015-2922
CONFIRM:git.kernel.org:CVE-2015-4167
CONFIRM:git.kernel.org:CVE-2015-4692
CONFIRM:www.kernel.org:CVE-2014-7145
CVE-2014-3631
CVE-2015-4692
EXPLOIT-DB:36268
FEDORA:FEDORA-2015-10677
FEDORA:FEDORA-2015-10678
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20150620 Re: CVE request -- Linux kernel - kvm: x86: NULL pointer dereference in kvm_apic_has_events function
OSVDB:111298
RH:CVE-2014-3631
RH:CVE-2015-4692
RHSA-2014:1971
SECTRACK:1032798
SMASH Issue 106051
UBUNTU:CVE-2014-3631
UBUNTU:CVE-2015-4692
UBUNTU:USN-2378-1
UBUNTU:USN-2379-1
UBUNTU:USN-2682-1
UBUNTU:USN-2683-1
UBUNTU:USN-2684-1
bnc#896262
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=95389b08d93d5c06ec63ab49bd732b0069b7c35e
linux.git:commit:95389b08d93d5c06ec63ab49bd732b0069b7c35e
rh#1140325
rh#1230770
CVE-2014-3646kernel-source-rt:Not affectedmoderate ()BID:70742
CONFIRM:git.kernel.org:CVE-2014-3610
CONFIRM:git.kernel.org:CVE-2014-3646
CVE-2014-3610
CVE-2014-3646
CVE-2023-2002
DSA-3060
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20141024 kvm issues
OSS:2023/04/16/3
RH:CVE-2014-3610
RH:CVE-2014-3646
RHSA-2014:1724
RHSA-2014:1843
RHSA-2015:0126
RHSA-2015:0284
RHSA-2015:0869
SMASH Issue 155986
SMASH Issue 232560
SUSE:SUSE-SU-2015:0481
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-3610
UBUNTU:CVE-2014-3646
UBUNTU:USN-2394-1
UBUNTU:USN-2417-1
UBUNTU:USN-2418-1
UBUNTU:USN-2491-1
bdo#766195
bnc#899192
linux.git:commit:854e8bb1aa06c578c2c9145fa6bfe3680ef63b23
linux.git:commit:a642fc305053cc1c6e47e4f4df327895747ab485
rh#1113899
rh#1144825
rh#1144883
rh#1163762
rh#1183744
CVE-2014-3673kernel-source-rt:Not affectedmoderate ()BID:70691
BID:70883
CONFIRM:git.kernel.org:CVE-2014-3673
CONFIRM:git.kernel.org:CVE-2014-3690
CONFIRM:github.com:CVE-2014-3673
CONFIRM:github.com:CVE-2014-3690
CONFIRM:linux.oracle.com:CVE-2014-3687
CONFIRM:www.kernel.org:CVE-2014-3690
CVE-2014-3673
CVE-2014-3690
CVE-2014-8160
CVE-2014-9584
CVE-2015-7303
CVE-2015-7838
CVE-2015-7839
CVE-2015-8028
CVE-2015-8029
CVE-2015-8030
CVE-2015-8220
CVE-2015-8561
CVE-2015-8572
CVE-2015-8580
CVE-2015-8843
CVE-2016-1715
CVE-2016-4065
CVE-2023-2002
D:CVE-2014-3690
DSA-3060
HP:HPSBGN03282
HP:HPSBGN03285
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace
MISC:git.kernel.org:MLIST:[oss-security] 20141126 Re: CVE Request: Linux kernel LDT handling bugs
MISC:git.kernel.org:MLIST:[oss-security] 20141215 Linux kernel: multiple x86_64 vulnerabilities
MISC:git.kernel.org:MLIST:[oss-security] 20150320 Re: CVE Request: Linux kernel execution in the early microcode loader.
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:www.zerodayinitiative.com
MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace
MLIST:[oss-security] 20141029 Re: CVE-2014-3690: KVM DoS triggerable by malicious host userspace
OSS:2014/Q4/416
OSS:2023/04/16/3
RH:CVE-2014-3673
RH:CVE-2014-3690
RHSA-2014:1971
RHSA-2014:1997
RHSA-2015:0043
RHSA-2015:0062
RHSA-2015:0115
RHSA-2015:0290
RHSA-2015:0782
RHSA-2015:0864
SECUNIA:60174
SECUNIA:62428
SMASH Issue 110104
SMASH Issue 110107
SMASH Issue 155985
SMASH Issue 232568
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0529
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:0812
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-3185
UBUNTU:CVE-2014-3673
UBUNTU:CVE-2014-3690
UBUNTU:CVE-2014-7826
UBUNTU:CVE-2014-8133
UBUNTU:CVE-2014-9090
UBUNTU:CVE-2014-9322
UBUNTU:USN-2417-1
UBUNTU:USN-2418-1
UBUNTU:USN-2419-1
UBUNTU:USN-2420-1
UBUNTU:USN-2421-1
bdo#766195
bnc#902232
bnc#902346
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d974baa398f34393db76be45f7d4d04fbdbb4a0a
rh#1113899
rh#1147850
rh#1153322
rh#1163762
rh#1163792
CVE-2014-3687kernel-source-rt:Not affectedimportant ()BID:70766
CONFIRM:git.kernel.org:CVE-2014-3687
CONFIRM:github.com:CVE-2014-3687
CONFIRM:linux.oracle.com:CVE-2014-3687
CVE-2014-3687
CVE-2023-2002
DSA-3060
HP:HPSBGN03282
HP:HPSBGN03285
MISC:git.kernel.org:OSS:2023/04/16/3
OSS:2023/04/16/3
RH:CVE-2014-3687
RHSA-2014:1971
RHSA-2014:1997
RHSA-2015:0043
RHSA-2015:0062
RHSA-2015:0115
SECUNIA:62428
SMASH Issue 155999
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0529
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:1489
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-3687
UBUNTU:USN-2417-1
UBUNTU:USN-2418-1
bdo#766195
bnc#902349
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b69040d8e39f20d5215a03502a8e8b4c6ab78395
rh#1113899
rh#1155731
rh#1163762
rh#1163792
rh#1183744
rh#1202855
rh#1205079
CVE-2014-3688kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2014-3688
CONFIRM:github.com:CVE-2014-3688
CONFIRM:www.kernel.org:CVE-2014-8884
CVE-2014-3688
CVE-2023-2002
DSA-3060
HP:HPSBGN03282
HP:HPSBGN03285
MISC:bugzilla.redhat.com:MLIST:[oss-security] 20141113 Linux kernel: SCTP issues
MISC:git.kernel.org:MLIST:[oss-security] 20141113 Linux kernel: SCTP issues
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20141113 Linux kernel: SCTP issues
OSS:2023/04/16/3
RH:CVE-2014-3688
RHSA-2014:1971
RHSA-2014:1997
RHSA-2015:0043
RHSA-2015:0062
RHSA-2015:0115
SMASH Issue 110127
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-3688
UBUNTU:USN-2417-1
UBUNTU:USN-2418-1
bdo#766195
bnc#902351
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=26b87c7881006311828bb0ab271a551a62dcceb4
rh#1113899
rh#1155745
rh#1163762
rh#1163792
CVE-2014-3690kernel-source-rt:Not affectedmoderate ()BID:70691
CONFIRM:git.kernel.org:CVE-2014-3690
CONFIRM:github.com:CVE-2014-3690
CONFIRM:www.kernel.org:CVE-2014-3690
CVE-2014-3673
CVE-2014-3690
CVE-2014-8160
CVE-2014-9584
CVE-2015-7303
CVE-2015-7838
CVE-2015-7839
CVE-2015-8028
CVE-2015-8029
CVE-2015-8030
CVE-2015-8220
CVE-2015-8561
CVE-2015-8572
CVE-2015-8580
CVE-2015-8843
CVE-2016-1715
CVE-2016-4065
CVE-2023-2002
D:CVE-2014-3690
DSA-3060
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace
MISC:git.kernel.org:MLIST:[oss-security] 20141126 Re: CVE Request: Linux kernel LDT handling bugs
MISC:git.kernel.org:MLIST:[oss-security] 20141215 Linux kernel: multiple x86_64 vulnerabilities
MISC:git.kernel.org:MLIST:[oss-security] 20150320 Re: CVE Request: Linux kernel execution in the early microcode loader.
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:www.zerodayinitiative.com
MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace
MLIST:[oss-security] 20141029 Re: CVE-2014-3690: KVM DoS triggerable by malicious host userspace
OSS:2014/Q4/416
OSS:2023/04/16/3
RH:CVE-2014-3690
RHSA-2015:0290
RHSA-2015:0782
RHSA-2015:0864
SECUNIA:60174
SMASH Issue 110104
SMASH Issue 110107
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0736
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-3185
UBUNTU:CVE-2014-3690
UBUNTU:CVE-2014-7826
UBUNTU:CVE-2014-8133
UBUNTU:CVE-2014-9090
UBUNTU:CVE-2014-9322
UBUNTU:USN-2417-1
UBUNTU:USN-2418-1
UBUNTU:USN-2419-1
UBUNTU:USN-2420-1
UBUNTU:USN-2421-1
bdo#766195
bnc#902232
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d974baa398f34393db76be45f7d4d04fbdbb4a0a
rh#1113899
rh#1153322
rh#1163762
rh#1163792
CVE-2014-3917kernel-source-rt:Already fixedmoderate ()CVE-2014-3917
CVE-2023-2002
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-kernel] 20140528 [PATCH 1/2] auditsc: audit_krule mask accesses need bounds checking
MLIST:[oss-security] 20140529 Re: CVE request: Linux kernel DoS with syscall auditing
OSS:2023/04/16/3
RH:CVE-2014-3917
RHSA-2014:0913
RHSA-2014:1143
RHSA-2014:1167
RHSA-2014:1281
SECUNIA:59777
SECUNIA:60011
SECUNIA:60564
SMASH Issue 103024
SMASH Issue 103081
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2014-3917
UBUNTU:USN-2334-1
UBUNTU:USN-2335-1
bnc#880484
rh#1070618
rh#1102571
rh#822754
CVE-2014-4014kernel-source-rt:Unsupportedmoderate ()BID:67988
CONFIRM:git.kernel.org:CVE-2014-4014
CONFIRM:www.kernel.org:CVE-2014-4157
CVE-2014-4014
D:CVE-2014-4014
EXPLOIT-DB:33824
MLIST:[oss-security] 20140610 CVE-2014-4014: Linux kernel user namespace bug
OSS:2014/Q2/511
RH:CVE-2014-4014
SECTRACK:1030394
SECUNIA:59220
SMASH Issue 99458
UBUNTU:CVE-2014-4014
bnc#882189
linux.git:commit:23adbe12ef7d3d4195e80800ab36b37bee28cd03
rh#1070618
rh#1107966
CVE-2014-4330perl:Already fixedmoderate ()APPLE:APPLE-SA-2010-03-29-1
APPLE:APPLE-SA-2016-05-16-4
APPLE:APPLE-SA-2016-07-18-1
BID:100503
BID:100514
BID:100861
BID:105647
BID:105656
BID:105658
BID:67121
BID:70142
BID:79091
BID:85801
BID:91067
BID:91068
BID:91787
BID:91869
BID:93132
BID:93287
BID:93604
BID:94371
BID:94377
BID:94925
BID:95429
BUGTRAQ:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
BUGTRAQ:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
CONFIRM:access.redhat.com:CVE-2014-0114
CONFIRM:advisories.mageia.org:CVE-2014-0114
CONFIRM:advisories.mageia.org:CVE-2014-4330
CONFIRM:bugs.jython.org:CVE-2016-4000
CONFIRM:bugs.launchpad.net:CVE-2015-8866
CONFIRM:bugs.launchpad.net:CVE-2015-8867
CONFIRM:bugs.php.net:CVE-2015-8866
CONFIRM:bugs.php.net:CVE-2015-8867
CONFIRM:bugs.php.net:CVE-2015-8878
CONFIRM:bugs.php.net:CVE-2016-4070
CONFIRM:bugzilla.redhat.com:CVE-2015-7559
CONFIRM:commons.apache.org:CVE-2014-0114
CONFIRM:git.php.net:CVE-2015-8866
CONFIRM:git.php.net:CVE-2015-8867
CONFIRM:github.com:CVE-2016-1182
CONFIRM:github.com:CVE-2016-9389
CONFIRM:github.com:CVE-2016-9394
CONFIRM:github.com:CVE-2016-9583
CONFIRM:github.com:CVE-2017-1000071
CONFIRM:github.com:CVE-2017-14735
CONFIRM:h20566.www2.hpe.com:CVE-2016-0763
CONFIRM:h20566.www2.hpe.com:CVE-2016-5388
CONFIRM:h20566.www2.hpe.com:CVE-2016-5773
CONFIRM:h20566.www2.hpe.com:CVE-2017-5787
CONFIRM:hg.python.org:CVE-2016-4000
CONFIRM:issues.apache.org:CVE-2014-0114
CONFIRM:issues.apache.org:CVE-2015-1832
CONFIRM:issues.apache.org:CVE-2015-7559
CONFIRM:issues.apache.org:CVE-2016-1000031
CONFIRM:metacpan.org:CVE-2014-4330
CONFIRM:rwkbp.makekb.com:CVE-2015-8965
CONFIRM:security-tracker.debian.org:CVE-2016-1181
CONFIRM:security-tracker.debian.org:CVE-2016-1182
CONFIRM:security.netapp.com:CVE-2014-0114
CONFIRM:security.netapp.com:CVE-2016-1000031
CONFIRM:security.netapp.com:CVE-2016-1182
CONFIRM:security.netapp.com:CVE-2017-5645
CONFIRM:support.apple.com:CVE-2009-0689
CONFIRM:support.apple.com:CVE-2016-4073
CONFIRM:support.apple.com:CVE-2016-4653
CONFIRM:svn.apache.org:CVE-2015-1832
CONFIRM:www-01.ibm.com:CVE-2014-0114
CONFIRM:www-01.ibm.com:CVE-2014-3022
CONFIRM:www-01.ibm.com:CVE-2015-1832
CONFIRM:www.ibm.com:CVE-2014-0963
CONFIRM:www.lsexperts.de:CVE-2014-4330
CONFIRM:www.oracle.com:CVE-2014-0114
CONFIRM:www.oracle.com:CVE-2014-4271
CONFIRM:www.oracle.com:CVE-2014-6564
CONFIRM:www.oracle.com:CVE-2015-0437
CONFIRM:www.oracle.com:CVE-2016-5477
CONFIRM:www.oracle.com:CVE-2016-8296
CONFIRM:www.oracle.com:CVE-2017-3626
CONFIRM:www.oracle.com:CVE-2017-5689
CONFIRM:www.oracle.com:CVE-2017-5709
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CONFIRM:www.pcre.org:CVE-2015-2325
CONFIRM:www.php.net:CVE-2009-3558
CONFIRM:www.php.net:CVE-2016-9935
CONFIRM:www.php.net:CVE-2016-9936
CONFIRM:www.vmware.com:CVE-2014-0114
CONFIRM:www.vmware.com:CVE-2014-8371
CONFIRM:x-stream.github.io:CVE-2013-7285
CVE-2009-3559
CVE-2013-7285
CVE-2014-0114
CVE-2014-0245
CVE-2014-3540
CVE-2014-4172
CVE-2014-4330
CVE-2014-4651
CVE-2015-0852
CVE-2015-1832
CVE-2015-2325
CVE-2015-2326
CVE-2015-2613
CVE-2015-5328
CVE-2015-7559
CVE-2015-7940
CVE-2015-8878
CVE-2015-8965
CVE-2015-9251
CVE-2016-0635
CVE-2016-1000031
CVE-2016-1181
CVE-2016-1182
CVE-2016-4000
CVE-2016-4070
CVE-2016-4612
CVE-2016-4619
CVE-2016-5483
CVE-2016-5616
CVE-2016-5617
CVE-2016-5684
CVE-2016-6814
CVE-2016-9389
CVE-2016-9392
CVE-2016-9583
CVE-2017-0379
CVE-2017-13745
CVE-2017-14229
CVE-2017-14735
CVE-2017-15095
CVE-2017-16012
DEBIAN:DSA-3959
DSA-2940
DSA-3392
DSA-3417
DSA-3893
FEDORA:FEDORA-2014-11453
FEDORA:FEDORA-2014-9380
FEDORA:FEDORA-2015-16104
FEDORA:FEDORA-2015-16105
FEDORA:FEDORA-2015-16106
FEDORA:FEDORA-2015-7d95466eda
FEDORA:FEDORA-2015-992342e82f
FEDORA:FEDORA-2015-decbab7c9f
FULLDISC:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
FULLDISC:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
GENTOO:GLSA-201607-09
GENTOO:GLSA-201701-68
GENTOO:GLSA-201710-28
HP:HPSBGN03041
HP:HPSBMU03090
HP:HPSBST03160
JVN:JVN#03188560
JVN:JVN#65044642
JVNDB:JVNDB-2016-000096
JVNDB:JVNDB-2016-000097
L3:42159
MANDRIVA:MDVSA-2009:302
MANDRIVA:MDVSA-2014:095
MANDRIVA:MDVSA-2015:136
MISC:access.redhat.com:CVE-2014-0245
MISC:blog.diniscruz.com:CVE-2013-7285
MISC:blogs.gentoo.org:CVE-2016-9399
MISC:bugs.exim.org:CVE-2015-2325
MISC:bugs.exim.org:CVE-2015-2326
MISC:bugs.php.net:CVE-2009-3559
MISC:bugzilla.redhat.com:CVE-2014-0245
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:eprint.iacr.org:CVE-2017-0379
MISC:exchange.xforce.ibmcloud.com:CVE-2014-4172
MISC:fortiguard.com:CVE-2015-2325
MISC:fortiguard.com:CVE-2015-2326
MISC:git.gnupg.org:CVE-2017-0379
MISC:github.com:CVE-2014-4172
MISC:github.com:CVE-2015-9251
MISC:github.com:CVE-2017-14229
MISC:ics-cert.us-cert.gov:CVE-2015-9251
MISC:issues.apache.org:CVE-2014-4651
MISC:issues.jasig.org:CVE-2014-4172
MISC:lists.debian.org:CVE-2017-0379
MISC:lists.fedoraproject.org:CVE-2014-4172
MISC:mail-archives.apache.org:CVE-2016-6814
MISC:packetstormsecurity.com:CVE-2014-4330
MISC:seclists.org:CVE-2014-4651
MISC:security-tracker.debian.org:CVE-2016-4000
MISC:security-tracker.debian.org:CVE-2017-0379
MISC:snyk.io:CVE-2015-9251
MISC:snyk.io:CVE-2016-4000
MISC:sw.aveva.com:CVE-2015-9251
MISC:web-in-security.blogspot.ca:CVE-2015-7940
MISC:web.archive.org:CVE-2013-7285
MISC:www.debian.org:CVE-2014-4172
MISC:www.mail-archive.com:CVE-2014-4172
MISC:www.oracle.com:CVE-2013-7285
MISC:www.talosintelligence.com:CVE-2016-5684
MISC:www.tenable.com:CVE-2016-1000031
MISC:www.tenable.com:CVE-2016-6793
MLIST:[activemq-issues] 20190718 [jira] [Updated] (AMQ-7236) SEV-1 Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring framework) and xstream-1.4.10.jar
MLIST:[activemq-issues] 20190826 [jira] [Created] (AMQ-7288) Security Vulnerabilities in ActiveMQ dependent libraries.
MLIST:[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior
MLIST:[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114
MLIST:[oss-security] 20091120 CVE request: php 5.3.1 update
MLIST:[oss-security] 20091120 Re: CVE request: php 5.3.1 update
MLIST:[oss-security] 20140109 Re: CVE request: remote code execution via deserialization in XStream
MLIST:[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE
MLIST:[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE
MLIST:[oss-security] 20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
MLIST:[oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp
MLIST:[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle
MLIST:[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle
MLIST:[oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases
MLIST:[oss-security] 20161117 Re: jasper: multiple assertion failures
MLIST:[perl.perl5.porters] 20140918 fix for CVE-2014-4330 present in blead
MLIST:[php-announce] 20091119 5.3.1 Release announcement
MLIST:[xstream-user] 20130717 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper
MLIST:[xstream-user] 20130718 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper
Oracle:CVE-2016-5616
Oracle:CVE-2016-5617
Oracle:CVE-2019-10173
RH:CVE-2014-4330
RHSA-2014:0216
RHSA-2014:0294
RHSA-2014:0323
RHSA-2014:0371
RHSA-2014:0372
RHSA-2014:0374
RHSA-2014:0389
RHSA-2014:0452
RHSA-2014:0474
RHSA-2014:0497
RHSA-2014:0498
RHSA-2014:0500
RHSA-2014:0511
RHSA-2014:1007
RHSA-2014:1059
RHSA-2015:1009
RHSA-2015:1176
RHSA-2015:1888
RHSA-2016:2035
RHSA-2016:2036
RHSA-2016:2130
RHSA-2016:2131
RHSA-2016:2595
RHSA-2016:2749
RHSA-2016:2750
RHSA-2016:2927
RHSA-2016:2928
RHSA-2017:0184
RHSA-2017:0272
RHSA-2017:0868
RHSA-2017:1208
RHSA-2017:2192
RHSA-2017:2486
RHSA-2017:2596
RHSA-2017:2787
RHSA-2017:2886
RHSA-2017:3189
RHSA-2017:3190
RHSA-2018:0279
RHSA-2018:0342
RHSA-2018:0480
RHSA-2018:0481
RHSA-2018:0501
RHSA-2018:0574
RHSA-2018:0576
RHSA-2018:0577
RHSA-2018:1447
RHSA-2018:1448
RHSA-2018:1449
RHSA-2018:1450
RHSA-2018:2669
RHSA-2018:2927
RHSA-2019:1822
RHSA-2019:1823
RHSA-2019:2995
RHSA-2019:3892
RHSA-2019:4352
RHSA-2020:0445
RHSA-2020:0727
RHSA-2020:0983
SECTRACK:1034077
SECTRACK:1036056
SECTRACK:1036377
SECTRACK:1036378
SECTRACK:1036393
SECTRACK:1036397
SECTRACK:1037036
SECTRACK:1037046
SECTRACK:1037053
SECTRACK:1037640
SECTRACK:1039600
SECTRACK:1041294
SECUNIA:57477
SECUNIA:58710
SECUNIA:58851
SECUNIA:58947
SECUNIA:59014
SECUNIA:59118
SECUNIA:59228
SECUNIA:59245
SECUNIA:59246
SECUNIA:59430
SECUNIA:59464
SECUNIA:59479
SECUNIA:59480
SECUNIA:59704
SECUNIA:59718
SECUNIA:60177
SECUNIA:60703
SECUNIA:61441
SECUNIA:61961
SMASH Issue 106174
SMASH Issue 106399
SUSE:SUSE-SU-2016:1277
SUSE:openSUSE-SU-2015:0858
SUSE:openSUSE-SU-2015:1911
SUSE:openSUSE-SU-2016:1274
SUSE:openSUSE-SU-2016:1373
UBUNTU:CVE-2014-4330
UBUNTU:CVE-2015-7559
UBUNTU:USN-2916-1
UBUNTU:USN-2952-1
UBUNTU:USN-2952-2
UBUNTU:USN-3693-1
UBUNTU:USN-3727-1
XF:perl-cve20144330-dos(96216)
ZDI-16-570
bdo#759718
bdo#797165
bdo#864859
bdo#873383
bnc#1022633
bnc#896715
http://www.debian.org/security/2016/dsa-3560
https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=95433e8e339dbb6b5d5541473c1661db6ba2c451
rh#1051277
rh#1091938
rh#1101303
rh#1112877
rh#1116665
rh#1131350
rh#1139700
rh#1207198
rh#1207202
rh#1293972
rh#1323114
rh#1343538
rh#1343540
rh#1378936
rh#1386562
rh#1386564
rh#1396963
rh#1396971
rh#1414133
rh#1433010
rh#1591854
rh#1714979
rh#1716448
rh#1716453
rh#1716454
rh#1722971
rh#539529
CVE-2014-4508kernel-source-rt:Not affectedimportant5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)BID:68126
CONFIRM:www.kernel.org:CVE-2014-4508
CVE-2014-4508
CVE-2023-2002
D:CVE-2014-4508
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-kernel] 20140616 Re: 3.15: kernel BUG at kernel/auditsc.c:1525!
MLIST:[oss-security] 20140619 CVE request: Another Linux syscall auditing bug
MLIST:[oss-security] 20140620 Re: CVE request: Another Linux syscall auditing bug
MLIST:[oss-security] 20201112 CVE-2014-4508
OSS:2020/Q4/121
OSS:2023/04/16/3
RH:CVE-2014-4508
RHSA-2021:0181
SECUNIA:58964
SECUNIA:60564
SMASH Issue 99968
SMASH Issue 99971
SUSE:SUSE-SU-2014:1316
SUSE:SUSE-SU-2014:1319
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-4508
UBUNTU:USN-2334-1
bnc#883724
linux.git:commit:554086d85e71f30abe46fc014fea31929a7c6a8a
linux.git:commit:8142b215501f8b291a108a202b3a053a265b03dd
linux.git:commit:d1fc98ba961db83293f804a1037e905c03b301cf
linux.git:commit:fb21b84e7f809ef04b1e5aed5d463cf0d4866638
rh#1070618
rh#1111590
rh#1113899
rh#1163762
rh#822754
CVE-2014-4608kernel-source-rt:Not affectedmoderate ()BID:64111
BID:66095
BID:66779
BID:67162
BID:67309
BID:67321
BID:68214
BID:68862
BID:68881
BID:72061
CONFIRM:git.kernel.org:CVE-2013-2929
CONFIRM:git.kernel.org:CVE-2013-4299
CONFIRM:git.kernel.org:CVE-2013-7281
CONFIRM:git.kernel.org:CVE-2014-0101
CONFIRM:git.kernel.org:CVE-2014-0131
CONFIRM:git.kernel.org:CVE-2014-0155
CONFIRM:git.kernel.org:CVE-2014-1444
CONFIRM:git.kernel.org:CVE-2014-1445
CONFIRM:git.kernel.org:CVE-2014-1446
CONFIRM:git.kernel.org:CVE-2014-1874
CONFIRM:git.kernel.org:CVE-2014-2309
CONFIRM:git.kernel.org:CVE-2014-2851
CONFIRM:git.kernel.org:CVE-2014-3122
CONFIRM:git.kernel.org:CVE-2014-3145
CONFIRM:git.kernel.org:CVE-2014-4608
CONFIRM:git.kernel.org:CVE-2014-4943
CONFIRM:git.kernel.org:CVE-2014-5045
CONFIRM:git.kernel.org:CVE-2014-5077
CONFIRM:git.kernel.org:CVE-2014-8160
CONFIRM:github.com:CVE-2013-7281
CONFIRM:github.com:CVE-2014-0131
CONFIRM:github.com:CVE-2014-4608
CONFIRM:github.com:CVE-2014-4943
CONFIRM:github.com:CVE-2014-5045
CONFIRM:github.com:CVE-2014-5077
CONFIRM:github.com:CVE-2014-8160
CONFIRM:linux.oracle.com:CVE-2014-4943
CONFIRM:www.kernel.org:CVE-2014-5045
CONFIRM:www.kernel.org:CVE-2014-9914
CVE-2013-7263
CVE-2014-0131
CVE-2014-2309
CVE-2014-2851
CVE-2014-3145
CVE-2014-4608
CVE-2014-4943
CVE-2014-5045
CVE-2014-5077
CVE-2014-8160
CVE-2023-2002
D:CVE-2013-7263
D:CVE-2014-4608
D:CVE-2014-4943
D:CVE-2014-5045
D:CVE-2014-5077
DSA-2906
DSA-2992
DSA-3170
EXPLOIT-DB:36267
L3:41261
MANDRIVA:MDVSA-2015:057
MANDRIVA:MDVSA-2015:058
MISC:blog.securitymouse.com:CVE-2014-4611
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:MLIST:[oss-security] 20140407 CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest ioapic redirection table
MISC:git.kernel.org:MLIST:[oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:patchwork.ozlabs.org:MLIST:[oss-security] 20140725 Re: CVE request Linux Kernel: net: SCTP: NULL pointer dereference
MISC:www.oberhumer.com:CVE-2014-4608
MISC:www.openwall.com:MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding
MISC:www.securitymouse.com:CVE-2014-4608
MLIST:[linux-kernel] 20140411 net: ipv4: current group_info should be put after using.
MLIST:[netdev] 20140310 [PATCH 0/5] skbuff: fix skb_segment with zero copy skbs
MLIST:[netdev] 20140310 [PATCH 5/5] skbuff: skb_segment: orphan frags before copying
MLIST:[netfilter-devel] 20140925 [PATCH nf] netfilter: conntrack: disable generic protocol tracking
MLIST:[oss-security] 20131128 Re: CVE Request: Linux kernel: net: uninitialised memory leakage
MLIST:[oss-security] 20140107 oss-sec: CVE split and a missed file
MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding
MLIST:[oss-security] 20140310 CVE-2014-0131 -- kernel: net: use-after-free during segmentation with zerocopy
MLIST:[oss-security] 20140407 CVE-2014-0155 -- kernel: kvm: BUG caused by invalid entry in guest ioapic redirection table
MLIST:[oss-security] 20140411 Re: CVE request -- Linux kernel: net: ping: refcount issue in ping_init_sock() function
MLIST:[oss-security] 20140430 Re: CVE request Linux kernel: mm: try_to_unmap_cluster() should lock_page() before mlocking
MLIST:[oss-security] 20140509 Re: CVE request Linux kernel: filter: prevent nla extensions to peek beyond the end of the message
MLIST:[oss-security] 20140626 LMS-2014-06-16-2: Linux Kernel LZO
MLIST:[oss-security] 20140716 CVE-2014-4943: Linux privilege escalation in ppp over l2tp sockets
MLIST:[oss-security] 20140723 Re: CVE request: kernel: vfs: refcount issues during unmount on symlink
MLIST:[oss-security] 20140725 Re: CVE request Linux Kernel: net: SCTP: NULL pointer dereference
MLIST:[oss-security] 20150114 CVE-2014-8160 Linux Kernel: SCTP firewalling fails until SCTP module is loaded
OSS:2023/04/16/3
OSVDB:109277
RH:CVE-2013-7263
RH:CVE-2014-0131
RH:CVE-2014-2309
RH:CVE-2014-2851
RH:CVE-2014-3122
RH:CVE-2014-4608
RH:CVE-2014-4943
RH:CVE-2014-5045
RH:CVE-2014-5077
RH:CVE-2014-8160
RHSA-2014:0100
RHSA-2014:0159
RHSA-2014:0285
RHSA-2014:0439
RHSA-2014:0557
RHSA-2014:0786
RHSA-2014:0923
RHSA-2014:0924
RHSA-2014:0925
RHSA-2014:0981
RHSA-2014:1025
RHSA-2014:1083
RHSA-2014:1101
RHSA-2014:1392
RHSA-2014:1668
RHSA-2014:1724
RHSA-2014:1763
RHSA-2014:1872
RHSA-2014:1971
RHSA-2015:0062
RHSA-2015:0284
RHSA-2015:0290
RHSA-2015:0674
RHSA-2018:1252
SECTRACK:1029894
SECTRACK:1030610
SECTRACK:1030681
SECTRACK:1030769
SECUNIA:55882
SECUNIA:56036
SECUNIA:59311
SECUNIA:59777
SECUNIA:59790
SECUNIA:60011
SECUNIA:60071
SECUNIA:60174
SECUNIA:60220
SECUNIA:60353
SECUNIA:60380
SECUNIA:60393
SECUNIA:60430
SECUNIA:60545
SECUNIA:60564
SECUNIA:60744
SECUNIA:62563
SECUNIA:62633
SMASH Issue 103602
SMASH Issue 104015
SMASH Issue 104049
SMASH Issue 104186
SMASH Issue 104187
SMASH Issue 55713
SMASH Issue 95116
SMASH Issue 99988
SUSE:SUSE-SU-2014:1316
SUSE:SUSE-SU-2014:1319
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0529
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:openSUSE-SU-2015:0566
SUSE:openSUSE-SU-2015:0714
UBUNTU:CVE-2013-7263
UBUNTU:CVE-2014-0131
UBUNTU:CVE-2014-4608
UBUNTU:CVE-2014-4943
UBUNTU:CVE-2014-5045
UBUNTU:CVE-2014-5077
UBUNTU:CVE-2014-8160
UBUNTU:USN-2070-1
UBUNTU:USN-2075-1
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2111-1
UBUNTU:USN-2112-1
UBUNTU:USN-2114-1
UBUNTU:USN-2115-1
UBUNTU:USN-2116-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
UBUNTU:USN-2251-1
UBUNTU:USN-2252-1
UBUNTU:USN-2262-1
UBUNTU:USN-2334-1
UBUNTU:USN-2335-1
UBUNTU:USN-2358-1
UBUNTU:USN-2359-1
UBUNTU:USN-2416-1
UBUNTU:USN-2417-1
UBUNTU:USN-2418-1
UBUNTU:USN-2419-1
UBUNTU:USN-2420-1
UBUNTU:USN-2421-1
UBUNTU:USN-2513-1
UBUNTU:USN-2514-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
XF:linux-kernel-cve20144943-priv-esc(94665)
XF:linux-kernel-cve20145077-dos(95134)
bdo#728705
bnc#857643
bnc#883948
bnc#887082
bnc#889060
bnc#889071
bnc#889173
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1fd819ecb90cc9b822cd84d3056ddba315d3340f
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3cf521f7dc87c031617fd47e4b7aa2593c2f3daf
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=db29a9508a9246e77087c5531e45b2c88ec6988b
rh#1007690
rh#1035875
rh#1067558
rh#1074589
rh#1081589
rh#1086730
rh#1094232
rh#1113899
rh#1119458
rh#1122472
rh#1122982
rh#1163762
rh#1163792
rh#1182059
CVE-2014-4650python3:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)APPLE:APPLE-SA-2015-08-13-2
BID:65379
BID:70089
CONFIRM:bugs.python.org:CVE-2013-1753
CONFIRM:bugs.python.org:CVE-2014-1912
CONFIRM:bugs.python.org:CVE-2014-7185
CONFIRM:hg.python.org:CVE-2014-1912
CONFIRM:support.apple.com:CVE-2015-5784
CONFIRM:www.oracle.com:CVE-2015-8472
CONFIRM:www.oracle.com:CVE-2016-2802
CONFIRM:www.oracle.com:CVE-2017-5689
CVE-2013-1752
CVE-2013-1753
CVE-2014-1912
CVE-2014-4650
CVE-2014-7185
D:CVE-2014-1912
DSA-2880
EXPLOIT-DB:31875
FEDORA:FEDORA-2014-11559
GENTOO:GLSA-201503-10
L3:40831
L3:41126
L3:42215
L3:42216
L3:42218
L3:42269
L3:44220
L3:45543
MISC:bugs.python.org
MISC:bugs.python.org:MISC:openwall.com:CVE-2014-4650
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:openwall.com:CVE-2014-4650
MISC:pastebin.com:CVE-2014-1912
MISC:www.trustedsec.com:CVE-2014-1912
MLIST:[oss-security] 20140212 Re: CVE request? buffer overflow in socket.recvfrom_into
MLIST:[oss-security] 20140923 CVE Request: Python 2.7
MLIST:[oss-security] 20140925 Re: CVE Request: Python 2.7
OSS:11745
OSS:12067
OSS:2014/Q3/727
Oracle:CVE-2014-1912
Oracle:CVE-2018-20852
Oracle:CVE-2019-15903
Oracle:CVE-2019-16056
Oracle:CVE-2019-9636
RH:CVE-2013-1752
RH:CVE-2013-1753
RH:CVE-2014-1912
RH:CVE-2014-4650
RH:CVE-2014-7185
RHSA-2015:1064
RHSA-2015:1330
RHSA-2015:2101
Red Hat
SECTRACK:1029831
SMASH Issue 103325
SMASH Issue 108521
SMASH Issue 108663
SMASH Issue 280463
SMASH Issue 94981
SMASH Issue 94982
SMASH Issue 96171
SUSE:openSUSE-SU-2014:0518
SUSE:openSUSE-SU-2014:0597
SUSE:openSUSE-SU-2014:1292
UBUNTU:CVE-2013-1752
UBUNTU:CVE-2013-1753
UBUNTU:CVE-2014-1912
UBUNTU:CVE-2014-4650
UBUNTU:CVE-2014-7185
UBUNTU:USN-2125-1
XF:python-bufferobject-overflow(96193)
bnc#1049392
bnc#856835
bnc#856836
bnc#863741
bnc#882915
bnc#885882
bnc#898572
bnc#912739
bnc#913479
bnc#955182
rh#1046170
rh#1046174
rh#1062370
rh#1113527
rh#1146026
rh#1752592
rh#750555
CVE-2014-4653kernel-source-rt:Ignoremoderate ()BID:68164
CONFIRM:git.kernel.org:CVE-2014-4653
CONFIRM:github.com:CVE-2014-4653
CONFIRM:www.kernel.org:CVE-2014-9914
CVE-2014-4652
CVE-2014-4653
CVE-2014-4654
CVE-2014-4655
CVE-2014-4656
CVE-2023-2002
D:CVE-2014-4653
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20140626 Re: CVE Request: Linux kernel ALSA core control API vulnerabilities
OSS:2023/04/16/3
RH:CVE-2014-4653
RHSA-2014:1083
RHSA-2014:1392
RHSA-2014:1724
RHSA-2014:1971
RHSA-2015:0087
RHSA-2015:1272
SECUNIA:59434
SECUNIA:59777
SECUNIA:60545
SECUNIA:60564
SMASH Issue 102901
SMASH Issue 103056
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2014-4653
UBUNTU:USN-2334-1
UBUNTU:USN-2335-1
bnc#883795
rh#1070618
rh#1113406
rh#1113409
rh#1113445
rh#1113470
rh#822754
CVE-2014-4654kernel-source-rt:Ignoremoderate ()BID:68162
CONFIRM:git.kernel.org:CVE-2014-4655
CONFIRM:github.com:CVE-2014-4655
CONFIRM:www.kernel.org:CVE-2014-9914
CVE-2014-4652
CVE-2014-4653
CVE-2014-4654
CVE-2014-4655
CVE-2014-4656
CVE-2023-2002
D:CVE-2014-4654
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20140626 Re: CVE Request: Linux kernel ALSA core control API vulnerabilities
OSS:2023/04/16/3
RH:CVE-2014-4654
RHSA-2014:1083
RHSA-2014:1392
RHSA-2014:1724
RHSA-2014:1971
RHSA-2015:0087
RHSA-2015:1272
SECUNIA:59434
SECUNIA:59777
SECUNIA:60545
SECUNIA:60564
SMASH Issue 102900
SMASH Issue 103056
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2014-4654
UBUNTU:USN-2334-1
UBUNTU:USN-2335-1
bnc#883795
rh#1070618
rh#1113406
rh#1113409
rh#1113445
rh#1113470
rh#822754
CVE-2014-4655kernel-source-rt:Ignoremoderate ()BID:68162
CONFIRM:git.kernel.org:CVE-2014-4655
CONFIRM:github.com:CVE-2014-4655
CONFIRM:www.kernel.org:CVE-2014-9914
CVE-2014-4652
CVE-2014-4653
CVE-2014-4654
CVE-2014-4655
CVE-2014-4656
CVE-2023-2002
D:CVE-2014-4655
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20140626 Re: CVE Request: Linux kernel ALSA core control API vulnerabilities
OSS:2023/04/16/3
RH:CVE-2014-4655
RHSA-2014:1083
RHSA-2014:1392
RHSA-2014:1724
RHSA-2014:1971
RHSA-2015:0087
RHSA-2015:1272
SECTRACK:1036763
SECUNIA:59434
SECUNIA:59777
SECUNIA:60545
SECUNIA:60564
SMASH Issue 102899
SMASH Issue 103056
SUSE:SUSE-SU-2015:0812
UBUNTU:CVE-2014-4655
UBUNTU:USN-2334-1
UBUNTU:USN-2335-1
bnc#883795
rh#1070618
rh#1113406
rh#1113409
rh#1113445
rh#1113470
rh#822754
CVE-2014-4715lz4:Not affectedmoderate ()CONFIRM:code.google.com:CVE-2014-4715
CONFIRM:fastcompression.blogspot.fr:CVE-2014-4715
CVE-2014-4715
D:CVE-2014-4715
MISC:blog.securitymouse.com:CVE-2014-4715
RH:CVE-2014-4715
SMASH Issue 103300
UBUNTU:CVE-2014-4715
rh#1115767
CVE-2014-4943kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2014-4943
CONFIRM:github.com:CVE-2014-4943
CONFIRM:linux.oracle.com:CVE-2014-4943
CVE-2014-4608
CVE-2014-4943
CVE-2023-2002
D:CVE-2014-4943
DSA-2992
EXPLOIT-DB:36267
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20140716 CVE-2014-4943: Linux privilege escalation in ppp over l2tp sockets
OSS:2023/04/16/3
OSVDB:109277
RH:CVE-2014-4943
RHSA-2014:0923
RHSA-2014:0924
RHSA-2014:0925
RHSA-2014:1025
RHSA-2014:1392
RHSA-2015:0062
SECTRACK:1030610
SECUNIA:59790
SECUNIA:60011
SECUNIA:60071
SECUNIA:60220
SECUNIA:60380
SECUNIA:60393
SMASH Issue 103602
SMASH Issue 103728
SUSE:SUSE-SU-2014:1316
SUSE:SUSE-SU-2014:1319
SUSE:SUSE-SU-2015:0481
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-4943
XF:linux-kernel-cve20144943-priv-esc(94665)
bdo#728705
bnc#887082
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3cf521f7dc87c031617fd47e4b7aa2593c2f3daf
rh#1113899
rh#1119458
rh#1163762
CVE-2014-5077kernel-source-rt:Not affectedimportant ()BID:68214
BID:68881
CONFIRM:git.kernel.org:CVE-2014-4608
CONFIRM:git.kernel.org:CVE-2014-5077
CONFIRM:github.com:CVE-2014-4608
CONFIRM:github.com:CVE-2014-5077
CONFIRM:www.kernel.org:CVE-2014-9914
CVE-2014-4608
CVE-2014-5077
CVE-2023-2002
D:CVE-2014-5077
MISC:blog.securitymouse.com:CVE-2014-4611
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:patchwork.ozlabs.org:MLIST:[oss-security] 20140725 Re: CVE request Linux Kernel: net: SCTP: NULL pointer dereference
MISC:www.oberhumer.com:CVE-2014-4608
MISC:www.securitymouse.com:CVE-2014-4608
MLIST:[oss-security] 20140626 LMS-2014-06-16-2: Linux Kernel LZO
MLIST:[oss-security] 20140725 Re: CVE request Linux Kernel: net: SCTP: NULL pointer dereference
OSS:2023/04/16/3
RH:CVE-2014-5077
RHSA-2014:1083
RHSA-2014:1392
RHSA-2014:1668
RHSA-2014:1724
RHSA-2014:1763
RHSA-2014:1872
RHSA-2015:0062
SECTRACK:1030681
SECUNIA:59777
SECUNIA:60011
SECUNIA:60174
SECUNIA:60430
SECUNIA:60545
SECUNIA:60564
SECUNIA:60744
SECUNIA:62563
SECUNIA:62633
SMASH Issue 104049
SMASH Issue 104187
SUSE:SUSE-SU-2014:1316
SUSE:SUSE-SU-2014:1319
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0736
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-5077
UBUNTU:USN-2334-1
UBUNTU:USN-2335-1
UBUNTU:USN-2358-1
UBUNTU:USN-2359-1
UBUNTU:USN-2416-1
UBUNTU:USN-2417-1
UBUNTU:USN-2418-1
UBUNTU:USN-2419-1
UBUNTU:USN-2420-1
UBUNTU:USN-2421-1
XF:linux-kernel-cve20145077-dos(95134)
bnc#889173
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce
rh#1113899
rh#1122982
CVE-2014-5206kernel-source-rt:Unsupportedimportant ()BID:69214
BID:69216
CONFIRM:git.kernel.org:CVE-2014-5206
CONFIRM:git.kernel.org:CVE-2014-5207
CONFIRM:github.com:CVE-2014-5206
CONFIRM:github.com:CVE-2014-5207
CVE-2014-5206
CVE-2014-5207
CVE-2023-2002
D:CVE-2014-5206
D:CVE-2014-5207
EXPLOIT-DB:34923
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:packetstormsecurity.com:CVE-2014-5207
MLIST:[oss-security] 20140812 CVE Request: ro bind mount bypass using user namespaces
MLIST:[oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces
OSS:2014/Q3/357
OSS:2023/04/16/3
OSVDB:110055
RH:CVE-2014-5206
RH:CVE-2014-5207
SMASH Issue 104985
UBUNTU:CVE-2014-5206
UBUNTU:CVE-2014-5207
UBUNTU:USN-2317-1
UBUNTU:USN-2318-1
XF:linux-kernel-cve20145207-sec-bypass(95266)
bnc#891689
linux.git:commit:380cf5ba6b0a0b307f4afb62b186ca801defb203
rh#1113899
rh#1129662
CVE-2014-5207kernel-source-rt:Unsupportedimportant ()BID:69214
BID:69216
CONFIRM:git.kernel.org:CVE-2014-5206
CONFIRM:git.kernel.org:CVE-2014-5207
CONFIRM:github.com:CVE-2014-5206
CONFIRM:github.com:CVE-2014-5207
CVE-2014-5206
CVE-2014-5207
CVE-2023-2002
D:CVE-2014-5206
D:CVE-2014-5207
EXPLOIT-DB:34923
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:packetstormsecurity.com:CVE-2014-5207
MLIST:[oss-security] 20140812 CVE Request: ro bind mount bypass using user namespaces
MLIST:[oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces
OSS:2014/Q3/357
OSS:2023/04/16/3
OSVDB:110055
RH:CVE-2014-5206
RH:CVE-2014-5207
SMASH Issue 104985
UBUNTU:CVE-2014-5206
UBUNTU:CVE-2014-5207
UBUNTU:USN-2317-1
UBUNTU:USN-2318-1
XF:linux-kernel-cve20145207-sec-bypass(95266)
bnc#891689
linux.git:commit:380cf5ba6b0a0b307f4afb62b186ca801defb203
rh#1113899
rh#1129662
CVE-2014-5461lua53:Unsupportedmoderate ()BID:69342
CONFIRM:advisories.mageia.org:CVE-2014-5461
CONFIRM:www.lua.org:CVE-2014-5461
CVE-2014-5461
D:CVE-2014-5461
DSA-3015
DSA-3016
GENTOO:GLSA-201701-53
MANDRIVA:MDVSA-2015:144
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20140821 CVE request: possible overflow in vararg functions
MLIST:[oss-security] 20140821 Re: CVE request: possible overflow in vararg functions
MLIST:[oss-security] 20140827 Re: Lua CVE request [was Re: CVE request: possible overflow in vararg functions]
RH:CVE-2014-5461
SECUNIA:59890
SECUNIA:60869
SECUNIA:61411
SMASH Issue 105370
SUSE:openSUSE-SU-2014:1145
UBUNTU:CVE-2014-5461
UBUNTU:USN-2338-1
bnc#893824
http://www.debian.org/security/2014/dsa-3015
http://www.debian.org/security/2014/dsa-3016
https://security.gentoo.org/glsa/202305-23
rh#1132304
CVE-2014-5471kernel-source-rt:Not affectedmoderate ()BID:69396
BID:69428
CONFIRM:git.kernel.org:CVE-2014-5472
CONFIRM:github.com:CVE-2014-5472
CVE-2014-5471
CVE-2014-5472
CVE-2023-2002
D:CVE-2014-5471
D:CVE-2014-5472
MISC:code.google.com:CVE-2014-5472
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20140826 CVE Request: Linux Kernel unbound recursion in ISOFS
MLIST:[oss-security] 20140827 Re: CVE Request: Linux Kernel unbound recursion in ISOFS
OSS:2014/Q3/452
OSS:2023/04/16/3
RH:CVE-2014-5471
RH:CVE-2014-5472
RHSA-2014:1318
RHSA-2014:1997
RHSA-2015:0102
RHSA-2015:0695
RHSA-2015:0782
RHSA-2015:0803
SMASH Issue 105171
UBUNTU:CVE-2014-5471
UBUNTU:CVE-2014-5472
UBUNTU:USN-2354-1
UBUNTU:USN-2355-1
XF:linux-kernel-cve20145472-dos(95556)
XF:linux-kernel-isofs-bo(95481)
bnc#892490
rh#1113899
rh#1134099
rh#1163762
CVE-2014-5472kernel-source-rt:Not affectedmoderate ()BID:69396
BID:69428
CONFIRM:git.kernel.org:CVE-2014-5472
CONFIRM:github.com:CVE-2014-5472
CVE-2014-5471
CVE-2014-5472
CVE-2023-2002
D:CVE-2014-5471
D:CVE-2014-5472
MISC:code.google.com:CVE-2014-5472
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20140826 CVE Request: Linux Kernel unbound recursion in ISOFS
MLIST:[oss-security] 20140827 Re: CVE Request: Linux Kernel unbound recursion in ISOFS
OSS:2014/Q3/452
OSS:2023/04/16/3
RH:CVE-2014-5471
RH:CVE-2014-5472
RHSA-2014:1318
RHSA-2014:1997
RHSA-2015:0102
RHSA-2015:0695
RHSA-2015:0782
RHSA-2015:0803
SMASH Issue 105171
UBUNTU:CVE-2014-5471
UBUNTU:CVE-2014-5472
UBUNTU:USN-2354-1
UBUNTU:USN-2355-1
XF:linux-kernel-cve20145472-dos(95556)
XF:linux-kernel-isofs-bo(95481)
bnc#892490
rh#1113899
rh#1134099
rh#1163762
CVE-2014-6410kernel-source-rt:Not affectedmoderate ()BID:69799
CONFIRM:git.kernel.org:CVE-2014-6410
CONFIRM:github.com:CVE-2014-6410
CVE-2014-6410
CVE-2023-2002
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20140915 Re: CVE request for Linux kernel: udf: Avoid infinite loop when processing indirect ICBs
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20140915 Re: CVE request for Linux kernel: udf: Avoid infinite loop when processing indirect ICBs
OSS:2023/04/16/3
RH:CVE-2014-6410
RHSA-2014:1318
RHSA-2014:1971
RHSA-2014:1997
SMASH Issue 106168
UBUNTU:CVE-2014-6410
bnc#896689
rh#1113899
rh#1141809
CVE-2014-7145kernel-source-rt:Unsupportedimportant ()BID:69867
CONFIRM:git.kernel.org:CVE-2014-7145
CONFIRM:github.com:CVE-2014-7145
CONFIRM:www.kernel.org:CVE-2014-7145
CVE-2014-7145
D:CVE-2014-7145
MLIST:[oss-security] 20140922 Re: CVE request: [CIFS] Possible null ptr deref in SMB2_tcon / Linux kernel
RH:CVE-2014-7145
RHSA-2015:0102
SMASH Issue 108418
SMASH Issue 256286
UBUNTU:CVE-2014-7145
UBUNTU:USN-2394-1
bnc#897101
rh#1147522
CVE-2014-7283kernel-source-rt:Not affectedmoderate ()BID:70261
CONFIRM:git.kernel.org:CVE-2014-7283
CONFIRM:github.com:CVE-2014-7283
CONFIRM:www.kernel.org:CVE-2014-7283
CVE-2014-7283
MISC:git.kernel.org:MLIST:[oss-security] 20141002 xfs directory hash ordering bug
MISC:oss.sgi.com:MLIST:[oss-security] 20141002 xfs directory hash ordering bug
MLIST:[oss-security] 20141002 xfs directory hash ordering bug
MLIST:[xfs] 20140327 xfs errors while unlinking filenames with hash collisions
RH:CVE-2014-7283
RHSA-2014:1943
SMASH Issue 108844
UBUNTU:CVE-2014-7283
bnc#899480
rh#1148777
CVE-2014-7822kernel-source-rt:Not affectedmoderate ()BID:70854
BID:72347
BID:72357
CONFIRM:git.kernel.org:CVE-2014-8559
CONFIRM:github.com:CVE-2014-7822
CONFIRM:support.f5.com:CVE-2014-8559
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-8472
CVE-2014-7822
CVE-2014-8559
CVE-2015-1420
CVE-2023-2002
D:CVE-2015-1420
DSA-3170
EXPLOIT-DB:36743
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-kernel] 20141025 fs: lockup on rename_mutex in fs/dcache.c:1035
MLIST:[linux-kernel] 20141026 Re: fs: lockup on rename_mutex in fs/dcache.c:1035
MLIST:[linux-kernel] 20150128 [PATCH v2] vfs: read file_handle only once in handle_to_path
MLIST:[oss-security] 20141030 CVE-2014-8559 - Linux kernel fs/dcache.c incorrect use of rename_lock
MLIST:[oss-security] 20150129 CVE-2015-1420 - Linux kernel fs/fhandle.c race condition
OSS:2015/Q1/331
OSS:2023/04/16/3
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2014-7822
RH:CVE-2014-8559
RH:CVE-2015-1420
RHSA-2015:0102
RHSA-2015:0164
RHSA-2015:0674
RHSA-2015:0694
RHSA-2015:1976
RHSA-2015:1977
RHSA-2015:1978
SECTRACK:1034051
SECUNIA:62801
SMASH Issue 113306
SMASH Issue 155972
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0529
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:1488
SUSE:SUSE-SU-2015:1489
SUSE:openSUSE-SU-2015:0566
SUSE:openSUSE-SU-2015:0714
UBUNTU:CVE-2014-7822
UBUNTU:CVE-2014-8559
UBUNTU:CVE-2015-1420
UBUNTU:USN-2492-1
UBUNTU:USN-2493-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
UBUNTU:USN-2541-1
UBUNTU:USN-2542-1
UBUNTU:USN-2543-1
UBUNTU:USN-2544-1
UBUNTU:USN-2660-1
UBUNTU:USN-2661-1
UBUNTU:USN-2665-1
UBUNTU:USN-2667-1
bnc#915322
bnc#915517
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d0207652cbe27d1f962050737848e5ad4671958
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1113899
rh#1159313
rh#1163762
rh#1163792
rh#1183744
rh#1187534
rh#1202855
rh#1243465
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2014-7825kernel-source-rt:Ignoreimportant ()BID:70972
CONFIRM:git.kernel.org:CVE-2014-7826
CONFIRM:github.com:CVE-2014-7826
CVE-2014-7825
D:CVE-2014-7825
MISC:git.kernel.org:MLIST:[oss-security] 20141106 Exploitable issues in Linux perf/ftrace subsystems
MLIST:[oss-security] 20141106 Exploitable issues in Linux perf/ftrace subsystems
RH:CVE-2014-7825
RHSA-2014:1943
RHSA-2015:0290
RHSA-2015:0864
SMASH Issue 110469
UBUNTU:CVE-2014-7825
XF:linux-kernel-cve20147825-dos(98557)
bnc#904012
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=086ba77a6db00ed858ff07451bedee197df868c9
rh#1161565
CVE-2014-7841kernel-source-rt:Already fixedmoderate ()BID:71081
CONFIRM:github.com:CVE-2014-7841
CONFIRM:linux.oracle.com:CVE-2014-7841
CONFIRM:support.f5.com:CVE-2014-7841
CONFIRM:www.kernel.org:CVE-2014-8884
CVE-2014-7841
CVE-2023-2002
DSA-3093
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20141113 CVE-2014-7841 Linux kernel: net: sctp: NULL pointer dereference in af->from_addr_param on malformed packet
OSS:2023/04/16/3
RH:CVE-2014-7841
RHSA-2015:0087
RHSA-2015:0102
RHSA-2015:0284
RHSA-2015:0285
RHSA-2015:0695
SECUNIA:62305
SECUNIA:62597
SECUNIA:62735
SMASH Issue 155988
SMASH Issue 232562
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0529
SUSE:SUSE-SU-2015:0652
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-7841
bnc#905100
rh#1113899
rh#1163087
rh#1163762
rh#1163792
CVE-2014-7842kernel-source-rt:Not affectedmoderate ()BID:71078
CONFIRM:git.kernel.org:CVE-2014-7842
CONFIRM:github.com:CVE-2014-7842
CONFIRM:www.kernel.org:CVE-2014-7842
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-1351
CONFIRM:www.oracle.com:CVE-2015-8391
CVE-2014-7842
CVE-2023-2002
D:CVE-2014-7842
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20141113 CVE-2014-7842 Linux kernel: kvm: reporting emulation failures to userspace
OSS:2014/Q4/605
OSS:2023/04/16/3
RH:CVE-2014-7842
RHSA-2015:2152
RHSA-2016:0855
SECUNIA:62326
SECUNIA:62336
SMASH Issue 110719
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-7842
bnc#905312
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2b9e6c1a35afcc0973acb72e591c714e78885ff
rh#1113899
rh#1163762
rh#1163792
CVE-2014-7843kernel-source-rt:Ignoremoderate ()BID:71082
CONFIRM:git.kernel.org:CVE-2014-7843
CONFIRM:github.com:CVE-2014-7843
CONFIRM:www.kernel.org:CVE-2014-8884
CVE-2014-7843
CVE-2016-0823
D:CVE-2014-7843
D:CVE-2022-2590
L3:45886
MLIST:[oss-security] 20141113 CVE-2014-7843 Linux kernel: aarch64: copying from /dev/zero causes local DoS
OSS:2014/Q4/603
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2014-7843
SMASH Issue 110718
SMASH Issue 172067
UBUNTU:CVE-2014-7843
bnc#987709
bnc#994751
bnc#994752
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=97fc15436b36ee3956efad83e22a557991f7d19d
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1163744
rh#1384344
rh#2116175
CVE-2014-7923icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CONFIRM:www.oracle.com:CVE-2015-3814
CONFIRM:www.oracle.com:CVE-2015-4917
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113097
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7924icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113098
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7925icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113099
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7926icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CONFIRM:www.oracle.com:CVE-2015-3814
CONFIRM:www.oracle.com:CVE-2015-4917
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113100
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7927icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113101
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7928icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113102
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7929icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113103
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7930icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113104
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7931icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113105
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7932icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113106
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7934icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113108
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7935icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113109
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7936icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113110
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7937icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
GENTOO:GLSA-201603-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113111
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7938icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113112
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7939icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113113
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7940icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CONFIRM:www.oracle.com:CVE-2015-3814
CONFIRM:www.oracle.com:CVE-2015-4917
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113114
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7941icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113115
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7942icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113116
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7947icu:Analysisimportant ()BID:72288
CONFIRM:advisories.mageia.org:CVE-2014-7940
CONFIRM:bugs.icu-project.org:CVE-2014-7923
CONFIRM:bugs.icu-project.org:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7926
CONFIRM:chromium.googlesource.com:CVE-2014-7937
CONFIRM:chromium.googlesource.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7923
CONFIRM:code.google.com:CVE-2014-7924
CONFIRM:code.google.com:CVE-2014-7925
CONFIRM:code.google.com:CVE-2014-7926
CONFIRM:code.google.com:CVE-2014-7927
CONFIRM:code.google.com:CVE-2014-7928
CONFIRM:code.google.com:CVE-2014-7929
CONFIRM:code.google.com:CVE-2014-7930
CONFIRM:code.google.com:CVE-2014-7931
CONFIRM:code.google.com:CVE-2014-7932
CONFIRM:code.google.com:CVE-2014-7934
CONFIRM:code.google.com:CVE-2014-7935
CONFIRM:code.google.com:CVE-2014-7936
CONFIRM:code.google.com:CVE-2014-7937
CONFIRM:code.google.com:CVE-2014-7938
CONFIRM:code.google.com:CVE-2014-7939
CONFIRM:code.google.com:CVE-2014-7940
CONFIRM:code.google.com:CVE-2014-7941
CONFIRM:code.google.com:CVE-2014-7943
CONFIRM:code.google.com:CVE-2014-7944
CONFIRM:code.google.com:CVE-2014-7945
CONFIRM:code.google.com:CVE-2014-7946
CONFIRM:code.google.com:CVE-2014-7947
CONFIRM:code.google.com:CVE-2014-7948
CONFIRM:code.google.com:CVE-2015-1205
CONFIRM:code.google.com:CVE-2015-1231
CONFIRM:code.google.com:CVE-2015-1361
CONFIRM:codereview.chromium.org:CVE-2014-7924
CONFIRM:codereview.chromium.org:CVE-2014-7925
CONFIRM:codereview.chromium.org:CVE-2014-7926
CONFIRM:codereview.chromium.org:CVE-2014-7927
CONFIRM:codereview.chromium.org:CVE-2014-7928
CONFIRM:codereview.chromium.org:CVE-2014-7931
CONFIRM:codereview.chromium.org:CVE-2014-7935
CONFIRM:codereview.chromium.org:CVE-2014-7936
CONFIRM:codereview.chromium.org:CVE-2014-7941
CONFIRM:codereview.chromium.org:CVE-2014-7948
CONFIRM:git.videolan.org:CVE-2014-7937
CONFIRM:googlechromereleases.blogspot.com:CVE-2015-1361
CONFIRM:pdfium.googlesource.com:CVE-2014-7944
CONFIRM:pdfium.googlesource.com:CVE-2014-7945
CONFIRM:pdfium.googlesource.com:CVE-2014-7947
CONFIRM:src.chromium.org:CVE-2014-7925
CONFIRM:src.chromium.org:CVE-2014-7929
CONFIRM:src.chromium.org:CVE-2014-7930
CONFIRM:src.chromium.org:CVE-2014-7932
CONFIRM:src.chromium.org:CVE-2014-7934
CONFIRM:src.chromium.org:CVE-2014-7946
CVE-2014-7923
CVE-2014-7924
CVE-2014-7925
CVE-2014-7926
CVE-2014-7927
CVE-2014-7928
CVE-2014-7929
CVE-2014-7930
CVE-2014-7931
CVE-2014-7932
CVE-2014-7934
CVE-2014-7935
CVE-2014-7936
CVE-2014-7937
CVE-2014-7938
CVE-2014-7939
CVE-2014-7940
CVE-2014-7941
CVE-2014-7942
CVE-2014-7943
CVE-2014-7944
CVE-2014-7945
CVE-2014-7946
CVE-2014-7947
CVE-2014-7948
CVE-2015-1205
CVE-2015-1346
D:CVE-2015-1205
D:CVE-2015-1346
DSA-3187
GENTOO:GLSA-201502-13
GENTOO:GLSA-201503-06
OSS:2016/Q2/342
Oracle:CVE-2014-7940
RH:CVE-2014-7923
RH:CVE-2014-7924
RH:CVE-2014-7925
RH:CVE-2014-7926
RH:CVE-2014-7927
RH:CVE-2014-7928
RH:CVE-2014-7929
RH:CVE-2014-7930
RH:CVE-2014-7931
RH:CVE-2014-7932
RH:CVE-2014-7934
RH:CVE-2014-7935
RH:CVE-2014-7936
RH:CVE-2014-7937
RH:CVE-2014-7938
RH:CVE-2014-7939
RH:CVE-2014-7940
RH:CVE-2014-7941
RH:CVE-2014-7942
RH:CVE-2014-7943
RH:CVE-2014-7944
RH:CVE-2014-7945
RH:CVE-2014-7946
RH:CVE-2014-7947
RH:CVE-2014-7948
RH:CVE-2015-1205
RH:CVE-2015-1346
RHSA-2015:0093
SECTRACK:1031623
SECUNIA:62383
SECUNIA:62575
SECUNIA:62665
SMASH Issue 113121
SMASH Issue 113139
SUSE:openSUSE-SU-2015:0441
UBUNTU:CVE-2014-7923
UBUNTU:CVE-2014-7924
UBUNTU:CVE-2014-7925
UBUNTU:CVE-2014-7926
UBUNTU:CVE-2014-7927
UBUNTU:CVE-2014-7928
UBUNTU:CVE-2014-7929
UBUNTU:CVE-2014-7930
UBUNTU:CVE-2014-7931
UBUNTU:CVE-2014-7932
UBUNTU:CVE-2014-7934
UBUNTU:CVE-2014-7935
UBUNTU:CVE-2014-7936
UBUNTU:CVE-2014-7937
UBUNTU:CVE-2014-7938
UBUNTU:CVE-2014-7939
UBUNTU:CVE-2014-7940
UBUNTU:CVE-2014-7941
UBUNTU:CVE-2014-7942
UBUNTU:CVE-2014-7943
UBUNTU:CVE-2014-7944
UBUNTU:CVE-2014-7945
UBUNTU:CVE-2014-7946
UBUNTU:CVE-2014-7947
UBUNTU:CVE-2014-7948
UBUNTU:CVE-2015-1205
UBUNTU:CVE-2015-1346
UBUNTU:USN-2476-1
XF:google-v8-cve20151346-code-exec(100361)
bdo#775884
bdo#776264
bdo#776265
bdo#776719
bnc#914468
rh#1185202
rh#1185203
rh#1185204
rh#1185205
rh#1185206
rh#1185208
rh#1185209
rh#1185210
rh#1185211
rh#1185212
rh#1185214
rh#1185215
rh#1185216
rh#1185217
rh#1185218
rh#1185219
rh#1185220
rh#1185221
rh#1185222
rh#1185223
rh#1185224
rh#1185225
rh#1185226
rh#1185229
rh#1185230
rh#1185282
rh#1185283
CVE-2014-7975kernel-source-rt:Not affectedmoderate ()BID:70314
CONFIRM:git.kernel.org:CVE-2014-7975
CVE-2014-7975
CVE-2023-2002
D:CVE-2014-7975
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20141008 CVE-2014-7975: 0-day umount denial of service
MLIST:[stable] 20141008 [PATCH] fs: Add a missing permission check to do_umount
OSS:2014/Q4/229
OSS:2023/04/16/3
RH:CVE-2014-7975
RHSA-2017:1842
RHSA-2017:2077
SECTRACK:1031180
SECUNIA:60174
SECUNIA:61145
SECUNIA:62633
SECUNIA:62634
SMASH Issue 109031
SMASH Issue 109039
UBUNTU:CVE-2014-7975
UBUNTU:USN-2415-1
UBUNTU:USN-2416-1
UBUNTU:USN-2417-1
UBUNTU:USN-2418-1
UBUNTU:USN-2419-1
UBUNTU:USN-2420-1
UBUNTU:USN-2421-1
XF:linux-kernel-cve20147975-dos(96994)
bnc#900392
linux.git:commit:0ef3a56b1c466629cd0bf482b09c7b0e5a085bb5
linux.git:commit:a1480dcc3c706e309a88884723446f2e84fedd5b
rh#1113899
rh#1151108
CVE-2014-8134kernel-source-rt:Not affectedlow ()BID:71650
CONFIRM:bugs.launchpad.net:CVE-2014-8134
CONFIRM:bugzilla.novell.com:CVE-2014-8134
CONFIRM:support.f5.com:CVE-2014-8134
CONFIRM:www.oracle.com:CVE-2015-8391
CONFIRM:www.oracle.com:CVE-2016-5240
CVE-2014-8134
CVE-2023-2002
D:CVE-2014-8134
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[kvm] 20141205 [PATCH] x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit
OSS:2023/04/16/3
RH:CVE-2014-8134
RHSA-2016:0855
SECUNIA:62336
SMASH Issue 111365
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0736
SUSE:openSUSE-SU-2015:0566
SUSE:openSUSE-SU-2015:0714
UBUNTU:CVE-2014-8134
bnc#909078
https://support.f5.com/csp/article/K17120?utm_source=f5support&%3Butm_medium=RSS
linux.git:commit:29fa6825463c97e5157284db80107d1bfac5d77b
rh#1113899
rh#1163762
rh#1163792
rh#1172765
CVE-2014-8160kernel-source-rt:Not affectedimportant ()BID:68214
BID:70691
BID:72061
CONFIRM:git.kernel.org:CVE-2013-7281
CONFIRM:git.kernel.org:CVE-2014-3690
CONFIRM:git.kernel.org:CVE-2014-4608
CONFIRM:git.kernel.org:CVE-2014-8160
CONFIRM:github.com:CVE-2013-7281
CONFIRM:github.com:CVE-2014-3690
CONFIRM:github.com:CVE-2014-4608
CONFIRM:github.com:CVE-2014-8160
CONFIRM:www.kernel.org:CVE-2014-3690
CONFIRM:www.kernel.org:CVE-2014-9914
CVE-2013-7263
CVE-2014-3673
CVE-2014-3690
CVE-2014-4608
CVE-2014-8160
CVE-2014-9584
CVE-2015-7303
CVE-2015-7838
CVE-2015-7839
CVE-2015-8028
CVE-2015-8029
CVE-2015-8030
CVE-2015-8220
CVE-2015-8561
CVE-2015-8572
CVE-2015-8580
CVE-2015-8843
CVE-2016-1715
CVE-2016-4065
CVE-2023-2002
D:CVE-2013-7263
D:CVE-2014-3690
DSA-2906
DSA-3060
DSA-3170
MANDRIVA:MDVSA-2015:057
MANDRIVA:MDVSA-2015:058
MISC:blog.securitymouse.com:CVE-2014-4611
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace
MISC:git.kernel.org:MLIST:[oss-security] 20141126 Re: CVE Request: Linux kernel LDT handling bugs
MISC:git.kernel.org:MLIST:[oss-security] 20141215 Linux kernel: multiple x86_64 vulnerabilities
MISC:git.kernel.org:MLIST:[oss-security] 20150320 Re: CVE Request: Linux kernel execution in the early microcode loader.
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:www.oberhumer.com:CVE-2014-4608
MISC:www.securitymouse.com:CVE-2014-4608
MISC:www.zerodayinitiative.com
MLIST:[netfilter-devel] 20140925 [PATCH nf] netfilter: conntrack: disable generic protocol tracking
MLIST:[oss-security] 20131128 Re: CVE Request: Linux kernel: net: uninitialised memory leakage
MLIST:[oss-security] 20140107 oss-sec: CVE split and a missed file
MLIST:[oss-security] 20140626 LMS-2014-06-16-2: Linux Kernel LZO
MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace
MLIST:[oss-security] 20141029 Re: CVE-2014-3690: KVM DoS triggerable by malicious host userspace
MLIST:[oss-security] 20150114 CVE-2014-8160 Linux Kernel: SCTP firewalling fails until SCTP module is loaded
OSS:2014/Q4/416
OSS:2023/04/16/3
RH:CVE-2013-7263
RH:CVE-2014-3690
RH:CVE-2014-4608
RH:CVE-2014-8160
RHSA-2014:0159
RHSA-2014:0285
RHSA-2014:0439
RHSA-2014:1392
RHSA-2015:0062
RHSA-2015:0284
RHSA-2015:0290
RHSA-2015:0674
RHSA-2015:0782
RHSA-2015:0864
SECUNIA:55882
SECUNIA:56036
SECUNIA:60011
SECUNIA:60174
SECUNIA:62633
SMASH Issue 110104
SMASH Issue 110107
SMASH Issue 95116
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0529
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:openSUSE-SU-2015:0566
SUSE:openSUSE-SU-2015:0714
UBUNTU:CVE-2013-7263
UBUNTU:CVE-2014-3185
UBUNTU:CVE-2014-3690
UBUNTU:CVE-2014-4608
UBUNTU:CVE-2014-7826
UBUNTU:CVE-2014-8133
UBUNTU:CVE-2014-8160
UBUNTU:CVE-2014-9090
UBUNTU:CVE-2014-9322
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2416-1
UBUNTU:USN-2417-1
UBUNTU:USN-2418-1
UBUNTU:USN-2419-1
UBUNTU:USN-2420-1
UBUNTU:USN-2421-1
UBUNTU:USN-2513-1
UBUNTU:USN-2514-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
bdo#766195
bnc#857643
bnc#902232
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d974baa398f34393db76be45f7d4d04fbdbb4a0a
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=db29a9508a9246e77087c5531e45b2c88ec6988b
rh#1007690
rh#1035875
rh#1067558
rh#1094232
rh#1113899
rh#1153322
rh#1163762
rh#1163792
rh#1182059
CVE-2014-8171kernel-source-rt:Unsupportedmoderate ()BID:74293
CVE-2014-8171
RH:CVE-2014-8171
RHSA-2015:0864
RHSA-2015:2152
RHSA-2015:2411
RHSA-2016:0068
SMASH Issue 116130
SMASH Issue 116205
UBUNTU:CVE-2014-8171
bnc#928128
rh#1198109
CVE-2014-8172kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2014-8172
CONFIRM:github.com:CVE-2014-8172
CVE-2014-8172
L3:42836
MISC:git.kernel.org:MLIST:[oss-security] 20150309 CVE-2014-8172
MLIST:[oss-security] 20150309 CVE-2014-8172
OSS:2015/Q1/778
RH:CVE-2014-8172
RHSA-2015:0290
RHSA-2015:0694
SMASH Issue 114412
UBUNTU:CVE-2014-8172
bnc#920632
bnc#926407
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=eee5cc2702929fd41cce28058dc6d6717f723f87
rh#1198503
CVE-2014-8173kernel-source-rt:Unsupportedimportant ()CONFIRM:git.kernel.org:CVE-2014-8173
CONFIRM:github.com:CVE-2014-8173
CVE-2014-8173
D:CVE-2014-8173
MISC:git.kernel.org:/
RH:CVE-2014-8173
RHSA-2015:0290
RHSA-2015:0694
SMASH Issue 114410
SUSE:openSUSE-SU-2015:0714
UBUNTU:CVE-2014-8173
bnc#920583
rh#1198457
CVE-2014-8369kernel-source-rt:Not affectedimportant ()BID:70747
BID:70749
CONFIRM:git.kernel.org:CVE-2014-8369
CVE-2014-8369
CVE-2023-2002
D:CVE-2014-8369
DSA-3093
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[linux-kernel] 20141024 [PATCH 13/14] kvm: fix excessive pages un-pinning in kvm_iommu_map error path.
MLIST:[oss-security] 20141024 CVE-2014-8369 - Linux kernel iommu.c excessive unpinning
OSS:2023/04/16/3
RH:CVE-2014-8369
RHSA-2015:0674
SECUNIA:62326
SECUNIA:62336
SMASH Issue 110150
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0736
SUSE:openSUSE-SU-2015:0566
UBUNTU:CVE-2014-8369
bnc#902675
linux.git:commit:3d32e4dbe71374a6780eaf51d719d76f9a9bf22f
rh#1113899
rh#1156518
rh#1163762
rh#1163792
CVE-2014-8559kernel-source-rt:Not affectedmoderate ()BID:70854
BID:72347
BID:72357
CONFIRM:git.kernel.org:CVE-2014-8559
CONFIRM:github.com:CVE-2014-7822
CONFIRM:support.f5.com:CVE-2014-8559
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-8472
CVE-2014-7822
CVE-2014-8559
CVE-2015-1420
D:CVE-2015-1420
DSA-3170
EXPLOIT-DB:36743
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[linux-kernel] 20141025 fs: lockup on rename_mutex in fs/dcache.c:1035
MLIST:[linux-kernel] 20141026 Re: fs: lockup on rename_mutex in fs/dcache.c:1035
MLIST:[linux-kernel] 20150128 [PATCH v2] vfs: read file_handle only once in handle_to_path
MLIST:[oss-security] 20141030 CVE-2014-8559 - Linux kernel fs/dcache.c incorrect use of rename_lock
MLIST:[oss-security] 20150129 CVE-2015-1420 - Linux kernel fs/fhandle.c race condition
OSS:2015/Q1/331
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2014-7822
RH:CVE-2014-8559
RH:CVE-2015-1420
RHSA-2015:0102
RHSA-2015:0164
RHSA-2015:0674
RHSA-2015:0694
RHSA-2015:1976
RHSA-2015:1977
RHSA-2015:1978
SECTRACK:1034051
SECUNIA:62801
SMASH Issue 113306
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0529
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:1488
SUSE:SUSE-SU-2015:1489
SUSE:openSUSE-SU-2015:0566
SUSE:openSUSE-SU-2015:0714
UBUNTU:CVE-2014-7822
UBUNTU:CVE-2014-8559
UBUNTU:CVE-2015-1420
UBUNTU:USN-2492-1
UBUNTU:USN-2493-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
UBUNTU:USN-2541-1
UBUNTU:USN-2542-1
UBUNTU:USN-2543-1
UBUNTU:USN-2544-1
UBUNTU:USN-2660-1
UBUNTU:USN-2661-1
UBUNTU:USN-2665-1
UBUNTU:USN-2667-1
bnc#915517
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d0207652cbe27d1f962050737848e5ad4671958
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1159313
rh#1163792
rh#1183744
rh#1187534
rh#1202855
rh#1243465
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2014-8709kernel-source-rt:Not affectedimportant ()BID:70965
CONFIRM:git.kernel.org:CVE-2014-8709
CONFIRM:github.com:CVE-2014-8709
CVE-2014-8709
CVE-2023-2002
D:CVE-2014-8709
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20141109 Re: CVE Request: Linux kernel mac80211 plain text leak
OSS:2023/04/16/3
RH:CVE-2014-8709
RHSA-2015:0290
RHSA-2015:1272
SMASH Issue 110597
UBUNTU:CVE-2014-8709
XF:linux-kernel-cve20148709-info-disclsoure(98922)
bnc#904700
rh#1113899
rh#1163762
rh#1173580
CVE-2014-9419kernel-source-rt:Not affectedlow ()BID:74964
BID:75001
CONFIRM:git.kernel.org:CVE-2014-9420
CONFIRM:git.kernel.org:CVE-2014-9728
CONFIRM:git.kernel.org:CVE-2014-9729
CONFIRM:git.kernel.org:CVE-2014-9730
CONFIRM:git.kernel.org:CVE-2014-9731
CONFIRM:github.com:CVE-2014-9420
CONFIRM:github.com:CVE-2014-9728
CONFIRM:github.com:CVE-2014-9729
CONFIRM:github.com:CVE-2014-9730
CONFIRM:github.com:CVE-2014-9731
CONFIRM:source.android.com:CVE-2017-0404
CONFIRM:www.oracle.com:CVE-2015-1351
CVE-2014-9419
CVE-2014-9420
CVE-2014-9728
CVE-2014-9729
CVE-2014-9730
CVE-2014-9731
CVE-2023-2002
D:CVE-2014-9420
FEDORA:FEDORA-2015-0515
FEDORA:FEDORA-2015-0517
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20141225 Re: CVE Request Linux kernel: fs: isofs: infinite loop in CE records
MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage
MLIST:[oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink
OSS:2016/Q2/365
OSS:2023/04/16/3
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2014-9419
RH:CVE-2014-9420
RH:CVE-2014-9728
RH:CVE-2014-9729
RH:CVE-2014-9730
RH:CVE-2014-9731
RHSA-2015:1081
RHSA-2015:1137
RHSA-2015:1138
RHSA-2015:1139
RHSA-2015:2152
RHSA-2015:2411
SECUNIA:62801
SMASH Issue 111836
SMASH Issue 156023
SMASH Issue 240305
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:0812
SUSE:SUSE-SU-2015:1324
SUSE:SUSE-SU-2015:1592
SUSE:SUSE-SU-2015:1611
SUSE:openSUSE-SU-2015:0714
SUSE:openSUSE-SU-2015:1382
UBUNTU:CVE-2014-9419
UBUNTU:CVE-2014-9420
UBUNTU:CVE-2014-9728
UBUNTU:CVE-2014-9729
UBUNTU:CVE-2014-9730
UBUNTU:CVE-2014-9731
UBUNTU:USN-2490-1
UBUNTU:USN-2491-1
UBUNTU:USN-2492-1
UBUNTU:USN-2493-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
bnc#911325
bnc#911326
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1113899
rh#1163762
rh#1163792
rh#1175235
rh#1177260
rh#1228220
rh#1228229
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2014-9420kernel-source-rt:Not affectedlow ()BID:74964
BID:75001
CONFIRM:git.kernel.org:CVE-2014-9420
CONFIRM:git.kernel.org:CVE-2014-9728
CONFIRM:git.kernel.org:CVE-2014-9729
CONFIRM:git.kernel.org:CVE-2014-9730
CONFIRM:git.kernel.org:CVE-2014-9731
CONFIRM:github.com:CVE-2014-9420
CONFIRM:github.com:CVE-2014-9728
CONFIRM:github.com:CVE-2014-9729
CONFIRM:github.com:CVE-2014-9730
CONFIRM:github.com:CVE-2014-9731
CONFIRM:source.android.com:CVE-2017-0404
CONFIRM:www.oracle.com:CVE-2015-1351
CVE-2014-9419
CVE-2014-9420
CVE-2014-9728
CVE-2014-9729
CVE-2014-9730
CVE-2014-9731
CVE-2023-2002
D:CVE-2014-9420
FEDORA:FEDORA-2015-0515
FEDORA:FEDORA-2015-0517
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20141225 Re: CVE Request Linux kernel: fs: isofs: infinite loop in CE records
MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage
MLIST:[oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink
OSS:2016/Q2/365
OSS:2023/04/16/3
RH:CVE-2014-9420
RH:CVE-2014-9728
RH:CVE-2014-9729
RH:CVE-2014-9730
RH:CVE-2014-9731
RHSA-2015:1081
RHSA-2015:1137
RHSA-2015:1138
RHSA-2015:1139
SECUNIA:62801
SMASH Issue 111836
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:0812
SUSE:SUSE-SU-2015:1324
SUSE:SUSE-SU-2015:1592
SUSE:SUSE-SU-2015:1611
SUSE:openSUSE-SU-2015:0714
SUSE:openSUSE-SU-2015:1382
UBUNTU:CVE-2014-9420
UBUNTU:CVE-2014-9728
UBUNTU:CVE-2014-9729
UBUNTU:CVE-2014-9730
UBUNTU:CVE-2014-9731
UBUNTU:USN-2490-1
UBUNTU:USN-2491-1
UBUNTU:USN-2492-1
UBUNTU:USN-2493-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
bnc#911325
rh#1113899
rh#1163762
rh#1163792
rh#1175235
rh#1228220
rh#1228229
CVE-2014-9428kernel-source-rt:Unsupportedimportant ()CONFIRM:git.kernel.org:CVE-2014-9428
CONFIRM:github.com:CVE-2014-9428
CVE-2014-9428
FEDORA:FEDORA-2015-0515
FEDORA:FEDORA-2015-0517
MANDRIVA:MDVSA-2015:058
MISC:bugzilla.kernel.org:MLIST:[oss-security] 20141231 Re: CVE Request: Linux: Remote crash via batman-adv module - Linux kernel
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20141231 Re: CVE Request: Linux: Remote crash via batman-adv module - Linux kernel
MLIST:[b.a.t.m.a.n] 20141118 kernel BUG at net/core/skbuff.c:100
MLIST:[netdev] 20141220 Stable fixes for batman-adv
MLIST:[oss-security] 20141231 Re: CVE Request: Linux: Remote crash via batman-adv module - Linux kernel
RH:CVE-2014-9428
SMASH Issue 111976
UBUNTU:CVE-2014-9428
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
bdo#774155
bnc#912429
rh#1178826
CVE-2014-9584kernel-source-rt:Not affectedmoderate ()BID:47503
BID:70691
BID:71883
BID:74450
CONFIRM:git.kernel.org:CVE-2011-1598
CONFIRM:git.kernel.org:CVE-2014-3690
CONFIRM:git.kernel.org:CVE-2014-9584
CONFIRM:github.com:CVE-2014-3690
CONFIRM:github.com:CVE-2014-9584
CONFIRM:www.kernel.org:CVE-2011-1748
CONFIRM:www.kernel.org:CVE-2014-3690
CONFIRM:www.kernel.org:CVE-2014-9731
CONFIRM:www.kernel.org:CVE-2015-2830
CONFIRM:www.kernel.org:CVE-2015-8950
CONFIRM:www.oracle.com:CVE-2015-1351
CONFIRM:www.oracle.com:CVE-2016-2802
CVE-2011-1598
CVE-2014-3673
CVE-2014-3690
CVE-2014-8160
CVE-2014-9584
CVE-2015-3636
CVE-2015-7303
CVE-2015-7838
CVE-2015-7839
CVE-2015-8028
CVE-2015-8029
CVE-2015-8030
CVE-2015-8220
CVE-2015-8561
CVE-2015-8572
CVE-2015-8580
CVE-2015-8843
CVE-2016-1715
CVE-2016-4065
CVE-2023-2002
D:CVE-2014-3690
DSA-2240
DSA-2264
DSA-3060
DSA-3128
FEDORA:FEDORA-2015-7784
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace
MISC:git.kernel.org:MLIST:[oss-security] 20141126 Re: CVE Request: Linux kernel LDT handling bugs
MISC:git.kernel.org:MLIST:[oss-security] 20141215 Linux kernel: multiple x86_64 vulnerabilities
MISC:git.kernel.org:MLIST:[oss-security] 20150320 Re: CVE Request: Linux kernel execution in the early microcode loader.
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:github.com:MLIST:[oss-security] 20150502 Re: CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam
MISC:www.zerodayinitiative.com
MLIST:[netdev] 20110420 Add missing socket check in can/bcm release.
MLIST:[oss-security] 20110420 CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20110420 Re: CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20110421 Re: CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20110422 Re: CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20110425 Re: CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace
MLIST:[oss-security] 20141029 Re: CVE-2014-3690: KVM DoS triggerable by malicious host userspace
MLIST:[oss-security] 20150109 Re: CVE request Linux kernel: isofs: unchecked printing of ER records
MLIST:[oss-security] 20150502 CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam
OSS:2014/Q4/416
OSS:2023/04/16/3
RH:CVE-2011-1598
RH:CVE-2014-3690
RH:CVE-2014-9584
RH:CVE-2015-3636
RHSA-2011:0836
RHSA-2011:1253
RHSA-2015:0290
RHSA-2015:0782
RHSA-2015:0864
RHSA-2015:1137
RHSA-2015:1138
RHSA-2015:1139
RHSA-2015:1221
RHSA-2015:1534
RHSA-2015:1564
RHSA-2015:1565
RHSA-2015:1583
RHSA-2015:1643
SECTRACK:1033186
SECUNIA:60174
SMASH Issue 110104
SMASH Issue 110107
SMASH Issue 45008
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0529
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:0812
SUSE:openSUSE-SU-2015:0566
SUSE:openSUSE-SU-2015:0714
UBUNTU:CVE-2011-1598
UBUNTU:CVE-2014-3185
UBUNTU:CVE-2014-3690
UBUNTU:CVE-2014-7826
UBUNTU:CVE-2014-8133
UBUNTU:CVE-2014-9090
UBUNTU:CVE-2014-9322
UBUNTU:CVE-2014-9584
UBUNTU:CVE-2015-3636
UBUNTU:USN-2417-1
UBUNTU:USN-2418-1
UBUNTU:USN-2419-1
UBUNTU:USN-2420-1
UBUNTU:USN-2421-1
UBUNTU:USN-2511-1
UBUNTU:USN-2512-1
UBUNTU:USN-2513-1
UBUNTU:USN-2514-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
UBUNTU:USN-2633-1
UBUNTU:USN-2634-1
bdo#618485
bdo#766195
bnc#688685
bnc#689038
bnc#902232
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e2024624e678f0ebb916e6192bd23c1f9fdf696
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c6914a6f261aca0c9f715f883a353ae7ff51fe83
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d974baa398f34393db76be45f7d4d04fbdbb4a0a
rh#1113899
rh#1153322
rh#1163762
rh#1163792
rh#1180119
rh#1218074
rh#698057
CVE-2014-9585kernel-source-rt:Not affectedimportant ()BID:71990
CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:git.kernel.org:CVE-2011-4913
CONFIRM:git.kernel.org:CVE-2014-3610
CONFIRM:git.kernel.org:CVE-2014-3611
CONFIRM:git.kernel.org:CVE-2014-3645
CONFIRM:git.kernel.org:CVE-2014-3646
CONFIRM:git.kernel.org:CVE-2014-3647
CONFIRM:git.kernel.org:CVE-2014-3673
CONFIRM:git.kernel.org:CVE-2014-3687
CONFIRM:git.kernel.org:CVE-2014-7822
CONFIRM:git.kernel.org:CVE-2014-7841
CONFIRM:git.kernel.org:CVE-2014-8160
CONFIRM:git.kernel.org:CVE-2014-9419
CONFIRM:git.kernel.org:CVE-2014-9529
CONFIRM:git.kernel.org:CVE-2014-9584
CONFIRM:git.kernel.org:CVE-2014-9585
CONFIRM:git.kernel.org:CVE-2015-1465
CONFIRM:git.kernel.org:CVE-2015-2041
CONFIRM:git.kernel.org:CVE-2015-2042
CONFIRM:git.kernel.org:CVE-2015-2830
CONFIRM:git.kernel.org:CVE-2015-3339
CONFIRM:git.kernel.org:CVE-2015-3636
CONFIRM:github.com:CVE-2011-4913
CVE-2011-1493
CVE-2014-9585
DSA-2240
DSA-2264
DSA-3170
FEDORA:FEDORA-2015-0937
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:CVE-2014-9585
MISC:git.kernel.org:MLIST:[oss-security] 20150109 Re: PIE bypass using VDSO ASLR weakness - Linux kernel
MISC:v0ids3curity.blogspot.in:CVE-2014-9585
MLIST:[oss-security] 20110405 Re: CVE request: kernel: multiple issues in ROSE
MLIST:[oss-security] 20141209 PIE bypass using VDSO ASLR weakness
MLIST:[oss-security] 20150109 Re: PIE bypass using VDSO ASLR weakness - Linux kernel
RH:CVE-2011-1493
RH:CVE-2014-9585
RHSA-2015:1081
RHSA-2015:1778
RHSA-2015:1787
RHSA-2015:1788
SMASH Issue 44695
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:0812
SUSE:openSUSE-SU-2015:0566
SUSE:openSUSE-SU-2015:0714
UBUNTU:CVE-2011-1493
UBUNTU:CVE-2014-9585
UBUNTU:USN-2513-1
UBUNTU:USN-2514-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
bdo#618485
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=be20250c13f88375345ad99950190685eda51eb8
rh#1181054
rh#770777
CVE-2014-9644kernel-source-rt:Already fixedmoderate ()BID:72320
BID:72322
BID:72324
CONFIRM:git.busybox.net:CVE-2014-9645
CONFIRM:git.kernel.org:CVE-2013-7421
CONFIRM:git.kernel.org:CVE-2014-9644
CONFIRM:github.com:CVE-2013-7421
CONFIRM:github.com:CVE-2014-9644
CONFIRM:github.com:CVE-2017-6429
CONFIRM:www.kernel.org:CVE-2015-1573
CONFIRM:www.oracle.com:CVE-2015-8472
CONFIRM:www.oracle.com:CVE-2016-2802
CVE-2013-7421
CVE-2014-9644
CVE-2014-9645
CVE-2023-2002
D:CVE-2013-7421
D:CVE-2014-9644
D:CVE-2014-9645
DSA-3170
GENTOO:GLSA-201503-13
MANDRIVA:MDVSA-2015:057
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:plus.google.com:CVE-2014-9645
MLIST:[linux-kernel] 20130304 Re: user ns: arbitrary module loading
MLIST:[oss-security] 20150124 Re: CVE Request: Linux kernel crypto api unprivileged arbitrary module load
OSS:2023/04/16/3
RH:CVE-2013-7421
RH:CVE-2014-9644
RH:CVE-2014-9645
RHSA-2015:2152
RHSA-2015:2411
RHSA-2016:0068
SMASH Issue 113136
SMASH Issue 113164
SMASH Issue 113165
UBUNTU:CVE-2013-7421
UBUNTU:CVE-2014-9644
UBUNTU:CVE-2014-9645
UBUNTU:USN-2513-1
UBUNTU:USN-2514-1
UBUNTU:USN-2543-1
UBUNTU:USN-2544-1
UBUNTU:USN-2545-1
UBUNTU:USN-2546-1
bnc#914423
rh#1113899
rh#1163762
rh#1163792
rh#1185469
rh#1185707
rh#1190546
CVE-2014-9645kernel-source-rt:Already fixedmoderate ()BID:72320
BID:72322
BID:72324
CONFIRM:git.busybox.net:CVE-2014-9645
CONFIRM:git.kernel.org:CVE-2013-7421
CONFIRM:git.kernel.org:CVE-2014-9644
CONFIRM:github.com:CVE-2013-7421
CONFIRM:github.com:CVE-2014-9644
CONFIRM:github.com:CVE-2017-6429
CONFIRM:www.kernel.org:CVE-2015-1573
CONFIRM:www.oracle.com:CVE-2015-8472
CONFIRM:www.oracle.com:CVE-2016-2802
CVE-2013-7421
CVE-2014-9644
CVE-2014-9645
CVE-2023-2002
D:CVE-2013-7421
D:CVE-2014-9644
D:CVE-2014-9645
DSA-3170
GENTOO:GLSA-201503-13
MANDRIVA:MDVSA-2015:057
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:plus.google.com:CVE-2014-9645
MLIST:[linux-kernel] 20130304 Re: user ns: arbitrary module loading
MLIST:[oss-security] 20150124 Re: CVE Request: Linux kernel crypto api unprivileged arbitrary module load
OSS:2023/04/16/3
RH:CVE-2013-7421
RH:CVE-2014-9644
RH:CVE-2014-9645
RHSA-2015:2152
RHSA-2015:2411
RHSA-2016:0068
SMASH Issue 113136
SMASH Issue 113165
UBUNTU:CVE-2013-7421
UBUNTU:CVE-2014-9644
UBUNTU:CVE-2014-9645
UBUNTU:USN-2513-1
UBUNTU:USN-2514-1
UBUNTU:USN-2543-1
UBUNTU:USN-2544-1
UBUNTU:USN-2545-1
UBUNTU:USN-2546-1
bnc#914423
rh#1113899
rh#1163762
rh#1163792
rh#1185469
rh#1185707
rh#1190546
CVE-2014-9683kernel-source-rt:Ignorelow ()BID:72643
CONFIRM:git.kernel.org:CVE-2014-9683
CONFIRM:github.com:CVE-2014-9683
CVE-2014-9683
DSA-3170
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20150217 Re: CVE request: Linux kernel ecryptfs 1-byte overwrite
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2014-9683
RHSA-2015:1272
SECTRACK:1031860
SMASH Issue 113982
UBUNTU:CVE-2014-9683
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
UBUNTU:USN-2541-1
UBUNTU:USN-2542-1
bnc#918333
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1193830
rh#1202855
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2014-9717kernel-source-rt:Not affectedlow ()BID:74226
CONFIRM:git.kernel.org:CVE-2014-9717
CONFIRM:github.com:CVE-2014-9717
CVE-2014-9717
MLIST:[containers] 20150402 [PATCH review 0/19] Locked mount and loopback mount fixes
MLIST:[linux-kernel] 20141007 [PATCH] mnt: don't allow to detach the namespace root
MLIST:[oss-security] 20150417 USERNS allows circumventing MNT_LOCKED
Oracle:CVE-2016-5244
RH:CVE-2014-9717
SMASH Issue 116196
SUSE:SUSE-SU-2016:1696
UBUNTU:CVE-2014-9717
bnc#928547
rh#1226751
rh#1324749
CVE-2014-9728kernel-source-rt:Not affectedlow ()BID:74964
BID:75001
CONFIRM:git.kernel.org:CVE-2014-9420
CONFIRM:git.kernel.org:CVE-2014-9728
CONFIRM:git.kernel.org:CVE-2014-9729
CONFIRM:git.kernel.org:CVE-2014-9730
CONFIRM:git.kernel.org:CVE-2014-9731
CONFIRM:github.com:CVE-2014-9420
CONFIRM:github.com:CVE-2014-9728
CONFIRM:github.com:CVE-2014-9729
CONFIRM:github.com:CVE-2014-9730
CONFIRM:github.com:CVE-2014-9731
CONFIRM:source.android.com:CVE-2017-0404
CONFIRM:www.oracle.com:CVE-2015-1351
CVE-2014-9419
CVE-2014-9420
CVE-2014-9728
CVE-2014-9729
CVE-2014-9730
CVE-2014-9731
CVE-2023-2002
D:CVE-2014-9420
FEDORA:FEDORA-2015-0515
FEDORA:FEDORA-2015-0517
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20141225 Re: CVE Request Linux kernel: fs: isofs: infinite loop in CE records
MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage
MLIST:[oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink
OSS:2016/Q2/365
OSS:2023/04/16/3
RH:CVE-2014-9420
RH:CVE-2014-9728
RH:CVE-2014-9729
RH:CVE-2014-9730
RH:CVE-2014-9731
RHSA-2015:1081
RHSA-2015:1137
RHSA-2015:1138
RHSA-2015:1139
SECUNIA:62801
SMASH Issue 111836
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:0812
SUSE:SUSE-SU-2015:1324
SUSE:SUSE-SU-2015:1592
SUSE:SUSE-SU-2015:1611
SUSE:openSUSE-SU-2015:0714
SUSE:openSUSE-SU-2015:1382
UBUNTU:CVE-2014-9420
UBUNTU:CVE-2014-9728
UBUNTU:CVE-2014-9729
UBUNTU:CVE-2014-9730
UBUNTU:CVE-2014-9731
UBUNTU:USN-2490-1
UBUNTU:USN-2491-1
UBUNTU:USN-2492-1
UBUNTU:USN-2493-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
bnc#911325
rh#1113899
rh#1163762
rh#1163792
rh#1175235
rh#1228220
rh#1228229
CVE-2014-9729kernel-source-rt:Not affectedlow ()BID:74964
BID:75001
CONFIRM:git.kernel.org:CVE-2014-9420
CONFIRM:git.kernel.org:CVE-2014-9728
CONFIRM:git.kernel.org:CVE-2014-9729
CONFIRM:git.kernel.org:CVE-2014-9730
CONFIRM:git.kernel.org:CVE-2014-9731
CONFIRM:github.com:CVE-2014-9420
CONFIRM:github.com:CVE-2014-9728
CONFIRM:github.com:CVE-2014-9729
CONFIRM:github.com:CVE-2014-9730
CONFIRM:github.com:CVE-2014-9731
CONFIRM:source.android.com:CVE-2017-0404
CONFIRM:www.oracle.com:CVE-2015-1351
CVE-2014-9419
CVE-2014-9420
CVE-2014-9728
CVE-2014-9729
CVE-2014-9730
CVE-2014-9731
CVE-2023-2002
D:CVE-2014-9420
FEDORA:FEDORA-2015-0515
FEDORA:FEDORA-2015-0517
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20141225 Re: CVE Request Linux kernel: fs: isofs: infinite loop in CE records
MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage
MLIST:[oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink
OSS:2016/Q2/365
OSS:2023/04/16/3
RH:CVE-2014-9420
RH:CVE-2014-9728
RH:CVE-2014-9729
RH:CVE-2014-9730
RH:CVE-2014-9731
RHSA-2015:1081
RHSA-2015:1137
RHSA-2015:1138
RHSA-2015:1139
SECUNIA:62801
SMASH Issue 111836
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:0812
SUSE:SUSE-SU-2015:1324
SUSE:SUSE-SU-2015:1592
SUSE:SUSE-SU-2015:1611
SUSE:openSUSE-SU-2015:0714
SUSE:openSUSE-SU-2015:1382
UBUNTU:CVE-2014-9420
UBUNTU:CVE-2014-9728
UBUNTU:CVE-2014-9729
UBUNTU:CVE-2014-9730
UBUNTU:CVE-2014-9731
UBUNTU:USN-2490-1
UBUNTU:USN-2491-1
UBUNTU:USN-2492-1
UBUNTU:USN-2493-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
bnc#911325
rh#1113899
rh#1163762
rh#1163792
rh#1175235
rh#1228220
rh#1228229
CVE-2014-9730kernel-source-rt:Not affectedlow ()BID:74964
BID:75001
CONFIRM:git.kernel.org:CVE-2014-9420
CONFIRM:git.kernel.org:CVE-2014-9728
CONFIRM:git.kernel.org:CVE-2014-9729
CONFIRM:git.kernel.org:CVE-2014-9730
CONFIRM:git.kernel.org:CVE-2014-9731
CONFIRM:github.com:CVE-2014-9420
CONFIRM:github.com:CVE-2014-9728
CONFIRM:github.com:CVE-2014-9729
CONFIRM:github.com:CVE-2014-9730
CONFIRM:github.com:CVE-2014-9731
CONFIRM:source.android.com:CVE-2017-0404
CONFIRM:www.oracle.com:CVE-2015-1351
CVE-2014-9419
CVE-2014-9420
CVE-2014-9728
CVE-2014-9729
CVE-2014-9730
CVE-2014-9731
CVE-2023-2002
D:CVE-2014-9420
FEDORA:FEDORA-2015-0515
FEDORA:FEDORA-2015-0517
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20141225 Re: CVE Request Linux kernel: fs: isofs: infinite loop in CE records
MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage
MLIST:[oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink
OSS:2016/Q2/365
OSS:2023/04/16/3
RH:CVE-2014-9420
RH:CVE-2014-9728
RH:CVE-2014-9729
RH:CVE-2014-9730
RH:CVE-2014-9731
RHSA-2015:1081
RHSA-2015:1137
RHSA-2015:1138
RHSA-2015:1139
SECUNIA:62801
SMASH Issue 111836
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:0812
SUSE:SUSE-SU-2015:1324
SUSE:SUSE-SU-2015:1592
SUSE:SUSE-SU-2015:1611
SUSE:openSUSE-SU-2015:0714
SUSE:openSUSE-SU-2015:1382
UBUNTU:CVE-2014-9420
UBUNTU:CVE-2014-9728
UBUNTU:CVE-2014-9729
UBUNTU:CVE-2014-9730
UBUNTU:CVE-2014-9731
UBUNTU:USN-2490-1
UBUNTU:USN-2491-1
UBUNTU:USN-2492-1
UBUNTU:USN-2493-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
bnc#911325
rh#1113899
rh#1163762
rh#1163792
rh#1175235
rh#1228220
rh#1228229
CVE-2014-9731kernel-source-rt:Not affectedlow ()BID:74964
BID:75001
CONFIRM:git.kernel.org:CVE-2014-9420
CONFIRM:git.kernel.org:CVE-2014-9728
CONFIRM:git.kernel.org:CVE-2014-9729
CONFIRM:git.kernel.org:CVE-2014-9730
CONFIRM:git.kernel.org:CVE-2014-9731
CONFIRM:github.com:CVE-2014-9420
CONFIRM:github.com:CVE-2014-9728
CONFIRM:github.com:CVE-2014-9729
CONFIRM:github.com:CVE-2014-9730
CONFIRM:github.com:CVE-2014-9731
CONFIRM:source.android.com:CVE-2017-0404
CONFIRM:www.oracle.com:CVE-2015-1351
CVE-2014-9419
CVE-2014-9420
CVE-2014-9728
CVE-2014-9729
CVE-2014-9730
CVE-2014-9731
CVE-2023-2002
D:CVE-2014-9420
FEDORA:FEDORA-2015-0515
FEDORA:FEDORA-2015-0517
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:OSS:2023/04/16/3
MLIST:[oss-security] 20141225 Re: CVE Request Linux kernel: fs: isofs: infinite loop in CE records
MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage
MLIST:[oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink
OSS:2016/Q2/365
OSS:2023/04/16/3
RH:CVE-2014-9420
RH:CVE-2014-9728
RH:CVE-2014-9729
RH:CVE-2014-9730
RH:CVE-2014-9731
RHSA-2015:1081
RHSA-2015:1137
RHSA-2015:1138
RHSA-2015:1139
SECUNIA:62801
SMASH Issue 111836
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:0812
SUSE:SUSE-SU-2015:1324
SUSE:SUSE-SU-2015:1592
SUSE:SUSE-SU-2015:1611
SUSE:openSUSE-SU-2015:0714
SUSE:openSUSE-SU-2015:1382
UBUNTU:CVE-2014-9420
UBUNTU:CVE-2014-9728
UBUNTU:CVE-2014-9729
UBUNTU:CVE-2014-9730
UBUNTU:CVE-2014-9731
UBUNTU:USN-2490-1
UBUNTU:USN-2491-1
UBUNTU:USN-2492-1
UBUNTU:USN-2493-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
bnc#911325
rh#1113899
rh#1163762
rh#1163792
rh#1175235
rh#1228220
rh#1228229
CVE-2014-9748libuv:Analysismoderate ()CVE-2014-9748
MISC:github.com:CVE-2014-9748
MISC:groups.google.com:CVE-2014-9748
SMASH Issue 170512
UBUNTU:CVE-2014-9748
bnc#986635
CVE-2014-9903kernel-source-rt:Unsupportedlow ()BID:91511
CONFIRM:git.kernel.org:CVE-2014-9903
CONFIRM:github.com:CVE-2014-9903
CVE-2014-9903
RH:CVE-2014-9903
SMASH Issue 170531
UBUNTU:CVE-2014-9903
bnc#986794
rh#1350796
CVE-2014-9904kernel-source-rt:Not affectedmoderate ()BID:91510
CONFIRM:git.kernel.org:CVE-2014-9904
CONFIRM:github.com:CVE-2014-9904
CVE-2014-9904
D:CVE-2014-9904
DSA-3616
OSS:2016/Q2/615
Oracle:CVE-2016-5244
RH:CVE-2014-9904
SECTRACK:1036189
SMASH Issue 170532
SUSE:SUSE-SU-2016:1937
SUSE:SUSE-SU-2016:2105
SUSE:openSUSE-SU-2016:2184
UBUNTU:CVE-2014-9904
bdo#828914
bnc#986811
rh#1324749
rh#1350801
rh#1351076
CVE-2014-9922kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:97354
CONFIRM:git.kernel.org:CVE-2014-9922
CONFIRM:github.com:CVE-2014-9922
CVE-2014-9922
Oracle:CVE-2017-6074
RH:CVE-2014-9922
SMASH Issue 182840
UBUNTU:CVE-2014-9922
bnc#1032340
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1435719
rh#1439087
rh#1462147
rh#1462158
CVE-2015-0239kernel-source-rt:Ignoremoderate ()BID:72842
CONFIRM:git.kernel.org:CVE-2015-0239
CONFIRM:www.kernel.org:CVE-2015-1573
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-1351
CONFIRM:www.oracle.com:CVE-2015-8472
CONFIRM:www.oracle.com:CVE-2016-2802
CVE-2015-0239
CVE-2016-0823
D:CVE-2015-0239
D:CVE-2022-2590
DSA-3170
L3:45886
MANDRIVA:MDVSA-2015:058
MISC:git.kernel.org:/
MLIST:[bk-commits-head] 20150123 KVM: x86: SYSENTER emulation is broken
MLIST:[oss-security] 20150127 KVM SYSENTER emulation vulnerability - CVE-2015-0239
OSS:2015/Q1/271
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2015-0239
RHSA-2015:1272
RHSA-2015:2152
SMASH Issue 113160
SMASH Issue 172055
UBUNTU:CVE-2015-0239
UBUNTU:USN-2513-1
UBUNTU:USN-2514-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
bnc#987709
bnc#994618
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:f3747379accba8e95d70cec0eae0582c8c182050
rh#1186448
rh#1384344
rh#2116175
CVE-2015-0267kexec-tools:Analysislow ()BID:74622
CVE-2015-0267
D:CVE-2015-0267
RH:CVE-2015-0267
RHSA-2015:0986
SMASH Issue 113948
UBUNTU:CVE-2015-0267
rh#1191575
CVE-2015-0274kernel-source-rt:Not affectedimportant ()CONFIRM:git.kernel.org:CVE-2015-0274
CONFIRM:github.com:CVE-2015-0274
CVE-2015-0274
D:CVE-2015-0274
RH:CVE-2015-0274
RHSA-2015:0290
RHSA-2015:0694
SECTRACK:1031853
SMASH Issue 114278
UBUNTU:CVE-2015-0274
UBUNTU:USN-2543-1
UBUNTU:USN-2544-1
bnc#919655
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8275cdd0e7ac550dcce2b3ef6d2fb3b808c1ae59
rh#1195248
CVE-2015-0275kernel-source-rt:Not affectedmoderate ()BID:75139
CONFIRM:git.kernel.org:CVE-2015-0275
CONFIRM:github.com:CVE-2015-0275
CONFIRM:support.f5.com:CVE-2014-8559
CONFIRM:www.oracle.com:CVE-2015-8472
CVE-2015-0275
D:CVE-2015-0275
MLIST:[linux-ext4] 20150218 [PATCH] ext4: Allocate entire range in zero range
MLIST:[oss-security] 20150223 CVE-2015-0275 -- Linux kernel: fs: ext4: fallocate zero range page size > block size BUG()
RH:CVE-2015-0275
RHSA-2015:1778
RHSA-2015:1787
RHSA-2015:1788
SECTRACK:1034454
SMASH Issue 114156
UBUNTU:CVE-2015-0275
bnc#919032
rh#1193907
CVE-2015-1283expat:Not affectedmoderate ()CVE-2015-1283
SMASH Issue 385752
bnc#980391
rh#1245587
CVE-2015-1350kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)BID:76075
CVE-2015-1350
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[linux-kernel] 20150117 [RFC PATCH RESEND] vfs: Move security_inode_killpriv() after permission checks
MLIST:[oss-security] 20150124 Re: CVE Request: Linux kernel - Denial of service in notify_change for xattrs.
Oracle:CVE-2016-5244
Oracle:CVE-2017-6074
RH:CVE-2015-1350
SMASH Issue 113173
UBUNTU:CVE-2015-1350
bdo#770492
bnc#914939
linux.git:commit:030b533c4fd4d2ec3402363323de4bb2983c9cee
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1185139
rh#1420236
rh#1435719
CVE-2015-1420kernel-source-rt:Not affectedmoderate ()BID:70854
BID:72347
BID:72357
CONFIRM:git.kernel.org:CVE-2014-8559
CONFIRM:github.com:CVE-2014-7822
CONFIRM:support.f5.com:CVE-2014-8559
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-8472
CVE-2014-7822
CVE-2014-8559
CVE-2015-1420
D:CVE-2015-1420
DSA-3170
EXPLOIT-DB:36743
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[linux-kernel] 20141025 fs: lockup on rename_mutex in fs/dcache.c:1035
MLIST:[linux-kernel] 20141026 Re: fs: lockup on rename_mutex in fs/dcache.c:1035
MLIST:[linux-kernel] 20150128 [PATCH v2] vfs: read file_handle only once in handle_to_path
MLIST:[oss-security] 20141030 CVE-2014-8559 - Linux kernel fs/dcache.c incorrect use of rename_lock
MLIST:[oss-security] 20150129 CVE-2015-1420 - Linux kernel fs/fhandle.c race condition
OSS:2015/Q1/331
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2014-7822
RH:CVE-2014-8559
RH:CVE-2015-1420
RHSA-2015:0102
RHSA-2015:0164
RHSA-2015:0674
RHSA-2015:0694
RHSA-2015:1976
RHSA-2015:1977
RHSA-2015:1978
SECTRACK:1034051
SECUNIA:62801
SMASH Issue 113306
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0529
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:1488
SUSE:SUSE-SU-2015:1489
SUSE:openSUSE-SU-2015:0566
SUSE:openSUSE-SU-2015:0714
UBUNTU:CVE-2014-7822
UBUNTU:CVE-2014-8559
UBUNTU:CVE-2015-1420
UBUNTU:USN-2492-1
UBUNTU:USN-2493-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
UBUNTU:USN-2541-1
UBUNTU:USN-2542-1
UBUNTU:USN-2543-1
UBUNTU:USN-2544-1
UBUNTU:USN-2660-1
UBUNTU:USN-2661-1
UBUNTU:USN-2665-1
UBUNTU:USN-2667-1
bnc#915517
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8d0207652cbe27d1f962050737848e5ad4671958
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1159313
rh#1163792
rh#1183744
rh#1187534
rh#1202855
rh#1243465
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-1421kernel-source-rt:Already fixedmoderate ()BID:72356
CONFIRM:git.kernel.org:CVE-2015-1421
CONFIRM:git.kernel.org:CVE-2015-2150
CONFIRM:github.com:CVE-2015-1421
CONFIRM:www.kernel.org:CVE-2015-1465
CVE-2015-1421
D:CVE-2015-1421
DSA-3170
L3:43128
L3:43134
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20150129 Re: CVE request -- Linux kernel - net: sctp: slab corruption from use after free on INIT collisions
MLIST:[oss-security] 20150129 Re: CVE request -- Linux kernel - net: sctp: slab corruption from use after free on INIT collisions
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2015-1421
RHSA-2015:0726
RHSA-2015:0727
RHSA-2015:0751
RHSA-2015:0782
RHSA-2015:0864
RHSA-2015:1030
RHSA-2015:1082
SECTRACK:1032172
SMASH Issue 113337
SUSE:SUSE-SU-2015:0832
SUSE:SUSE-SU-2015:1478
UBUNTU:CVE-2015-1421
UBUNTU:USN-2541-1
UBUNTU:USN-2542-1
UBUNTU:USN-2545-1
UBUNTU:USN-2546-1
UBUNTU:USN-2562-1
UBUNTU:USN-2563-1
bnc#915577
bnc#922004
bnc#932477
bnc#939261
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:af6fc858a35b90e89ea7a7ee58e66628c55c776b
rh#1196581
rh#1202855
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-1465kernel-source-rt:Already fixedimportant ()BID:72435
CONFIRM:git.kernel.org:CVE-2015-1465
CONFIRM:github.com:CVE-2015-1465
CONFIRM:www.kernel.org:CVE-2015-1465
CVE-2015-1465
MLIST:[oss-security] 20150203 Re: CVE request -- Linux kernel - net: DoS due to routing packets to too many different dsts/too fast
Oracle:CVE-2015-6937
RH:CVE-2015-1465
SECTRACK:1036763
SMASH Issue 156078
SMASH Issue 240308
SUSE:SUSE-SU-2015:1488
SUSE:SUSE-SU-2015:1489
SUSE:openSUSE-SU-2015:1382
UBUNTU:CVE-2015-1465
UBUNTU:USN-2545-1
UBUNTU:USN-2546-1
UBUNTU:USN-2562-1
UBUNTU:USN-2563-1
bnc#916225
rh#1163792
rh#1183744
rh#1202855
rh#1205079
rh#1243465
rh#2162082
rh#2162084
rh#2162087
CVE-2015-1593kernel-source-rt:Not affectedimportant ()BID:72607
BID:74951
BID:74963
CONFIRM:git.kernel.org:CVE-2015-1593
CONFIRM:www.kernel.org:CVE-2015-4167
CVE-2015-1593
CVE-2015-1805
CVE-2015-4167
CVE-2023-2002
D:CVE-2015-1593
DSA-3170
L3:42485
L3:44416
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:hmarco.org:CVE-2015-1593
MLIST:[linux-kernel] 20150107 Re: [PATH] Fix stack randomization on x86_64 bit
MLIST:[oss-security] 20150213 Re: CVE-Request -- Linux ASLR integer overflow
MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf kernel oops
MLIST:[oss-security] 20150606 CVE-2015-1805 Linux kernel: pipe: iovec overrun leading to memory corruption
OSS:2015/Q2/652
OSS:2017/Q2/500
OSS:2023/04/16/3
RH:CVE-2015-1593
RH:CVE-2015-1805
RH:CVE-2015-4167
RHSA-2010:0631
RHSA-2010:0660
RHSA-2010:0661
RHSA-2010:0670
RHSA-2010:0676
RHSA-2010:0677
RHSA-2010:0882
RHSA-2015:1042
RHSA-2015:1081
RHSA-2015:1082
RHSA-2015:1120
RHSA-2015:1137
RHSA-2015:1138
RHSA-2015:1139
RHSA-2015:1190
RHSA-2015:1199
RHSA-2015:1211
RHSA-2015:1221
RHSA-2015:2152
RHSA-2016:0103
RHSA-2016:0494
RHSA-2016:0617
RHSA-2019:3517
SECTRACK:1032454
SECTRACK:1033187
SMASH Issue 113891
SUSE:SUSE-SU-2015:1490
UBUNTU:CVE-2015-1593
UBUNTU:CVE-2015-1805
UBUNTU:CVE-2015-4167
UBUNTU:USN-2560-1
UBUNTU:USN-2564-1
UBUNTU:USN-2565-1
UBUNTU:USN-2679-1
UBUNTU:USN-2680-1
UBUNTU:USN-2681-1
bnc#917839
bnc#918554
bnc#959156
linux.git:commit:4e7c22d447bb6d7e37bfe39ff658486ae78e8d77
rh#1113899
rh#1163762
rh#1163792
rh#1192519
rh#1202855
rh#1228204
rh#1303961
rh#606611
CVE-2015-1805kernel-source-rt:Not affectedimportant ()BID:72607
BID:74951
BID:74963
CONFIRM:git.kernel.org:CVE-2015-1593
CONFIRM:www.kernel.org:CVE-2015-4167
CVE-2015-1593
CVE-2015-1805
CVE-2015-4167
CVE-2023-2002
D:CVE-2015-1593
DSA-3170
L3:42485
L3:44416
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:hmarco.org:CVE-2015-1593
MLIST:[linux-kernel] 20150107 Re: [PATH] Fix stack randomization on x86_64 bit
MLIST:[oss-security] 20150213 Re: CVE-Request -- Linux ASLR integer overflow
MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf kernel oops
MLIST:[oss-security] 20150606 CVE-2015-1805 Linux kernel: pipe: iovec overrun leading to memory corruption
OSS:2015/Q2/652
OSS:2017/Q2/500
OSS:2023/04/16/3
RH:CVE-2015-1593
RH:CVE-2015-1805
RH:CVE-2015-4167
RHSA-2010:0631
RHSA-2010:0660
RHSA-2010:0661
RHSA-2010:0670
RHSA-2010:0676
RHSA-2010:0677
RHSA-2010:0882
RHSA-2015:1042
RHSA-2015:1081
RHSA-2015:1082
RHSA-2015:1120
RHSA-2015:1137
RHSA-2015:1138
RHSA-2015:1139
RHSA-2015:1190
RHSA-2015:1199
RHSA-2015:1211
RHSA-2015:1221
RHSA-2015:2152
RHSA-2016:0103
RHSA-2016:0494
RHSA-2016:0617
RHSA-2019:3517
SECTRACK:1032454
SECTRACK:1033187
SMASH Issue 113891
SMASH Issue 155967
SUSE:SUSE-SU-2015:1490
UBUNTU:CVE-2015-1593
UBUNTU:CVE-2015-1805
UBUNTU:CVE-2015-4167
UBUNTU:USN-2560-1
UBUNTU:USN-2564-1
UBUNTU:USN-2565-1
UBUNTU:USN-2679-1
UBUNTU:USN-2680-1
UBUNTU:USN-2681-1
bnc#917839
bnc#918554
bnc#939270
bnc#959156
linux.git:commit:4e7c22d447bb6d7e37bfe39ff658486ae78e8d77
rh#1113899
rh#1163762
rh#1163792
rh#1183744
rh#1192519
rh#1202855
rh#1205079
rh#1228204
rh#1303961
rh#606611
CVE-2015-1821chrony:Not affectedmoderate ()BID:73955
BID:73956
CONFIRM:chrony.tuxfamily.org:CVE-2010-0294
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-8472
CVE-2015-1821
CVE-2015-1822
CVE-2015-1853
D:CVE-2015-1853
DSA-3222
GENTOO:GLSA-201507-01
MLIST:[chrony-announce] 20150407 chrony-1.31.1 released (security)
RH:CVE-2015-1821
RH:CVE-2015-1822
RH:CVE-2015-1853
RHSA-2015:2241
SMASH Issue 115602
SMASH Issue 115604
UBUNTU:CVE-2015-1821
UBUNTU:CVE-2015-1822
UBUNTU:CVE-2015-1853
bdo#782160
bnc#926323
rh#1209572
rh#1209631
rh#1209632
CVE-2015-1822chrony:Not affectedmoderate ()BID:73955
BID:73956
CONFIRM:chrony.tuxfamily.org:CVE-2010-0294
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-8472
CVE-2015-1821
CVE-2015-1822
CVE-2015-1853
D:CVE-2015-1853
DSA-3222
GENTOO:GLSA-201507-01
MLIST:[chrony-announce] 20150407 chrony-1.31.1 released (security)
RH:CVE-2015-1821
RH:CVE-2015-1822
RH:CVE-2015-1853
RHSA-2015:2241
SMASH Issue 115602
SMASH Issue 115603
UBUNTU:CVE-2015-1821
UBUNTU:CVE-2015-1822
UBUNTU:CVE-2015-1853
bdo#782160
bnc#926323
rh#1209572
rh#1209631
rh#1209632
CVE-2015-1853chrony:Not affectedmoderate ()BID:73955
BID:73956
CONFIRM:chrony.tuxfamily.org:CVE-2010-0294
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-8472
CVE-2015-1821
CVE-2015-1822
CVE-2015-1853
D:CVE-2015-1853
DSA-3222
GENTOO:GLSA-201507-01
MLIST:[chrony-announce] 20150407 chrony-1.31.1 released (security)
RH:CVE-2015-1821
RH:CVE-2015-1822
RH:CVE-2015-1853
RHSA-2015:2241
SMASH Issue 115602
SMASH Issue 115603
SMASH Issue 115604
UBUNTU:CVE-2015-1821
UBUNTU:CVE-2015-1822
UBUNTU:CVE-2015-1853
bdo#782160
bnc#926323
rh#1209572
rh#1209631
rh#1209632
CVE-2015-20107python3:Releasedimportant7.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L)CONFIRM:python-security.readthedocs.io:CVE-2015-20107
CONFIRM:security.netapp.com:CVE-2015-20107
CVE-2015-20107
FEDORA:FEDORA-2022-0be85556b4
FEDORA:FEDORA-2022-1358cedf2d
FEDORA:FEDORA-2022-17a1bb7e78
FEDORA:FEDORA-2022-20e87fb0d1
FEDORA:FEDORA-2022-2e1d1205cf
FEDORA:FEDORA-2022-4a69d20cf4
FEDORA:FEDORA-2022-4b0dfda810
FEDORA:FEDORA-2022-4c788bdc40
FEDORA:FEDORA-2022-5ad25e3d3c
FEDORA:FEDORA-2022-5ea8aa7518
FEDORA:FEDORA-2022-79843dfb3c
FEDORA:FEDORA-2022-9cd41b6709
FEDORA:FEDORA-2022-9da5703d22
FEDORA:FEDORA-2022-9dd70781cb
FEDORA:FEDORA-2022-a8e50dc83e
FEDORA:FEDORA-2022-b499f2a9c6
FEDORA:FEDORA-2022-ce55d01569
FEDORA:FEDORA-2022-cece1d07d9
FEDORA:FEDORA-2022-d157a91e10
FEDORA:FEDORA-2022-d1682fef04
FEDORA:FEDORA-2022-dbe9a8f9ac
FEDORA:FEDORA-2022-ec74ac4079
L3:63797
L3:64535
L3:65219
MISC:bugs.python.org:CVE-2015-20107
MISC:github.com:CVE-2015-20107
RHSA-2022:6457
RHSA-2022:6766
RHSA-2022:7581
RHSA-2022:7592
RHSA-2022:7593
RHSA-2022:8353
SMASH Issue 329033
bnc#1198511
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
https://security.gentoo.org/glsa/202305-02
jsc#CAR-1683
rh#2075390
CVE-2015-20109glibc:Already fixedmoderate ()CVE-2015-20109
D:CVE-2015-20109
SMASH Issue 370456
bnc#1212713
https://security.netapp.com/advisory/ntap-20230731-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=18036
rh#2217330
CVE-2015-2325perl:Already fixedmoderate ()APPLE:APPLE-SA-2010-03-29-1
APPLE:APPLE-SA-2016-03-21-1
APPLE:APPLE-SA-2016-03-21-2
APPLE:APPLE-SA-2016-03-21-3
APPLE:APPLE-SA-2016-03-21-5
APPLE:APPLE-SA-2016-05-16-4
APPLE:APPLE-SA-2016-07-18-1
APPLE:APPLE-SA-2016-07-18-2
APPLE:APPLE-SA-2016-07-18-3
APPLE:APPLE-SA-2016-07-18-4
APPLE:APPLE-SA-2016-07-18-6
APPLE:APPLE-SA-2016-09-20
BID:100503
BID:100514
BID:100861
BID:103144
BID:103415
BID:103782
BID:103796
BID:103846
BID:103848
BID:103954
BID:104222
BID:104764
BID:104765
BID:104768
BID:104773
BID:104774
BID:104775
BID:104780
BID:104782
BID:105117
BID:105118
BID:105126
BID:105587
BID:105590
BID:105591
BID:105597
BID:105601
BID:105602
BID:105608
BID:105615
BID:105617
BID:105619
BID:105622
BID:105624
BID:105635
BID:105637
BID:105647
BID:105656
BID:105658
BID:106619
BID:106622
BID:106625
BID:106626
BID:106627
BID:106628
BID:67121
BID:69257
BID:70142
BID:71206
BID:74073
BID:74075
BID:74078
BID:74081
BID:74085
BID:74095
BID:74112
BID:74924
BID:76157
BID:76187
BID:76282
BID:76289
BID:76291
BID:79091
BID:82307
BID:82990
BID:84220
BID:84223
BID:84271
BID:85572
BID:85576
BID:85801
BID:86957
BID:90876
BID:91067
BID:91068
BID:91081
BID:91566
BID:91787
BID:91869
BID:92115
BID:92127
BID:93132
BID:93287
BID:93604
BID:93612
BID:93614
BID:93685
BID:93687
BID:93697
BID:93711
BID:93718
BID:93744
BID:94371
BID:94377
BID:94925
BID:95131
BID:95429
BID:95849
BID:96389
BID:96392
BID:96409
BID:96410
BID:96434
BID:96435
BID:96436
BID:97102
BID:97791
BID:97848
BID:99046
BUGTRAQ:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
BUGTRAQ:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
CISCO:20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016
CONFIRM:access.redhat.com:CVE-2014-0114
CONFIRM:access.redhat.com:CVE-2014-3577
CONFIRM:access.redhat.com:CVE-2015-0293
CONFIRM:access.redhat.com:CVE-2015-3456
CONFIRM:advisories.mageia.org:CVE-2014-0114
CONFIRM:advisories.mageia.org:CVE-2014-4330
CONFIRM:advisories.mageia.org:CVE-2014-8964
CONFIRM:bto.bluecoat.com:CVE-2016-1950
CONFIRM:bto.bluecoat.com:CVE-2016-3191
CONFIRM:bto.bluecoat.com:CVE-2016-7052
CONFIRM:bugs.eclipse.org:CVE-2018-12539
CONFIRM:bugs.exim.org:CVE-2014-8964
CONFIRM:bugs.exim.org:CVE-2015-2328
CONFIRM:bugs.exim.org:CVE-2015-8381
CONFIRM:bugs.exim.org:CVE-2015-8382
CONFIRM:bugs.jython.org:CVE-2016-4000
CONFIRM:bugs.launchpad.net:CVE-2015-8866
CONFIRM:bugs.launchpad.net:CVE-2015-8867
CONFIRM:bugs.php.net:CVE-2015-8866
CONFIRM:bugs.php.net:CVE-2015-8867
CONFIRM:bugs.php.net:CVE-2015-8878
CONFIRM:bugs.php.net:CVE-2016-3141
CONFIRM:bugs.php.net:CVE-2016-4070
CONFIRM:bugs.php.net:CVE-2016-6294
CONFIRM:bugzilla.mozilla.org:CVE-2016-1950
CONFIRM:bugzilla.mozilla.org:CVE-2016-1955
CONFIRM:bugzilla.mozilla.org:CVE-2016-1956
CONFIRM:bugzilla.mozilla.org:CVE-2016-1959
CONFIRM:bugzilla.mozilla.org:CVE-2016-1967
CONFIRM:bugzilla.mozilla.org:CVE-2016-1968
CONFIRM:bugzilla.mozilla.org:CVE-2016-1969
CONFIRM:bugzilla.mozilla.org:CVE-2016-1970
CONFIRM:bugzilla.mozilla.org:CVE-2016-1971
CONFIRM:bugzilla.mozilla.org:CVE-2016-1972
CONFIRM:bugzilla.mozilla.org:CVE-2016-1973
CONFIRM:bugzilla.mozilla.org:CVE-2016-1975
CONFIRM:bugzilla.mozilla.org:CVE-2016-1976
CONFIRM:bugzilla.redhat.com:CVE-2015-7559
CONFIRM:bugzilla.redhat.com:CVE-2016-9583
CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-412672.pdf
CONFIRM:codereview.chromium.org:CVE-2016-1675
CONFIRM:codereview.chromium.org:CVE-2016-1676
CONFIRM:codereview.chromium.org:CVE-2016-1677
CONFIRM:codereview.chromium.org:CVE-2016-1678
CONFIRM:codereview.chromium.org:CVE-2016-1679
CONFIRM:codereview.chromium.org:CVE-2016-1680
CONFIRM:codereview.chromium.org:CVE-2016-1681
CONFIRM:codereview.chromium.org:CVE-2016-1682
CONFIRM:codereview.chromium.org:CVE-2016-1685
CONFIRM:codereview.chromium.org:CVE-2016-1686
CONFIRM:codereview.chromium.org:CVE-2016-1687
CONFIRM:codereview.chromium.org:CVE-2016-1688
CONFIRM:codereview.chromium.org:CVE-2016-1689
CONFIRM:codereview.chromium.org:CVE-2016-1691
CONFIRM:codereview.chromium.org:CVE-2016-1692
CONFIRM:codereview.chromium.org:CVE-2016-1693
CONFIRM:codereview.chromium.org:CVE-2016-1694
CONFIRM:codereview.chromium.org:CVE-2016-1701
CONFIRM:commons.apache.org:CVE-2014-0114
CONFIRM:crbug.com:CVE-2016-1672
CONFIRM:crbug.com:CVE-2016-1673
CONFIRM:crbug.com:CVE-2016-1674
CONFIRM:crbug.com:CVE-2016-1675
CONFIRM:crbug.com:CVE-2016-1676
CONFIRM:crbug.com:CVE-2016-1677
CONFIRM:crbug.com:CVE-2016-1678
CONFIRM:crbug.com:CVE-2016-1679
CONFIRM:crbug.com:CVE-2016-1680
CONFIRM:crbug.com:CVE-2016-1681
CONFIRM:crbug.com:CVE-2016-1682
CONFIRM:crbug.com:CVE-2016-1683
CONFIRM:crbug.com:CVE-2016-1684
CONFIRM:crbug.com:CVE-2016-1685
CONFIRM:crbug.com:CVE-2016-1686
CONFIRM:crbug.com:CVE-2016-1687
CONFIRM:crbug.com:CVE-2016-1688
CONFIRM:crbug.com:CVE-2016-1689
CONFIRM:crbug.com:CVE-2016-1690
CONFIRM:crbug.com:CVE-2016-1691
CONFIRM:crbug.com:CVE-2016-1692
CONFIRM:crbug.com:CVE-2016-1693
CONFIRM:crbug.com:CVE-2016-1694
CONFIRM:crbug.com:CVE-2016-1695
CONFIRM:curl.haxx.se:CVE-2016-0755
CONFIRM:curl.haxx.se:CVE-2018-1000121
CONFIRM:developer.mozilla.org:CVE-2016-1950
CONFIRM:git.gnome.org:CVE-2016-1683
CONFIRM:git.gnome.org:CVE-2016-1684
CONFIRM:git.gnupg.org:CVE-2017-9526
CONFIRM:git.php.net:CVE-2015-8382
CONFIRM:git.php.net:CVE-2015-8866
CONFIRM:git.php.net:CVE-2015-8867
CONFIRM:git.php.net:CVE-2016-3141
CONFIRM:git.php.net:CVE-2016-6294
CONFIRM:git.savannah.gnu.org:CVE-2014-9746
CONFIRM:git.savannah.gnu.org:CVE-2014-9747
CONFIRM:github.com:CVE-2013-7330
CONFIRM:github.com:CVE-2014-2058
CONFIRM:github.com:CVE-2014-2059
CONFIRM:github.com:CVE-2014-2061
CONFIRM:github.com:CVE-2014-2062
CONFIRM:github.com:CVE-2014-2063
CONFIRM:github.com:CVE-2014-2064
CONFIRM:github.com:CVE-2014-2065
CONFIRM:github.com:CVE-2014-2066
CONFIRM:github.com:CVE-2014-2067
CONFIRM:github.com:CVE-2014-2068
CONFIRM:github.com:CVE-2016-1182
CONFIRM:github.com:CVE-2016-4979
CONFIRM:github.com:CVE-2016-9389
CONFIRM:github.com:CVE-2016-9394
CONFIRM:github.com:CVE-2016-9583
CONFIRM:github.com:CVE-2016-9840
CONFIRM:github.com:CVE-2016-9841
CONFIRM:github.com:CVE-2016-9842
CONFIRM:github.com:CVE-2016-9843
CONFIRM:github.com:CVE-2017-1000071
CONFIRM:github.com:CVE-2017-14735
CONFIRM:googlechromereleases.blogspot.com:CVE-2016-1695
CONFIRM:h20566.www2.hpe.com:CVE-2016-0763
CONFIRM:h20566.www2.hpe.com:CVE-2016-2014
CONFIRM:h20566.www2.hpe.com:CVE-2016-2183
CONFIRM:h20566.www2.hpe.com:CVE-2016-5388
CONFIRM:h20566.www2.hpe.com:CVE-2016-5773
CONFIRM:h20566.www2.hpe.com:CVE-2016-6306
CONFIRM:h20566.www2.hpe.com:CVE-2016-8518
CONFIRM:h20566.www2.hpe.com:CVE-2017-5787
CONFIRM:hg.mozilla.org:CVE-2016-1975
CONFIRM:hg.python.org:CVE-2016-4000
CONFIRM:httpd.apache.org:CVE-2016-4979
CONFIRM:issues.apache.org:CVE-2014-0114
CONFIRM:issues.apache.org:CVE-2015-1832
CONFIRM:issues.apache.org:CVE-2015-7559
CONFIRM:issues.apache.org:CVE-2016-1000031
CONFIRM:jenkins.io:CVE-2017-1000403
CONFIRM:jira.mongodb.org:CVE-2015-2328
CONFIRM:kb.juniper.net:CVE-2015-3209
CONFIRM:kb.juniper.net:CVE-2016-7052
CONFIRM:kb.pulsesecure.net:CVE-2016-6306
CONFIRM:kc.mcafee.com:CVE-2016-6306
CONFIRM:mariadb.com:CVE-2015-2571
CONFIRM:metacpan.org:CVE-2014-4330
CONFIRM:nodejs.org:CVE-2016-7099
CONFIRM:nodesecurity.io:CVE-2013-7454
CONFIRM:nodesecurity.io:CVE-2014-9772
CONFIRM:nodesecurity.io:CVE-2015-8315
CONFIRM:nodesecurity.io:CVE-2015-8854
CONFIRM:nodesecurity.io:CVE-2015-8855
CONFIRM:nodesecurity.io:CVE-2015-8856
CONFIRM:nodesecurity.io:CVE-2015-8858
CONFIRM:nodesecurity.io:CVE-2015-8859
CONFIRM:nodesecurity.io:CVE-2015-8860
CONFIRM:nodesecurity.io:CVE-2015-8862
CONFIRM:nodesecurity.io:CVE-2016-4055
CONFIRM:php.net:CVE-2016-3142
CONFIRM:pivotal.io:CVE-2018-1258
CONFIRM:rwkbp.makekb.com:CVE-2015-8965
CONFIRM:security-tracker.debian.org:CVE-2016-1181
CONFIRM:security-tracker.debian.org:CVE-2016-1182
CONFIRM:security.netapp.com:CVE-2014-0114
CONFIRM:security.netapp.com:CVE-2015-2575
CONFIRM:security.netapp.com:CVE-2016-1000031
CONFIRM:security.netapp.com:CVE-2016-1182
CONFIRM:security.netapp.com:CVE-2016-9843
CONFIRM:security.netapp.com:CVE-2017-10388
CONFIRM:security.netapp.com:CVE-2017-5645
CONFIRM:security.netapp.com:CVE-2018-1305
CONFIRM:security.netapp.com:CVE-2018-2973
CONFIRM:security.netapp.com:CVE-2019-2435
CONFIRM:support.apple.com:CVE-2009-0689
CONFIRM:support.apple.com:CVE-2016-1950
CONFIRM:support.apple.com:CVE-2016-4073
CONFIRM:support.apple.com:CVE-2016-4616
CONFIRM:support.apple.com:CVE-2016-4653
CONFIRM:support.apple.com:CVE-2016-7582
CONFIRM:support.apple.com:CVE-2017-13873
CONFIRM:support.apple.com:CVE-2017-13877
CONFIRM:support.apple.com:CVE-2017-6464
CONFIRM:support.f5.com:CVE-2015-8854
CONFIRM:support.f5.com:CVE-2016-2178
CONFIRM:support.hpe.com:CVE-2016-6306
CONFIRM:support.hpe.com:CVE-2016-7052
CONFIRM:support.hpe.com:CVE-2018-2940
CONFIRM:support.hpe.com:CVE-2018-2973
CONFIRM:svn.apache.org:CVE-2012-6153
CONFIRM:svn.apache.org:CVE-2015-1832
CONFIRM:vcs.pcre.org:CVE-2015-8382
CONFIRM:vcs.pcre.org:CVE-2015-8395
CONFIRM:www-01.ibm.com:CVE-2014-0114
CONFIRM:www-01.ibm.com:CVE-2014-3022
CONFIRM:www-01.ibm.com:CVE-2015-1832
CONFIRM:www-01.ibm.com:CVE-2016-3191
CONFIRM:www-01.ibm.com:CVE-2016-7052
CONFIRM:www.exim.org:CVE-2014-8964
CONFIRM:www.huawei.com:CVE-2016-6306
CONFIRM:www.ibm.com:CVE-2014-0963
CONFIRM:www.ibm.com:CVE-2018-1656
CONFIRM:www.lsexperts.de:CVE-2014-4330
CONFIRM:www.mozilla.org:CVE-2016-1950
CONFIRM:www.mozilla.org:CVE-2016-1955
CONFIRM:www.mozilla.org:CVE-2016-1956
CONFIRM:www.mozilla.org:CVE-2016-1959
CONFIRM:www.mozilla.org:CVE-2016-1967
CONFIRM:www.mozilla.org:CVE-2016-1968
CONFIRM:www.mozilla.org:CVE-2016-1969
CONFIRM:www.mozilla.org:CVE-2016-1973
CONFIRM:www.mozilla.org:CVE-2016-1976
CONFIRM:www.oracle.com:CVE-2014-0114
CONFIRM:www.oracle.com:CVE-2014-4271
CONFIRM:www.oracle.com:CVE-2014-6564
CONFIRM:www.oracle.com:CVE-2015-0437
CONFIRM:www.oracle.com:CVE-2015-1351
CONFIRM:www.oracle.com:CVE-2015-2568
CONFIRM:www.oracle.com:CVE-2015-2579
CONFIRM:www.oracle.com:CVE-2015-4879
CONFIRM:www.oracle.com:CVE-2015-5722
CONFIRM:www.oracle.com:CVE-2015-8391
CONFIRM:www.oracle.com:CVE-2016-0778
CONFIRM:www.oracle.com:CVE-2016-2802
CONFIRM:www.oracle.com:CVE-2016-4957
CONFIRM:www.oracle.com:CVE-2016-5240
CONFIRM:www.oracle.com:CVE-2016-5477
CONFIRM:www.oracle.com:CVE-2016-6304
CONFIRM:www.oracle.com:CVE-2016-7039
CONFIRM:www.oracle.com:CVE-2016-7154
CONFIRM:www.oracle.com:CVE-2016-8296
CONFIRM:www.oracle.com:CVE-2017-10365
CONFIRM:www.oracle.com:CVE-2017-3626
CONFIRM:www.oracle.com:CVE-2017-3636
CONFIRM:www.oracle.com:CVE-2017-5689
CONFIRM:www.oracle.com:CVE-2017-5709
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CONFIRM:www.oracle.com:CVE-2018-18223
CONFIRM:www.oracle.com:CVE-2018-2639
CONFIRM:www.oracle.com:CVE-2018-2819
CONFIRM:www.oracle.com:CVE-2018-3081
CONFIRM:www.oracle.com:CVE-2018-3125
CONFIRM:www.pcre.org:CVE-2015-2325
CONFIRM:www.php.net:CVE-2009-3558
CONFIRM:www.php.net:CVE-2016-9935
CONFIRM:www.php.net:CVE-2016-9936
CONFIRM:www.splunk.com:CVE-2016-6304
CONFIRM:www.synology.com:CVE-2015-9104
CONFIRM:www.synology.com:CVE-2015-9105
CONFIRM:www.tenable.com:CVE-2016-4055
CONFIRM:www.tenable.com:CVE-2016-7052
CONFIRM:www.tenable.com:CVE-2016-8625
CONFIRM:www.tenable.com:CVE-2016-9260
CONFIRM:www.tenable.com:CVE-2016-9261
CONFIRM:www.vmware.com:CVE-2014-0114
CONFIRM:www.vmware.com:CVE-2014-8371
CONFIRM:x-stream.github.io:CVE-2013-7285
CVE-2009-3559
CVE-2012-6153
CVE-2013-7285
CVE-2013-7451
CVE-2013-7452
CVE-2013-7453
CVE-2013-7454
CVE-2014-0114
CVE-2014-0245
CVE-2014-3540
CVE-2014-4172
CVE-2014-4330
CVE-2014-4651
CVE-2014-7192
CVE-2014-8964
CVE-2014-9745
CVE-2014-9746
CVE-2014-9747
CVE-2014-9772
CVE-2015-0405
CVE-2015-0423
CVE-2015-0433
CVE-2015-0438
CVE-2015-0439
CVE-2015-0441
CVE-2015-0498
CVE-2015-0499
CVE-2015-0500
CVE-2015-0501
CVE-2015-0503
CVE-2015-0505
CVE-2015-0506
CVE-2015-0507
CVE-2015-0508
CVE-2015-0511
CVE-2015-0852
CVE-2015-1832
CVE-2015-2325
CVE-2015-2326
CVE-2015-2327
CVE-2015-2328
CVE-2015-2566
CVE-2015-2567
CVE-2015-2568
CVE-2015-2571
CVE-2015-2573
CVE-2015-2575
CVE-2015-2576
CVE-2015-2613
CVE-2015-5125
CVE-2015-5127
CVE-2015-5128
CVE-2015-5129
CVE-2015-5130
CVE-2015-5131
CVE-2015-5132
CVE-2015-5134
CVE-2015-5328
CVE-2015-5539
CVE-2015-5540
CVE-2015-5541
CVE-2015-5544
CVE-2015-5545
CVE-2015-5551
CVE-2015-5552
CVE-2015-5553
CVE-2015-5554
CVE-2015-5555
CVE-2015-5556
CVE-2015-5557
CVE-2015-5558
CVE-2015-5559
CVE-2015-5560
CVE-2015-5561
CVE-2015-5564
CVE-2015-5565
CVE-2015-5566
CVE-2015-7559
CVE-2015-7940
CVE-2015-8315
CVE-2015-8381
CVE-2015-8382
CVE-2015-8383
CVE-2015-8384
CVE-2015-8385
CVE-2015-8386
CVE-2015-8387
CVE-2015-8388
CVE-2015-8389
CVE-2015-8390
CVE-2015-8391
CVE-2015-8392
CVE-2015-8393
CVE-2015-8394
CVE-2015-8395
CVE-2015-8854
CVE-2015-8855
CVE-2015-8856
CVE-2015-8857
CVE-2015-8858
CVE-2015-8859
CVE-2015-8860
CVE-2015-8861
CVE-2015-8862
CVE-2015-8878
CVE-2015-8965
CVE-2015-9104
CVE-2015-9105
CVE-2015-9251
CVE-2016-0635
CVE-2016-0755
CVE-2016-1000031
CVE-2016-1181
CVE-2016-1182
CVE-2016-1672
CVE-2016-1673
CVE-2016-1674
CVE-2016-1675
CVE-2016-1676
CVE-2016-1677
CVE-2016-1678
CVE-2016-1679
CVE-2016-1680
CVE-2016-1681
CVE-2016-1682
CVE-2016-1683
CVE-2016-1684
CVE-2016-1685
CVE-2016-1686
CVE-2016-1687
CVE-2016-1688
CVE-2016-1689
CVE-2016-1690
CVE-2016-1691
CVE-2016-1692
CVE-2016-1693
CVE-2016-1694
CVE-2016-1695
CVE-2016-1950
CVE-2016-1955
CVE-2016-1956
CVE-2016-1959
CVE-2016-1967
CVE-2016-1968
CVE-2016-1969
CVE-2016-1970
CVE-2016-1971
CVE-2016-1972
CVE-2016-1973
CVE-2016-1975
CVE-2016-1976
CVE-2016-2178
CVE-2016-2515
CVE-2016-2537
CVE-2016-3141
CVE-2016-3142
CVE-2016-4000
CVE-2016-4055
CVE-2016-4070
CVE-2016-4612
CVE-2016-4619
CVE-2016-4979
CVE-2016-5483
CVE-2016-5501
CVE-2016-5538
CVE-2016-5605
CVE-2016-5608
CVE-2016-5610
CVE-2016-5611
CVE-2016-5616
CVE-2016-5617
CVE-2016-5684
CVE-2016-6293
CVE-2016-6294
CVE-2016-6814
CVE-2016-9389
CVE-2016-9392
CVE-2016-9583
CVE-2016-9840
CVE-2016-9841
CVE-2016-9842
CVE-2017-0379
CVE-2017-13745
CVE-2017-14229
CVE-2017-14735
CVE-2017-15095
CVE-2017-16012
CVE-2017-3454
CVE-2017-3468
CVE-2017-9526
CVE-2018-1000121
CVE-2018-12539
CVE-2018-1258
CVE-2018-1517
CVE-2018-1656
CVE-2018-2767
CVE-2018-2797
CVE-2018-2815
CVE-2018-2825
CVE-2018-2826
CVE-2018-2909
CVE-2018-2938
CVE-2018-2940
CVE-2018-2941
CVE-2018-2952
CVE-2018-2964
CVE-2018-2972
CVE-2018-2973
CVE-2018-3005
CVE-2018-3055
CVE-2018-3085
CVE-2018-3086
CVE-2018-3087
CVE-2018-3088
CVE-2018-3089
CVE-2018-3090
CVE-2018-3091
CVE-2018-3127
CVE-2018-3134
CVE-2018-3136
CVE-2018-3139
CVE-2018-3149
CVE-2018-3150
CVE-2018-3169
CVE-2018-3180
CVE-2018-3183
CVE-2018-3209
CVE-2018-3211
CVE-2018-3214
CVE-2018-3287
CVE-2018-3288
CVE-2018-3289
CVE-2018-3290
CVE-2018-3291
CVE-2018-3292
CVE-2018-3293
CVE-2018-3294
CVE-2018-3295
CVE-2018-3296
CVE-2018-3297
CVE-2018-3298
CVE-2019-2422
CVE-2019-2426
CVE-2019-2449
CVE-2019-2455
CVE-2019-2481
CVE-2019-2482
CVE-2019-2503
CVE-2019-2507
CVE-2019-2510
CVE-2019-2513
CVE-2019-2528
CVE-2019-2529
CVE-2019-2530
CVE-2019-2531
CVE-2019-2532
CVE-2019-2533
CVE-2019-2534
CVE-2019-2535
CVE-2019-2536
CVE-2019-2537
CVE-2019-2539
CVE-2019-2540
CVE-2024-2466
D:CVE-2015-2301
D:CVE-2015-2571
D:CVE-2015-2573
D:CVE-2015-2575
D:CVE-2015-2576
D:CVE-2015-5557
D:CVE-2015-5558
D:CVE-2015-5559
D:CVE-2015-5560
D:CVE-2015-5561
D:CVE-2015-5562
D:CVE-2015-5563
D:CVE-2015-5564
D:CVE-2015-5565
D:CVE-2015-8386
D:CVE-2015-8387
D:CVE-2015-8388
D:CVE-2015-8389
D:CVE-2015-8390
D:CVE-2015-8391
D:CVE-2015-8392
D:CVE-2015-8393
D:CVE-2015-8394
D:CVE-2015-8395
D:CVE-2015-9105
D:CVE-2016-1674
D:CVE-2016-1682
D:CVE-2016-1694
D:CVE-2016-1695
D:CVE-2016-1950
D:CVE-2016-1970
D:CVE-2016-1973
D:CVE-2016-2178
D:CVE-2016-3141
D:CVE-2016-3142
D:CVE-2016-4055
D:CVE-2016-5608
D:CVE-2016-5610
D:CVE-2016-6293
D:CVE-2016-6294
D:CVE-2017-9526
D:CVE-2018-1517
D:CVE-2018-1656
D:CVE-2018-3297
D:CVE-2018-3298
D:CVE-2022-2590
DEBIAN:DSA-3959
DEBIAN:DSA-4136
DEBIAN:DSA-4268
DEBIAN:DSA-4281
DEBIAN:DSA-4341
DSA-2940
DSA-3229
DSA-3311
DSA-3370
DSA-3392
DSA-3417
DSA-3455
DSA-3510
DSA-3520
DSA-3590
DSA-3605
DSA-3621
DSA-3631
DSA-3673
DSA-3688
DSA-3725
DSA-3880
DSA-3893
DSA-4136
DSA-4281
DSA-5378
EXPLOIT-DB:37852
EXPLOIT-DB:37854
EXPLOIT-DB:37855
EXPLOIT-DB:37856
EXPLOIT-DB:37857
EXPLOIT-DB:37859
EXPLOIT-DB:37861
FEDORA:FEDORA-2014-11453
FEDORA:FEDORA-2014-15573
FEDORA:FEDORA-2014-17624
FEDORA:FEDORA-2014-17626
FEDORA:FEDORA-2014-17642
FEDORA:FEDORA-2014-9380
FEDORA:FEDORA-2015-16104
FEDORA:FEDORA-2015-16105
FEDORA:FEDORA-2015-16106
FEDORA:FEDORA-2015-7d95466eda
FEDORA:FEDORA-2015-992342e82f
FEDORA:FEDORA-2015-decbab7c9f
FEDORA:FEDORA-2015-eb896290d3
FEDORA:FEDORA-2016-3fa315a5dd
FEDORA:FEDORA-2016-55137a3adb
FEDORA:FEDORA-2016-57bebab3b6
FEDORA:FEDORA-2016-5a141de5d9
FREEBSD:FreeBSD-SA-16:26
FULLDISC:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
FULLDISC:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
FULLDISC:20160706 CVE-2016-4979: HTTPD webserver - X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs]
FULLDISC:20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities
GENTOO:GLSA-201507-19
GENTOO:GLSA-201605-06
GENTOO:GLSA-201607-02
GENTOO:GLSA-201607-07
GENTOO:GLSA-201607-09
GENTOO:GLSA-201610-02
GENTOO:GLSA-201612-16
GENTOO:GLSA-201612-27
GENTOO:GLSA-201701-56
GENTOO:GLSA-201701-68
GENTOO:GLSA-201710-28
GLSA-201908-24
GLSA-202007-54
HP:HPSBGN03041
HP:HPSBMU03090
HP:HPSBST03160
IBM Security Bulletin 0713459 (Cognos Business Intelligence)
IBM Security Bulletin 0713487 (Rational Collaborative Lifecycle Management)
IBM Security Bulletin 0715641 (Cognos Business Intelligence)
IBM Security Bulletin 0715721 (Agile Lifecycle Manager)
IBM Security Bulletin 0716285 (Cognos TM1)
IBM Security Bulletin 0716289 (Cognos Insight)
IBM Security Bulletin 0717693 (Tivoli Monitoring V6)
IBM Security Bulletin 0717727 (Tivoli Monitoring V6)
IBM Security Bulletin 0717895 (Rational Business Developer)
IBM Security Bulletin 0718381 (Platform Symphony)
IBM Security Bulletin 0718421 (InfoSphere Guardium Data Redaction)
IBM Security Bulletin 0718447 (Cognos Planning)
IBM Security Bulletin 0718949 (Cloud Manager with Openstack)
IBM Security Bulletin 0719163 (Rational Reporting for Development Intelligence)
IBM Security Bulletin 0719165 (Rational Insight)
IBM Security Bulletin 0720115 (Spectrum Conductor with Spark)
IBM Security Bulletin 0728577 (Content Classification)
IBM Security Bulletin 0729341 (ILOG CPLEX Optimization Studio)
IBM Security Bulletin 0729343 (Decision Optimization Center)
IBM Security Bulletin 0729607 (WebSphere Application Server)
IBM Security Bulletin 0735319 (Tivoli System Automation Application Manager)
IBM Security Bulletin 0735477 (Spectrum Conductor)
IBM Security Bulletin 0737281 (Application Delivery Intelligence)
IBM Security Bulletin 0738853 (Tivoli Monitoring V6)
IBM Security Bulletin 0739057 (Sterling Connect:Direct for Microsoft Windows)
IBM Security Bulletin 0739549 (Sterling Connect:Direct File Agent)
IBM Security Bulletin 0739701 (Sterling Connect:Direct FTP+)
IBM Security Bulletin 0739763 (Sterling Connect:Direct for UNIX)
IBM Security Bulletin 0743351 (Workload Scheduler)
IBM Security Bulletin 0792275 (Tivoli Netcool/Impact)
IBM Security Bulletin 2015806 (Runtimes for Java Technology)
IBM Security Bulletin 2016406 (Decision Optimization Center)
IBM Security Bulletin 2016663 (Tivoli Netcool OMNIbus)
IBM Security Bulletin 2016776 (Content Collector)
IBM Security Bulletin 2016781 (Content Collector for SAP Applications)
IBM Security Bulletin 2016827 (MessageSight)
IBM Security Bulletin 2017431 (PureApplication System)
IBM Security Bulletin 2017432 (PureApplication System)
IBM Security Bulletin 2017449 (Web Experience Factory)
IBM Security Bulletin 2017554 (Rational Software Architect)
IBM Security Bulletin 715641 (Cognos Business Intelligence Server)
IBM Security Bulletin 717121 (Cognos Controller)
IBM Security Bulletin 717125 (MQ Appliance)
IBM Security Bulletin 719933 (Tivoli Application Dependency Discovery Manager)
IBM Security Bulletin 720173 (Transformation Extender)
IBM Security Bulletin 725491 (DB2 for Linux, UNIX and Windows)
IBM Security Bulletin 726009 (DataPower Gateways)
IBM Security Bulletin 728399 (WebSphere Service Registry and Repository)
IBM Security Bulletin 728567 (Algo Credit Manager)
IBM Security Bulletin 728607 (PureApplication System)
IBM Security Bulletin 729116 (Spectrum Protect Plus)
IBM Security Bulletin 729699 (QRadar SIEM)
IBM Security Bulletin 729745 (WebSphere Application Server Patterns)
IBM Security Bulletin 730083 (Rational ClearCase)
IBM Security Bulletin 730311 (Cognos Command Center)
IBM Security Bulletin 730799 (Spectrum Control Standard Edition)
IBM Security Bulletin 730909 (AIX family)
IBM Security Bulletin 731323 (Financial Transaction Manager)
IBM Security Bulletin 731325 (Financial Transaction Manager)
IBM Security Bulletin 731329 (i)
IBM Security Bulletin 731331 (Financial Transaction Manager)
IBM Security Bulletin 731337 (Financial Transaction Manager)
IBM Security Bulletin 731339 (Financial Transaction Manager)
IBM Security Bulletin 731419 (Rational Software Architect Designer)
IBM Security Bulletin 731507 (Rational Software Architect Design Manager)
IBM Security Bulletin 731615 (Process Designer)
IBM Security Bulletin 731641 (InfoSphere Guardium Data Redaction)
IBM Security Bulletin 731875 (FileNet System Monitor)
IBM Security Bulletin 732375 (Initiate Master Data Service)
IBM Security Bulletin 732455 (Rational Performance Tester)
IBM Security Bulletin 732457 (Rational Service Tester for SOA Quality)
IBM Security Bulletin 732723 (Tivoli Application Dependency Discovery Manager)
IBM Security Bulletin 732753 (Agile Lifecycle Manager)
IBM Security Bulletin 732785 (Security Guardium)
IBM Security Bulletin 732846 (Spectrum Symphony)
IBM Security Bulletin 732850 (App Connect Enterprise)
IBM Security Bulletin 732896 (Planning Analytics)
IBM Security Bulletin 732932 (SPSS Statistics)
IBM Security Bulletin 733068 (Liberty for Java for Bluemix)
IBM Security Bulletin 733457 (Tivoli Netcool/OMNIbus)
IBM Security Bulletin 733543 (Tivoli Netcool/Impact)
IBM Security Bulletin 733845 (Integration Designer)
IBM Security Bulletin 733857 (Rational DOORS Web Access)
IBM Security Bulletin 733869 (DataPower Gateways)
IBM Security Bulletin 733905 (Rational Application Developer for WebSphere Software)
IBM Security Bulletin 734161 (WebSphere Application Server in Cloud)
IBM Security Bulletin 734595 (Rational Build Forge)
IBM Security Bulletin 735325 (Tivoli System Automation for Multiplatforms)
IBM Security Bulletin 735421 (MessageSight)
IBM Security Bulletin 735481 (Rational Directory Server)
IBM Security Bulletin 735515 (Rational Host On-Demand)
IBM Security Bulletin 735541 (Rational Method Composer)
IBM Security Bulletin 735551 (Runtimes for Java Technology)
IBM Security Bulletin 735807 (Tivoli Monitoring V6)
IBM Security Bulletin 737495 (Cloud App Management)
IBM Security Bulletin 737775 (Web Experience Factory)
IBM Security Bulletin 737813 (Content Collector for SAP Applications)
IBM Security Bulletin 738337 (Monitoring)
IBM Security Bulletin 738347 (Rational Publishing Engine)
IBM Security Bulletin 738633 (WebSphere Service Registry and Repository)
IBM Security Bulletin 738729 (Installation Manager)
IBM Security Bulletin 738743 (Rational Developer for i)
IBM Security Bulletin 738905 (Cognos Insight)
IBM Security Bulletin 738907 (Cognos TM1)
IBM Security Bulletin 738985 (WebSphere MQ)
IBM Security Bulletin 738997 (MQ)
IBM Security Bulletin 739183 (http://www.ibm.com/support/docview.wss?uid=ibm10739183)
IBM Security Bulletin 739227 (Cloud Orchestrator)
IBM Security Bulletin 739231 (Algo Credit Manager)
IBM Security Bulletin 739251 (Decision Optimization Center)
IBM Security Bulletin 739261 (Monitoring)
IBM Security Bulletin 739387 (Spectrum Protect for Virtual Environments)
IBM Security Bulletin 739455 (Spectrum Protect Snapshot)
IBM Security Bulletin 739941 (Content Collector)
IBM Security Bulletin 739985 (WebSphere Application Server Patterns)
IBM Security Bulletin 740269 (Notes)
IBM Security Bulletin 740383 (Sterling Connect:Direct Browser User Interface)
IBM Security Bulletin 740419 (Security Access Manager Appliance)
IBM Security Bulletin 740447 (Operational Decision Manager)
IBM Security Bulletin 740467 (Tivoli Storage Manager FastBack)
IBM Security Bulletin 740673 (Control Center)
IBM Security Bulletin 741745 (Tivoli Composite Application Manager (ITCAM) for Transactions)
IBM Security Bulletin 742369 (Security SiteProtector System)
IBM Security Bulletin 742729 (QRadar SIEM)
IBM Security Bulletin 743071 (Rational Asset Analyzer)
IBM Security Bulletin 743149 (Financial Transaction Manager)
IBM Security Bulletin 743157 (Financial Transaction Manager)
IBM Security Bulletin 743193 (Spectrum Protect)
IBM Security Bulletin 743961 (Rational Publishing Engine)
IBM Security Bulletin 744823 (Rational Collaborative Lifecycle Management)
IBM Security Bulletin 787583 (API Connect)
IBM Security Bulletin 787833 (AIX family)
IBM Security Bulletin 788277 (WebSphere Cast Iron)
IBM Security Bulletin 789805 (WebSphere MQ)
IBM Security Bulletin 791171 (Rational DOORS Web Access)
IBM Security Bulletin 791855 (WebSphere eXtreme Scale)
IBM Security Bulletin 791861 (WebSphere DataPower XC10 Appliance)
IBM Security Bulletin 792239 (Cloud Manager with Openstack)
IBM Security Bulletin T1027807 (AIX family)
JVN:JVN#03188560
JVN:JVN#65044642
JVNDB:JVNDB-2016-000096
JVNDB:JVNDB-2016-000097
L3:42159
L3:44989
L3:45334
L3:45906
L3:47274
L3:53225
MANDRIVA:MDVSA-2009:302
MANDRIVA:MDVSA-2014:095
MANDRIVA:MDVSA-2015:002
MANDRIVA:MDVSA-2015:136
MANDRIVA:MDVSA-2015:137
MANDRIVA:MDVSA-2015:227
MISC:access.redhat.com:CVE-2014-0245
MISC:access.redhat.com:MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MISC:blog.diniscruz.com:CVE-2013-7285
MISC:blogs.gentoo.org:CVE-2016-9399
MISC:bugs.exim.org:CVE-2015-2325
MISC:bugs.exim.org:CVE-2015-2326
MISC:bugs.launchpad.net:MLIST:[oss-security] 20150911 CVE Request: 2 FreeType issues
MISC:bugs.php.net:CVE-2009-3559
MISC:bugs.php.net:MISC:www.openwall.com
MISC:bugzilla.redhat.com:CVE-2014-0245
MISC:curl.haxx.se
MISC:curl.haxx.se:OSS:2018/Q1/235
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:developer.mozilla.org:CVE-2016-1979
MISC:eprint.iacr.org:CVE-2016-2178
MISC:eprint.iacr.org:CVE-2017-0379
MISC:exchange.xforce.ibmcloud.com:CVE-2014-4172
MISC:fortiguard.com:CVE-2015-2325
MISC:fortiguard.com:CVE-2015-2326
MISC:git.gnupg.org:CVE-2017-0379
MISC:git.openssl.org:MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MISC:github.com:CVE-2014-4172
MISC:github.com:CVE-2015-9251
MISC:github.com:CVE-2017-14229
MISC:github.com:MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
MISC:github.com:OSS:2018/Q1/235
MISC:github.com:OSS:2024/Q1/256
MISC:ics-cert.us-cert.gov:CVE-2015-9251
MISC:issues.apache.org:CVE-2014-4651
MISC:issues.jasig.org:CVE-2014-4172
MISC:lists.apache.org:CVE-2018-1305
MISC:lists.debian.org:CVE-2017-0379
MISC:lists.fedoraproject.org:CVE-2014-4172
MISC:mail-archives.apache.org:CVE-2016-6814
MISC:nodesecurity.io:CVE-2014-10064
MISC:nodesecurity.io:CVE-2015-8857
MISC:nodesecurity.io:MLIST:[oss-security] 20160420 various vulnerabilities in Node.js packages
MISC:packetstormsecurity.com:CVE-2014-4330
MISC:packetstormsecurity.com:CVE-2016-0755
MISC:packetstormsecurity.com:CVE-2016-4979
MISC:savannah.nongnu.org:CVE-2014-9747
MISC:seclists.org:CVE-2014-4651
MISC:security-tracker.debian.org:CVE-2016-4000
MISC:security-tracker.debian.org:CVE-2017-0379
MISC:snyk.io:CVE-2015-9251
MISC:snyk.io:CVE-2016-4000
MISC:sw.aveva.com:CVE-2015-9251
MISC:web-in-security.blogspot.ca:CVE-2015-7940
MISC:web.archive.org:CVE-2013-7285
MISC:wiki.mozilla.org:CVE-2016-9843
MISC:www.arista.com:CVE-2016-6306
MISC:www.debian.org:CVE-2014-4172
MISC:www.fortiguard.com:CVE-2015-2327
MISC:www.fortiguard.com:CVE-2015-2328
MISC:www.fortiguard.com:CVE-2015-9104
MISC:www.fortiguard.com:CVE-2015-9105
MISC:www.mail-archive.com:CVE-2014-4172
MISC:www.openssl.org:CVE-2016-6302
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2014-0107
MISC:www.oracle.com:CVE-2015-7501
MISC:www.oracle.com:CVE-2016-1000031
MISC:www.sourceclear.com:CVE-2015-8861
MISC:www.talosintelligence.com:CVE-2016-5684
MISC:www.tenable.com:CVE-2016-1000031
MISC:www.tenable.com:CVE-2016-6793
MLIST:[activemq-issues] 20190718 [jira] [Updated] (AMQ-7236) SEV-1 Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring framework) and xstream-1.4.10.jar
MLIST:[activemq-issues] 20190826 [jira] [Created] (AMQ-7288) Security Vulnerabilities in ActiveMQ dependent libraries.
MLIST:[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior
MLIST:[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114
MLIST:[debian-lts-announce] 20180306 [SECURITY] [DLA 1301-1] tomcat7 security update
MLIST:[debian-lts-announce] 20180318 [SECURITY] [DLA 1309-1] curl security update
MLIST:[debian-lts-announce] 20180627 [SECURITY] [DLA 1400-1] tomcat7 security update
MLIST:[debian-lts-announce] 20180729 [SECURITY] [DLA 1450-1] tomcat8 security update
MLIST:[debian-lts-announce] 20181105 [SECURITY] [DLA 1566-1] mysql-5.5 security update
MLIST:[debian-lts-announce] 20181122 [SECURITY] [DLA 1590-1] openjdk-7 security update
MLIST:[debian-lts-announce] 20190201 [SECURITY] [DLA 1655-1] mariadb-10.0 security update
MLIST:[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update
MLIST:[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update
MLIST:[flink-dev] 20190811 Apache flink 1.7.2 security issues
MLIST:[flink-user] 20190811 Apache flink 1.7.2 security issues
MLIST:[flink-user] 20190813 Apache flink 1.7.2 security issues
MLIST:[flink-user] 20190813 Re: Apache flink 1.7.2 security issues
MLIST:[oss-security] 20091120 CVE request: php 5.3.1 update
MLIST:[oss-security] 20091120 Re: CVE request: php 5.3.1 update
MLIST:[oss-security] 20140109 Re: CVE request: remote code execution via deserialization in XStream
MLIST:[oss-security] 20140220 Re: Possible CVE Requests: several issues fixed in Jenkins (Advisory 2014-02-14)
MLIST:[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE
MLIST:[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE
MLIST:[oss-security] 20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
MLIST:[oss-security] 20141121 Re: CVE request: heap buffer overflow in PCRE
MLIST:[oss-security] 20150804 Re: CVE Request: Information disclosure in pcre
MLIST:[oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp
MLIST:[oss-security] 20150911 CVE Request: 2 FreeType issues
MLIST:[oss-security] 20150925 Re: CVE Request: 2 FreeType issues
MLIST:[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle
MLIST:[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle
MLIST:[oss-security] 20151128 Re: Heap Overflow in PCRE
MLIST:[oss-security] 20160420 various vulnerabilities in Node.js packages
MLIST:[oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases
MLIST:[oss-security] 20160608 CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MLIST:[oss-security] 20160609 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MLIST:[oss-security] 20160705 CVE-2016-4979: HTTPD webserver - X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs]
MLIST:[oss-security] 20161117 Re: jasper: multiple assertion failures
MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
MLIST:[perl.perl5.porters] 20140918 fix for CVE-2014-4330 present in blead
MLIST:[php-announce] 20091119 5.3.1 Release announcement
MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
MLIST:[xstream-user] 20130717 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper
MLIST:[xstream-user] 20130718 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper
OSS:2015/Q4/414
OSS:2015/Q4/419
OSS:2015/Q4/422
OSS:2016/Q1/258
OSS:2016/Q1/625
OSS:2016/Q1/626
OSS:2016/Q2/122
OSS:2016/Q2/493
OSS:2016/Q3/137
OSS:2016/Q4/602
OSS:2017/Q2/418
OSS:2017/Q4/297
OSS:2017/Q4/298
OSS:2017/Q4/299
OSS:2017/Q4/300
OSS:2017/Q4/301
OSS:2017/Q4/59
OSS:2017/Q4/60
OSS:2018/Q1/174
OSS:2018/Q1/235
OSS:2018/Q2/21
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/11/10/2
OSS:2022/Q3/99
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2024/03/27/4
OSS:2024/Q1/256
Oracle:CVE-2011-4461
Oracle:CVE-2013-1768
Oracle:CVE-2014-0114
Oracle:CVE-2014-3490
Oracle:CVE-2014-3577
Oracle:CVE-2015-0204
Oracle:CVE-2015-0235
Oracle:CVE-2015-0405
Oracle:CVE-2015-0423
Oracle:CVE-2015-0433
Oracle:CVE-2015-0438
Oracle:CVE-2015-0439
Oracle:CVE-2015-0441
Oracle:CVE-2015-0498
Oracle:CVE-2015-0499
Oracle:CVE-2015-0500
Oracle:CVE-2015-0501
Oracle:CVE-2015-0503
Oracle:CVE-2015-0505
Oracle:CVE-2015-0506
Oracle:CVE-2015-0507
Oracle:CVE-2015-0508
Oracle:CVE-2015-0511
Oracle:CVE-2015-1832
Oracle:CVE-2015-2566
Oracle:CVE-2015-2567
Oracle:CVE-2015-2568
Oracle:CVE-2015-2571
Oracle:CVE-2015-2573
Oracle:CVE-2015-2575
Oracle:CVE-2015-2576
Oracle:CVE-2015-5600
Oracle:CVE-2015-6937
Oracle:CVE-2015-7501
Oracle:CVE-2015-7940
Oracle:CVE-2015-8965
Oracle:CVE-2015-9251
Oracle:CVE-2016-0635
Oracle:CVE-2016-0714
Oracle:CVE-2016-0729
Oracle:CVE-2016-1000031
Oracle:CVE-2016-1181
Oracle:CVE-2016-1182
Oracle:CVE-2016-1950
Oracle:CVE-2016-2099
Oracle:CVE-2016-2107
Oracle:CVE-2016-2176
Oracle:CVE-2016-2179
Oracle:CVE-2016-2183
Oracle:CVE-2016-3092
Oracle:CVE-2016-3506
Oracle:CVE-2016-4000
Oracle:CVE-2016-4055
Oracle:CVE-2016-4979
Oracle:CVE-2016-5007
Oracle:CVE-2016-5019
Oracle:CVE-2016-5080
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2016-5501
Oracle:CVE-2016-5538
Oracle:CVE-2016-5605
Oracle:CVE-2016-5608
Oracle:CVE-2016-5610
Oracle:CVE-2016-5611
Oracle:CVE-2016-5616
Oracle:CVE-2016-5617
Oracle:CVE-2016-5684
Oracle:CVE-2016-6304
Oracle:CVE-2016-6814
Oracle:CVE-2016-7103
Oracle:CVE-2016-7167
Oracle:CVE-2016-9583
Oracle:CVE-2016-9841
Oracle:CVE-2016-9843
Oracle:CVE-2016-9878
Oracle:CVE-2017-0379
Oracle:CVE-2017-10068
Oracle:CVE-2017-12617
Oracle:CVE-2017-13077
Oracle:CVE-2017-13745
Oracle:CVE-2017-14229
Oracle:CVE-2017-14735
Oracle:CVE-2017-15095
Oracle:CVE-2017-17562
Oracle:CVE-2017-3454
Oracle:CVE-2017-3468
Oracle:CVE-2017-3633
Oracle:CVE-2017-3732
Oracle:CVE-2017-3736
Oracle:CVE-2017-3737
Oracle:CVE-2017-5533
Oracle:CVE-2017-5645
Oracle:CVE-2017-5662
Oracle:CVE-2017-5664
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-6074
Oracle:CVE-2017-7525
Oracle:CVE-2017-7805
Oracle:CVE-2017-9798
Oracle:CVE-2018-0732
Oracle:CVE-2018-0734
Oracle:CVE-2018-0739
Oracle:CVE-2018-1000120
Oracle:CVE-2018-1000300
Oracle:CVE-2018-10933
Oracle:CVE-2018-11039
Oracle:CVE-2018-1171
Oracle:CVE-2018-11776
Oracle:CVE-2018-1258
Oracle:CVE-2018-1275
Oracle:CVE-2018-1305
Oracle:CVE-2018-13785
Oracle:CVE-2018-1656
Oracle:CVE-2018-2562
Oracle:CVE-2018-2563
Oracle:CVE-2018-2572
Oracle:CVE-2018-2587
Oracle:CVE-2018-2598
Oracle:CVE-2018-2612
Oracle:CVE-2018-2622
Oracle:CVE-2018-2628
Oracle:CVE-2018-2640
Oracle:CVE-2018-2665
Oracle:CVE-2018-2668
Oracle:CVE-2018-2676
Oracle:CVE-2018-2685
Oracle:CVE-2018-2686
Oracle:CVE-2018-2687
Oracle:CVE-2018-2688
Oracle:CVE-2018-2689
Oracle:CVE-2018-2690
Oracle:CVE-2018-2693
Oracle:CVE-2018-2694
Oracle:CVE-2018-2698
Oracle:CVE-2018-2718
Oracle:CVE-2018-2737
Oracle:CVE-2018-2738
Oracle:CVE-2018-2739
Oracle:CVE-2018-2742
Oracle:CVE-2018-2746
Oracle:CVE-2018-2747
Oracle:CVE-2018-2748
Oracle:CVE-2018-2749
Oracle:CVE-2018-2750
Oracle:CVE-2018-2752
Oracle:CVE-2018-2753
Oracle:CVE-2018-2754
Oracle:CVE-2018-2755
Oracle:CVE-2018-2756
Oracle:CVE-2018-2758
Oracle:CVE-2018-2759
Oracle:CVE-2018-2760
Oracle:CVE-2018-2761
Oracle:CVE-2018-2762
Oracle:CVE-2018-2763
Oracle:CVE-2018-2764
Oracle:CVE-2018-2765
Oracle:CVE-2018-2766
Oracle:CVE-2018-2767
Oracle:CVE-2018-2768
Oracle:CVE-2018-2769
Oracle:CVE-2018-2770
Oracle:CVE-2018-2771
Oracle:CVE-2018-2772
Oracle:CVE-2018-2773
Oracle:CVE-2018-2774
Oracle:CVE-2018-2775
Oracle:CVE-2018-2776
Oracle:CVE-2018-2777
Oracle:CVE-2018-2778
Oracle:CVE-2018-2779
Oracle:CVE-2018-2780
Oracle:CVE-2018-2781
Oracle:CVE-2018-2782
Oracle:CVE-2018-2783
Oracle:CVE-2018-2784
Oracle:CVE-2018-2785
Oracle:CVE-2018-2786
Oracle:CVE-2018-2787
Oracle:CVE-2018-2788
Oracle:CVE-2018-2789
Oracle:CVE-2018-2790
Oracle:CVE-2018-2791
Oracle:CVE-2018-2792
Oracle:CVE-2018-2793
Oracle:CVE-2018-2794
Oracle:CVE-2018-2795
Oracle:CVE-2018-2796
Oracle:CVE-2018-2797
Oracle:CVE-2018-2798
Oracle:CVE-2018-2799
Oracle:CVE-2018-2800
Oracle:CVE-2018-2801
Oracle:CVE-2018-2804
Oracle:CVE-2018-2805
Oracle:CVE-2018-2806
Oracle:CVE-2018-2807
Oracle:CVE-2018-2808
Oracle:CVE-2018-2809
Oracle:CVE-2018-2810
Oracle:CVE-2018-2811
Oracle:CVE-2018-2812
Oracle:CVE-2018-2813
Oracle:CVE-2018-2814
Oracle:CVE-2018-2815
Oracle:CVE-2018-2816
Oracle:CVE-2018-2817
Oracle:CVE-2018-2818
Oracle:CVE-2018-2819
Oracle:CVE-2018-2820
Oracle:CVE-2018-2821
Oracle:CVE-2018-2822
Oracle:CVE-2018-2823
Oracle:CVE-2018-2825
Oracle:CVE-2018-2826
Oracle:CVE-2018-2827
Oracle:CVE-2018-2828
Oracle:CVE-2018-2830
Oracle:CVE-2018-2831
Oracle:CVE-2018-2832
Oracle:CVE-2018-2834
Oracle:CVE-2018-2835
Oracle:CVE-2018-2836
Oracle:CVE-2018-2837
Oracle:CVE-2018-2838
Oracle:CVE-2018-2839
Oracle:CVE-2018-2840
Oracle:CVE-2018-2841
Oracle:CVE-2018-2842
Oracle:CVE-2018-2843
Oracle:CVE-2018-2844
Oracle:CVE-2018-2845
Oracle:CVE-2018-2846
Oracle:CVE-2018-2849
Oracle:CVE-2018-2850
Oracle:CVE-2018-2852
Oracle:CVE-2018-2854
Oracle:CVE-2018-2855
Oracle:CVE-2018-2856
Oracle:CVE-2018-2857
Oracle:CVE-2018-2858
Oracle:CVE-2018-2859
Oracle:CVE-2018-2860
Oracle:CVE-2018-2861
Oracle:CVE-2018-2862
Oracle:CVE-2018-2863
Oracle:CVE-2018-2864
Oracle:CVE-2018-2865
Oracle:CVE-2018-2866
Oracle:CVE-2018-2867
Oracle:CVE-2018-2868
Oracle:CVE-2018-2869
Oracle:CVE-2018-2870
Oracle:CVE-2018-2871
Oracle:CVE-2018-2872
Oracle:CVE-2018-2873
Oracle:CVE-2018-2874
Oracle:CVE-2018-2876
Oracle:CVE-2018-2877
Oracle:CVE-2018-2878
Oracle:CVE-2018-2879
Oracle:CVE-2018-2881
Oracle:CVE-2018-2882
Oracle:CVE-2018-2887
Oracle:CVE-2018-2888
Oracle:CVE-2018-2889
Oracle:CVE-2018-2891
Oracle:CVE-2018-2892
Oracle:CVE-2018-2893
Oracle:CVE-2018-2894
Oracle:CVE-2018-2895
Oracle:CVE-2018-2896
Oracle:CVE-2018-2897
Oracle:CVE-2018-2898
Oracle:CVE-2018-2899
Oracle:CVE-2018-2900
Oracle:CVE-2018-2901
Oracle:CVE-2018-2902
Oracle:CVE-2018-2903
Oracle:CVE-2018-2904
Oracle:CVE-2018-2905
Oracle:CVE-2018-2906
Oracle:CVE-2018-2907
Oracle:CVE-2018-2908
Oracle:CVE-2018-2909
Oracle:CVE-2018-2911
Oracle:CVE-2018-2912
Oracle:CVE-2018-2913
Oracle:CVE-2018-2914
Oracle:CVE-2018-2915
Oracle:CVE-2018-2916
Oracle:CVE-2018-2917
Oracle:CVE-2018-2918
Oracle:CVE-2018-2919
Oracle:CVE-2018-2920
Oracle:CVE-2018-2921
Oracle:CVE-2018-2922
Oracle:CVE-2018-2923
Oracle:CVE-2018-2924
Oracle:CVE-2018-2925
Oracle:CVE-2018-2926
Oracle:CVE-2018-2927
Oracle:CVE-2018-2928
Oracle:CVE-2018-2929
Oracle:CVE-2018-2930
Oracle:CVE-2018-2932
Oracle:CVE-2018-2933
Oracle:CVE-2018-2934
Oracle:CVE-2018-2935
Oracle:CVE-2018-2936
Oracle:CVE-2018-2937
Oracle:CVE-2018-2938
Oracle:CVE-2018-2939
Oracle:CVE-2018-2940
Oracle:CVE-2018-2941
Oracle:CVE-2018-2942
Oracle:CVE-2018-2943
Oracle:CVE-2018-2944
Oracle:CVE-2018-2945
Oracle:CVE-2018-2946
Oracle:CVE-2018-2947
Oracle:CVE-2018-2948
Oracle:CVE-2018-2949
Oracle:CVE-2018-2950
Oracle:CVE-2018-2951
Oracle:CVE-2018-2952
Oracle:CVE-2018-2953
Oracle:CVE-2018-2954
Oracle:CVE-2018-2955
Oracle:CVE-2018-2956
Oracle:CVE-2018-2957
Oracle:CVE-2018-2958
Oracle:CVE-2018-2959
Oracle:CVE-2018-2960
Oracle:CVE-2018-2961
Oracle:CVE-2018-2962
Oracle:CVE-2018-2963
Oracle:CVE-2018-2964
Oracle:CVE-2018-2965
Oracle:CVE-2018-2966
Oracle:CVE-2018-2967
Oracle:CVE-2018-2968
Oracle:CVE-2018-2969
Oracle:CVE-2018-2970
Oracle:CVE-2018-2971
Oracle:CVE-2018-2972
Oracle:CVE-2018-2973
Oracle:CVE-2018-2974
Oracle:CVE-2018-2975
Oracle:CVE-2018-2976
Oracle:CVE-2018-2977
Oracle:CVE-2018-2979
Oracle:CVE-2018-2980
Oracle:CVE-2018-2981
Oracle:CVE-2018-2982
Oracle:CVE-2018-2984
Oracle:CVE-2018-2985
Oracle:CVE-2018-2986
Oracle:CVE-2018-2987
Oracle:CVE-2018-2988
Oracle:CVE-2018-2989
Oracle:CVE-2018-2990
Oracle:CVE-2018-2991
Oracle:CVE-2018-2992
Oracle:CVE-2018-2993
Oracle:CVE-2018-2994
Oracle:CVE-2018-2995
Oracle:CVE-2018-2996
Oracle:CVE-2018-2997
Oracle:CVE-2018-2998
Oracle:CVE-2018-2999
Oracle:CVE-2018-3000
Oracle:CVE-2018-3001
Oracle:CVE-2018-3002
Oracle:CVE-2018-3003
Oracle:CVE-2018-3004
Oracle:CVE-2018-3005
Oracle:CVE-2018-3006
Oracle:CVE-2018-3007
Oracle:CVE-2018-3008
Oracle:CVE-2018-3009
Oracle:CVE-2018-3010
Oracle:CVE-2018-3011
Oracle:CVE-2018-3012
Oracle:CVE-2018-3013
Oracle:CVE-2018-3014
Oracle:CVE-2018-3015
Oracle:CVE-2018-3016
Oracle:CVE-2018-3017
Oracle:CVE-2018-3018
Oracle:CVE-2018-3019
Oracle:CVE-2018-3020
Oracle:CVE-2018-3021
Oracle:CVE-2018-3022
Oracle:CVE-2018-3023
Oracle:CVE-2018-3024
Oracle:CVE-2018-3025
Oracle:CVE-2018-3026
Oracle:CVE-2018-3027
Oracle:CVE-2018-3028
Oracle:CVE-2018-3029
Oracle:CVE-2018-3030
Oracle:CVE-2018-3031
Oracle:CVE-2018-3032
Oracle:CVE-2018-3033
Oracle:CVE-2018-3034
Oracle:CVE-2018-3035
Oracle:CVE-2018-3036
Oracle:CVE-2018-3037
Oracle:CVE-2018-3038
Oracle:CVE-2018-3039
Oracle:CVE-2018-3040
Oracle:CVE-2018-3041
Oracle:CVE-2018-3042
Oracle:CVE-2018-3043
Oracle:CVE-2018-3044
Oracle:CVE-2018-3045
Oracle:CVE-2018-3046
Oracle:CVE-2018-3047
Oracle:CVE-2018-3048
Oracle:CVE-2018-3049
Oracle:CVE-2018-3050
Oracle:CVE-2018-3051
Oracle:CVE-2018-3052
Oracle:CVE-2018-3053
Oracle:CVE-2018-3054
Oracle:CVE-2018-3055
Oracle:CVE-2018-3056
Oracle:CVE-2018-3057
Oracle:CVE-2018-3058
Oracle:CVE-2018-3059
Oracle:CVE-2018-3060
Oracle:CVE-2018-3061
Oracle:CVE-2018-3062
Oracle:CVE-2018-3063
Oracle:CVE-2018-3064
Oracle:CVE-2018-3065
Oracle:CVE-2018-3066
Oracle:CVE-2018-3067
Oracle:CVE-2018-3068
Oracle:CVE-2018-3069
Oracle:CVE-2018-3070
Oracle:CVE-2018-3071
Oracle:CVE-2018-3072
Oracle:CVE-2018-3073
Oracle:CVE-2018-3074
Oracle:CVE-2018-3075
Oracle:CVE-2018-3076
Oracle:CVE-2018-3077
Oracle:CVE-2018-3078
Oracle:CVE-2018-3079
Oracle:CVE-2018-3080
Oracle:CVE-2018-3081
Oracle:CVE-2018-3082
Oracle:CVE-2018-3084
Oracle:CVE-2018-3085
Oracle:CVE-2018-3086
Oracle:CVE-2018-3087
Oracle:CVE-2018-3088
Oracle:CVE-2018-3089
Oracle:CVE-2018-3090
Oracle:CVE-2018-3091
Oracle:CVE-2018-3092
Oracle:CVE-2018-3093
Oracle:CVE-2018-3094
Oracle:CVE-2018-3095
Oracle:CVE-2018-3096
Oracle:CVE-2018-3097
Oracle:CVE-2018-3098
Oracle:CVE-2018-3099
Oracle:CVE-2018-3100
Oracle:CVE-2018-3101
Oracle:CVE-2018-3102
Oracle:CVE-2018-3103
Oracle:CVE-2018-3104
Oracle:CVE-2018-3105
Oracle:CVE-2018-3108
Oracle:CVE-2018-3109
Oracle:CVE-2018-3115
Oracle:CVE-2018-3122
Oracle:CVE-2018-3125
Oracle:CVE-2018-3126
Oracle:CVE-2018-3127
Oracle:CVE-2018-3128
Oracle:CVE-2018-3129
Oracle:CVE-2018-3130
Oracle:CVE-2018-3131
Oracle:CVE-2018-3132
Oracle:CVE-2018-3133
Oracle:CVE-2018-3134
Oracle:CVE-2018-3135
Oracle:CVE-2018-3136
Oracle:CVE-2018-3137
Oracle:CVE-2018-3138
Oracle:CVE-2018-3139
Oracle:CVE-2018-3140
Oracle:CVE-2018-3141
Oracle:CVE-2018-3142
Oracle:CVE-2018-3143
Oracle:CVE-2018-3144
Oracle:CVE-2018-3145
Oracle:CVE-2018-3146
Oracle:CVE-2018-3147
Oracle:CVE-2018-3148
Oracle:CVE-2018-3149
Oracle:CVE-2018-3150
Oracle:CVE-2018-3151
Oracle:CVE-2018-3152
Oracle:CVE-2018-3153
Oracle:CVE-2018-3154
Oracle:CVE-2018-3155
Oracle:CVE-2018-3156
Oracle:CVE-2018-3157
Oracle:CVE-2018-3158
Oracle:CVE-2018-3159
Oracle:CVE-2018-3160
Oracle:CVE-2018-3161
Oracle:CVE-2018-3162
Oracle:CVE-2018-3163
Oracle:CVE-2018-3164
Oracle:CVE-2018-3165
Oracle:CVE-2018-3166
Oracle:CVE-2018-3167
Oracle:CVE-2018-3168
Oracle:CVE-2018-3169
Oracle:CVE-2018-3170
Oracle:CVE-2018-3171
Oracle:CVE-2018-3172
Oracle:CVE-2018-3173
Oracle:CVE-2018-3174
Oracle:CVE-2018-3175
Oracle:CVE-2018-3176
Oracle:CVE-2018-3177
Oracle:CVE-2018-3178
Oracle:CVE-2018-3179
Oracle:CVE-2018-3180
Oracle:CVE-2018-3181
Oracle:CVE-2018-3182
Oracle:CVE-2018-3183
Oracle:CVE-2018-3184
Oracle:CVE-2018-3185
Oracle:CVE-2018-3186
Oracle:CVE-2018-3187
Oracle:CVE-2018-3188
Oracle:CVE-2018-3189
Oracle:CVE-2018-3190
Oracle:CVE-2018-3191
Oracle:CVE-2018-3192
Oracle:CVE-2018-3193
Oracle:CVE-2018-3194
Oracle:CVE-2018-3195
Oracle:CVE-2018-3196
Oracle:CVE-2018-3197
Oracle:CVE-2018-3198
Oracle:CVE-2018-3200
Oracle:CVE-2018-3201
Oracle:CVE-2018-3202
Oracle:CVE-2018-3203
Oracle:CVE-2018-3204
Oracle:CVE-2018-3205
Oracle:CVE-2018-3206
Oracle:CVE-2018-3207
Oracle:CVE-2018-3208
Oracle:CVE-2018-3209
Oracle:CVE-2018-3210
Oracle:CVE-2018-3211
Oracle:CVE-2018-3212
Oracle:CVE-2018-3213
Oracle:CVE-2018-3214
Oracle:CVE-2018-3215
Oracle:CVE-2018-3217
Oracle:CVE-2018-3218
Oracle:CVE-2018-3219
Oracle:CVE-2018-3220
Oracle:CVE-2018-3221
Oracle:CVE-2018-3222
Oracle:CVE-2018-3223
Oracle:CVE-2018-3224
Oracle:CVE-2018-3225
Oracle:CVE-2018-3226
Oracle:CVE-2018-3227
Oracle:CVE-2018-3228
Oracle:CVE-2018-3229
Oracle:CVE-2018-3230
Oracle:CVE-2018-3231
Oracle:CVE-2018-3232
Oracle:CVE-2018-3233
Oracle:CVE-2018-3234
Oracle:CVE-2018-3235
Oracle:CVE-2018-3236
Oracle:CVE-2018-3237
Oracle:CVE-2018-3238
Oracle:CVE-2018-3239
Oracle:CVE-2018-3241
Oracle:CVE-2018-3242
Oracle:CVE-2018-3243
Oracle:CVE-2018-3244
Oracle:CVE-2018-3245
Oracle:CVE-2018-3246
Oracle:CVE-2018-3247
Oracle:CVE-2018-3248
Oracle:CVE-2018-3249
Oracle:CVE-2018-3250
Oracle:CVE-2018-3251
Oracle:CVE-2018-3252
Oracle:CVE-2018-3253
Oracle:CVE-2018-3254
Oracle:CVE-2018-3255
Oracle:CVE-2018-3256
Oracle:CVE-2018-3257
Oracle:CVE-2018-3258
Oracle:CVE-2018-3259
Oracle:CVE-2018-3261
Oracle:CVE-2018-3262
Oracle:CVE-2018-3263
Oracle:CVE-2018-3264
Oracle:CVE-2018-3265
Oracle:CVE-2018-3266
Oracle:CVE-2018-3267
Oracle:CVE-2018-3268
Oracle:CVE-2018-3269
Oracle:CVE-2018-3270
Oracle:CVE-2018-3271
Oracle:CVE-2018-3272
Oracle:CVE-2018-3273
Oracle:CVE-2018-3274
Oracle:CVE-2018-3275
Oracle:CVE-2018-3276
Oracle:CVE-2018-3277
Oracle:CVE-2018-3278
Oracle:CVE-2018-3279
Oracle:CVE-2018-3280
Oracle:CVE-2018-3281
Oracle:CVE-2018-3282
Oracle:CVE-2018-3283
Oracle:CVE-2018-3284
Oracle:CVE-2018-3285
Oracle:CVE-2018-3286
Oracle:CVE-2018-3287
Oracle:CVE-2018-3288
Oracle:CVE-2018-3289
Oracle:CVE-2018-3290
Oracle:CVE-2018-3291
Oracle:CVE-2018-3292
Oracle:CVE-2018-3293
Oracle:CVE-2018-3294
Oracle:CVE-2018-3295
Oracle:CVE-2018-3296
Oracle:CVE-2018-3297
Oracle:CVE-2018-3298
Oracle:CVE-2018-3299
Oracle:CVE-2018-3301
Oracle:CVE-2018-3302
Oracle:CVE-2018-3303
Oracle:CVE-2018-3304
Oracle:CVE-2018-3305
Oracle:CVE-2018-3309
Oracle:CVE-2018-3311
Oracle:CVE-2018-3639
Oracle:CVE-2018-7489
Oracle:CVE-2018-8013
Oracle:CVE-2018-8014
Oracle:CVE-2018-8037
Oracle:CVE-2019-10173
Oracle:CVE-2019-2395
Oracle:CVE-2019-2396
Oracle:CVE-2019-2397
Oracle:CVE-2019-2398
Oracle:CVE-2019-2399
Oracle:CVE-2019-2400
Oracle:CVE-2019-2401
Oracle:CVE-2019-2402
Oracle:CVE-2019-2403
Oracle:CVE-2019-2404
Oracle:CVE-2019-2405
Oracle:CVE-2019-2406
Oracle:CVE-2019-2407
Oracle:CVE-2019-2408
Oracle:CVE-2019-2409
Oracle:CVE-2019-2410
Oracle:CVE-2019-2411
Oracle:CVE-2019-2412
Oracle:CVE-2019-2413
Oracle:CVE-2019-2414
Oracle:CVE-2019-2415
Oracle:CVE-2019-2416
Oracle:CVE-2019-2417
Oracle:CVE-2019-2418
Oracle:CVE-2019-2419
Oracle:CVE-2019-2420
Oracle:CVE-2019-2421
Oracle:CVE-2019-2422
Oracle:CVE-2019-2423
Oracle:CVE-2019-2425
Oracle:CVE-2019-2426
Oracle:CVE-2019-2427
Oracle:CVE-2019-2429
Oracle:CVE-2019-2430
Oracle:CVE-2019-2431
Oracle:CVE-2019-2432
Oracle:CVE-2019-2433
Oracle:CVE-2019-2434
Oracle:CVE-2019-2435
Oracle:CVE-2019-2436
Oracle:CVE-2019-2437
Oracle:CVE-2019-2438
Oracle:CVE-2019-2439
Oracle:CVE-2019-2440
Oracle:CVE-2019-2441
Oracle:CVE-2019-2442
Oracle:CVE-2019-2443
Oracle:CVE-2019-2444
Oracle:CVE-2019-2445
Oracle:CVE-2019-2446
Oracle:CVE-2019-2447
Oracle:CVE-2019-2448
Oracle:CVE-2019-2449
Oracle:CVE-2019-2450
Oracle:CVE-2019-2451
Oracle:CVE-2019-2452
Oracle:CVE-2019-2453
Oracle:CVE-2019-2455
Oracle:CVE-2019-2456
Oracle:CVE-2019-2457
Oracle:CVE-2019-2458
Oracle:CVE-2019-2459
Oracle:CVE-2019-2460
Oracle:CVE-2019-2461
Oracle:CVE-2019-2462
Oracle:CVE-2019-2463
Oracle:CVE-2019-2464
Oracle:CVE-2019-2465
Oracle:CVE-2019-2466
Oracle:CVE-2019-2467
Oracle:CVE-2019-2468
Oracle:CVE-2019-2469
Oracle:CVE-2019-2470
Oracle:CVE-2019-2471
Oracle:CVE-2019-2472
Oracle:CVE-2019-2473
Oracle:CVE-2019-2474
Oracle:CVE-2019-2475
Oracle:CVE-2019-2476
Oracle:CVE-2019-2477
Oracle:CVE-2019-2478
Oracle:CVE-2019-2479
Oracle:CVE-2019-2480
Oracle:CVE-2019-2481
Oracle:CVE-2019-2482
Oracle:CVE-2019-2485
Oracle:CVE-2019-2486
Oracle:CVE-2019-2487
Oracle:CVE-2019-2488
Oracle:CVE-2019-2489
Oracle:CVE-2019-2490
Oracle:CVE-2019-2491
Oracle:CVE-2019-2492
Oracle:CVE-2019-2493
Oracle:CVE-2019-2494
Oracle:CVE-2019-2495
Oracle:CVE-2019-2496
Oracle:CVE-2019-2497
Oracle:CVE-2019-2498
Oracle:CVE-2019-2499
Oracle:CVE-2019-2500
Oracle:CVE-2019-2501
Oracle:CVE-2019-2502
Oracle:CVE-2019-2503
Oracle:CVE-2019-2504
Oracle:CVE-2019-2505
Oracle:CVE-2019-2506
Oracle:CVE-2019-2507
Oracle:CVE-2019-2508
Oracle:CVE-2019-2509
Oracle:CVE-2019-2510
Oracle:CVE-2019-2511
Oracle:CVE-2019-2512
Oracle:CVE-2019-2513
Oracle:CVE-2019-2519
Oracle:CVE-2019-2520
Oracle:CVE-2019-2521
Oracle:CVE-2019-2522
Oracle:CVE-2019-2523
Oracle:CVE-2019-2524
Oracle:CVE-2019-2525
Oracle:CVE-2019-2526
Oracle:CVE-2019-2527
Oracle:CVE-2019-2528
Oracle:CVE-2019-2529
Oracle:CVE-2019-2530
Oracle:CVE-2019-2531
Oracle:CVE-2019-2532
Oracle:CVE-2019-2533
Oracle:CVE-2019-2534
Oracle:CVE-2019-2535
Oracle:CVE-2019-2536
Oracle:CVE-2019-2537
Oracle:CVE-2019-2538
Oracle:CVE-2019-2539
Oracle:CVE-2019-2540
Oracle:CVE-2019-2541
Oracle:CVE-2019-2543
Oracle:CVE-2019-2544
Oracle:CVE-2019-2545
Oracle:CVE-2019-2546
Oracle:CVE-2019-2547
Oracle:CVE-2019-2548
Oracle:CVE-2019-2549
Oracle:CVE-2019-2550
Oracle:CVE-2019-2552
Oracle:CVE-2019-2553
Oracle:CVE-2019-2554
Oracle:CVE-2019-2555
Oracle:CVE-2019-2556
RH:CVE-2009-3559
RH:CVE-2012-6153
RH:CVE-2013-7285
RH:CVE-2014-3540
RH:CVE-2014-4330
RH:CVE-2014-4651
RH:CVE-2014-8964
RH:CVE-2014-9746
RH:CVE-2014-9747
RH:CVE-2015-0405
RH:CVE-2015-0423
RH:CVE-2015-0433
RH:CVE-2015-0438
RH:CVE-2015-0439
RH:CVE-2015-0441
RH:CVE-2015-0498
RH:CVE-2015-0499
RH:CVE-2015-0500
RH:CVE-2015-0501
RH:CVE-2015-0503
RH:CVE-2015-0505
RH:CVE-2015-0506
RH:CVE-2015-0507
RH:CVE-2015-0508
RH:CVE-2015-0511
RH:CVE-2015-2325
RH:CVE-2015-2326
RH:CVE-2015-2327
RH:CVE-2015-2328
RH:CVE-2015-2566
RH:CVE-2015-2567
RH:CVE-2015-2568
RH:CVE-2015-2571
RH:CVE-2015-2573
RH:CVE-2015-2575
RH:CVE-2015-2576
RH:CVE-2015-5125
RH:CVE-2015-5127
RH:CVE-2015-5129
RH:CVE-2015-5130
RH:CVE-2015-5131
RH:CVE-2015-5132
RH:CVE-2015-5134
RH:CVE-2015-5539
RH:CVE-2015-5540
RH:CVE-2015-5541
RH:CVE-2015-5544
RH:CVE-2015-5545
RH:CVE-2015-5551
RH:CVE-2015-5552
RH:CVE-2015-5553
RH:CVE-2015-5554
RH:CVE-2015-5555
RH:CVE-2015-5556
RH:CVE-2015-5557
RH:CVE-2015-5558
RH:CVE-2015-5559
RH:CVE-2015-5560
RH:CVE-2015-5561
RH:CVE-2015-5564
RH:CVE-2015-5565
RH:CVE-2015-5566
RH:CVE-2015-7559
RH:CVE-2015-8315
RH:CVE-2015-8381
RH:CVE-2015-8382
RH:CVE-2015-8383
RH:CVE-2015-8384
RH:CVE-2015-8385
RH:CVE-2015-8386
RH:CVE-2015-8387
RH:CVE-2015-8388
RH:CVE-2015-8389
RH:CVE-2015-8390
RH:CVE-2015-8391
RH:CVE-2015-8392
RH:CVE-2015-8393
RH:CVE-2015-8394
RH:CVE-2015-8395
RH:CVE-2015-8855
RH:CVE-2015-8860
RH:CVE-2016-0755
RH:CVE-2016-1672
RH:CVE-2016-1673
RH:CVE-2016-1674
RH:CVE-2016-1675
RH:CVE-2016-1676
RH:CVE-2016-1677
RH:CVE-2016-1678
RH:CVE-2016-1679
RH:CVE-2016-1680
RH:CVE-2016-1681
RH:CVE-2016-1682
RH:CVE-2016-1683
RH:CVE-2016-1684
RH:CVE-2016-1685
RH:CVE-2016-1686
RH:CVE-2016-1687
RH:CVE-2016-1688
RH:CVE-2016-1689
RH:CVE-2016-1690
RH:CVE-2016-1691
RH:CVE-2016-1692
RH:CVE-2016-1693
RH:CVE-2016-1694
RH:CVE-2016-1695
RH:CVE-2016-1950
RH:CVE-2016-1955
RH:CVE-2016-1956
RH:CVE-2016-1959
RH:CVE-2016-1967
RH:CVE-2016-1968
RH:CVE-2016-1969
RH:CVE-2016-1970
RH:CVE-2016-1971
RH:CVE-2016-1972
RH:CVE-2016-1973
RH:CVE-2016-1975
RH:CVE-2016-1976
RH:CVE-2016-3141
RH:CVE-2016-4055
RH:CVE-2016-4070
RH:CVE-2016-4979
RH:CVE-2016-5616
RH:CVE-2016-5617
RH:CVE-2016-6293
RH:CVE-2016-6294
RH:CVE-2016-9840
RH:CVE-2016-9841
RH:CVE-2016-9842
RH:CVE-2016-9843
RH:CVE-2017-16012
RH:CVE-2017-3454
RH:CVE-2017-3468
RH:CVE-2017-9526
RH:CVE-2018-1000121
RH:CVE-2018-12539
RH:CVE-2018-1305
RH:CVE-2018-1517
RH:CVE-2018-1656
RH:CVE-2018-2767
RH:CVE-2018-2938
RH:CVE-2018-2940
RH:CVE-2018-2952
RH:CVE-2018-2964
RH:CVE-2018-2973
RH:CVE-2019-2455
RH:CVE-2019-2481
RH:CVE-2019-2482
RH:CVE-2019-2503
RH:CVE-2019-2507
RH:CVE-2019-2510
RH:CVE-2019-2513
RH:CVE-2019-2528
RH:CVE-2019-2529
RH:CVE-2019-2530
RH:CVE-2019-2531
RH:CVE-2019-2532
RH:CVE-2019-2533
RH:CVE-2019-2534
RH:CVE-2019-2535
RH:CVE-2019-2536
RH:CVE-2019-2537
RH:CVE-2019-2539
RHBA-2015:1659
RHBA-2015:1762
RHBA-2015:1763
RHBA-2015:2142
RHBA-2019:0327
RHSA-2014:0216
RHSA-2014:0294
RHSA-2014:0323
RHSA-2014:0371
RHSA-2014:0372
RHSA-2014:0374
RHSA-2014:0389
RHSA-2014:0452
RHSA-2014:0474
RHSA-2014:0497
RHSA-2014:0498
RHSA-2014:0500
RHSA-2014:0511
RHSA-2014:0702
RHSA-2014:1007
RHSA-2014:1059
RHSA-2014:1082
RHSA-2014:1098
RHSA-2014:1146
RHSA-2014:1162
RHSA-2014:1163
RHSA-2014:1166
RHSA-2014:1320
RHSA-2014:1321
RHSA-2014:1322
RHSA-2014:1323
RHSA-2014:1833
RHSA-2014:1834
RHSA-2014:1835
RHSA-2014:1836
RHSA-2014:1891
RHSA-2014:1892
RHSA-2014:1904
RHSA-2014:2019
RHSA-2014:2020
RHSA-2015:0125
RHSA-2015:0158
RHSA-2015:0234
RHSA-2015:0235
RHSA-2015:0330
RHSA-2015:0675
RHSA-2015:0720
RHSA-2015:0765
RHSA-2015:0850
RHSA-2015:0851
RHSA-2015:1009
RHSA-2015:1176
RHSA-2015:1177
RHSA-2015:1603
RHSA-2015:1628
RHSA-2015:1629
RHSA-2015:1646
RHSA-2015:1647
RHSA-2015:1665
RHSA-2015:1888
RHSA-2016:0197
RHSA-2016:0370
RHSA-2016:0371
RHSA-2016:0373
RHSA-2016:0495
RHSA-2016:1025
RHSA-2016:1132
RHSA-2016:1190
RHSA-2016:1420
RHSA-2016:1773
RHSA-2016:1931
RHSA-2016:1940
RHSA-2016:2035
RHSA-2016:2036
RHSA-2016:2130
RHSA-2016:2131
RHSA-2016:2595
RHSA-2016:2749
RHSA-2016:2750
RHSA-2016:2927
RHSA-2016:2928
RHSA-2016:2957
RHSA-2017:0184
RHSA-2017:0193
RHSA-2017:0194
RHSA-2017:0272
RHSA-2017:0868
RHSA-2017:1208
RHSA-2017:1220
RHSA-2017:1221
RHSA-2017:1222
RHSA-2017:1658
RHSA-2017:1659
RHSA-2017:2192
RHSA-2017:2486
RHSA-2017:2596
RHSA-2017:2787
RHSA-2017:2886
RHSA-2017:2999
RHSA-2017:3046
RHSA-2017:3047
RHSA-2017:3189
RHSA-2017:3190
RHSA-2017:3453
RHSA-2018:0279
RHSA-2018:0342
RHSA-2018:0465
RHSA-2018:0466
RHSA-2018:0478
RHSA-2018:0479
RHSA-2018:0480
RHSA-2018:0481
RHSA-2018:0501
RHSA-2018:0574
RHSA-2018:0576
RHSA-2018:0577
RHSA-2018:1320
RHSA-2018:1447
RHSA-2018:1448
RHSA-2018:1449
RHSA-2018:1450
RHSA-2018:1451
RHSA-2018:2241
RHSA-2018:2242
RHSA-2018:2253
RHSA-2018:2254
RHSA-2018:2255
RHSA-2018:2256
RHSA-2018:2283
RHSA-2018:2286
RHSA-2018:2439
RHSA-2018:2568
RHSA-2018:2569
RHSA-2018:2575
RHSA-2018:2576
RHSA-2018:2669
RHSA-2018:2712
RHSA-2018:2713
RHSA-2018:2729
RHSA-2018:2927
RHSA-2018:2939
RHSA-2018:3007
RHSA-2018:3008
RHSA-2018:3157
RHSA-2018:3558
RHSA-2019:1258
RHSA-2019:1543
RHSA-2019:1822
RHSA-2019:1823
RHSA-2019:2205
RHSA-2019:2327
RHSA-2019:2413
RHSA-2019:2484
RHSA-2019:2511
RHSA-2019:2995
RHSA-2019:3708
RHSA-2019:3892
RHSA-2019:4352
RHSA-2020:0445
RHSA-2020:0544
RHSA-2020:0594
RHSA-2020:0727
RHSA-2020:0983
RHSA-2020:5663
SECTRACK ID: 1041302
SECTRACK:1032121
SECTRACK:1034077
SECTRACK:1034882
SECTRACK:1035215
SECTRACK:1035255
SECTRACK:1035981
SECTRACK:1036054
SECTRACK:1036056
SECTRACK:1036225
SECTRACK:1036377
SECTRACK:1036378
SECTRACK:1036393
SECTRACK:1036397
SECTRACK:1037036
SECTRACK:1037046
SECTRACK:1037053
SECTRACK:1037640
SECTRACK:1039427
SECTRACK:1039596
SECTRACK:1039600
SECTRACK:1040428
SECTRACK:1040529
SECTRACK:1041294
SECTRACK:1041296
SECTRACK:1041302
SECTRACK:1041765
SECTRACK:1041887
SECTRACK:1041888
SECTRACK:1041896
SECUNIA:57477
SECUNIA:58710
SECUNIA:58851
SECUNIA:58947
SECUNIA:59014
SECUNIA:59118
SECUNIA:59228
SECUNIA:59245
SECUNIA:59246
SECUNIA:59430
SECUNIA:59464
SECUNIA:59479
SECUNIA:59480
SECUNIA:59704
SECUNIA:59718
SECUNIA:60177
SECUNIA:60703
SECUNIA:61441
SECUNIA:61961
SLACKWARE:SSA:2016-039-01
SMASH Issue 106174
SMASH Issue 106399
SMASH Issue 110951
SMASH Issue 115321
SMASH Issue 115322
SMASH Issue 115944
SMASH Issue 115951
SMASH Issue 116060
SMASH Issue 121091
SMASH Issue 122403
SMASH Issue 157079
SMASH Issue 157080
SMASH Issue 159315
SMASH Issue 159316
SMASH Issue 159358
SMASH Issue 159359
SMASH Issue 159360
SMASH Issue 159361
SMASH Issue 159362
SMASH Issue 159363
SMASH Issue 159364
SMASH Issue 159365
SMASH Issue 159366
SMASH Issue 159367
SMASH Issue 159368
SMASH Issue 159369
SMASH Issue 159370
SMASH Issue 159501
SMASH Issue 161165
SMASH Issue 161277
SMASH Issue 162768
SMASH Issue 162800
SMASH Issue 162870
SMASH Issue 163266
SMASH Issue 163267
SMASH Issue 168106
SMASH Issue 168107
SMASH Issue 168108
SMASH Issue 168109
SMASH Issue 168110
SMASH Issue 168111
SMASH Issue 168112
SMASH Issue 168113
SMASH Issue 168114
SMASH Issue 168115
SMASH Issue 168116
SMASH Issue 168117
SMASH Issue 168118
SMASH Issue 168119
SMASH Issue 168120
SMASH Issue 169465
SMASH Issue 169466
SMASH Issue 169472
SMASH Issue 169820
SMASH Issue 169849
SMASH Issue 170598
SMASH Issue 173284
SMASH Issue 173285
SMASH Issue 173743
SMASH Issue 173744
SMASH Issue 173746
SMASH Issue 173747
SMASH Issue 173748
SMASH Issue 173749
SMASH Issue 177157
SMASH Issue 177158
SMASH Issue 177160
SMASH Issue 177997
SMASH Issue 180273
SMASH Issue 183803
SMASH Issue 183804
SMASH Issue 183903
SMASH Issue 186176
SMASH Issue 186594
SMASH Issue 195320
SMASH Issue 200729
SMASH Issue 201476
SMASH Issue 201809
SMASH Issue 203304
SMASH Issue 205710
SMASH Issue 210804
SMASH Issue 210805
SMASH Issue 210807
SMASH Issue 210809
SMASH Issue 210810
SMASH Issue 210923
SMASH Issue 210972
SMASH Issue 211000
SMASH Issue 211001
SMASH Issue 211002
SMASH Issue 211003
SMASH Issue 211004
SMASH Issue 211005
SMASH Issue 211006
SMASH Issue 211038
SMASH Issue 211039
SMASH Issue 211040
SMASH Issue 211041
SMASH Issue 211042
SMASH Issue 211051
SMASH Issue 212718
SMASH Issue 212765
SMASH Issue 212925
SMASH Issue 216708
SMASH Issue 216720
SMASH Issue 216727
SMASH Issue 216869
SMASH Issue 216870
SMASH Issue 216871
SMASH Issue 216872
SMASH Issue 216873
SMASH Issue 216874
SMASH Issue 216875
SMASH Issue 216876
SMASH Issue 216877
SMASH Issue 216878
SMASH Issue 216879
SMASH Issue 216880
SMASH Issue 222884
SMASH Issue 222951
SMASH Issue 77111
SUSE:SUSE-SU-2015:0946
SUSE:SUSE-SU-2016:0727
SUSE:SUSE-SU-2016:0777
SUSE:SUSE-SU-2016:0820
SUSE:SUSE-SU-2016:0909
SUSE:SUSE-SU-2016:1277
SUSE:SUSE-SU-2016:2387
SUSE:SUSE-SU-2016:2394
SUSE:SUSE-SU-2016:2458
SUSE:SUSE-SU-2016:2468
SUSE:SUSE-SU-2016:2469
SUSE:SUSE-SU-2016:2470
SUSE:SUSE-SU-2017:2699
SUSE:SUSE-SU-2017:2700
SUSE:openSUSE-SU-2015:0858
SUSE:openSUSE-SU-2015:0967
SUSE:openSUSE-SU-2015:1911
SUSE:openSUSE-SU-2016:0360
SUSE:openSUSE-SU-2016:0373
SUSE:openSUSE-SU-2016:0376
SUSE:openSUSE-SU-2016:0731
SUSE:openSUSE-SU-2016:0733
SUSE:openSUSE-SU-2016:1274
SUSE:openSUSE-SU-2016:1373
SUSE:openSUSE-SU-2016:1430
SUSE:openSUSE-SU-2016:1433
SUSE:openSUSE-SU-2016:1496
SUSE:openSUSE-SU-2016:1557
SUSE:openSUSE-SU-2016:2391
SUSE:openSUSE-SU-2016:2407
SUSE:openSUSE-SU-2016:2496
SUSE:openSUSE-SU-2016:2537
SUSE:openSUSE-SU-2016:3202
SUSE:openSUSE-SU-2017:0077
SUSE:openSUSE-SU-2017:0080
SUSE:openSUSE-SU-2018:0458
UBUNTU:CVE-2009-3559
UBUNTU:CVE-2012-6153
UBUNTU:CVE-2013-7285
UBUNTU:CVE-2013-7451
UBUNTU:CVE-2013-7452
UBUNTU:CVE-2013-7453
UBUNTU:CVE-2013-7454
UBUNTU:CVE-2014-4330
UBUNTU:CVE-2014-8964
UBUNTU:CVE-2014-9746
UBUNTU:CVE-2014-9747
UBUNTU:CVE-2014-9772
UBUNTU:CVE-2015-0405
UBUNTU:CVE-2015-0423
UBUNTU:CVE-2015-0433
UBUNTU:CVE-2015-0438
UBUNTU:CVE-2015-0439
UBUNTU:CVE-2015-0441
UBUNTU:CVE-2015-0498
UBUNTU:CVE-2015-0499
UBUNTU:CVE-2015-0500
UBUNTU:CVE-2015-0501
UBUNTU:CVE-2015-0503
UBUNTU:CVE-2015-0505
UBUNTU:CVE-2015-0506
UBUNTU:CVE-2015-0507
UBUNTU:CVE-2015-0508
UBUNTU:CVE-2015-0511
UBUNTU:CVE-2015-2325
UBUNTU:CVE-2015-2326
UBUNTU:CVE-2015-2327
UBUNTU:CVE-2015-2328
UBUNTU:CVE-2015-2566
UBUNTU:CVE-2015-2567
UBUNTU:CVE-2015-2568
UBUNTU:CVE-2015-2571
UBUNTU:CVE-2015-2573
UBUNTU:CVE-2015-2575
UBUNTU:CVE-2015-5125
UBUNTU:CVE-2015-5127
UBUNTU:CVE-2015-5128
UBUNTU:CVE-2015-5129
UBUNTU:CVE-2015-5130
UBUNTU:CVE-2015-5131
UBUNTU:CVE-2015-5132
UBUNTU:CVE-2015-5134
UBUNTU:CVE-2015-5539
UBUNTU:CVE-2015-5540
UBUNTU:CVE-2015-5541
UBUNTU:CVE-2015-5544
UBUNTU:CVE-2015-5545
UBUNTU:CVE-2015-5551
UBUNTU:CVE-2015-5552
UBUNTU:CVE-2015-5553
UBUNTU:CVE-2015-5554
UBUNTU:CVE-2015-5555
UBUNTU:CVE-2015-5556
UBUNTU:CVE-2015-5557
UBUNTU:CVE-2015-5558
UBUNTU:CVE-2015-5559
UBUNTU:CVE-2015-5560
UBUNTU:CVE-2015-5561
UBUNTU:CVE-2015-5564
UBUNTU:CVE-2015-5565
UBUNTU:CVE-2015-5566
UBUNTU:CVE-2015-7559
UBUNTU:CVE-2015-8381
UBUNTU:CVE-2015-8382
UBUNTU:CVE-2015-8383
UBUNTU:CVE-2015-8384
UBUNTU:CVE-2015-8385
UBUNTU:CVE-2015-8386
UBUNTU:CVE-2015-8387
UBUNTU:CVE-2015-8388
UBUNTU:CVE-2015-8389
UBUNTU:CVE-2015-8390
UBUNTU:CVE-2015-8391
UBUNTU:CVE-2015-8392
UBUNTU:CVE-2015-8393
UBUNTU:CVE-2015-8394
UBUNTU:CVE-2015-8395
UBUNTU:CVE-2015-8854
UBUNTU:CVE-2015-8855
UBUNTU:CVE-2015-8856
UBUNTU:CVE-2015-8857
UBUNTU:CVE-2015-8858
UBUNTU:CVE-2015-8859
UBUNTU:CVE-2015-8860
UBUNTU:CVE-2015-8861
UBUNTU:CVE-2015-8862
UBUNTU:CVE-2016-0755
UBUNTU:CVE-2016-1672
UBUNTU:CVE-2016-1673
UBUNTU:CVE-2016-1674
UBUNTU:CVE-2016-1675
UBUNTU:CVE-2016-1676
UBUNTU:CVE-2016-1677
UBUNTU:CVE-2016-1678
UBUNTU:CVE-2016-1679
UBUNTU:CVE-2016-1680
UBUNTU:CVE-2016-1681
UBUNTU:CVE-2016-1682
UBUNTU:CVE-2016-1683
UBUNTU:CVE-2016-1684
UBUNTU:CVE-2016-1685
UBUNTU:CVE-2016-1686
UBUNTU:CVE-2016-1687
UBUNTU:CVE-2016-1688
UBUNTU:CVE-2016-1689
UBUNTU:CVE-2016-1690
UBUNTU:CVE-2016-1691
UBUNTU:CVE-2016-1692
UBUNTU:CVE-2016-1693
UBUNTU:CVE-2016-1694
UBUNTU:CVE-2016-1695
UBUNTU:CVE-2016-1950
UBUNTU:CVE-2016-1955
UBUNTU:CVE-2016-1956
UBUNTU:CVE-2016-1959
UBUNTU:CVE-2016-1967
UBUNTU:CVE-2016-1968
UBUNTU:CVE-2016-1969
UBUNTU:CVE-2016-1970
UBUNTU:CVE-2016-1971
UBUNTU:CVE-2016-1972
UBUNTU:CVE-2016-1973
UBUNTU:CVE-2016-1975
UBUNTU:CVE-2016-1976
UBUNTU:CVE-2016-2178
UBUNTU:CVE-2016-3141
UBUNTU:CVE-2016-4055
UBUNTU:CVE-2016-4070
UBUNTU:CVE-2016-4612
UBUNTU:CVE-2016-4619
UBUNTU:CVE-2016-4979
UBUNTU:CVE-2016-5501
UBUNTU:CVE-2016-5538
UBUNTU:CVE-2016-5605
UBUNTU:CVE-2016-5608
UBUNTU:CVE-2016-5610
UBUNTU:CVE-2016-5611
UBUNTU:CVE-2016-6293
UBUNTU:CVE-2016-6294
UBUNTU:CVE-2016-9840
UBUNTU:CVE-2016-9841
UBUNTU:CVE-2016-9842
UBUNTU:CVE-2016-9843
UBUNTU:CVE-2017-3454
UBUNTU:CVE-2017-3468
UBUNTU:CVE-2017-9526
UBUNTU:CVE-2018-1000121
UBUNTU:CVE-2018-1258
UBUNTU:CVE-2018-1305
UBUNTU:CVE-2018-1517
UBUNTU:CVE-2018-1656
UBUNTU:CVE-2018-2767
UBUNTU:CVE-2018-2938
UBUNTU:CVE-2018-2940
UBUNTU:CVE-2018-2952
UBUNTU:CVE-2018-2964
UBUNTU:CVE-2018-2973
UBUNTU:CVE-2018-3005
UBUNTU:CVE-2018-3055
UBUNTU:CVE-2018-3085
UBUNTU:CVE-2018-3086
UBUNTU:CVE-2018-3087
UBUNTU:CVE-2018-3088
UBUNTU:CVE-2018-3089
UBUNTU:CVE-2018-3090
UBUNTU:CVE-2018-3091
UBUNTU:CVE-2018-3287
UBUNTU:CVE-2018-3288
UBUNTU:CVE-2018-3289
UBUNTU:CVE-2018-3290
UBUNTU:CVE-2018-3291
UBUNTU:CVE-2018-3292
UBUNTU:CVE-2018-3293
UBUNTU:CVE-2018-3294
UBUNTU:CVE-2018-3295
UBUNTU:CVE-2018-3296
UBUNTU:CVE-2018-3297
UBUNTU:CVE-2018-3298
UBUNTU:CVE-2019-2455
UBUNTU:CVE-2019-2481
UBUNTU:CVE-2019-2482
UBUNTU:CVE-2019-2503
UBUNTU:CVE-2019-2507
UBUNTU:CVE-2019-2510
UBUNTU:CVE-2019-2513
UBUNTU:CVE-2019-2528
UBUNTU:CVE-2019-2529
UBUNTU:CVE-2019-2530
UBUNTU:CVE-2019-2531
UBUNTU:CVE-2019-2532
UBUNTU:CVE-2019-2533
UBUNTU:CVE-2019-2534
UBUNTU:CVE-2019-2535
UBUNTU:CVE-2019-2536
UBUNTU:CVE-2019-2537
UBUNTU:CVE-2019-2539
UBUNTU:USN-2575-1
UBUNTU:USN-2769-1
UBUNTU:USN-2882-1
UBUNTU:USN-2916-1
UBUNTU:USN-2917-1
UBUNTU:USN-2917-2
UBUNTU:USN-2917-3
UBUNTU:USN-2924-1
UBUNTU:USN-2934-1
UBUNTU:USN-2952-1
UBUNTU:USN-2952-2
UBUNTU:USN-2992-1
UBUNTU:USN-3598-1
UBUNTU:USN-3598-2
UBUNTU:USN-3665-1
UBUNTU:USN-3693-1
UBUNTU:USN-3725-1
UBUNTU:USN-3725-2
UBUNTU:USN-3727-1
UBUNTU:USN-3734-1
UBUNTU:USN-3735-1
UBUNTU:USN-3747-1
USN-3087-1
USN-3087-2
USN-3867-1
USN-4246-1
USN-4292-1
XF:perl-cve20144330-dos(96216)
ZDI-16-570
ZDI-18-1232ZDI-CAN-6635
ZDI-18-1233ZDI-CAN-6591
ZDI-18-1234ZDI-CAN-6592
ZDI-18-1292ZDI-CAN-7329
bdo#1033297
bdo#583651
bdo#759718
bdo#782645
bdo#797165
bdo#798619
bdo#798620
bdo#802671
bdo#802971
bdo#838694
bdo#864859
bdo#867247
bdo#873383
bdo#885345
bdo#898444
bdo#898445
bdo#912848
bnc#1003579
bnc#1003580
bnc#1005621
bnc#1016653
bnc#1021757
bnc#1022633
bnc#1042326
bnc#1043777
bnc#1084524
bnc#1085215
bnc#1088681
bnc#1101644
bnc#1101645
bnc#1101656
bnc#1101667
bnc#1101675
bnc#1104668
bnc#1120866
bnc#1122198
bnc#885963
bnc#896715
bnc#924960
bnc#924961
bnc#927623
bnc#941239
bnc#947966
bnc#957598
bnc#958373
bnc#962983
bnc#969821
bnc#969894
bnc#970257
bnc#970377
bnc#970378
bnc#970379
bnc#970380
bnc#970381
bnc#970431
bnc#970433
bnc#976547
bnc#977050
bnc#981886
bnc#983249
bnc#983519
bnc#988162
http://www.debian.org/security/2016/dsa-3560
https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=95433e8e339dbb6b5d5541473c1661db6ba2c451
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/
https://security.netapp.com/advisory/ntap-20230216-0002/
https://support.f5.com/csp/article/K05052081?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K46337613?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K46337613?utm_source=f5support&utm_medium=RSS
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
openssl.git:commit:399944622df7bd81af62e67ea967c470534090e2
rh#1051277
rh#1091938
rh#1101303
rh#1104858
rh#1107544
rh#1112877
rh#1116665
rh#1129074
rh#1129916
rh#1131350
rh#1139700
rh#1166147
rh#1167537
rh#1183461
rh#1187225
rh#1202366
rh#1202380
rh#1202384
rh#1202395
rh#1202418
rh#1203195
rh#1207198
rh#1207202
rh#1208428
rh#1209496
rh#1209501
rh#1212753
rh#1212755
rh#1212757
rh#1212758
rh#1212759
rh#1212760
rh#1212763
rh#1212764
rh#1212765
rh#1212767
rh#1212768
rh#1212769
rh#1212770
rh#1212771
rh#1212772
rh#1212774
rh#1212776
rh#1212777
rh#1212779
rh#1212780
rh#1212781
rh#1212782
rh#1212783
rh#1237223
rh#1252697
rh#1252707
rh#1256449
rh#1262373
rh#1277888
rh#1285399
rh#1285408
rh#1287614
rh#1287623
rh#1287629
rh#1287636
rh#1287646
rh#1287654
rh#1287659
rh#1287666
rh#1287671
rh#1287690
rh#1287695
rh#1287702
rh#1287711
rh#1291742
rh#1293972
rh#1302263
rh#1304645
rh#1310509
rh#1311503
rh#1315312
rh#1315328
rh#1315570
rh#1315571
rh#1315575
rh#1315776
rh#1315777
rh#1315780
rh#1315782
rh#1317560
rh#1323114
rh#1323749
rh#1329533
rh#1329552
rh#1340005
rh#1340006
rh#1340007
rh#1340008
rh#1340009
rh#1340010
rh#1340011
rh#1340012
rh#1340013
rh#1340014
rh#1340015
rh#1340016
rh#1340017
rh#1340018
rh#1340019
rh#1340021
rh#1340022
rh#1340023
rh#1340024
rh#1340026
rh#1340027
rh#1340028
rh#1340029
rh#1340030
rh#1341821
rh#1343400
rh#1343538
rh#1343540
rh#1352476
rh#1359811
rh#1360339
rh#1369383
rh#1378936
rh#1384344
rh#1386562
rh#1386564
rh#1393454
rh#1396963
rh#1396971
rh#1397485
rh#1399546
rh#1402345
rh#1402346
rh#1402348
rh#1402351
rh#1405148
rh#1414133
rh#1433010
rh#1443366
rh#1443385
rh#1459887
rh#1485274
rh#1501812
rh#1501813
rh#1501814
rh#1501815
rh#1501816
rh#1501817
rh#1501818
rh#1501819
rh#1501820
rh#1516791
rh#1519780
rh#1548282
rh#1552631
rh#1553413
rh#1564965
rh#1578582
rh#1591854
rh#1600925
rh#1602141
rh#1602142
rh#1602145
rh#1602146
rh#1607582
rh#1608073
rh#1614973
rh#1618767
rh#1618869
rh#1618871
rh#1666742
rh#1666743
rh#1666744
rh#1666749
rh#1666750
rh#1666751
rh#1666752
rh#1666753
rh#1666755
rh#1666756
rh#1666757
rh#1666758
rh#1666759
rh#1666760
rh#1666761
rh#1666762
rh#1666763
rh#1666764
rh#1714979
rh#1716448
rh#1716453
rh#1716454
rh#1722971
rh#1731271
rh#2061700
rh#2116175
rh#2119127
rh#2161287
rh#2270497
rh#539529
rh#873317
xf#141681
xf#141953
xf#141971
xf#141981
xf#141982
xf#144882
xf#146672
xf#146803
xf#146804
xf#146815
xf#146827
xf#146834
xf#146835
xf#151452
xf#151455
xf#151465
xf#151466
xf#151486
xf#151497
xf#151500
xf#151525
xf#151527
xf#151530
xf#155741
xf#155744
xf#155766
xf#155850
CVE-2015-2326perl:Already fixedmoderate ()APPLE:APPLE-SA-2010-03-29-1
APPLE:APPLE-SA-2016-03-21-1
APPLE:APPLE-SA-2016-03-21-2
APPLE:APPLE-SA-2016-03-21-3
APPLE:APPLE-SA-2016-03-21-5
APPLE:APPLE-SA-2016-05-16-4
APPLE:APPLE-SA-2016-07-18-1
APPLE:APPLE-SA-2016-07-18-2
APPLE:APPLE-SA-2016-07-18-3
APPLE:APPLE-SA-2016-07-18-4
APPLE:APPLE-SA-2016-07-18-6
APPLE:APPLE-SA-2016-09-20
BID:100503
BID:100514
BID:100861
BID:103144
BID:103415
BID:103782
BID:103796
BID:103846
BID:103848
BID:103954
BID:104222
BID:104764
BID:104765
BID:104768
BID:104773
BID:104774
BID:104775
BID:104780
BID:104782
BID:105117
BID:105118
BID:105126
BID:105587
BID:105590
BID:105591
BID:105597
BID:105601
BID:105602
BID:105608
BID:105615
BID:105617
BID:105619
BID:105622
BID:105624
BID:105635
BID:105637
BID:105647
BID:105656
BID:105658
BID:106619
BID:106622
BID:106625
BID:106626
BID:106627
BID:106628
BID:67121
BID:69257
BID:70142
BID:71206
BID:74073
BID:74075
BID:74078
BID:74081
BID:74085
BID:74095
BID:74112
BID:74924
BID:76157
BID:76187
BID:76282
BID:76289
BID:76291
BID:79091
BID:82307
BID:82990
BID:84220
BID:84223
BID:84271
BID:85572
BID:85576
BID:85801
BID:86957
BID:90876
BID:91067
BID:91068
BID:91081
BID:91566
BID:91787
BID:91869
BID:92115
BID:92127
BID:92912
BID:93132
BID:93287
BID:93604
BID:93685
BID:93687
BID:93697
BID:93711
BID:93718
BID:93728
BID:93744
BID:94371
BID:94377
BID:94925
BID:95019
BID:95131
BID:95429
BID:95849
BID:96389
BID:96392
BID:96409
BID:96410
BID:96434
BID:96435
BID:96436
BID:97102
BID:97725
BID:97742
BID:97763
BID:97765
BID:97776
BID:97791
BID:97812
BID:97818
BID:97831
BID:97848
BID:97849
BID:97851
BID:99046
BUGTRAQ:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
BUGTRAQ:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
CISCO:20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016
CONFIRM:access.redhat.com:CVE-2014-0114
CONFIRM:access.redhat.com:CVE-2014-3577
CONFIRM:access.redhat.com:CVE-2015-0293
CONFIRM:access.redhat.com:CVE-2015-3456
CONFIRM:advisories.mageia.org:CVE-2014-0114
CONFIRM:advisories.mageia.org:CVE-2014-4330
CONFIRM:advisories.mageia.org:CVE-2014-8964
CONFIRM:bto.bluecoat.com:CVE-2016-1950
CONFIRM:bto.bluecoat.com:CVE-2016-3191
CONFIRM:bto.bluecoat.com:CVE-2016-7052
CONFIRM:bugs.eclipse.org:CVE-2018-12539
CONFIRM:bugs.exim.org:CVE-2014-8964
CONFIRM:bugs.exim.org:CVE-2015-2328
CONFIRM:bugs.exim.org:CVE-2015-8381
CONFIRM:bugs.exim.org:CVE-2015-8382
CONFIRM:bugs.jython.org:CVE-2016-4000
CONFIRM:bugs.launchpad.net:CVE-2015-8866
CONFIRM:bugs.launchpad.net:CVE-2015-8867
CONFIRM:bugs.php.net:CVE-2015-8866
CONFIRM:bugs.php.net:CVE-2015-8867
CONFIRM:bugs.php.net:CVE-2015-8878
CONFIRM:bugs.php.net:CVE-2016-3141
CONFIRM:bugs.php.net:CVE-2016-4070
CONFIRM:bugs.php.net:CVE-2016-6294
CONFIRM:bugzilla.mozilla.org:CVE-2016-1950
CONFIRM:bugzilla.mozilla.org:CVE-2016-1955
CONFIRM:bugzilla.mozilla.org:CVE-2016-1956
CONFIRM:bugzilla.mozilla.org:CVE-2016-1959
CONFIRM:bugzilla.mozilla.org:CVE-2016-1967
CONFIRM:bugzilla.mozilla.org:CVE-2016-1968
CONFIRM:bugzilla.mozilla.org:CVE-2016-1969
CONFIRM:bugzilla.mozilla.org:CVE-2016-1970
CONFIRM:bugzilla.mozilla.org:CVE-2016-1971
CONFIRM:bugzilla.mozilla.org:CVE-2016-1972
CONFIRM:bugzilla.mozilla.org:CVE-2016-1973
CONFIRM:bugzilla.mozilla.org:CVE-2016-1975
CONFIRM:bugzilla.mozilla.org:CVE-2016-1976
CONFIRM:bugzilla.redhat.com:CVE-2015-7559
CONFIRM:bugzilla.redhat.com:CVE-2016-9583
CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-412672.pdf
CONFIRM:codereview.chromium.org:CVE-2016-1675
CONFIRM:codereview.chromium.org:CVE-2016-1676
CONFIRM:codereview.chromium.org:CVE-2016-1677
CONFIRM:codereview.chromium.org:CVE-2016-1678
CONFIRM:codereview.chromium.org:CVE-2016-1679
CONFIRM:codereview.chromium.org:CVE-2016-1680
CONFIRM:codereview.chromium.org:CVE-2016-1681
CONFIRM:codereview.chromium.org:CVE-2016-1682
CONFIRM:codereview.chromium.org:CVE-2016-1685
CONFIRM:codereview.chromium.org:CVE-2016-1686
CONFIRM:codereview.chromium.org:CVE-2016-1687
CONFIRM:codereview.chromium.org:CVE-2016-1688
CONFIRM:codereview.chromium.org:CVE-2016-1689
CONFIRM:codereview.chromium.org:CVE-2016-1691
CONFIRM:codereview.chromium.org:CVE-2016-1692
CONFIRM:codereview.chromium.org:CVE-2016-1693
CONFIRM:codereview.chromium.org:CVE-2016-1694
CONFIRM:codereview.chromium.org:CVE-2016-1701
CONFIRM:commons.apache.org:CVE-2014-0114
CONFIRM:crbug.com:CVE-2016-1672
CONFIRM:crbug.com:CVE-2016-1673
CONFIRM:crbug.com:CVE-2016-1674
CONFIRM:crbug.com:CVE-2016-1675
CONFIRM:crbug.com:CVE-2016-1676
CONFIRM:crbug.com:CVE-2016-1677
CONFIRM:crbug.com:CVE-2016-1678
CONFIRM:crbug.com:CVE-2016-1679
CONFIRM:crbug.com:CVE-2016-1680
CONFIRM:crbug.com:CVE-2016-1681
CONFIRM:crbug.com:CVE-2016-1682
CONFIRM:crbug.com:CVE-2016-1683
CONFIRM:crbug.com:CVE-2016-1684
CONFIRM:crbug.com:CVE-2016-1685
CONFIRM:crbug.com:CVE-2016-1686
CONFIRM:crbug.com:CVE-2016-1687
CONFIRM:crbug.com:CVE-2016-1688
CONFIRM:crbug.com:CVE-2016-1689
CONFIRM:crbug.com:CVE-2016-1690
CONFIRM:crbug.com:CVE-2016-1691
CONFIRM:crbug.com:CVE-2016-1692
CONFIRM:crbug.com:CVE-2016-1693
CONFIRM:crbug.com:CVE-2016-1694
CONFIRM:crbug.com:CVE-2016-1695
CONFIRM:curl.haxx.se:CVE-2016-0755
CONFIRM:curl.haxx.se:CVE-2016-9586
CONFIRM:curl.haxx.se:CVE-2018-1000121
CONFIRM:developer.mozilla.org:CVE-2016-1950
CONFIRM:git.gnome.org:CVE-2016-1683
CONFIRM:git.gnome.org:CVE-2016-1684
CONFIRM:git.gnupg.org:CVE-2017-9526
CONFIRM:git.php.net:CVE-2015-8382
CONFIRM:git.php.net:CVE-2015-8866
CONFIRM:git.php.net:CVE-2015-8867
CONFIRM:git.php.net:CVE-2016-3141
CONFIRM:git.php.net:CVE-2016-6294
CONFIRM:git.savannah.gnu.org:CVE-2014-9746
CONFIRM:git.savannah.gnu.org:CVE-2014-9747
CONFIRM:github.com:CVE-2013-7330
CONFIRM:github.com:CVE-2014-2058
CONFIRM:github.com:CVE-2014-2059
CONFIRM:github.com:CVE-2014-2061
CONFIRM:github.com:CVE-2014-2062
CONFIRM:github.com:CVE-2014-2063
CONFIRM:github.com:CVE-2014-2064
CONFIRM:github.com:CVE-2014-2065
CONFIRM:github.com:CVE-2014-2066
CONFIRM:github.com:CVE-2014-2067
CONFIRM:github.com:CVE-2014-2068
CONFIRM:github.com:CVE-2016-1182
CONFIRM:github.com:CVE-2016-4979
CONFIRM:github.com:CVE-2016-9389
CONFIRM:github.com:CVE-2016-9394
CONFIRM:github.com:CVE-2016-9583
CONFIRM:github.com:CVE-2016-9586
CONFIRM:github.com:CVE-2016-9840
CONFIRM:github.com:CVE-2016-9841
CONFIRM:github.com:CVE-2016-9842
CONFIRM:github.com:CVE-2016-9843
CONFIRM:github.com:CVE-2017-1000071
CONFIRM:github.com:CVE-2017-14735
CONFIRM:googlechromereleases.blogspot.com:CVE-2016-1695
CONFIRM:h20566.www2.hpe.com:CVE-2016-0763
CONFIRM:h20566.www2.hpe.com:CVE-2016-2014
CONFIRM:h20566.www2.hpe.com:CVE-2016-2183
CONFIRM:h20566.www2.hpe.com:CVE-2016-5388
CONFIRM:h20566.www2.hpe.com:CVE-2016-5773
CONFIRM:h20566.www2.hpe.com:CVE-2016-6306
CONFIRM:h20566.www2.hpe.com:CVE-2016-8518
CONFIRM:h20566.www2.hpe.com:CVE-2017-5787
CONFIRM:hg.mozilla.org:CVE-2016-1975
CONFIRM:hg.python.org:CVE-2016-4000
CONFIRM:httpd.apache.org:CVE-2016-4979
CONFIRM:issues.apache.org:CVE-2014-0114
CONFIRM:issues.apache.org:CVE-2015-1832
CONFIRM:issues.apache.org:CVE-2015-7559
CONFIRM:issues.apache.org:CVE-2016-1000031
CONFIRM:jenkins.io:CVE-2017-1000403
CONFIRM:jira.mariadb.org:CVE-2016-6662
CONFIRM:jira.mongodb.org:CVE-2015-2328
CONFIRM:kb.juniper.net:CVE-2015-3209
CONFIRM:kb.juniper.net:CVE-2016-7052
CONFIRM:kb.pulsesecure.net:CVE-2016-6306
CONFIRM:kc.mcafee.com:CVE-2016-6306
CONFIRM:mariadb.com:CVE-2015-2571
CONFIRM:mariadb.com:CVE-2016-6662
CONFIRM:metacpan.org:CVE-2014-4330
CONFIRM:nodejs.org:CVE-2016-7099
CONFIRM:nodesecurity.io:CVE-2013-7454
CONFIRM:nodesecurity.io:CVE-2014-9772
CONFIRM:nodesecurity.io:CVE-2015-8315
CONFIRM:nodesecurity.io:CVE-2015-8854
CONFIRM:nodesecurity.io:CVE-2015-8855
CONFIRM:nodesecurity.io:CVE-2015-8856
CONFIRM:nodesecurity.io:CVE-2015-8858
CONFIRM:nodesecurity.io:CVE-2015-8859
CONFIRM:nodesecurity.io:CVE-2015-8860
CONFIRM:nodesecurity.io:CVE-2015-8862
CONFIRM:nodesecurity.io:CVE-2016-4055
CONFIRM:php.net:CVE-2016-3142
CONFIRM:pivotal.io:CVE-2018-1258
CONFIRM:rwkbp.makekb.com:CVE-2015-8965
CONFIRM:security-tracker.debian.org:CVE-2016-1181
CONFIRM:security-tracker.debian.org:CVE-2016-1182
CONFIRM:security.netapp.com:CVE-2014-0114
CONFIRM:security.netapp.com:CVE-2015-2575
CONFIRM:security.netapp.com:CVE-2016-1000031
CONFIRM:security.netapp.com:CVE-2016-1182
CONFIRM:security.netapp.com:CVE-2016-4979
CONFIRM:security.netapp.com:CVE-2016-9843
CONFIRM:security.netapp.com:CVE-2017-10388
CONFIRM:security.netapp.com:CVE-2017-5645
CONFIRM:security.netapp.com:CVE-2018-1305
CONFIRM:security.netapp.com:CVE-2018-2973
CONFIRM:security.netapp.com:CVE-2019-2435
CONFIRM:support.apple.com:CVE-2009-0689
CONFIRM:support.apple.com:CVE-2016-1950
CONFIRM:support.apple.com:CVE-2016-4073
CONFIRM:support.apple.com:CVE-2016-4616
CONFIRM:support.apple.com:CVE-2016-4653
CONFIRM:support.apple.com:CVE-2016-7582
CONFIRM:support.apple.com:CVE-2017-13873
CONFIRM:support.apple.com:CVE-2017-13877
CONFIRM:support.apple.com:CVE-2017-6464
CONFIRM:support.f5.com:CVE-2015-8854
CONFIRM:support.f5.com:CVE-2016-2178
CONFIRM:support.hpe.com:CVE-2016-6306
CONFIRM:support.hpe.com:CVE-2016-7052
CONFIRM:support.hpe.com:CVE-2018-2940
CONFIRM:support.hpe.com:CVE-2018-2973
CONFIRM:svn.apache.org:CVE-2012-6153
CONFIRM:svn.apache.org:CVE-2015-1832
CONFIRM:vcs.pcre.org:CVE-2015-8382
CONFIRM:vcs.pcre.org:CVE-2015-8395
CONFIRM:www-01.ibm.com:CVE-2014-0114
CONFIRM:www-01.ibm.com:CVE-2014-3022
CONFIRM:www-01.ibm.com:CVE-2015-1832
CONFIRM:www-01.ibm.com:CVE-2016-3191
CONFIRM:www-01.ibm.com:CVE-2016-7052
CONFIRM:www.apache.org:CVE-2016-4979
CONFIRM:www.exim.org:CVE-2014-8964
CONFIRM:www.huawei.com:CVE-2016-6306
CONFIRM:www.ibm.com:CVE-2014-0963
CONFIRM:www.ibm.com:CVE-2018-1656
CONFIRM:www.lsexperts.de:CVE-2014-4330
CONFIRM:www.mozilla.org:CVE-2016-1950
CONFIRM:www.mozilla.org:CVE-2016-1955
CONFIRM:www.mozilla.org:CVE-2016-1956
CONFIRM:www.mozilla.org:CVE-2016-1959
CONFIRM:www.mozilla.org:CVE-2016-1967
CONFIRM:www.mozilla.org:CVE-2016-1968
CONFIRM:www.mozilla.org:CVE-2016-1969
CONFIRM:www.mozilla.org:CVE-2016-1973
CONFIRM:www.mozilla.org:CVE-2016-1976
CONFIRM:www.oracle.com:CVE-2014-0114
CONFIRM:www.oracle.com:CVE-2014-4271
CONFIRM:www.oracle.com:CVE-2014-6564
CONFIRM:www.oracle.com:CVE-2015-0437
CONFIRM:www.oracle.com:CVE-2015-1351
CONFIRM:www.oracle.com:CVE-2015-2568
CONFIRM:www.oracle.com:CVE-2015-2579
CONFIRM:www.oracle.com:CVE-2015-4879
CONFIRM:www.oracle.com:CVE-2015-5722
CONFIRM:www.oracle.com:CVE-2015-8391
CONFIRM:www.oracle.com:CVE-2016-0778
CONFIRM:www.oracle.com:CVE-2016-2802
CONFIRM:www.oracle.com:CVE-2016-4957
CONFIRM:www.oracle.com:CVE-2016-5240
CONFIRM:www.oracle.com:CVE-2016-5477
CONFIRM:www.oracle.com:CVE-2016-6302
CONFIRM:www.oracle.com:CVE-2016-6304
CONFIRM:www.oracle.com:CVE-2016-7039
CONFIRM:www.oracle.com:CVE-2016-7154
CONFIRM:www.oracle.com:CVE-2016-8296
CONFIRM:www.oracle.com:CVE-2017-10365
CONFIRM:www.oracle.com:CVE-2017-3456
CONFIRM:www.oracle.com:CVE-2017-3626
CONFIRM:www.oracle.com:CVE-2017-3636
CONFIRM:www.oracle.com:CVE-2017-5689
CONFIRM:www.oracle.com:CVE-2017-5709
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CONFIRM:www.oracle.com:CVE-2018-18223
CONFIRM:www.oracle.com:CVE-2018-2639
CONFIRM:www.oracle.com:CVE-2018-2819
CONFIRM:www.oracle.com:CVE-2018-3081
CONFIRM:www.oracle.com:CVE-2018-3125
CONFIRM:www.pcre.org:CVE-2015-2325
CONFIRM:www.percona.com:CVE-2016-6662
CONFIRM:www.php.net:CVE-2009-3558
CONFIRM:www.php.net:CVE-2016-9935
CONFIRM:www.php.net:CVE-2016-9936
CONFIRM:www.splunk.com:CVE-2016-6304
CONFIRM:www.synology.com:CVE-2015-9104
CONFIRM:www.synology.com:CVE-2015-9105
CONFIRM:www.tenable.com:CVE-2016-4055
CONFIRM:www.tenable.com:CVE-2016-7052
CONFIRM:www.tenable.com:CVE-2016-8625
CONFIRM:www.tenable.com:CVE-2016-9260
CONFIRM:www.tenable.com:CVE-2016-9261
CONFIRM:www.vmware.com:CVE-2014-0114
CONFIRM:www.vmware.com:CVE-2014-8371
CONFIRM:x-stream.github.io:CVE-2013-7285
CVE-2009-3559
CVE-2012-6153
CVE-2013-7285
CVE-2013-7451
CVE-2013-7452
CVE-2013-7453
CVE-2013-7454
CVE-2014-0114
CVE-2014-0245
CVE-2014-3540
CVE-2014-4172
CVE-2014-4330
CVE-2014-4651
CVE-2014-7192
CVE-2014-8964
CVE-2014-9745
CVE-2014-9746
CVE-2014-9747
CVE-2014-9772
CVE-2015-0405
CVE-2015-0423
CVE-2015-0433
CVE-2015-0438
CVE-2015-0439
CVE-2015-0441
CVE-2015-0498
CVE-2015-0499
CVE-2015-0500
CVE-2015-0501
CVE-2015-0503
CVE-2015-0505
CVE-2015-0506
CVE-2015-0507
CVE-2015-0508
CVE-2015-0511
CVE-2015-0852
CVE-2015-1832
CVE-2015-2325
CVE-2015-2326
CVE-2015-2327
CVE-2015-2328
CVE-2015-2566
CVE-2015-2567
CVE-2015-2568
CVE-2015-2571
CVE-2015-2573
CVE-2015-2575
CVE-2015-2576
CVE-2015-2613
CVE-2015-5125
CVE-2015-5127
CVE-2015-5128
CVE-2015-5129
CVE-2015-5130
CVE-2015-5131
CVE-2015-5132
CVE-2015-5134
CVE-2015-5328
CVE-2015-5539
CVE-2015-5540
CVE-2015-5541
CVE-2015-5544
CVE-2015-5545
CVE-2015-5551
CVE-2015-5552
CVE-2015-5553
CVE-2015-5554
CVE-2015-5555
CVE-2015-5556
CVE-2015-5557
CVE-2015-5558
CVE-2015-5559
CVE-2015-5560
CVE-2015-5561
CVE-2015-5564
CVE-2015-5565
CVE-2015-5566
CVE-2015-7559
CVE-2015-7940
CVE-2015-8315
CVE-2015-8381
CVE-2015-8382
CVE-2015-8383
CVE-2015-8384
CVE-2015-8385
CVE-2015-8386
CVE-2015-8387
CVE-2015-8388
CVE-2015-8389
CVE-2015-8390
CVE-2015-8391
CVE-2015-8392
CVE-2015-8393
CVE-2015-8394
CVE-2015-8395
CVE-2015-8854
CVE-2015-8855
CVE-2015-8856
CVE-2015-8857
CVE-2015-8858
CVE-2015-8859
CVE-2015-8860
CVE-2015-8861
CVE-2015-8862
CVE-2015-8878
CVE-2015-8965
CVE-2015-9104
CVE-2015-9105
CVE-2015-9251
CVE-2016-0635
CVE-2016-0755
CVE-2016-1000031
CVE-2016-1181
CVE-2016-1182
CVE-2016-1672
CVE-2016-1673
CVE-2016-1674
CVE-2016-1675
CVE-2016-1676
CVE-2016-1677
CVE-2016-1678
CVE-2016-1679
CVE-2016-1680
CVE-2016-1681
CVE-2016-1682
CVE-2016-1683
CVE-2016-1684
CVE-2016-1685
CVE-2016-1686
CVE-2016-1687
CVE-2016-1688
CVE-2016-1689
CVE-2016-1690
CVE-2016-1691
CVE-2016-1692
CVE-2016-1693
CVE-2016-1694
CVE-2016-1695
CVE-2016-1950
CVE-2016-1955
CVE-2016-1956
CVE-2016-1959
CVE-2016-1967
CVE-2016-1968
CVE-2016-1969
CVE-2016-1970
CVE-2016-1971
CVE-2016-1972
CVE-2016-1973
CVE-2016-1975
CVE-2016-1976
CVE-2016-2178
CVE-2016-2515
CVE-2016-2537
CVE-2016-3141
CVE-2016-3142
CVE-2016-4000
CVE-2016-4055
CVE-2016-4070
CVE-2016-4612
CVE-2016-4619
CVE-2016-4979
CVE-2016-5483
CVE-2016-5501
CVE-2016-5538
CVE-2016-5605
CVE-2016-5608
CVE-2016-5610
CVE-2016-5611
CVE-2016-5613
CVE-2016-5616
CVE-2016-5617
CVE-2016-5684
CVE-2016-6293
CVE-2016-6294
CVE-2016-6662
CVE-2016-6814
CVE-2016-9389
CVE-2016-9392
CVE-2016-9583
CVE-2016-9586
CVE-2016-9840
CVE-2016-9841
CVE-2016-9842
CVE-2017-0379
CVE-2017-13745
CVE-2017-14229
CVE-2017-14735
CVE-2017-15095
CVE-2017-16012
CVE-2017-3308
CVE-2017-3309
CVE-2017-3329
CVE-2017-3453
CVE-2017-3454
CVE-2017-3456
CVE-2017-3461
CVE-2017-3462
CVE-2017-3463
CVE-2017-3464
CVE-2017-3468
CVE-2017-3600
CVE-2017-9526
CVE-2018-1000121
CVE-2018-12539
CVE-2018-1258
CVE-2018-1517
CVE-2018-1656
CVE-2018-2767
CVE-2018-2797
CVE-2018-2815
CVE-2018-2825
CVE-2018-2826
CVE-2018-2909
CVE-2018-2938
CVE-2018-2940
CVE-2018-2941
CVE-2018-2952
CVE-2018-2964
CVE-2018-2972
CVE-2018-2973
CVE-2018-3005
CVE-2018-3055
CVE-2018-3085
CVE-2018-3086
CVE-2018-3087
CVE-2018-3088
CVE-2018-3089
CVE-2018-3090
CVE-2018-3091
CVE-2018-3127
CVE-2018-3134
CVE-2018-3136
CVE-2018-3139
CVE-2018-3149
CVE-2018-3150
CVE-2018-3169
CVE-2018-3180
CVE-2018-3183
CVE-2018-3209
CVE-2018-3211
CVE-2018-3214
CVE-2018-3287
CVE-2018-3288
CVE-2018-3289
CVE-2018-3290
CVE-2018-3291
CVE-2018-3292
CVE-2018-3293
CVE-2018-3294
CVE-2018-3295
CVE-2018-3296
CVE-2018-3297
CVE-2018-3298
CVE-2019-2422
CVE-2019-2426
CVE-2019-2449
CVE-2019-2455
CVE-2019-2481
CVE-2019-2482
CVE-2019-2503
CVE-2019-2507
CVE-2019-2510
CVE-2019-2513
CVE-2019-2528
CVE-2019-2529
CVE-2019-2530
CVE-2019-2531
CVE-2019-2532
CVE-2019-2533
CVE-2019-2534
CVE-2019-2535
CVE-2019-2536
CVE-2019-2537
CVE-2019-2539
CVE-2019-2540
CVE-2024-2466
D:CVE-2015-2301
D:CVE-2015-2571
D:CVE-2015-2573
D:CVE-2015-2575
D:CVE-2015-2576
D:CVE-2015-5557
D:CVE-2015-5558
D:CVE-2015-5559
D:CVE-2015-5560
D:CVE-2015-5561
D:CVE-2015-5562
D:CVE-2015-5563
D:CVE-2015-5564
D:CVE-2015-5565
D:CVE-2015-8386
D:CVE-2015-8387
D:CVE-2015-8388
D:CVE-2015-8389
D:CVE-2015-8390
D:CVE-2015-8391
D:CVE-2015-8392
D:CVE-2015-8393
D:CVE-2015-8394
D:CVE-2015-8395
D:CVE-2015-9105
D:CVE-2016-1674
D:CVE-2016-1682
D:CVE-2016-1694
D:CVE-2016-1695
D:CVE-2016-1950
D:CVE-2016-1970
D:CVE-2016-1973
D:CVE-2016-2178
D:CVE-2016-3141
D:CVE-2016-4055
D:CVE-2016-5608
D:CVE-2016-5610
D:CVE-2016-6293
D:CVE-2016-6294
D:CVE-2016-6662
D:CVE-2016-9586
D:CVE-2017-9526
D:CVE-2018-1517
D:CVE-2018-1656
D:CVE-2018-3297
D:CVE-2018-3298
D:CVE-2022-2590
DEBIAN:DSA-3959
DEBIAN:DSA-4136
DEBIAN:DSA-4268
DEBIAN:DSA-4281
DEBIAN:DSA-4341
DSA-2940
DSA-3229
DSA-3311
DSA-3370
DSA-3392
DSA-3417
DSA-3455
DSA-3510
DSA-3520
DSA-3590
DSA-3605
DSA-3621
DSA-3631
DSA-3666
DSA-3673
DSA-3688
DSA-3725
DSA-3834
DSA-3880
DSA-3893
DSA-3944
DSA-4136
DSA-4281
DSA-5378
EXPLOIT-DB:37852
EXPLOIT-DB:37854
EXPLOIT-DB:37855
EXPLOIT-DB:37856
EXPLOIT-DB:37857
EXPLOIT-DB:37859
EXPLOIT-DB:37861
EXPLOIT-DB:40360
FEDORA:FEDORA-2014-11453
FEDORA:FEDORA-2014-15573
FEDORA:FEDORA-2014-17624
FEDORA:FEDORA-2014-17626
FEDORA:FEDORA-2014-17642
FEDORA:FEDORA-2014-9380
FEDORA:FEDORA-2015-16104
FEDORA:FEDORA-2015-16105
FEDORA:FEDORA-2015-16106
FEDORA:FEDORA-2015-7d95466eda
FEDORA:FEDORA-2015-992342e82f
FEDORA:FEDORA-2015-decbab7c9f
FEDORA:FEDORA-2015-eb896290d3
FEDORA:FEDORA-2016-3fa315a5dd
FEDORA:FEDORA-2016-55137a3adb
FEDORA:FEDORA-2016-57bebab3b6
FEDORA:FEDORA-2016-5a141de5d9
FREEBSD:FreeBSD-SA-16:26
FULLDISC:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
FULLDISC:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
FULLDISC:20160706 CVE-2016-4979: HTTPD webserver - X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs]
FULLDISC:20160912 CVE-2016-6662 - MySQL Remote Root Code Execution / Privilege Escalation ( 0day )
FULLDISC:20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities
GENTOO:GLSA-201507-19
GENTOO:GLSA-201605-06
GENTOO:GLSA-201607-02
GENTOO:GLSA-201607-07
GENTOO:GLSA-201607-09
GENTOO:GLSA-201610-02
GENTOO:GLSA-201612-16
GENTOO:GLSA-201612-27
GENTOO:GLSA-201701-01
GENTOO:GLSA-201701-47
GENTOO:GLSA-201701-56
GENTOO:GLSA-201701-68
GENTOO:GLSA-201710-28
GLSA-201908-24
GLSA-202007-54
HP:HPSBGN03041
HP:HPSBMU03090
HP:HPSBST03160
IBM Security Bulletin 0713459 (Cognos Business Intelligence)
IBM Security Bulletin 0713487 (Rational Collaborative Lifecycle Management)
IBM Security Bulletin 0715641 (Cognos Business Intelligence)
IBM Security Bulletin 0715721 (Agile Lifecycle Manager)
IBM Security Bulletin 0716285 (Cognos TM1)
IBM Security Bulletin 0716289 (Cognos Insight)
IBM Security Bulletin 0717693 (Tivoli Monitoring V6)
IBM Security Bulletin 0717727 (Tivoli Monitoring V6)
IBM Security Bulletin 0717895 (Rational Business Developer)
IBM Security Bulletin 0718381 (Platform Symphony)
IBM Security Bulletin 0718421 (InfoSphere Guardium Data Redaction)
IBM Security Bulletin 0718447 (Cognos Planning)
IBM Security Bulletin 0718949 (Cloud Manager with Openstack)
IBM Security Bulletin 0719163 (Rational Reporting for Development Intelligence)
IBM Security Bulletin 0719165 (Rational Insight)
IBM Security Bulletin 0720115 (Spectrum Conductor with Spark)
IBM Security Bulletin 0728577 (Content Classification)
IBM Security Bulletin 0729341 (ILOG CPLEX Optimization Studio)
IBM Security Bulletin 0729343 (Decision Optimization Center)
IBM Security Bulletin 0729607 (WebSphere Application Server)
IBM Security Bulletin 0735319 (Tivoli System Automation Application Manager)
IBM Security Bulletin 0735477 (Spectrum Conductor)
IBM Security Bulletin 0737281 (Application Delivery Intelligence)
IBM Security Bulletin 0738853 (Tivoli Monitoring V6)
IBM Security Bulletin 0739057 (Sterling Connect:Direct for Microsoft Windows)
IBM Security Bulletin 0739549 (Sterling Connect:Direct File Agent)
IBM Security Bulletin 0739701 (Sterling Connect:Direct FTP+)
IBM Security Bulletin 0739763 (Sterling Connect:Direct for UNIX)
IBM Security Bulletin 0743351 (Workload Scheduler)
IBM Security Bulletin 0792275 (Tivoli Netcool/Impact)
IBM Security Bulletin 2015806 (Runtimes for Java Technology)
IBM Security Bulletin 2016406 (Decision Optimization Center)
IBM Security Bulletin 2016663 (Tivoli Netcool OMNIbus)
IBM Security Bulletin 2016776 (Content Collector)
IBM Security Bulletin 2016781 (Content Collector for SAP Applications)
IBM Security Bulletin 2016827 (MessageSight)
IBM Security Bulletin 2017431 (PureApplication System)
IBM Security Bulletin 2017432 (PureApplication System)
IBM Security Bulletin 2017449 (Web Experience Factory)
IBM Security Bulletin 2017554 (Rational Software Architect)
IBM Security Bulletin 715641 (Cognos Business Intelligence Server)
IBM Security Bulletin 717121 (Cognos Controller)
IBM Security Bulletin 717125 (MQ Appliance)
IBM Security Bulletin 719933 (Tivoli Application Dependency Discovery Manager)
IBM Security Bulletin 720173 (Transformation Extender)
IBM Security Bulletin 725491 (DB2 for Linux, UNIX and Windows)
IBM Security Bulletin 726009 (DataPower Gateways)
IBM Security Bulletin 728399 (WebSphere Service Registry and Repository)
IBM Security Bulletin 728567 (Algo Credit Manager)
IBM Security Bulletin 728607 (PureApplication System)
IBM Security Bulletin 729116 (Spectrum Protect Plus)
IBM Security Bulletin 729699 (QRadar SIEM)
IBM Security Bulletin 729745 (WebSphere Application Server Patterns)
IBM Security Bulletin 730083 (Rational ClearCase)
IBM Security Bulletin 730311 (Cognos Command Center)
IBM Security Bulletin 730799 (Spectrum Control Standard Edition)
IBM Security Bulletin 730909 (AIX family)
IBM Security Bulletin 731323 (Financial Transaction Manager)
IBM Security Bulletin 731325 (Financial Transaction Manager)
IBM Security Bulletin 731329 (i)
IBM Security Bulletin 731331 (Financial Transaction Manager)
IBM Security Bulletin 731337 (Financial Transaction Manager)
IBM Security Bulletin 731339 (Financial Transaction Manager)
IBM Security Bulletin 731419 (Rational Software Architect Designer)
IBM Security Bulletin 731507 (Rational Software Architect Design Manager)
IBM Security Bulletin 731615 (Process Designer)
IBM Security Bulletin 731641 (InfoSphere Guardium Data Redaction)
IBM Security Bulletin 731875 (FileNet System Monitor)
IBM Security Bulletin 732375 (Initiate Master Data Service)
IBM Security Bulletin 732455 (Rational Performance Tester)
IBM Security Bulletin 732457 (Rational Service Tester for SOA Quality)
IBM Security Bulletin 732723 (Tivoli Application Dependency Discovery Manager)
IBM Security Bulletin 732753 (Agile Lifecycle Manager)
IBM Security Bulletin 732785 (Security Guardium)
IBM Security Bulletin 732846 (Spectrum Symphony)
IBM Security Bulletin 732850 (App Connect Enterprise)
IBM Security Bulletin 732896 (Planning Analytics)
IBM Security Bulletin 732932 (SPSS Statistics)
IBM Security Bulletin 733068 (Liberty for Java for Bluemix)
IBM Security Bulletin 733457 (Tivoli Netcool/OMNIbus)
IBM Security Bulletin 733543 (Tivoli Netcool/Impact)
IBM Security Bulletin 733845 (Integration Designer)
IBM Security Bulletin 733857 (Rational DOORS Web Access)
IBM Security Bulletin 733869 (DataPower Gateways)
IBM Security Bulletin 733905 (Rational Application Developer for WebSphere Software)
IBM Security Bulletin 734161 (WebSphere Application Server in Cloud)
IBM Security Bulletin 734595 (Rational Build Forge)
IBM Security Bulletin 735325 (Tivoli System Automation for Multiplatforms)
IBM Security Bulletin 735421 (MessageSight)
IBM Security Bulletin 735481 (Rational Directory Server)
IBM Security Bulletin 735515 (Rational Host On-Demand)
IBM Security Bulletin 735541 (Rational Method Composer)
IBM Security Bulletin 735551 (Runtimes for Java Technology)
IBM Security Bulletin 735807 (Tivoli Monitoring V6)
IBM Security Bulletin 737495 (Cloud App Management)
IBM Security Bulletin 737775 (Web Experience Factory)
IBM Security Bulletin 737813 (Content Collector for SAP Applications)
IBM Security Bulletin 738337 (Monitoring)
IBM Security Bulletin 738347 (Rational Publishing Engine)
IBM Security Bulletin 738633 (WebSphere Service Registry and Repository)
IBM Security Bulletin 738729 (Installation Manager)
IBM Security Bulletin 738743 (Rational Developer for i)
IBM Security Bulletin 738905 (Cognos Insight)
IBM Security Bulletin 738907 (Cognos TM1)
IBM Security Bulletin 738985 (WebSphere MQ)
IBM Security Bulletin 738997 (MQ)
IBM Security Bulletin 739183 (http://www.ibm.com/support/docview.wss?uid=ibm10739183)
IBM Security Bulletin 739227 (Cloud Orchestrator)
IBM Security Bulletin 739231 (Algo Credit Manager)
IBM Security Bulletin 739251 (Decision Optimization Center)
IBM Security Bulletin 739261 (Monitoring)
IBM Security Bulletin 739387 (Spectrum Protect for Virtual Environments)
IBM Security Bulletin 739455 (Spectrum Protect Snapshot)
IBM Security Bulletin 739941 (Content Collector)
IBM Security Bulletin 739985 (WebSphere Application Server Patterns)
IBM Security Bulletin 740269 (Notes)
IBM Security Bulletin 740383 (Sterling Connect:Direct Browser User Interface)
IBM Security Bulletin 740419 (Security Access Manager Appliance)
IBM Security Bulletin 740447 (Operational Decision Manager)
IBM Security Bulletin 740467 (Tivoli Storage Manager FastBack)
IBM Security Bulletin 740673 (Control Center)
IBM Security Bulletin 741745 (Tivoli Composite Application Manager (ITCAM) for Transactions)
IBM Security Bulletin 742369 (Security SiteProtector System)
IBM Security Bulletin 742729 (QRadar SIEM)
IBM Security Bulletin 743071 (Rational Asset Analyzer)
IBM Security Bulletin 743149 (Financial Transaction Manager)
IBM Security Bulletin 743157 (Financial Transaction Manager)
IBM Security Bulletin 743193 (Spectrum Protect)
IBM Security Bulletin 743961 (Rational Publishing Engine)
IBM Security Bulletin 744823 (Rational Collaborative Lifecycle Management)
IBM Security Bulletin 787583 (API Connect)
IBM Security Bulletin 787833 (AIX family)
IBM Security Bulletin 788277 (WebSphere Cast Iron)
IBM Security Bulletin 789805 (WebSphere MQ)
IBM Security Bulletin 791171 (Rational DOORS Web Access)
IBM Security Bulletin 791855 (WebSphere eXtreme Scale)
IBM Security Bulletin 791861 (WebSphere DataPower XC10 Appliance)
IBM Security Bulletin 792239 (Cloud Manager with Openstack)
IBM Security Bulletin T1027807 (AIX family)
JVN:JVN#03188560
JVN:JVN#65044642
JVNDB:JVNDB-2016-000096
JVNDB:JVNDB-2016-000097
L3:42159
L3:44989
L3:45334
L3:45906
L3:47274
L3:53225
MANDRIVA:MDVSA-2009:302
MANDRIVA:MDVSA-2014:095
MANDRIVA:MDVSA-2015:002
MANDRIVA:MDVSA-2015:136
MANDRIVA:MDVSA-2015:137
MANDRIVA:MDVSA-2015:227
MISC:access.redhat.com:CVE-2014-0245
MISC:access.redhat.com:MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MISC:blog.diniscruz.com:CVE-2013-7285
MISC:blogs.gentoo.org:CVE-2016-9399
MISC:bugs.exim.org:CVE-2015-2325
MISC:bugs.exim.org:CVE-2015-2326
MISC:bugs.launchpad.net:MLIST:[oss-security] 20150911 CVE Request: 2 FreeType issues
MISC:bugs.php.net:CVE-2009-3559
MISC:bugs.php.net:MISC:www.openwall.com
MISC:bugzilla.redhat.com:CVE-2014-0245
MISC:bugzilla.redhat.com:CVE-2016-9586
MISC:curl.haxx.se
MISC:curl.haxx.se:OSS:2018/Q1/235
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:developer.mozilla.org:CVE-2016-1979
MISC:eprint.iacr.org:CVE-2016-2178
MISC:eprint.iacr.org:CVE-2017-0379
MISC:exchange.xforce.ibmcloud.com:CVE-2014-4172
MISC:fortiguard.com:CVE-2015-2325
MISC:fortiguard.com:CVE-2015-2326
MISC:git.gnupg.org:CVE-2017-0379
MISC:git.openssl.org:MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MISC:github.com:CVE-2014-4172
MISC:github.com:CVE-2015-9251
MISC:github.com:CVE-2017-14229
MISC:github.com:MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
MISC:github.com:OSS:2018/Q1/235
MISC:github.com:OSS:2024/Q1/256
MISC:ics-cert.us-cert.gov:CVE-2015-9251
MISC:issues.apache.org:CVE-2014-4651
MISC:issues.jasig.org:CVE-2014-4172
MISC:legalhackers.com:CVE-2016-6662
MISC:lists.apache.org:CVE-2018-1305
MISC:lists.debian.org:CVE-2017-0379
MISC:lists.fedoraproject.org:CVE-2014-4172
MISC:mail-archives.apache.org:CVE-2016-6814
MISC:nodesecurity.io:CVE-2014-10064
MISC:nodesecurity.io:CVE-2015-8857
MISC:nodesecurity.io:MLIST:[oss-security] 20160420 various vulnerabilities in Node.js packages
MISC:packetstormsecurity.com:CVE-2014-4330
MISC:packetstormsecurity.com:CVE-2016-0755
MISC:packetstormsecurity.com:CVE-2016-4979
MISC:savannah.nongnu.org:CVE-2014-9747
MISC:seclists.org:CVE-2014-4651
MISC:security-tracker.debian.org:CVE-2016-4000
MISC:security-tracker.debian.org:CVE-2017-0379
MISC:snyk.io:CVE-2015-9251
MISC:snyk.io:CVE-2016-4000
MISC:sw.aveva.com:CVE-2015-9251
MISC:web-in-security.blogspot.ca:CVE-2015-7940
MISC:web.archive.org:CVE-2013-7285
MISC:wiki.mozilla.org:CVE-2016-9843
MISC:www.arista.com:CVE-2016-6306
MISC:www.debian.org:CVE-2014-4172
MISC:www.fortiguard.com:CVE-2015-2327
MISC:www.fortiguard.com:CVE-2015-2328
MISC:www.fortiguard.com:CVE-2015-9104
MISC:www.fortiguard.com:CVE-2015-9105
MISC:www.mail-archive.com:CVE-2014-4172
MISC:www.openssl.org:CVE-2016-6302
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2014-0107
MISC:www.oracle.com:CVE-2015-7501
MISC:www.oracle.com:CVE-2016-1000031
MISC:www.sourceclear.com:CVE-2015-8861
MISC:www.talosintelligence.com:CVE-2016-5684
MISC:www.tenable.com:CVE-2016-1000031
MISC:www.tenable.com:CVE-2016-6793
MLIST:[activemq-issues] 20190718 [jira] [Updated] (AMQ-7236) SEV-1 Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring framework) and xstream-1.4.10.jar
MLIST:[activemq-issues] 20190826 [jira] [Created] (AMQ-7288) Security Vulnerabilities in ActiveMQ dependent libraries.
MLIST:[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior
MLIST:[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[debian-lts-announce] 20180306 [SECURITY] [DLA 1301-1] tomcat7 security update
MLIST:[debian-lts-announce] 20180318 [SECURITY] [DLA 1309-1] curl security update
MLIST:[debian-lts-announce] 20180627 [SECURITY] [DLA 1400-1] tomcat7 security update
MLIST:[debian-lts-announce] 20180729 [SECURITY] [DLA 1450-1] tomcat8 security update
MLIST:[debian-lts-announce] 20181105 [SECURITY] [DLA 1566-1] mysql-5.5 security update
MLIST:[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update
MLIST:[debian-lts-announce] 20181122 [SECURITY] [DLA 1590-1] openjdk-7 security update
MLIST:[debian-lts-announce] 20190201 [SECURITY] [DLA 1655-1] mariadb-10.0 security update
MLIST:[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update
MLIST:[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update
MLIST:[flink-dev] 20190811 Apache flink 1.7.2 security issues
MLIST:[flink-user] 20190811 Apache flink 1.7.2 security issues
MLIST:[flink-user] 20190813 Apache flink 1.7.2 security issues
MLIST:[flink-user] 20190813 Re: Apache flink 1.7.2 security issues
MLIST:[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20....
MLIST:[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20....
MLIST:[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20....
MLIST:[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20....
MLIST:[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
MLIST:[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
MLIST:[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html secu...
MLIST:[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html se...
MLIST:[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
MLIST:[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
MLIST:[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/
MLIST:[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.h...
MLIST:[oss-security] 20091120 CVE request: php 5.3.1 update
MLIST:[oss-security] 20091120 Re: CVE request: php 5.3.1 update
MLIST:[oss-security] 20140109 Re: CVE request: remote code execution via deserialization in XStream
MLIST:[oss-security] 20140220 Re: Possible CVE Requests: several issues fixed in Jenkins (Advisory 2014-02-14)
MLIST:[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE
MLIST:[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE
MLIST:[oss-security] 20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
MLIST:[oss-security] 20141121 Re: CVE request: heap buffer overflow in PCRE
MLIST:[oss-security] 20150804 Re: CVE Request: Information disclosure in pcre
MLIST:[oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp
MLIST:[oss-security] 20150911 CVE Request: 2 FreeType issues
MLIST:[oss-security] 20150925 Re: CVE Request: 2 FreeType issues
MLIST:[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle
MLIST:[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle
MLIST:[oss-security] 20151128 Re: Heap Overflow in PCRE
MLIST:[oss-security] 20160420 various vulnerabilities in Node.js packages
MLIST:[oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases
MLIST:[oss-security] 20160608 CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MLIST:[oss-security] 20160609 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MLIST:[oss-security] 20160705 CVE-2016-4979: HTTPD webserver - X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs]
MLIST:[oss-security] 20160912 CVE-2016-6662 - MySQL Remote Root Code Execution / Privilege Escalation ( 0day )
MLIST:[oss-security] 20161117 Re: jasper: multiple assertion failures
MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
MLIST:[perl.perl5.porters] 20140918 fix for CVE-2014-4330 present in blead
MLIST:[php-announce] 20091119 5.3.1 Release announcement
MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
MLIST:[xstream-user] 20130717 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper
MLIST:[xstream-user] 20130718 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper
OSS:2015/Q4/414
OSS:2015/Q4/419
OSS:2015/Q4/422
OSS:2016/Q1/258
OSS:2016/Q1/625
OSS:2016/Q2/122
OSS:2016/Q2/493
OSS:2016/Q3/137
OSS:2016/Q3/481
OSS:2016/Q3/602
OSS:2016/Q4/602
OSS:2016/Q4/719
OSS:2017/Q2/418
OSS:2017/Q4/297
OSS:2017/Q4/298
OSS:2017/Q4/299
OSS:2017/Q4/300
OSS:2017/Q4/301
OSS:2017/Q4/59
OSS:2017/Q4/60
OSS:2018/Q1/174
OSS:2018/Q1/235
OSS:2018/Q2/21
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/11/10/2
OSS:2022/Q3/99
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2024/03/27/4
OSS:2024/Q1/256
Oracle:CVE-2011-4461
Oracle:CVE-2013-1768
Oracle:CVE-2014-0114
Oracle:CVE-2014-3490
Oracle:CVE-2014-3577
Oracle:CVE-2015-0204
Oracle:CVE-2015-0235
Oracle:CVE-2015-0405
Oracle:CVE-2015-0423
Oracle:CVE-2015-0433
Oracle:CVE-2015-0438
Oracle:CVE-2015-0439
Oracle:CVE-2015-0441
Oracle:CVE-2015-0498
Oracle:CVE-2015-0499
Oracle:CVE-2015-0500
Oracle:CVE-2015-0501
Oracle:CVE-2015-0503
Oracle:CVE-2015-0505
Oracle:CVE-2015-0506
Oracle:CVE-2015-0507
Oracle:CVE-2015-0508
Oracle:CVE-2015-0511
Oracle:CVE-2015-1832
Oracle:CVE-2015-2566
Oracle:CVE-2015-2567
Oracle:CVE-2015-2568
Oracle:CVE-2015-2571
Oracle:CVE-2015-2573
Oracle:CVE-2015-2575
Oracle:CVE-2015-2576
Oracle:CVE-2015-5600
Oracle:CVE-2015-6937
Oracle:CVE-2015-7501
Oracle:CVE-2015-7940
Oracle:CVE-2015-8965
Oracle:CVE-2015-9251
Oracle:CVE-2016-0635
Oracle:CVE-2016-0714
Oracle:CVE-2016-0729
Oracle:CVE-2016-1000031
Oracle:CVE-2016-1181
Oracle:CVE-2016-1182
Oracle:CVE-2016-1950
Oracle:CVE-2016-2099
Oracle:CVE-2016-2107
Oracle:CVE-2016-2176
Oracle:CVE-2016-2179
Oracle:CVE-2016-2183
Oracle:CVE-2016-3092
Oracle:CVE-2016-3506
Oracle:CVE-2016-4000
Oracle:CVE-2016-4055
Oracle:CVE-2016-4979
Oracle:CVE-2016-5007
Oracle:CVE-2016-5019
Oracle:CVE-2016-5080
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2016-5501
Oracle:CVE-2016-5538
Oracle:CVE-2016-5605
Oracle:CVE-2016-5608
Oracle:CVE-2016-5610
Oracle:CVE-2016-5611
Oracle:CVE-2016-5613
Oracle:CVE-2016-5616
Oracle:CVE-2016-5617
Oracle:CVE-2016-5684
Oracle:CVE-2016-6304
Oracle:CVE-2016-6662
Oracle:CVE-2016-6814
Oracle:CVE-2016-7103
Oracle:CVE-2016-7167
Oracle:CVE-2016-9583
Oracle:CVE-2016-9841
Oracle:CVE-2016-9843
Oracle:CVE-2016-9878
Oracle:CVE-2017-0379
Oracle:CVE-2017-10068
Oracle:CVE-2017-12617
Oracle:CVE-2017-13077
Oracle:CVE-2017-13745
Oracle:CVE-2017-14229
Oracle:CVE-2017-14735
Oracle:CVE-2017-15095
Oracle:CVE-2017-17562
Oracle:CVE-2017-3308
Oracle:CVE-2017-3309
Oracle:CVE-2017-3329
Oracle:CVE-2017-3453
Oracle:CVE-2017-3454
Oracle:CVE-2017-3456
Oracle:CVE-2017-3461
Oracle:CVE-2017-3462
Oracle:CVE-2017-3463
Oracle:CVE-2017-3464
Oracle:CVE-2017-3468
Oracle:CVE-2017-3600
Oracle:CVE-2017-3633
Oracle:CVE-2017-3732
Oracle:CVE-2017-3736
Oracle:CVE-2017-3737
Oracle:CVE-2017-5533
Oracle:CVE-2017-5645
Oracle:CVE-2017-5662
Oracle:CVE-2017-5664
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-6074
Oracle:CVE-2017-7525
Oracle:CVE-2017-7805
Oracle:CVE-2017-9798
Oracle:CVE-2018-0732
Oracle:CVE-2018-0734
Oracle:CVE-2018-0739
Oracle:CVE-2018-1000120
Oracle:CVE-2018-1000300
Oracle:CVE-2018-10933
Oracle:CVE-2018-11039
Oracle:CVE-2018-1171
Oracle:CVE-2018-11776
Oracle:CVE-2018-1258
Oracle:CVE-2018-1275
Oracle:CVE-2018-1305
Oracle:CVE-2018-13785
Oracle:CVE-2018-1656
Oracle:CVE-2018-2562
Oracle:CVE-2018-2563
Oracle:CVE-2018-2572
Oracle:CVE-2018-2587
Oracle:CVE-2018-2598
Oracle:CVE-2018-2612
Oracle:CVE-2018-2622
Oracle:CVE-2018-2628
Oracle:CVE-2018-2640
Oracle:CVE-2018-2665
Oracle:CVE-2018-2668
Oracle:CVE-2018-2676
Oracle:CVE-2018-2685
Oracle:CVE-2018-2686
Oracle:CVE-2018-2687
Oracle:CVE-2018-2688
Oracle:CVE-2018-2689
Oracle:CVE-2018-2690
Oracle:CVE-2018-2693
Oracle:CVE-2018-2694
Oracle:CVE-2018-2698
Oracle:CVE-2018-2718
Oracle:CVE-2018-2737
Oracle:CVE-2018-2738
Oracle:CVE-2018-2739
Oracle:CVE-2018-2742
Oracle:CVE-2018-2746
Oracle:CVE-2018-2747
Oracle:CVE-2018-2748
Oracle:CVE-2018-2749
Oracle:CVE-2018-2750
Oracle:CVE-2018-2752
Oracle:CVE-2018-2753
Oracle:CVE-2018-2754
Oracle:CVE-2018-2755
Oracle:CVE-2018-2756
Oracle:CVE-2018-2758
Oracle:CVE-2018-2759
Oracle:CVE-2018-2760
Oracle:CVE-2018-2761
Oracle:CVE-2018-2762
Oracle:CVE-2018-2763
Oracle:CVE-2018-2764
Oracle:CVE-2018-2765
Oracle:CVE-2018-2766
Oracle:CVE-2018-2767
Oracle:CVE-2018-2768
Oracle:CVE-2018-2769
Oracle:CVE-2018-2770
Oracle:CVE-2018-2771
Oracle:CVE-2018-2772
Oracle:CVE-2018-2773
Oracle:CVE-2018-2774
Oracle:CVE-2018-2775
Oracle:CVE-2018-2776
Oracle:CVE-2018-2777
Oracle:CVE-2018-2778
Oracle:CVE-2018-2779
Oracle:CVE-2018-2780
Oracle:CVE-2018-2781
Oracle:CVE-2018-2782
Oracle:CVE-2018-2783
Oracle:CVE-2018-2784
Oracle:CVE-2018-2785
Oracle:CVE-2018-2786
Oracle:CVE-2018-2787
Oracle:CVE-2018-2788
Oracle:CVE-2018-2789
Oracle:CVE-2018-2790
Oracle:CVE-2018-2791
Oracle:CVE-2018-2792
Oracle:CVE-2018-2793
Oracle:CVE-2018-2794
Oracle:CVE-2018-2795
Oracle:CVE-2018-2796
Oracle:CVE-2018-2797
Oracle:CVE-2018-2798
Oracle:CVE-2018-2799
Oracle:CVE-2018-2800
Oracle:CVE-2018-2801
Oracle:CVE-2018-2804
Oracle:CVE-2018-2805
Oracle:CVE-2018-2806
Oracle:CVE-2018-2807
Oracle:CVE-2018-2808
Oracle:CVE-2018-2809
Oracle:CVE-2018-2810
Oracle:CVE-2018-2811
Oracle:CVE-2018-2812
Oracle:CVE-2018-2813
Oracle:CVE-2018-2814
Oracle:CVE-2018-2815
Oracle:CVE-2018-2816
Oracle:CVE-2018-2817
Oracle:CVE-2018-2818
Oracle:CVE-2018-2819
Oracle:CVE-2018-2820
Oracle:CVE-2018-2821
Oracle:CVE-2018-2822
Oracle:CVE-2018-2823
Oracle:CVE-2018-2825
Oracle:CVE-2018-2826
Oracle:CVE-2018-2827
Oracle:CVE-2018-2828
Oracle:CVE-2018-2830
Oracle:CVE-2018-2831
Oracle:CVE-2018-2832
Oracle:CVE-2018-2834
Oracle:CVE-2018-2835
Oracle:CVE-2018-2836
Oracle:CVE-2018-2837
Oracle:CVE-2018-2838
Oracle:CVE-2018-2839
Oracle:CVE-2018-2840
Oracle:CVE-2018-2841
Oracle:CVE-2018-2842
Oracle:CVE-2018-2843
Oracle:CVE-2018-2844
Oracle:CVE-2018-2845
Oracle:CVE-2018-2846
Oracle:CVE-2018-2849
Oracle:CVE-2018-2850
Oracle:CVE-2018-2852
Oracle:CVE-2018-2854
Oracle:CVE-2018-2855
Oracle:CVE-2018-2856
Oracle:CVE-2018-2857
Oracle:CVE-2018-2858
Oracle:CVE-2018-2859
Oracle:CVE-2018-2860
Oracle:CVE-2018-2861
Oracle:CVE-2018-2862
Oracle:CVE-2018-2863
Oracle:CVE-2018-2864
Oracle:CVE-2018-2865
Oracle:CVE-2018-2866
Oracle:CVE-2018-2867
Oracle:CVE-2018-2868
Oracle:CVE-2018-2869
Oracle:CVE-2018-2870
Oracle:CVE-2018-2871
Oracle:CVE-2018-2872
Oracle:CVE-2018-2873
Oracle:CVE-2018-2874
Oracle:CVE-2018-2876
Oracle:CVE-2018-2877
Oracle:CVE-2018-2878
Oracle:CVE-2018-2879
Oracle:CVE-2018-2881
Oracle:CVE-2018-2882
Oracle:CVE-2018-2887
Oracle:CVE-2018-2888
Oracle:CVE-2018-2889
Oracle:CVE-2018-2891
Oracle:CVE-2018-2892
Oracle:CVE-2018-2893
Oracle:CVE-2018-2894
Oracle:CVE-2018-2895
Oracle:CVE-2018-2896
Oracle:CVE-2018-2897
Oracle:CVE-2018-2898
Oracle:CVE-2018-2899
Oracle:CVE-2018-2900
Oracle:CVE-2018-2901
Oracle:CVE-2018-2902
Oracle:CVE-2018-2903
Oracle:CVE-2018-2904
Oracle:CVE-2018-2905
Oracle:CVE-2018-2906
Oracle:CVE-2018-2907
Oracle:CVE-2018-2908
Oracle:CVE-2018-2909
Oracle:CVE-2018-2911
Oracle:CVE-2018-2912
Oracle:CVE-2018-2913
Oracle:CVE-2018-2914
Oracle:CVE-2018-2915
Oracle:CVE-2018-2916
Oracle:CVE-2018-2917
Oracle:CVE-2018-2918
Oracle:CVE-2018-2919
Oracle:CVE-2018-2920
Oracle:CVE-2018-2921
Oracle:CVE-2018-2922
Oracle:CVE-2018-2923
Oracle:CVE-2018-2924
Oracle:CVE-2018-2925
Oracle:CVE-2018-2926
Oracle:CVE-2018-2927
Oracle:CVE-2018-2928
Oracle:CVE-2018-2929
Oracle:CVE-2018-2930
Oracle:CVE-2018-2932
Oracle:CVE-2018-2933
Oracle:CVE-2018-2934
Oracle:CVE-2018-2935
Oracle:CVE-2018-2936
Oracle:CVE-2018-2937
Oracle:CVE-2018-2938
Oracle:CVE-2018-2939
Oracle:CVE-2018-2940
Oracle:CVE-2018-2941
Oracle:CVE-2018-2942
Oracle:CVE-2018-2943
Oracle:CVE-2018-2944
Oracle:CVE-2018-2945
Oracle:CVE-2018-2946
Oracle:CVE-2018-2947
Oracle:CVE-2018-2948
Oracle:CVE-2018-2949
Oracle:CVE-2018-2950
Oracle:CVE-2018-2951
Oracle:CVE-2018-2952
Oracle:CVE-2018-2953
Oracle:CVE-2018-2954
Oracle:CVE-2018-2955
Oracle:CVE-2018-2956
Oracle:CVE-2018-2957
Oracle:CVE-2018-2958
Oracle:CVE-2018-2959
Oracle:CVE-2018-2960
Oracle:CVE-2018-2961
Oracle:CVE-2018-2962
Oracle:CVE-2018-2963
Oracle:CVE-2018-2964
Oracle:CVE-2018-2965
Oracle:CVE-2018-2966
Oracle:CVE-2018-2967
Oracle:CVE-2018-2968
Oracle:CVE-2018-2969
Oracle:CVE-2018-2970
Oracle:CVE-2018-2971
Oracle:CVE-2018-2972
Oracle:CVE-2018-2973
Oracle:CVE-2018-2974
Oracle:CVE-2018-2975
Oracle:CVE-2018-2976
Oracle:CVE-2018-2977
Oracle:CVE-2018-2979
Oracle:CVE-2018-2980
Oracle:CVE-2018-2981
Oracle:CVE-2018-2982
Oracle:CVE-2018-2984
Oracle:CVE-2018-2985
Oracle:CVE-2018-2986
Oracle:CVE-2018-2987
Oracle:CVE-2018-2988
Oracle:CVE-2018-2989
Oracle:CVE-2018-2990
Oracle:CVE-2018-2991
Oracle:CVE-2018-2992
Oracle:CVE-2018-2993
Oracle:CVE-2018-2994
Oracle:CVE-2018-2995
Oracle:CVE-2018-2996
Oracle:CVE-2018-2997
Oracle:CVE-2018-2998
Oracle:CVE-2018-2999
Oracle:CVE-2018-3000
Oracle:CVE-2018-3001
Oracle:CVE-2018-3002
Oracle:CVE-2018-3003
Oracle:CVE-2018-3004
Oracle:CVE-2018-3005
Oracle:CVE-2018-3006
Oracle:CVE-2018-3007
Oracle:CVE-2018-3008
Oracle:CVE-2018-3009
Oracle:CVE-2018-3010
Oracle:CVE-2018-3011
Oracle:CVE-2018-3012
Oracle:CVE-2018-3013
Oracle:CVE-2018-3014
Oracle:CVE-2018-3015
Oracle:CVE-2018-3016
Oracle:CVE-2018-3017
Oracle:CVE-2018-3018
Oracle:CVE-2018-3019
Oracle:CVE-2018-3020
Oracle:CVE-2018-3021
Oracle:CVE-2018-3022
Oracle:CVE-2018-3023
Oracle:CVE-2018-3024
Oracle:CVE-2018-3025
Oracle:CVE-2018-3026
Oracle:CVE-2018-3027
Oracle:CVE-2018-3028
Oracle:CVE-2018-3029
Oracle:CVE-2018-3030
Oracle:CVE-2018-3031
Oracle:CVE-2018-3032
Oracle:CVE-2018-3033
Oracle:CVE-2018-3034
Oracle:CVE-2018-3035
Oracle:CVE-2018-3036
Oracle:CVE-2018-3037
Oracle:CVE-2018-3038
Oracle:CVE-2018-3039
Oracle:CVE-2018-3040
Oracle:CVE-2018-3041
Oracle:CVE-2018-3042
Oracle:CVE-2018-3043
Oracle:CVE-2018-3044
Oracle:CVE-2018-3045
Oracle:CVE-2018-3046
Oracle:CVE-2018-3047
Oracle:CVE-2018-3048
Oracle:CVE-2018-3049
Oracle:CVE-2018-3050
Oracle:CVE-2018-3051
Oracle:CVE-2018-3052
Oracle:CVE-2018-3053
Oracle:CVE-2018-3054
Oracle:CVE-2018-3055
Oracle:CVE-2018-3056
Oracle:CVE-2018-3057
Oracle:CVE-2018-3058
Oracle:CVE-2018-3059
Oracle:CVE-2018-3060
Oracle:CVE-2018-3061
Oracle:CVE-2018-3062
Oracle:CVE-2018-3063
Oracle:CVE-2018-3064
Oracle:CVE-2018-3065
Oracle:CVE-2018-3066
Oracle:CVE-2018-3067
Oracle:CVE-2018-3068
Oracle:CVE-2018-3069
Oracle:CVE-2018-3070
Oracle:CVE-2018-3071
Oracle:CVE-2018-3072
Oracle:CVE-2018-3073
Oracle:CVE-2018-3074
Oracle:CVE-2018-3075
Oracle:CVE-2018-3076
Oracle:CVE-2018-3077
Oracle:CVE-2018-3078
Oracle:CVE-2018-3079
Oracle:CVE-2018-3080
Oracle:CVE-2018-3081
Oracle:CVE-2018-3082
Oracle:CVE-2018-3084
Oracle:CVE-2018-3085
Oracle:CVE-2018-3086
Oracle:CVE-2018-3087
Oracle:CVE-2018-3088
Oracle:CVE-2018-3089
Oracle:CVE-2018-3090
Oracle:CVE-2018-3091
Oracle:CVE-2018-3092
Oracle:CVE-2018-3093
Oracle:CVE-2018-3094
Oracle:CVE-2018-3095
Oracle:CVE-2018-3096
Oracle:CVE-2018-3097
Oracle:CVE-2018-3098
Oracle:CVE-2018-3099
Oracle:CVE-2018-3100
Oracle:CVE-2018-3101
Oracle:CVE-2018-3102
Oracle:CVE-2018-3103
Oracle:CVE-2018-3104
Oracle:CVE-2018-3105
Oracle:CVE-2018-3108
Oracle:CVE-2018-3109
Oracle:CVE-2018-3115
Oracle:CVE-2018-3122
Oracle:CVE-2018-3125
Oracle:CVE-2018-3126
Oracle:CVE-2018-3127
Oracle:CVE-2018-3128
Oracle:CVE-2018-3129
Oracle:CVE-2018-3130
Oracle:CVE-2018-3131
Oracle:CVE-2018-3132
Oracle:CVE-2018-3133
Oracle:CVE-2018-3134
Oracle:CVE-2018-3135
Oracle:CVE-2018-3136
Oracle:CVE-2018-3137
Oracle:CVE-2018-3138
Oracle:CVE-2018-3139
Oracle:CVE-2018-3140
Oracle:CVE-2018-3141
Oracle:CVE-2018-3142
Oracle:CVE-2018-3143
Oracle:CVE-2018-3144
Oracle:CVE-2018-3145
Oracle:CVE-2018-3146
Oracle:CVE-2018-3147
Oracle:CVE-2018-3148
Oracle:CVE-2018-3149
Oracle:CVE-2018-3150
Oracle:CVE-2018-3151
Oracle:CVE-2018-3152
Oracle:CVE-2018-3153
Oracle:CVE-2018-3154
Oracle:CVE-2018-3155
Oracle:CVE-2018-3156
Oracle:CVE-2018-3157
Oracle:CVE-2018-3158
Oracle:CVE-2018-3159
Oracle:CVE-2018-3160
Oracle:CVE-2018-3161
Oracle:CVE-2018-3162
Oracle:CVE-2018-3163
Oracle:CVE-2018-3164
Oracle:CVE-2018-3165
Oracle:CVE-2018-3166
Oracle:CVE-2018-3167
Oracle:CVE-2018-3168
Oracle:CVE-2018-3169
Oracle:CVE-2018-3170
Oracle:CVE-2018-3171
Oracle:CVE-2018-3172
Oracle:CVE-2018-3173
Oracle:CVE-2018-3174
Oracle:CVE-2018-3175
Oracle:CVE-2018-3176
Oracle:CVE-2018-3177
Oracle:CVE-2018-3178
Oracle:CVE-2018-3179
Oracle:CVE-2018-3180
Oracle:CVE-2018-3181
Oracle:CVE-2018-3182
Oracle:CVE-2018-3183
Oracle:CVE-2018-3184
Oracle:CVE-2018-3185
Oracle:CVE-2018-3186
Oracle:CVE-2018-3187
Oracle:CVE-2018-3188
Oracle:CVE-2018-3189
Oracle:CVE-2018-3190
Oracle:CVE-2018-3191
Oracle:CVE-2018-3192
Oracle:CVE-2018-3193
Oracle:CVE-2018-3194
Oracle:CVE-2018-3195
Oracle:CVE-2018-3196
Oracle:CVE-2018-3197
Oracle:CVE-2018-3198
Oracle:CVE-2018-3200
Oracle:CVE-2018-3201
Oracle:CVE-2018-3202
Oracle:CVE-2018-3203
Oracle:CVE-2018-3204
Oracle:CVE-2018-3205
Oracle:CVE-2018-3206
Oracle:CVE-2018-3207
Oracle:CVE-2018-3208
Oracle:CVE-2018-3209
Oracle:CVE-2018-3210
Oracle:CVE-2018-3211
Oracle:CVE-2018-3212
Oracle:CVE-2018-3213
Oracle:CVE-2018-3214
Oracle:CVE-2018-3215
Oracle:CVE-2018-3217
Oracle:CVE-2018-3218
Oracle:CVE-2018-3219
Oracle:CVE-2018-3220
Oracle:CVE-2018-3221
Oracle:CVE-2018-3222
Oracle:CVE-2018-3223
Oracle:CVE-2018-3224
Oracle:CVE-2018-3225
Oracle:CVE-2018-3226
Oracle:CVE-2018-3227
Oracle:CVE-2018-3228
Oracle:CVE-2018-3229
Oracle:CVE-2018-3230
Oracle:CVE-2018-3231
Oracle:CVE-2018-3232
Oracle:CVE-2018-3233
Oracle:CVE-2018-3234
Oracle:CVE-2018-3235
Oracle:CVE-2018-3236
Oracle:CVE-2018-3237
Oracle:CVE-2018-3238
Oracle:CVE-2018-3239
Oracle:CVE-2018-3241
Oracle:CVE-2018-3242
Oracle:CVE-2018-3243
Oracle:CVE-2018-3244
Oracle:CVE-2018-3245
Oracle:CVE-2018-3246
Oracle:CVE-2018-3247
Oracle:CVE-2018-3248
Oracle:CVE-2018-3249
Oracle:CVE-2018-3250
Oracle:CVE-2018-3251
Oracle:CVE-2018-3252
Oracle:CVE-2018-3253
Oracle:CVE-2018-3254
Oracle:CVE-2018-3255
Oracle:CVE-2018-3256
Oracle:CVE-2018-3257
Oracle:CVE-2018-3258
Oracle:CVE-2018-3259
Oracle:CVE-2018-3261
Oracle:CVE-2018-3262
Oracle:CVE-2018-3263
Oracle:CVE-2018-3264
Oracle:CVE-2018-3265
Oracle:CVE-2018-3266
Oracle:CVE-2018-3267
Oracle:CVE-2018-3268
Oracle:CVE-2018-3269
Oracle:CVE-2018-3270
Oracle:CVE-2018-3271
Oracle:CVE-2018-3272
Oracle:CVE-2018-3273
Oracle:CVE-2018-3274
Oracle:CVE-2018-3275
Oracle:CVE-2018-3276
Oracle:CVE-2018-3277
Oracle:CVE-2018-3278
Oracle:CVE-2018-3279
Oracle:CVE-2018-3280
Oracle:CVE-2018-3281
Oracle:CVE-2018-3282
Oracle:CVE-2018-3283
Oracle:CVE-2018-3284
Oracle:CVE-2018-3285
Oracle:CVE-2018-3286
Oracle:CVE-2018-3287
Oracle:CVE-2018-3288
Oracle:CVE-2018-3289
Oracle:CVE-2018-3290
Oracle:CVE-2018-3291
Oracle:CVE-2018-3292
Oracle:CVE-2018-3293
Oracle:CVE-2018-3294
Oracle:CVE-2018-3295
Oracle:CVE-2018-3296
Oracle:CVE-2018-3297
Oracle:CVE-2018-3298
Oracle:CVE-2018-3299
Oracle:CVE-2018-3301
Oracle:CVE-2018-3302
Oracle:CVE-2018-3303
Oracle:CVE-2018-3304
Oracle:CVE-2018-3305
Oracle:CVE-2018-3309
Oracle:CVE-2018-3311
Oracle:CVE-2018-3639
Oracle:CVE-2018-7489
Oracle:CVE-2018-8013
Oracle:CVE-2018-8014
Oracle:CVE-2018-8037
Oracle:CVE-2019-10173
Oracle:CVE-2019-2395
Oracle:CVE-2019-2396
Oracle:CVE-2019-2397
Oracle:CVE-2019-2398
Oracle:CVE-2019-2399
Oracle:CVE-2019-2400
Oracle:CVE-2019-2401
Oracle:CVE-2019-2402
Oracle:CVE-2019-2403
Oracle:CVE-2019-2404
Oracle:CVE-2019-2405
Oracle:CVE-2019-2406
Oracle:CVE-2019-2407
Oracle:CVE-2019-2408
Oracle:CVE-2019-2409
Oracle:CVE-2019-2410
Oracle:CVE-2019-2411
Oracle:CVE-2019-2412
Oracle:CVE-2019-2413
Oracle:CVE-2019-2414
Oracle:CVE-2019-2415
Oracle:CVE-2019-2416
Oracle:CVE-2019-2417
Oracle:CVE-2019-2418
Oracle:CVE-2019-2419
Oracle:CVE-2019-2420
Oracle:CVE-2019-2421
Oracle:CVE-2019-2422
Oracle:CVE-2019-2423
Oracle:CVE-2019-2425
Oracle:CVE-2019-2426
Oracle:CVE-2019-2427
Oracle:CVE-2019-2429
Oracle:CVE-2019-2430
Oracle:CVE-2019-2431
Oracle:CVE-2019-2432
Oracle:CVE-2019-2433
Oracle:CVE-2019-2434
Oracle:CVE-2019-2435
Oracle:CVE-2019-2436
Oracle:CVE-2019-2437
Oracle:CVE-2019-2438
Oracle:CVE-2019-2439
Oracle:CVE-2019-2440
Oracle:CVE-2019-2441
Oracle:CVE-2019-2442
Oracle:CVE-2019-2443
Oracle:CVE-2019-2444
Oracle:CVE-2019-2445
Oracle:CVE-2019-2446
Oracle:CVE-2019-2447
Oracle:CVE-2019-2448
Oracle:CVE-2019-2449
Oracle:CVE-2019-2450
Oracle:CVE-2019-2451
Oracle:CVE-2019-2452
Oracle:CVE-2019-2453
Oracle:CVE-2019-2455
Oracle:CVE-2019-2456
Oracle:CVE-2019-2457
Oracle:CVE-2019-2458
Oracle:CVE-2019-2459
Oracle:CVE-2019-2460
Oracle:CVE-2019-2461
Oracle:CVE-2019-2462
Oracle:CVE-2019-2463
Oracle:CVE-2019-2464
Oracle:CVE-2019-2465
Oracle:CVE-2019-2466
Oracle:CVE-2019-2467
Oracle:CVE-2019-2468
Oracle:CVE-2019-2469
Oracle:CVE-2019-2470
Oracle:CVE-2019-2471
Oracle:CVE-2019-2472
Oracle:CVE-2019-2473
Oracle:CVE-2019-2474
Oracle:CVE-2019-2475
Oracle:CVE-2019-2476
Oracle:CVE-2019-2477
Oracle:CVE-2019-2478
Oracle:CVE-2019-2479
Oracle:CVE-2019-2480
Oracle:CVE-2019-2481
Oracle:CVE-2019-2482
Oracle:CVE-2019-2485
Oracle:CVE-2019-2486
Oracle:CVE-2019-2487
Oracle:CVE-2019-2488
Oracle:CVE-2019-2489
Oracle:CVE-2019-2490
Oracle:CVE-2019-2491
Oracle:CVE-2019-2492
Oracle:CVE-2019-2493
Oracle:CVE-2019-2494
Oracle:CVE-2019-2495
Oracle:CVE-2019-2496
Oracle:CVE-2019-2497
Oracle:CVE-2019-2498
Oracle:CVE-2019-2499
Oracle:CVE-2019-2500
Oracle:CVE-2019-2501
Oracle:CVE-2019-2502
Oracle:CVE-2019-2503
Oracle:CVE-2019-2504
Oracle:CVE-2019-2505
Oracle:CVE-2019-2506
Oracle:CVE-2019-2507
Oracle:CVE-2019-2508
Oracle:CVE-2019-2509
Oracle:CVE-2019-2510
Oracle:CVE-2019-2511
Oracle:CVE-2019-2512
Oracle:CVE-2019-2513
Oracle:CVE-2019-2519
Oracle:CVE-2019-2520
Oracle:CVE-2019-2521
Oracle:CVE-2019-2522
Oracle:CVE-2019-2523
Oracle:CVE-2019-2524
Oracle:CVE-2019-2525
Oracle:CVE-2019-2526
Oracle:CVE-2019-2527
Oracle:CVE-2019-2528
Oracle:CVE-2019-2529
Oracle:CVE-2019-2530
Oracle:CVE-2019-2531
Oracle:CVE-2019-2532
Oracle:CVE-2019-2533
Oracle:CVE-2019-2534
Oracle:CVE-2019-2535
Oracle:CVE-2019-2536
Oracle:CVE-2019-2537
Oracle:CVE-2019-2538
Oracle:CVE-2019-2539
Oracle:CVE-2019-2540
Oracle:CVE-2019-2541
Oracle:CVE-2019-2543
Oracle:CVE-2019-2544
Oracle:CVE-2019-2545
Oracle:CVE-2019-2546
Oracle:CVE-2019-2547
Oracle:CVE-2019-2548
Oracle:CVE-2019-2549
Oracle:CVE-2019-2550
Oracle:CVE-2019-2552
Oracle:CVE-2019-2553
Oracle:CVE-2019-2554
Oracle:CVE-2019-2555
Oracle:CVE-2019-2556
RH:CVE-2009-3559
RH:CVE-2012-6153
RH:CVE-2013-7285
RH:CVE-2014-3540
RH:CVE-2014-4330
RH:CVE-2014-4651
RH:CVE-2014-8964
RH:CVE-2014-9746
RH:CVE-2014-9747
RH:CVE-2015-0405
RH:CVE-2015-0423
RH:CVE-2015-0433
RH:CVE-2015-0438
RH:CVE-2015-0439
RH:CVE-2015-0441
RH:CVE-2015-0498
RH:CVE-2015-0499
RH:CVE-2015-0500
RH:CVE-2015-0501
RH:CVE-2015-0503
RH:CVE-2015-0505
RH:CVE-2015-0506
RH:CVE-2015-0507
RH:CVE-2015-0508
RH:CVE-2015-0511
RH:CVE-2015-2325
RH:CVE-2015-2326
RH:CVE-2015-2327
RH:CVE-2015-2328
RH:CVE-2015-2566
RH:CVE-2015-2567
RH:CVE-2015-2568
RH:CVE-2015-2571
RH:CVE-2015-2573
RH:CVE-2015-2575
RH:CVE-2015-2576
RH:CVE-2015-5125
RH:CVE-2015-5127
RH:CVE-2015-5129
RH:CVE-2015-5130
RH:CVE-2015-5131
RH:CVE-2015-5132
RH:CVE-2015-5134
RH:CVE-2015-5539
RH:CVE-2015-5540
RH:CVE-2015-5541
RH:CVE-2015-5544
RH:CVE-2015-5545
RH:CVE-2015-5551
RH:CVE-2015-5552
RH:CVE-2015-5553
RH:CVE-2015-5554
RH:CVE-2015-5555
RH:CVE-2015-5556
RH:CVE-2015-5557
RH:CVE-2015-5558
RH:CVE-2015-5559
RH:CVE-2015-5560
RH:CVE-2015-5561
RH:CVE-2015-5564
RH:CVE-2015-5565
RH:CVE-2015-5566
RH:CVE-2015-7559
RH:CVE-2015-8315
RH:CVE-2015-8381
RH:CVE-2015-8382
RH:CVE-2015-8383
RH:CVE-2015-8384
RH:CVE-2015-8385
RH:CVE-2015-8386
RH:CVE-2015-8387
RH:CVE-2015-8388
RH:CVE-2015-8389
RH:CVE-2015-8390
RH:CVE-2015-8391
RH:CVE-2015-8392
RH:CVE-2015-8393
RH:CVE-2015-8394
RH:CVE-2015-8395
RH:CVE-2015-8855
RH:CVE-2015-8860
RH:CVE-2016-0755
RH:CVE-2016-1672
RH:CVE-2016-1673
RH:CVE-2016-1674
RH:CVE-2016-1675
RH:CVE-2016-1676
RH:CVE-2016-1677
RH:CVE-2016-1678
RH:CVE-2016-1679
RH:CVE-2016-1680
RH:CVE-2016-1681
RH:CVE-2016-1682
RH:CVE-2016-1683
RH:CVE-2016-1684
RH:CVE-2016-1685
RH:CVE-2016-1686
RH:CVE-2016-1687
RH:CVE-2016-1688
RH:CVE-2016-1689
RH:CVE-2016-1690
RH:CVE-2016-1691
RH:CVE-2016-1692
RH:CVE-2016-1693
RH:CVE-2016-1694
RH:CVE-2016-1695
RH:CVE-2016-1950
RH:CVE-2016-1955
RH:CVE-2016-1956
RH:CVE-2016-1959
RH:CVE-2016-1967
RH:CVE-2016-1968
RH:CVE-2016-1969
RH:CVE-2016-1970
RH:CVE-2016-1971
RH:CVE-2016-1972
RH:CVE-2016-1973
RH:CVE-2016-1975
RH:CVE-2016-1976
RH:CVE-2016-3141
RH:CVE-2016-4055
RH:CVE-2016-4070
RH:CVE-2016-4979
RH:CVE-2016-5483
RH:CVE-2016-5617
RH:CVE-2016-6293
RH:CVE-2016-6294
RH:CVE-2016-6662
RH:CVE-2016-9586
RH:CVE-2016-9840
RH:CVE-2016-9841
RH:CVE-2016-9842
RH:CVE-2016-9843
RH:CVE-2017-3308
RH:CVE-2017-3309
RH:CVE-2017-3329
RH:CVE-2017-3453
RH:CVE-2017-3454
RH:CVE-2017-3456
RH:CVE-2017-3461
RH:CVE-2017-3462
RH:CVE-2017-3463
RH:CVE-2017-3464
RH:CVE-2017-3468
RH:CVE-2017-3600
RH:CVE-2017-9526
RH:CVE-2018-1000121
RH:CVE-2018-12539
RH:CVE-2018-1305
RH:CVE-2018-1517
RH:CVE-2018-1656
RH:CVE-2018-2767
RH:CVE-2018-2938
RH:CVE-2018-2940
RH:CVE-2018-2952
RH:CVE-2018-2973
RH:CVE-2019-2455
RH:CVE-2019-2481
RH:CVE-2019-2482
RH:CVE-2019-2503
RH:CVE-2019-2507
RH:CVE-2019-2510
RH:CVE-2019-2513
RH:CVE-2019-2528
RH:CVE-2019-2529
RH:CVE-2019-2530
RH:CVE-2019-2531
RH:CVE-2019-2532
RH:CVE-2019-2533
RH:CVE-2019-2534
RH:CVE-2019-2535
RH:CVE-2019-2536
RH:CVE-2019-2537
RH:CVE-2019-2539
RHBA-2015:1659
RHBA-2015:1762
RHBA-2015:1763
RHBA-2015:2142
RHBA-2019:0327
RHSA-2014:0216
RHSA-2014:0294
RHSA-2014:0323
RHSA-2014:0371
RHSA-2014:0372
RHSA-2014:0374
RHSA-2014:0389
RHSA-2014:0452
RHSA-2014:0474
RHSA-2014:0497
RHSA-2014:0498
RHSA-2014:0500
RHSA-2014:0511
RHSA-2014:0702
RHSA-2014:1007
RHSA-2014:1059
RHSA-2014:1082
RHSA-2014:1098
RHSA-2014:1146
RHSA-2014:1162
RHSA-2014:1163
RHSA-2014:1166
RHSA-2014:1320
RHSA-2014:1321
RHSA-2014:1322
RHSA-2014:1323
RHSA-2014:1833
RHSA-2014:1834
RHSA-2014:1835
RHSA-2014:1836
RHSA-2014:1891
RHSA-2014:1892
RHSA-2014:1904
RHSA-2014:2019
RHSA-2014:2020
RHSA-2015:0125
RHSA-2015:0158
RHSA-2015:0234
RHSA-2015:0235
RHSA-2015:0330
RHSA-2015:0675
RHSA-2015:0720
RHSA-2015:0765
RHSA-2015:0850
RHSA-2015:0851
RHSA-2015:1009
RHSA-2015:1176
RHSA-2015:1177
RHSA-2015:1603
RHSA-2015:1628
RHSA-2015:1629
RHSA-2015:1646
RHSA-2015:1647
RHSA-2015:1665
RHSA-2015:1888
RHSA-2016:0197
RHSA-2016:0370
RHSA-2016:0371
RHSA-2016:0373
RHSA-2016:0495
RHSA-2016:1025
RHSA-2016:1132
RHSA-2016:1190
RHSA-2016:1420
RHSA-2016:1773
RHSA-2016:1931
RHSA-2016:1940
RHSA-2016:2035
RHSA-2016:2036
RHSA-2016:2058
RHSA-2016:2059
RHSA-2016:2060
RHSA-2016:2061
RHSA-2016:2062
RHSA-2016:2077
RHSA-2016:2130
RHSA-2016:2131
RHSA-2016:2595
RHSA-2016:2749
RHSA-2016:2750
RHSA-2016:2927
RHSA-2016:2928
RHSA-2016:2957
RHSA-2017:0184
RHSA-2017:0193
RHSA-2017:0194
RHSA-2017:0272
RHSA-2017:0868
RHSA-2017:1208
RHSA-2017:1220
RHSA-2017:1221
RHSA-2017:1222
RHSA-2017:1658
RHSA-2017:1659
RHSA-2017:2192
RHSA-2017:2486
RHSA-2017:2596
RHSA-2017:2787
RHSA-2017:2886
RHSA-2017:2999
RHSA-2017:3046
RHSA-2017:3047
RHSA-2017:3189
RHSA-2017:3190
RHSA-2017:3453
RHSA-2018:0279
RHSA-2018:0342
RHSA-2018:0465
RHSA-2018:0466
RHSA-2018:0478
RHSA-2018:0479
RHSA-2018:0480
RHSA-2018:0481
RHSA-2018:0501
RHSA-2018:0574
RHSA-2018:0576
RHSA-2018:0577
RHSA-2018:1320
RHSA-2018:1447
RHSA-2018:1448
RHSA-2018:1449
RHSA-2018:1450
RHSA-2018:1451
RHSA-2018:2241
RHSA-2018:2242
RHSA-2018:2253
RHSA-2018:2254
RHSA-2018:2255
RHSA-2018:2256
RHSA-2018:2283
RHSA-2018:2286
RHSA-2018:2439
RHSA-2018:2568
RHSA-2018:2569
RHSA-2018:2575
RHSA-2018:2576
RHSA-2018:2669
RHSA-2018:2712
RHSA-2018:2713
RHSA-2018:2729
RHSA-2018:2927
RHSA-2018:2939
RHSA-2018:3007
RHSA-2018:3008
RHSA-2018:3157
RHSA-2018:3558
RHSA-2019:1258
RHSA-2019:1543
RHSA-2019:1822
RHSA-2019:1823
RHSA-2019:2205
RHSA-2019:2327
RHSA-2019:2413
RHSA-2019:2484
RHSA-2019:2511
RHSA-2019:2995
RHSA-2019:3708
RHSA-2019:3892
RHSA-2019:4352
RHSA-2020:0445
RHSA-2020:0544
RHSA-2020:0594
RHSA-2020:0727
RHSA-2020:0983
RHSA-2020:5663
SECTRACK ID: 1041302
SECTRACK:1032121
SECTRACK:1034077
SECTRACK:1034882
SECTRACK:1035215
SECTRACK:1035255
SECTRACK:1035981
SECTRACK:1036054
SECTRACK:1036056
SECTRACK:1036225
SECTRACK:1036377
SECTRACK:1036378
SECTRACK:1036393
SECTRACK:1036397
SECTRACK:1036769
SECTRACK:1037036
SECTRACK:1037046
SECTRACK:1037053
SECTRACK:1037515
SECTRACK:1037640
SECTRACK:1038287
SECTRACK:1039427
SECTRACK:1039596
SECTRACK:1039600
SECTRACK:1040428
SECTRACK:1040529
SECTRACK:1041294
SECTRACK:1041296
SECTRACK:1041302
SECTRACK:1041765
SECTRACK:1041887
SECTRACK:1041888
SECTRACK:1041896
SECUNIA:57477
SECUNIA:58710
SECUNIA:58851
SECUNIA:58947
SECUNIA:59014
SECUNIA:59118
SECUNIA:59228
SECUNIA:59245
SECUNIA:59246
SECUNIA:59430
SECUNIA:59464
SECUNIA:59479
SECUNIA:59480
SECUNIA:59704
SECUNIA:59718
SECUNIA:60177
SECUNIA:60703
SECUNIA:61441
SECUNIA:61961
SLACKWARE:SSA:2016-039-01
SMASH Issue 106174
SMASH Issue 106399
SMASH Issue 110951
SMASH Issue 115322
SMASH Issue 115944
SMASH Issue 115951
SMASH Issue 116060
SMASH Issue 121091
SMASH Issue 122403
SMASH Issue 157079
SMASH Issue 157080
SMASH Issue 159315
SMASH Issue 159316
SMASH Issue 159358
SMASH Issue 159359
SMASH Issue 159360
SMASH Issue 159361
SMASH Issue 159362
SMASH Issue 159363
SMASH Issue 159364
SMASH Issue 159365
SMASH Issue 159366
SMASH Issue 159367
SMASH Issue 159368
SMASH Issue 159369
SMASH Issue 159370
SMASH Issue 159501
SMASH Issue 161165
SMASH Issue 161277
SMASH Issue 162768
SMASH Issue 162800
SMASH Issue 162870
SMASH Issue 163267
SMASH Issue 168106
SMASH Issue 168107
SMASH Issue 168108
SMASH Issue 168109
SMASH Issue 168110
SMASH Issue 168111
SMASH Issue 168112
SMASH Issue 168113
SMASH Issue 168114
SMASH Issue 168115
SMASH Issue 168116
SMASH Issue 168117
SMASH Issue 168118
SMASH Issue 168119
SMASH Issue 168120
SMASH Issue 169465
SMASH Issue 169466
SMASH Issue 169472
SMASH Issue 169820
SMASH Issue 169849
SMASH Issue 170597
SMASH Issue 170598
SMASH Issue 172509
SMASH Issue 173284
SMASH Issue 173285
SMASH Issue 173743
SMASH Issue 173744
SMASH Issue 173746
SMASH Issue 173747
SMASH Issue 173748
SMASH Issue 173749
SMASH Issue 173750
SMASH Issue 177157
SMASH Issue 177158
SMASH Issue 177160
SMASH Issue 177510
SMASH Issue 177997
SMASH Issue 180273
SMASH Issue 183785
SMASH Issue 183803
SMASH Issue 183804
SMASH Issue 183903
SMASH Issue 186176
SMASH Issue 186594
SMASH Issue 195320
SMASH Issue 200729
SMASH Issue 201476
SMASH Issue 201809
SMASH Issue 203304
SMASH Issue 205710
SMASH Issue 210804
SMASH Issue 210805
SMASH Issue 210807
SMASH Issue 210809
SMASH Issue 210923
SMASH Issue 210972
SMASH Issue 211000
SMASH Issue 211001
SMASH Issue 211002
SMASH Issue 211003
SMASH Issue 211004
SMASH Issue 211005
SMASH Issue 211006
SMASH Issue 211038
SMASH Issue 211039
SMASH Issue 211040
SMASH Issue 211041
SMASH Issue 211042
SMASH Issue 211051
SMASH Issue 212718
SMASH Issue 212765
SMASH Issue 212925
SMASH Issue 216708
SMASH Issue 216720
SMASH Issue 216727
SMASH Issue 216869
SMASH Issue 216870
SMASH Issue 216871
SMASH Issue 216872
SMASH Issue 216873
SMASH Issue 216874
SMASH Issue 216875
SMASH Issue 216876
SMASH Issue 216877
SMASH Issue 216878
SMASH Issue 216879
SMASH Issue 216880
SMASH Issue 222884
SMASH Issue 222951
SMASH Issue 77111
SUSE:SUSE-SU-2015:0946
SUSE:SUSE-SU-2016:0727
SUSE:SUSE-SU-2016:0777
SUSE:SUSE-SU-2016:0820
SUSE:SUSE-SU-2016:0909
SUSE:SUSE-SU-2016:1277
SUSE:SUSE-SU-2016:2387
SUSE:SUSE-SU-2016:2394
SUSE:SUSE-SU-2016:2458
SUSE:SUSE-SU-2016:2468
SUSE:SUSE-SU-2016:2469
SUSE:SUSE-SU-2016:2470
SUSE:SUSE-SU-2017:2699
SUSE:SUSE-SU-2017:2700
SUSE:openSUSE-SU-2015:0858
SUSE:openSUSE-SU-2015:0967
SUSE:openSUSE-SU-2015:1911
SUSE:openSUSE-SU-2016:0360
SUSE:openSUSE-SU-2016:0373
SUSE:openSUSE-SU-2016:0376
SUSE:openSUSE-SU-2016:0731
SUSE:openSUSE-SU-2016:0733
SUSE:openSUSE-SU-2016:1274
SUSE:openSUSE-SU-2016:1373
SUSE:openSUSE-SU-2016:1430
SUSE:openSUSE-SU-2016:1433
SUSE:openSUSE-SU-2016:1496
SUSE:openSUSE-SU-2016:1557
SUSE:openSUSE-SU-2016:2391
SUSE:openSUSE-SU-2016:2407
SUSE:openSUSE-SU-2016:2496
SUSE:openSUSE-SU-2016:2537
SUSE:openSUSE-SU-2016:3202
SUSE:openSUSE-SU-2017:0077
SUSE:openSUSE-SU-2017:0080
SUSE:openSUSE-SU-2018:0458
UBUNTU:CVE-2009-3559
UBUNTU:CVE-2012-6153
UBUNTU:CVE-2013-7285
UBUNTU:CVE-2013-7451
UBUNTU:CVE-2013-7452
UBUNTU:CVE-2013-7453
UBUNTU:CVE-2013-7454
UBUNTU:CVE-2014-4330
UBUNTU:CVE-2014-8964
UBUNTU:CVE-2014-9746
UBUNTU:CVE-2014-9747
UBUNTU:CVE-2014-9772
UBUNTU:CVE-2015-0405
UBUNTU:CVE-2015-0423
UBUNTU:CVE-2015-0433
UBUNTU:CVE-2015-0438
UBUNTU:CVE-2015-0439
UBUNTU:CVE-2015-0441
UBUNTU:CVE-2015-0498
UBUNTU:CVE-2015-0499
UBUNTU:CVE-2015-0500
UBUNTU:CVE-2015-0501
UBUNTU:CVE-2015-0503
UBUNTU:CVE-2015-0505
UBUNTU:CVE-2015-0506
UBUNTU:CVE-2015-0507
UBUNTU:CVE-2015-0508
UBUNTU:CVE-2015-0511
UBUNTU:CVE-2015-2325
UBUNTU:CVE-2015-2326
UBUNTU:CVE-2015-2327
UBUNTU:CVE-2015-2328
UBUNTU:CVE-2015-2566
UBUNTU:CVE-2015-2567
UBUNTU:CVE-2015-2568
UBUNTU:CVE-2015-2571
UBUNTU:CVE-2015-2573
UBUNTU:CVE-2015-2575
UBUNTU:CVE-2015-5125
UBUNTU:CVE-2015-5127
UBUNTU:CVE-2015-5128
UBUNTU:CVE-2015-5129
UBUNTU:CVE-2015-5130
UBUNTU:CVE-2015-5131
UBUNTU:CVE-2015-5132
UBUNTU:CVE-2015-5134
UBUNTU:CVE-2015-5539
UBUNTU:CVE-2015-5540
UBUNTU:CVE-2015-5541
UBUNTU:CVE-2015-5544
UBUNTU:CVE-2015-5545
UBUNTU:CVE-2015-5551
UBUNTU:CVE-2015-5552
UBUNTU:CVE-2015-5553
UBUNTU:CVE-2015-5554
UBUNTU:CVE-2015-5555
UBUNTU:CVE-2015-5556
UBUNTU:CVE-2015-5557
UBUNTU:CVE-2015-5558
UBUNTU:CVE-2015-5559
UBUNTU:CVE-2015-5560
UBUNTU:CVE-2015-5561
UBUNTU:CVE-2015-5564
UBUNTU:CVE-2015-5565
UBUNTU:CVE-2015-5566
UBUNTU:CVE-2015-7559
UBUNTU:CVE-2015-8381
UBUNTU:CVE-2015-8382
UBUNTU:CVE-2015-8383
UBUNTU:CVE-2015-8384
UBUNTU:CVE-2015-8385
UBUNTU:CVE-2015-8386
UBUNTU:CVE-2015-8387
UBUNTU:CVE-2015-8388
UBUNTU:CVE-2015-8389
UBUNTU:CVE-2015-8390
UBUNTU:CVE-2015-8391
UBUNTU:CVE-2015-8392
UBUNTU:CVE-2015-8393
UBUNTU:CVE-2015-8394
UBUNTU:CVE-2015-8395
UBUNTU:CVE-2015-8854
UBUNTU:CVE-2015-8855
UBUNTU:CVE-2015-8856
UBUNTU:CVE-2015-8857
UBUNTU:CVE-2015-8858
UBUNTU:CVE-2015-8859
UBUNTU:CVE-2015-8860
UBUNTU:CVE-2015-8861
UBUNTU:CVE-2015-8862
UBUNTU:CVE-2016-0755
UBUNTU:CVE-2016-1672
UBUNTU:CVE-2016-1673
UBUNTU:CVE-2016-1674
UBUNTU:CVE-2016-1675
UBUNTU:CVE-2016-1676
UBUNTU:CVE-2016-1677
UBUNTU:CVE-2016-1678
UBUNTU:CVE-2016-1679
UBUNTU:CVE-2016-1680
UBUNTU:CVE-2016-1681
UBUNTU:CVE-2016-1682
UBUNTU:CVE-2016-1683
UBUNTU:CVE-2016-1684
UBUNTU:CVE-2016-1685
UBUNTU:CVE-2016-1686
UBUNTU:CVE-2016-1687
UBUNTU:CVE-2016-1688
UBUNTU:CVE-2016-1689
UBUNTU:CVE-2016-1690
UBUNTU:CVE-2016-1691
UBUNTU:CVE-2016-1692
UBUNTU:CVE-2016-1693
UBUNTU:CVE-2016-1694
UBUNTU:CVE-2016-1695
UBUNTU:CVE-2016-1950
UBUNTU:CVE-2016-1955
UBUNTU:CVE-2016-1956
UBUNTU:CVE-2016-1959
UBUNTU:CVE-2016-1967
UBUNTU:CVE-2016-1968
UBUNTU:CVE-2016-1969
UBUNTU:CVE-2016-1970
UBUNTU:CVE-2016-1971
UBUNTU:CVE-2016-1972
UBUNTU:CVE-2016-1973
UBUNTU:CVE-2016-1975
UBUNTU:CVE-2016-1976
UBUNTU:CVE-2016-2178
UBUNTU:CVE-2016-3141
UBUNTU:CVE-2016-4055
UBUNTU:CVE-2016-4070
UBUNTU:CVE-2016-4619
UBUNTU:CVE-2016-4979
UBUNTU:CVE-2016-5483
UBUNTU:CVE-2016-5501
UBUNTU:CVE-2016-5538
UBUNTU:CVE-2016-5605
UBUNTU:CVE-2016-5608
UBUNTU:CVE-2016-5610
UBUNTU:CVE-2016-5611
UBUNTU:CVE-2016-5613
UBUNTU:CVE-2016-6293
UBUNTU:CVE-2016-6294
UBUNTU:CVE-2016-6662
UBUNTU:CVE-2016-9586
UBUNTU:CVE-2016-9840
UBUNTU:CVE-2016-9841
UBUNTU:CVE-2016-9842
UBUNTU:CVE-2016-9843
UBUNTU:CVE-2017-3308
UBUNTU:CVE-2017-3309
UBUNTU:CVE-2017-3329
UBUNTU:CVE-2017-3453
UBUNTU:CVE-2017-3454
UBUNTU:CVE-2017-3456
UBUNTU:CVE-2017-3461
UBUNTU:CVE-2017-3462
UBUNTU:CVE-2017-3463
UBUNTU:CVE-2017-3464
UBUNTU:CVE-2017-3468
UBUNTU:CVE-2017-3600
UBUNTU:CVE-2017-9526
UBUNTU:CVE-2018-1000121
UBUNTU:CVE-2018-1258
UBUNTU:CVE-2018-1305
UBUNTU:CVE-2018-1517
UBUNTU:CVE-2018-1656
UBUNTU:CVE-2018-2767
UBUNTU:CVE-2018-2938
UBUNTU:CVE-2018-2940
UBUNTU:CVE-2018-2952
UBUNTU:CVE-2018-2973
UBUNTU:CVE-2018-3005
UBUNTU:CVE-2018-3055
UBUNTU:CVE-2018-3085
UBUNTU:CVE-2018-3086
UBUNTU:CVE-2018-3087
UBUNTU:CVE-2018-3088
UBUNTU:CVE-2018-3089
UBUNTU:CVE-2018-3090
UBUNTU:CVE-2018-3091
UBUNTU:CVE-2018-3287
UBUNTU:CVE-2018-3288
UBUNTU:CVE-2018-3289
UBUNTU:CVE-2018-3290
UBUNTU:CVE-2018-3291
UBUNTU:CVE-2018-3292
UBUNTU:CVE-2018-3293
UBUNTU:CVE-2018-3294
UBUNTU:CVE-2018-3295
UBUNTU:CVE-2018-3296
UBUNTU:CVE-2018-3297
UBUNTU:CVE-2018-3298
UBUNTU:CVE-2019-2455
UBUNTU:CVE-2019-2481
UBUNTU:CVE-2019-2482
UBUNTU:CVE-2019-2503
UBUNTU:CVE-2019-2507
UBUNTU:CVE-2019-2510
UBUNTU:CVE-2019-2513
UBUNTU:CVE-2019-2528
UBUNTU:CVE-2019-2529
UBUNTU:CVE-2019-2530
UBUNTU:CVE-2019-2531
UBUNTU:CVE-2019-2532
UBUNTU:CVE-2019-2533
UBUNTU:CVE-2019-2534
UBUNTU:CVE-2019-2535
UBUNTU:CVE-2019-2536
UBUNTU:CVE-2019-2537
UBUNTU:CVE-2019-2539
UBUNTU:USN-2575-1
UBUNTU:USN-2769-1
UBUNTU:USN-2882-1
UBUNTU:USN-2916-1
UBUNTU:USN-2917-1
UBUNTU:USN-2917-2
UBUNTU:USN-2917-3
UBUNTU:USN-2924-1
UBUNTU:USN-2934-1
UBUNTU:USN-2952-1
UBUNTU:USN-2952-2
UBUNTU:USN-2992-1
UBUNTU:USN-3598-1
UBUNTU:USN-3598-2
UBUNTU:USN-3665-1
UBUNTU:USN-3693-1
UBUNTU:USN-3725-1
UBUNTU:USN-3725-2
UBUNTU:USN-3727-1
UBUNTU:USN-3734-1
UBUNTU:USN-3735-1
UBUNTU:USN-3747-1
USN-3087-1
USN-3087-2
USN-3867-1
USN-4246-1
USN-4292-1
XF:perl-cve20144330-dos(96216)
ZDI-16-570
ZDI-18-1232ZDI-CAN-6635
ZDI-18-1233ZDI-CAN-6591
ZDI-18-1234ZDI-CAN-6592
ZDI-18-1292ZDI-CAN-7329
bdo#1033297
bdo#583651
bdo#759718
bdo#782645
bdo#797165
bdo#798619
bdo#798620
bdo#802671
bdo#802971
bdo#838694
bdo#854713
bdo#860544
bdo#864859
bdo#867247
bdo#873383
bdo#885345
bdo#898444
bdo#898445
bdo#912848
bnc#1003579
bnc#1003580
bnc#1005621
bnc#1015332
bnc#1016653
bnc#1021757
bnc#1022633
bnc#1042326
bnc#1043777
bnc#1084524
bnc#1085215
bnc#1088681
bnc#1101644
bnc#1101645
bnc#1101656
bnc#1101667
bnc#1101675
bnc#1104668
bnc#1120866
bnc#1122198
bnc#885963
bnc#896715
bnc#924961
bnc#927623
bnc#941239
bnc#947966
bnc#957598
bnc#958373
bnc#962983
bnc#969821
bnc#969894
bnc#970257
bnc#970377
bnc#970378
bnc#970379
bnc#970380
bnc#970381
bnc#970431
bnc#970433
bnc#976547
bnc#977050
bnc#981886
bnc#983249
bnc#983519
bnc#987365
bnc#988162
bnc#998309
http://www.debian.org/security/2016/dsa-3560
https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=95433e8e339dbb6b5d5541473c1661db6ba2c451
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/
https://security.netapp.com/advisory/ntap-20230216-0002/
https://support.f5.com/csp/article/K05052081?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K46337613?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K46337613?utm_source=f5support&utm_medium=RSS
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
openssl.git:commit:399944622df7bd81af62e67ea967c470534090e2
rh#1051277
rh#1091938
rh#1101303
rh#1104858
rh#1107544
rh#1112877
rh#1116665
rh#1129074
rh#1129916
rh#1131350
rh#1139700
rh#1166147
rh#1167537
rh#1183461
rh#1187225
rh#1202366
rh#1202380
rh#1202384
rh#1202395
rh#1202418
rh#1203195
rh#1207198
rh#1207202
rh#1208428
rh#1209496
rh#1209501
rh#1212753
rh#1212755
rh#1212757
rh#1212758
rh#1212759
rh#1212760
rh#1212763
rh#1212764
rh#1212765
rh#1212767
rh#1212768
rh#1212769
rh#1212770
rh#1212771
rh#1212772
rh#1212774
rh#1212776
rh#1212777
rh#1212779
rh#1212780
rh#1212781
rh#1212782
rh#1212783
rh#1237223
rh#1252697
rh#1252707
rh#1256449
rh#1262373
rh#1277888
rh#1285399
rh#1285408
rh#1287614
rh#1287623
rh#1287629
rh#1287636
rh#1287646
rh#1287654
rh#1287659
rh#1287666
rh#1287671
rh#1287690
rh#1287695
rh#1287702
rh#1287711
rh#1291742
rh#1293972
rh#1302263
rh#1304645
rh#1310509
rh#1311503
rh#1315312
rh#1315328
rh#1315570
rh#1315571
rh#1315575
rh#1315776
rh#1315777
rh#1315780
rh#1315782
rh#1317560
rh#1323114
rh#1323749
rh#1329533
rh#1329552
rh#1340005
rh#1340006
rh#1340007
rh#1340008
rh#1340009
rh#1340010
rh#1340011
rh#1340012
rh#1340013
rh#1340014
rh#1340015
rh#1340016
rh#1340017
rh#1340018
rh#1340019
rh#1340021
rh#1340022
rh#1340023
rh#1340024
rh#1340026
rh#1340027
rh#1340028
rh#1340029
rh#1340030
rh#1341821
rh#1343400
rh#1343538
rh#1343540
rh#1352476
rh#1359811
rh#1360339
rh#1369383
rh#1375198
rh#1378936
rh#1384344
rh#1386562
rh#1386564
rh#1393454
rh#1396963
rh#1396971
rh#1397485
rh#1399546
rh#1402345
rh#1402346
rh#1402348
rh#1402351
rh#1405148
rh#1406712
rh#1414133
rh#1414429
rh#1433010
rh#1443358
rh#1443359
rh#1443360
rh#1443365
rh#1443366
rh#1443369
rh#1443376
rh#1443377
rh#1443378
rh#1443379
rh#1443385
rh#1443387
rh#1459887
rh#1485274
rh#1501812
rh#1501813
rh#1501814
rh#1501815
rh#1501816
rh#1501817
rh#1501818
rh#1501819
rh#1501820
rh#1516791
rh#1519780
rh#1548282
rh#1552631
rh#1553413
rh#1564965
rh#1578582
rh#1591854
rh#1600925
rh#1602141
rh#1602145
rh#1602146
rh#1607582
rh#1608073
rh#1614973
rh#1618767
rh#1618869
rh#1618871
rh#1666742
rh#1666743
rh#1666744
rh#1666749
rh#1666750
rh#1666751
rh#1666752
rh#1666753
rh#1666755
rh#1666756
rh#1666757
rh#1666758
rh#1666759
rh#1666760
rh#1666761
rh#1666762
rh#1666763
rh#1666764
rh#1714979
rh#1716448
rh#1716453
rh#1716454
rh#1722971
rh#1731271
rh#2061700
rh#2116175
rh#2119127
rh#2161287
rh#2270497
rh#539529
rh#873317
xf#141681
xf#141953
xf#141971
xf#141981
xf#141982
xf#144882
xf#146672
xf#146803
xf#146804
xf#146815
xf#146827
xf#146834
xf#146835
xf#151452
xf#151455
xf#151465
xf#151466
xf#151486
xf#151497
xf#151500
xf#151525
xf#151527
xf#151530
xf#155741
xf#155744
xf#155766
xf#155850
CVE-2015-2686kernel-source-rt:Unsupportedimportant ()BID:73286
CONFIRM:git.kernel.org:CVE-2015-2686
CONFIRM:github.com:CVE-2015-2686
CVE-2015-2686
MISC:git.kernel.org:MLIST:[oss-security] 20150323 CVE Request: Linux kernel: sys_sendto/sys_recvfrom does not validate the user provided ubuf pointer
MISC:grsecurity.net:CVE-2015-2686
MISC:twitter.com
MLIST:[oss-security] 20150323 CVE Request: Linux kernel: sys_sendto/sys_recvfrom does not validate the user provided ubuf pointer
RH:CVE-2015-2686
SMASH Issue 115013
UBUNTU:CVE-2015-2686
bnc#923924
rh#1205242
CVE-2015-2877kernel-source-rt:Unsupportedlow ()BID:76256
CERT-VN:VU#935424
CVE-2015-2877
MISC:www.antoniobarresi.com:CVE-2015-2877
MISC:www.kb.cert.org:CVE-2015-2877
MISC:www.usenix.org:CVE-2015-2877
RH:CVE-2015-2877
SMASH Issue 120842
UBUNTU:CVE-2015-2877
bnc#941252
rh#1252096
CVE-2015-3212kernel-source-rt:Already fixedmoderate ()BID:74664
BID:75356
BID:75510
BID:76082
CONFIRM:git.kernel.org:CVE-2015-3212
CONFIRM:git.kernel.org:CVE-2015-4036
CONFIRM:git.kernel.org:CVE-2015-4700
CONFIRM:git.kernel.org:CVE-2015-5366
CONFIRM:github.com:CVE-2015-3212
CONFIRM:github.com:CVE-2015-4036
CONFIRM:github.com:CVE-2015-4700
CONFIRM:github.com:CVE-2015-5366
CONFIRM:kb.juniper.net:CVE-2015-5366
CONFIRM:support.f5.com:CVE-2014-8559
CONFIRM:www.kernel.org:CVE-2015-3212
CONFIRM:www.kernel.org:CVE-2015-5366
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-1351
CVE-2015-3212
CVE-2015-4036
CVE-2015-4700
CVE-2015-5364
CVE-2015-5366
DSA-3313
DSA-3329
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel.
MISC:twitter.com:CVE-2015-5364
MLIST:[oss-security] 20150513 CVE request for vhost/scsi possible memory corruption.
MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel.
MLIST:[oss-security] 20150630 CVE Request: UDP checksum DoS
OSS:2015/Q2/785
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2015-3212
RH:CVE-2015-4036
RH:CVE-2015-4700
RH:CVE-2015-5364
RH:CVE-2015-5366
RHSA-2015:1623
RHSA-2015:1778
RHSA-2015:1787
RHSA-2015:1788
RHSA-2016:0045
RHSA-2016:1096
RHSA-2016:1100
RHSA-2016:1225
SECTRACK:1032794
SECTRACK:1033046
SECTRACK:1033169
SECTRACK:1033729
SMASH Issue 117926
SUSE:SUSE-SU-2015:1224
SUSE:SUSE-SU-2015:1324
SUSE:SUSE-SU-2015:1478
SUSE:SUSE-SU-2015:1487
SUSE:SUSE-SU-2015:1488
SUSE:SUSE-SU-2015:1489
SUSE:SUSE-SU-2015:1490
SUSE:SUSE-SU-2015:1491
SUSE:SUSE-SU-2015:1592
SUSE:SUSE-SU-2015:1611
SUSE:openSUSE-SU-2015:1382
UBUNTU:CVE-2015-3212
UBUNTU:CVE-2015-4036
UBUNTU:CVE-2015-4700
UBUNTU:CVE-2015-5364
UBUNTU:CVE-2015-5366
UBUNTU:USN-2633-1
UBUNTU:USN-2634-1
UBUNTU:USN-2680-1
UBUNTU:USN-2681-1
UBUNTU:USN-2682-1
UBUNTU:USN-2683-1
UBUNTU:USN-2684-1
UBUNTU:USN-2713-1
UBUNTU:USN-2714-1
UBUNTU:USN-2715-1
UBUNTU:USN-2716-1
UBUNTU:USN-2717-1
UBUNTU:USN-2718-1
UBUNTU:USN-2719-1
bnc#935705
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1183744
rh#1189864
rh#1202855
rh#1226442
rh#1233615
rh#1239029
rh#1243465
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-3217pcre:Not affectedmoderate ()BID:75018
CONFIRM:bugs.exim.org:CVE-2015-2327
CONFIRM:bugs.exim.org:CVE-2015-2328
CONFIRM:bugs.exim.org:CVE-2015-3217
CONFIRM:bugs.exim.org:CVE-2015-8381
CONFIRM:vcs.pcre.org:CVE-2015-3217
CONFIRM:www-01.ibm.com:CVE-2016-3191
CVE-2015-3217
MISC:www.openwall.com
MISC:www.openwall.com:MISC:www.openwall.com
MLIST:[oss-security] 20150603 CVE-2015-3217: PCRE Library Call Stack Overflow Vulnerability in match()
OSS:2015/Q2/618
OSS:2015/Q4/364
RH:CVE-2015-3217
RHSA-2016:1025
RHSA-2016:1132
RHSA-2016:2750
SMASH Issue 117309
UBUNTU:CVE-2015-3217
bnc#933878
rh#1228283
rh#1287629
rh#1311503
CVE-2015-3288kernel-source-rt:Not affectedmoderate ()BID:93591
CONFIRM:git.kernel.org:CVE-2015-3288
CONFIRM:github.com:CVE-2015-3288
CONFIRM:security-tracker.debian.org:CVE-2015-3288
CONFIRM:source.android.com:CVE-2017-0404
CONFIRM:www.kernel.org:CVE-2015-3288
CVE-2015-3288
D:CVE-2015-3288
Oracle:CVE-2016-5244
Oracle:CVE-2017-6074
RH:CVE-2015-3288
RHSA-2015:2152
SMASH Issue 168681
UBUNTU:CVE-2015-3288
bnc#979021
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1324749
rh#1333830
rh#1435719
rh#1439087
rh#1462147
rh#1462158
CVE-2015-3290kernel-source-rt:Not affected, ltp:Releasedimportant ()BID:76004
CONFIRM:git.kernel.org:CVE-2015-5157
CONFIRM:github.com:CVE-2015-5157
CONFIRM:www.kernel.org:CVE-2015-5697
CVE-2015-3290
DSA-3313
EXPLOIT-DB:37722
MISC:git.kernel.org:MLIST:[oss-security] 20150722 Linux x86_64 NMI security issues
MLIST:[oss-security] 20150722 Linux x86_64 NMI security issues
MLIST:[oss-security] 20150804 CVE-2015-3290: Linux privilege escalation due to nested NMIs interrupting espfix64
OSS:2015/Q3/291
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2015-3290
SMASH Issue 118600
SUSE:openSUSE-SU-2015:1382
UBUNTU:CVE-2015-3290
UBUNTU:USN-2687-1
UBUNTU:USN-2688-1
UBUNTU:USN-2689-1
UBUNTU:USN-2690-1
UBUNTU:USN-2691-1
bnc#937969
bnc#939269
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1243465
rh#1243489
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-3291kernel-source-rt:Unsupportedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N)BID:76003
CONFIRM:git.kernel.org:CVE-2015-3291
CONFIRM:github.com:CVE-2015-3291
CVE-2015-3291
DSA-3313
MISC:bugzilla.redhat.com
OSS:2015/Q3/168
OSS:2015/Q3/174
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2015-3291
RHSA-2013:0590
RHSA-2013:1752
RHSA-2013:1753
RHSA-2013:1779
RHSA-2014:0365
SMASH Issue 118601
UBUNTU:CVE-2015-3291
bnc#937970
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1016832
rh#1024552
rh#1034153
rh#1243465
rh#1243489
rh#426568
rh#804591
rh#807993
rh#837577
rh#909119
CVE-2015-3414sqlite3:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H)APPLE:APPLE-SA-2015-09-21-1
APPLE:APPLE-SA-2015-09-30-3
BID:74228
CONFIRM:support.apple.com:CVE-2015-5922
CONFIRM:support.apple.com:CVE-2015-7761
CONFIRM:www.oracle.com:CVE-2015-4879
CONFIRM:www.oracle.com:CVE-2018-3081
CONFIRM:www.sqlite.org:CVE-2015-3414
CVE-2015-3414
D:CVE-2015-3414
DSA-3252
FULLDISC:20150414 several issues in SQLite (+ catching up on several other bugs)
GENTOO:GLSA-201507-05
MANDRIVA:MDVSA-2015:217
OSS:2015/Q2/819
RH:CVE-2015-3414
RHSA-2015:1635
SECTRACK:1033703
SMASH Issue 116275
UBUNTU:CVE-2015-3414
UBUNTU:USN-2698-1
bdo#783968
bnc#928700
rh#1212353
CVE-2015-3415sqlite3:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)APPLE:APPLE-SA-2015-09-21-1
APPLE:APPLE-SA-2015-09-30-3
BID:74228
CONFIRM:support.apple.com:CVE-2015-5922
CONFIRM:support.apple.com:CVE-2015-7761
CONFIRM:www.oracle.com:CVE-2015-4879
CONFIRM:www.oracle.com:CVE-2018-3081
CONFIRM:www.sqlite.org:CVE-2015-3415
CVE-2015-3415
D:CVE-2015-3415
DSA-3252
FULLDISC:20150414 several issues in SQLite (+ catching up on several other bugs)
GENTOO:GLSA-201507-05
MANDRIVA:MDVSA-2015:217
RH:CVE-2015-3415
RHSA-2015:1635
SECTRACK:1033703
SMASH Issue 116276
UBUNTU:CVE-2015-3415
UBUNTU:USN-2698-1
bdo#783968
bnc#928701
rh#1212356
CVE-2015-3416sqlite3:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)APPLE:APPLE-SA-2015-09-21-1
APPLE:APPLE-SA-2015-09-30-3
BID:74228
CONFIRM:support.apple.com:CVE-2015-5922
CONFIRM:support.apple.com:CVE-2015-7761
CONFIRM:www.oracle.com:CVE-2015-4879
CONFIRM:www.oracle.com:CVE-2018-3081
CONFIRM:www.sqlite.org:CVE-2015-3416
CVE-2015-3416
D:CVE-2015-3416
DSA-3252
FULLDISC:20150414 several issues in SQLite (+ catching up on several other bugs)
GENTOO:GLSA-201507-05
MANDRIVA:MDVSA-2015:217
OSS:2015/Q2/819
RH:CVE-2015-3416
RHSA-2015:1634
RHSA-2015:1635
SECTRACK:1033703
SMASH Issue 116277
UBUNTU:CVE-2015-3416
UBUNTU:USN-2698-1
bdo#783968
bnc#928702
rh#1212357
CVE-2015-3636kernel-source-rt:Not affectedmoderate ()BID:47503
BID:71883
BID:74450
CONFIRM:git.kernel.org:CVE-2011-1598
CONFIRM:git.kernel.org:CVE-2014-9584
CONFIRM:github.com:CVE-2014-9584
CONFIRM:www.kernel.org:CVE-2011-1748
CONFIRM:www.kernel.org:CVE-2014-9731
CONFIRM:www.kernel.org:CVE-2015-2830
CONFIRM:www.kernel.org:CVE-2015-8950
CONFIRM:www.oracle.com:CVE-2015-1351
CONFIRM:www.oracle.com:CVE-2016-2802
CVE-2011-1598
CVE-2014-9584
CVE-2015-3636
DSA-2240
DSA-2264
DSA-3128
FEDORA:FEDORA-2015-7784
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:github.com:MLIST:[oss-security] 20150502 Re: CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam
MLIST:[netdev] 20110420 Add missing socket check in can/bcm release.
MLIST:[oss-security] 20110420 CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20110420 Re: CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20110421 Re: CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20110422 Re: CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20110425 Re: CVE request: kernel: missing socket check in can/bcm release
MLIST:[oss-security] 20150109 Re: CVE request Linux kernel: isofs: unchecked printing of ER records
MLIST:[oss-security] 20150502 CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2011-1598
RH:CVE-2014-9584
RH:CVE-2015-3636
RHSA-2011:0836
RHSA-2011:1253
RHSA-2015:0864
RHSA-2015:1137
RHSA-2015:1138
RHSA-2015:1139
RHSA-2015:1221
RHSA-2015:1534
RHSA-2015:1564
RHSA-2015:1565
RHSA-2015:1583
RHSA-2015:1643
SECTRACK:1033186
SMASH Issue 155981
SMASH Issue 45008
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0529
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:0812
SUSE:openSUSE-SU-2015:0566
SUSE:openSUSE-SU-2015:0714
UBUNTU:CVE-2011-1598
UBUNTU:CVE-2014-9584
UBUNTU:CVE-2015-3636
UBUNTU:USN-2511-1
UBUNTU:USN-2512-1
UBUNTU:USN-2513-1
UBUNTU:USN-2514-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
UBUNTU:USN-2633-1
UBUNTU:USN-2634-1
bdo#618485
bnc#688685
bnc#689038
bnc#929525
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e2024624e678f0ebb916e6192bd23c1f9fdf696
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c6914a6f261aca0c9f715f883a353ae7ff51fe83
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1180119
rh#1183744
rh#1202855
rh#1218074
rh#2162080
rh#2162082
rh#2162084
rh#2162087
rh#698057
CVE-2015-4036kernel-source-rt:Already fixedmoderate ()BID:74664
BID:75356
BID:75510
BID:76082
CONFIRM:git.kernel.org:CVE-2015-3212
CONFIRM:git.kernel.org:CVE-2015-4036
CONFIRM:git.kernel.org:CVE-2015-4700
CONFIRM:git.kernel.org:CVE-2015-5366
CONFIRM:github.com:CVE-2015-3212
CONFIRM:github.com:CVE-2015-4036
CONFIRM:github.com:CVE-2015-4700
CONFIRM:github.com:CVE-2015-5366
CONFIRM:kb.juniper.net:CVE-2015-5366
CONFIRM:support.f5.com:CVE-2014-8559
CONFIRM:www.kernel.org:CVE-2015-3212
CONFIRM:www.kernel.org:CVE-2015-5366
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-1351
CVE-2015-3212
CVE-2015-4036
CVE-2015-4700
CVE-2015-5364
CVE-2015-5366
DSA-3313
DSA-3329
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel.
MISC:twitter.com:CVE-2015-5364
MLIST:[oss-security] 20150513 CVE request for vhost/scsi possible memory corruption.
MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel.
MLIST:[oss-security] 20150630 CVE Request: UDP checksum DoS
OSS:2015/Q2/785
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2015-3212
RH:CVE-2015-4036
RH:CVE-2015-4700
RH:CVE-2015-5364
RH:CVE-2015-5366
RHSA-2015:1623
RHSA-2015:1778
RHSA-2015:1787
RHSA-2015:1788
RHSA-2016:0045
RHSA-2016:1096
RHSA-2016:1100
RHSA-2016:1225
SECTRACK:1032794
SECTRACK:1033046
SECTRACK:1033169
SECTRACK:1033729
SMASH Issue 117926
SUSE:SUSE-SU-2015:1224
SUSE:SUSE-SU-2015:1324
SUSE:SUSE-SU-2015:1478
SUSE:SUSE-SU-2015:1487
SUSE:SUSE-SU-2015:1488
SUSE:SUSE-SU-2015:1489
SUSE:SUSE-SU-2015:1490
SUSE:SUSE-SU-2015:1491
SUSE:SUSE-SU-2015:1592
SUSE:SUSE-SU-2015:1611
SUSE:openSUSE-SU-2015:1382
UBUNTU:CVE-2015-3212
UBUNTU:CVE-2015-4036
UBUNTU:CVE-2015-4700
UBUNTU:CVE-2015-5364
UBUNTU:CVE-2015-5366
UBUNTU:USN-2633-1
UBUNTU:USN-2634-1
UBUNTU:USN-2680-1
UBUNTU:USN-2681-1
UBUNTU:USN-2682-1
UBUNTU:USN-2683-1
UBUNTU:USN-2684-1
UBUNTU:USN-2713-1
UBUNTU:USN-2714-1
UBUNTU:USN-2715-1
UBUNTU:USN-2716-1
UBUNTU:USN-2717-1
UBUNTU:USN-2718-1
UBUNTU:USN-2719-1
bnc#935705
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1183744
rh#1189864
rh#1202855
rh#1226442
rh#1233615
rh#1239029
rh#1243465
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-4167kernel-source-rt:Not affectedimportant ()BID:72607
BID:74951
BID:74963
CONFIRM:git.kernel.org:CVE-2015-1593
CONFIRM:www.kernel.org:CVE-2015-4167
CVE-2015-1593
CVE-2015-1805
CVE-2015-4167
CVE-2023-2002
D:CVE-2015-1593
DSA-3170
L3:42485
L3:44416
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:hmarco.org:CVE-2015-1593
MLIST:[linux-kernel] 20150107 Re: [PATH] Fix stack randomization on x86_64 bit
MLIST:[oss-security] 20150213 Re: CVE-Request -- Linux ASLR integer overflow
MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf kernel oops
MLIST:[oss-security] 20150606 CVE-2015-1805 Linux kernel: pipe: iovec overrun leading to memory corruption
OSS:2015/Q2/652
OSS:2017/Q2/500
OSS:2023/04/16/3
RH:CVE-2015-1593
RH:CVE-2015-1805
RH:CVE-2015-4167
RHSA-2010:0631
RHSA-2010:0660
RHSA-2010:0661
RHSA-2010:0670
RHSA-2010:0676
RHSA-2010:0677
RHSA-2010:0882
RHSA-2015:1042
RHSA-2015:1081
RHSA-2015:1082
RHSA-2015:1120
RHSA-2015:1137
RHSA-2015:1138
RHSA-2015:1139
RHSA-2015:1190
RHSA-2015:1199
RHSA-2015:1211
RHSA-2015:1221
RHSA-2015:2152
RHSA-2016:0103
RHSA-2016:0494
RHSA-2016:0617
RHSA-2019:3517
SECTRACK:1032454
SECTRACK:1033187
SMASH Issue 113891
SUSE:SUSE-SU-2015:1490
UBUNTU:CVE-2015-1593
UBUNTU:CVE-2015-1805
UBUNTU:CVE-2015-4167
UBUNTU:USN-2560-1
UBUNTU:USN-2564-1
UBUNTU:USN-2565-1
UBUNTU:USN-2679-1
UBUNTU:USN-2680-1
UBUNTU:USN-2681-1
bnc#917839
bnc#918554
bnc#959156
linux.git:commit:4e7c22d447bb6d7e37bfe39ff658486ae78e8d77
rh#1113899
rh#1163762
rh#1163792
rh#1192519
rh#1202855
rh#1228204
rh#1303961
rh#606611
CVE-2015-4176kernel-source-rt:Unsupportedlow ()CONFIRM:git.kernel.org:CVE-2015-4176
CONFIRM:github.com:CVE-2015-4176
CVE-2015-4176
MLIST:[oss-security] 20150604 Re: Re: CVE request Linux kernel: ns: user namespaces panic
OSS:2015/Q2/640
RH:CVE-2015-4176
SMASH Issue 117334
UBUNTU:CVE-2015-4176
bnc#933971
rh#1249442
CVE-2015-4177kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2015-4177
CONFIRM:github.com:CVE-2015-4177
CONFIRM:www.kernel.org:CVE-2015-4178
CVE-2015-4177
MLIST:[oss-security] 20150529 CVE request Linux kernel: ns: user namespaces panic
MLIST:[oss-security] 20150529 Re: CVE request Linux kernel: ns: user namespaces panic
OSS:2015/Q2/640
RH:CVE-2015-4177
SMASH Issue 117333
UBUNTU:CVE-2015-4177
bnc#933970
rh#1248486
CVE-2015-4178kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2015-4178
CONFIRM:github.com:CVE-2015-4178
CVE-2015-4178
OSS:2015/Q2/640
RH:CVE-2015-4178
SMASH Issue 117335
UBUNTU:CVE-2015-4178
bnc#933969
rh#1249849
CVE-2015-4692kernel-source-rt:Not affectedimportant ()BID:70095
BID:75142
CONFIRM:git.kernel.org:CVE-2014-3631
CONFIRM:git.kernel.org:CVE-2015-1805
CONFIRM:git.kernel.org:CVE-2015-2922
CONFIRM:git.kernel.org:CVE-2015-4167
CONFIRM:git.kernel.org:CVE-2015-4692
CONFIRM:www.kernel.org:CVE-2014-7145
CVE-2014-3631
CVE-2015-4692
EXPLOIT-DB:36268
FEDORA:FEDORA-2015-10677
FEDORA:FEDORA-2015-10678
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20150620 Re: CVE request -- Linux kernel - kvm: x86: NULL pointer dereference in kvm_apic_has_events function
OSVDB:111298
RH:CVE-2014-3631
RH:CVE-2015-4692
RHSA-2014:1971
SECTRACK:1032798
SMASH Issue 106051
UBUNTU:CVE-2014-3631
UBUNTU:CVE-2015-4692
UBUNTU:USN-2378-1
UBUNTU:USN-2379-1
UBUNTU:USN-2682-1
UBUNTU:USN-2683-1
UBUNTU:USN-2684-1
bnc#896262
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=95389b08d93d5c06ec63ab49bd732b0069b7c35e
linux.git:commit:95389b08d93d5c06ec63ab49bd732b0069b7c35e
rh#1140325
rh#1230770
CVE-2015-4700kernel-source-rt:Already fixedmoderate ()BID:74664
BID:75356
BID:75510
BID:76082
CONFIRM:git.kernel.org:CVE-2015-3212
CONFIRM:git.kernel.org:CVE-2015-4036
CONFIRM:git.kernel.org:CVE-2015-4700
CONFIRM:git.kernel.org:CVE-2015-5366
CONFIRM:github.com:CVE-2015-3212
CONFIRM:github.com:CVE-2015-4036
CONFIRM:github.com:CVE-2015-4700
CONFIRM:github.com:CVE-2015-5366
CONFIRM:kb.juniper.net:CVE-2015-5366
CONFIRM:support.f5.com:CVE-2014-8559
CONFIRM:www.kernel.org:CVE-2015-3212
CONFIRM:www.kernel.org:CVE-2015-5366
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-1351
CVE-2015-3212
CVE-2015-4036
CVE-2015-4700
CVE-2015-5364
CVE-2015-5366
DSA-3313
DSA-3329
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel.
MISC:twitter.com:CVE-2015-5364
MLIST:[oss-security] 20150513 CVE request for vhost/scsi possible memory corruption.
MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel.
MLIST:[oss-security] 20150630 CVE Request: UDP checksum DoS
OSS:2015/Q2/785
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2015-3212
RH:CVE-2015-4036
RH:CVE-2015-4700
RH:CVE-2015-5364
RH:CVE-2015-5366
RHSA-2015:1623
RHSA-2015:1778
RHSA-2015:1787
RHSA-2015:1788
RHSA-2016:0045
RHSA-2016:1096
RHSA-2016:1100
RHSA-2016:1225
SECTRACK:1032794
SECTRACK:1033046
SECTRACK:1033169
SECTRACK:1033729
SMASH Issue 117926
SUSE:SUSE-SU-2015:1224
SUSE:SUSE-SU-2015:1324
SUSE:SUSE-SU-2015:1478
SUSE:SUSE-SU-2015:1487
SUSE:SUSE-SU-2015:1488
SUSE:SUSE-SU-2015:1489
SUSE:SUSE-SU-2015:1490
SUSE:SUSE-SU-2015:1491
SUSE:SUSE-SU-2015:1592
SUSE:SUSE-SU-2015:1611
SUSE:openSUSE-SU-2015:1382
UBUNTU:CVE-2015-3212
UBUNTU:CVE-2015-4036
UBUNTU:CVE-2015-4700
UBUNTU:CVE-2015-5364
UBUNTU:CVE-2015-5366
UBUNTU:USN-2633-1
UBUNTU:USN-2634-1
UBUNTU:USN-2680-1
UBUNTU:USN-2681-1
UBUNTU:USN-2682-1
UBUNTU:USN-2683-1
UBUNTU:USN-2684-1
UBUNTU:USN-2713-1
UBUNTU:USN-2714-1
UBUNTU:USN-2715-1
UBUNTU:USN-2716-1
UBUNTU:USN-2717-1
UBUNTU:USN-2718-1
UBUNTU:USN-2719-1
bnc#935705
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1183744
rh#1189864
rh#1202855
rh#1226442
rh#1233615
rh#1239029
rh#1243465
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-5157kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:76005
CONFIRM:git.kernel.org:CVE-2015-5157
CONFIRM:github.com:CVE-2015-5157
CONFIRM:www.kernel.org:CVE-2015-5697
CONFIRM:www.oracle.com:CVE-2015-1351
CONFIRM:www.oracle.com:CVE-2015-8391
CVE-2015-5157
DSA-3313
MLIST:[oss-security] 20150722 Linux x86_64 NMI security issues
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2015-5157
RHSA-2016:0185
RHSA-2016:0212
RHSA-2016:0224
RHSA-2016:0715
SMASH Issue 119120
SUSE:SUSE-SU-2015:1727
SUSE:SUSE-SU-2015:2108
SUSE:SUSE-SU-2015:2339
SUSE:SUSE-SU-2015:2350
SUSE:SUSE-SU-2016:0354
UBUNTU:CVE-2015-5157
UBUNTU:USN-2687-1
UBUNTU:USN-2688-1
UBUNTU:USN-2689-1
UBUNTU:USN-2690-1
UBUNTU:USN-2691-1
bnc#938706
bnc#939207
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:37868fe113ff2ba814b3b4eb12df214df555f8dc
rh#1243465
rh#1243852
rh#1259577
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-5180glibc:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:99324
CONFIRM:sourceware.org:CVE-2015-5180
CVE-2015-5180
GENTOO:GLSA-201706-19
L3:66840
MISC:sourceware.org:/git/gitweb.cgi
MISC:www.oracle.com:CVE-2019-0217
MLIST:[libc-alpha@sourceware.org] 20170205 The GNU C Library version 2.25 is now available
Oracle:CVE-2015-5180
RH:CVE-2015-5180
RHSA-2018:0805
SMASH Issue 120979
UBUNTU:CVE-2015-5180
UBUNTU:USN-3239-1
UBUNTU:USN-3239-2
bnc#941234
rh#1249603
rh#1504804
CVE-2015-5283kernel-source-rt:Ignoremoderate ()BID:77058
CONFIRM:git.kernel.org:CVE-2015-5283
CONFIRM:github.com:CVE-2015-5283
CONFIRM:patchwork.ozlabs.org:CVE-2015-5283
CONFIRM:security-tracker.debian.org:CVE-2015-5283
CONFIRM:www.kernel.org:CVE-2015-5283
CONFIRM:www.oracle.com
CVE-2015-5283
D:CVE-2015-5283
DSA-3372
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2015-5283
RHSA-2015:2152
RHSA-2015:2411
SECTRACK:1033808
SMASH Issue 156885
SUSE:SUSE-SU-2015:1727
SUSE:SUSE-SU-2015:2194
UBUNTU:CVE-2015-5283
UBUNTU:USN-2823-1
UBUNTU:USN-2826-1
UBUNTU:USN-2829-1
UBUNTU:USN-2829-2
bnc#947155
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1243465
rh#1257528
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-5307kernel-source-rt:Not affectedmoderate ()BID:77528
CONFIRM:git.kernel.org:CVE-2015-5307
CONFIRM:kb.juniper.net:CVE-2017-2334
CONFIRM:support.citrix.com:CVE-2015-8104
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-1351
CONFIRM:www.oracle.com:CVE-2015-7744
CONFIRM:www.oracle.com:CVE-2016-2105
CONFIRM:xenbits.xen.org:CVE-2015-8104
CVE-2015-5307
D:CVE-2015-5307
D:CVE-2022-2590
DSA-3396
DSA-3414
DSA-3454
FEDORA:FEDORA-2015-394835a3f6
FEDORA:FEDORA-2015-668d213dc3
FEDORA:FEDORA-2015-f150b2a8c8
MISC:bugzilla.redhat.com
MLIST:[oss-security] 20151110 Re: CVE-2015-5307 kernel: kvm: guest to host DoS by triggering an infinite loop in microcode via #AC exception
OSS:2015/Q4/245
OSS:2015/Q4/248
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-5307
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
RH:CVE-2015-5307
RHSA-2013:0590
RHSA-2013:1752
RHSA-2013:1753
RHSA-2013:1779
RHSA-2014:0365
RHSA-2015:2552
RHSA-2015:2587
RHSA-2015:2636
RHSA-2015:2645
RHSA-2016:0004
RHSA-2016:0024
RHSA-2016:0046
SECTRACK:1034105
SMASH Issue 158544
SUSE:SUSE-SU-2015:2108
SUSE:SUSE-SU-2015:2194
SUSE:SUSE-SU-2015:2339
SUSE:SUSE-SU-2015:2350
SUSE:SUSE-SU-2016:0354
SUSE:SUSE-SU-2016:2074
SUSE:openSUSE-SU-2015:2232
SUSE:openSUSE-SU-2015:2250
UBUNTU:CVE-2015-5307
UBUNTU:USN-2800-1
UBUNTU:USN-2801-1
UBUNTU:USN-2802-1
UBUNTU:USN-2803-1
UBUNTU:USN-2804-1
UBUNTU:USN-2805-1
UBUNTU:USN-2806-1
UBUNTU:USN-2807-1
bnc#953527
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:54a20552e1eae07aa240fa370a0293e006b5faed
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1016832
rh#1024552
rh#1034153
rh#1243489
rh#1277172
rh#1384344
rh#2116175
rh#2162080
rh#2162082
rh#2162084
rh#2162087
rh#426568
rh#804591
rh#807993
rh#837577
rh#909119
CVE-2015-5364kernel-source-rt:Already fixedmoderate ()BID:74664
BID:75356
BID:75510
BID:76082
CONFIRM:git.kernel.org:CVE-2015-3212
CONFIRM:git.kernel.org:CVE-2015-4036
CONFIRM:git.kernel.org:CVE-2015-4700
CONFIRM:git.kernel.org:CVE-2015-5366
CONFIRM:github.com:CVE-2015-3212
CONFIRM:github.com:CVE-2015-4036
CONFIRM:github.com:CVE-2015-4700
CONFIRM:github.com:CVE-2015-5366
CONFIRM:kb.juniper.net:CVE-2015-5366
CONFIRM:support.f5.com:CVE-2014-8559
CONFIRM:www.kernel.org:CVE-2015-3212
CONFIRM:www.kernel.org:CVE-2015-5366
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-1351
CVE-2015-3212
CVE-2015-4036
CVE-2015-4700
CVE-2015-5364
CVE-2015-5366
DSA-3313
DSA-3329
L3:43705
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel.
MISC:twitter.com:CVE-2015-5364
MLIST:[oss-security] 20150513 CVE request for vhost/scsi possible memory corruption.
MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel.
MLIST:[oss-security] 20150630 CVE Request: UDP checksum DoS
OSS:2015/Q2/785
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2015-3212
RH:CVE-2015-4036
RH:CVE-2015-4700
RH:CVE-2015-5364
RH:CVE-2015-5366
RHSA-2015:1623
RHSA-2015:1778
RHSA-2015:1787
RHSA-2015:1788
RHSA-2016:0045
RHSA-2016:1096
RHSA-2016:1100
RHSA-2016:1225
SECTRACK:1032794
SECTRACK:1033046
SECTRACK:1033169
SECTRACK:1033729
SMASH Issue 117926
SMASH Issue 138139
SUSE:SUSE-SU-2015:1224
SUSE:SUSE-SU-2015:1324
SUSE:SUSE-SU-2015:1478
SUSE:SUSE-SU-2015:1487
SUSE:SUSE-SU-2015:1488
SUSE:SUSE-SU-2015:1489
SUSE:SUSE-SU-2015:1490
SUSE:SUSE-SU-2015:1491
SUSE:SUSE-SU-2015:1592
SUSE:SUSE-SU-2015:1611
SUSE:openSUSE-SU-2015:1382
UBUNTU:CVE-2015-3212
UBUNTU:CVE-2015-4036
UBUNTU:CVE-2015-4700
UBUNTU:CVE-2015-5364
UBUNTU:CVE-2015-5366
UBUNTU:USN-2633-1
UBUNTU:USN-2634-1
UBUNTU:USN-2680-1
UBUNTU:USN-2681-1
UBUNTU:USN-2682-1
UBUNTU:USN-2683-1
UBUNTU:USN-2684-1
UBUNTU:USN-2713-1
UBUNTU:USN-2714-1
UBUNTU:USN-2715-1
UBUNTU:USN-2716-1
UBUNTU:USN-2717-1
UBUNTU:USN-2718-1
UBUNTU:USN-2719-1
bnc#935705
bnc#942914
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1183744
rh#1189864
rh#1202855
rh#1226442
rh#1233615
rh#1239029
rh#1243465
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-5366kernel-source-rt:Already fixedmoderate ()BID:74664
BID:75356
BID:75510
BID:76082
CONFIRM:git.kernel.org:CVE-2015-3212
CONFIRM:git.kernel.org:CVE-2015-4036
CONFIRM:git.kernel.org:CVE-2015-4700
CONFIRM:git.kernel.org:CVE-2015-5366
CONFIRM:github.com:CVE-2015-3212
CONFIRM:github.com:CVE-2015-4036
CONFIRM:github.com:CVE-2015-4700
CONFIRM:github.com:CVE-2015-5366
CONFIRM:kb.juniper.net:CVE-2015-5366
CONFIRM:support.f5.com:CVE-2014-8559
CONFIRM:www.kernel.org:CVE-2015-3212
CONFIRM:www.kernel.org:CVE-2015-5366
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-1351
CVE-2015-3212
CVE-2015-4036
CVE-2015-4700
CVE-2015-5364
CVE-2015-5366
DSA-3313
DSA-3329
L3:43705
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel.
MISC:twitter.com:CVE-2015-5364
MLIST:[oss-security] 20150513 CVE request for vhost/scsi possible memory corruption.
MLIST:[oss-security] 20150622 Re: CVE request: Linux kernel - bpf jit optimization flaw can panic kenrel.
MLIST:[oss-security] 20150630 CVE Request: UDP checksum DoS
OSS:2015/Q2/785
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2015-3212
RH:CVE-2015-4036
RH:CVE-2015-4700
RH:CVE-2015-5364
RH:CVE-2015-5366
RHSA-2015:1623
RHSA-2015:1778
RHSA-2015:1787
RHSA-2015:1788
RHSA-2016:0045
RHSA-2016:1096
RHSA-2016:1100
RHSA-2016:1225
SECTRACK:1032794
SECTRACK:1033046
SECTRACK:1033169
SECTRACK:1033729
SMASH Issue 117926
SMASH Issue 138139
SUSE:SUSE-SU-2015:1224
SUSE:SUSE-SU-2015:1324
SUSE:SUSE-SU-2015:1478
SUSE:SUSE-SU-2015:1487
SUSE:SUSE-SU-2015:1488
SUSE:SUSE-SU-2015:1489
SUSE:SUSE-SU-2015:1490
SUSE:SUSE-SU-2015:1491
SUSE:SUSE-SU-2015:1592
SUSE:SUSE-SU-2015:1611
SUSE:openSUSE-SU-2015:1382
UBUNTU:CVE-2015-3212
UBUNTU:CVE-2015-4036
UBUNTU:CVE-2015-4700
UBUNTU:CVE-2015-5364
UBUNTU:CVE-2015-5366
UBUNTU:USN-2633-1
UBUNTU:USN-2634-1
UBUNTU:USN-2680-1
UBUNTU:USN-2681-1
UBUNTU:USN-2682-1
UBUNTU:USN-2683-1
UBUNTU:USN-2684-1
UBUNTU:USN-2713-1
UBUNTU:USN-2714-1
UBUNTU:USN-2715-1
UBUNTU:USN-2716-1
UBUNTU:USN-2717-1
UBUNTU:USN-2718-1
UBUNTU:USN-2719-1
bnc#935705
bnc#942914
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1183744
rh#1189864
rh#1202855
rh#1226442
rh#1233615
rh#1239029
rh#1243465
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-5697kernel-source-rt:Already fixedlow1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N)BID:76066
CONFIRM:git.kernel.org:CVE-2015-5697
CONFIRM:github.com:CVE-2015-5697
CVE-2015-5697
DSA-3329
FEDORA:FEDORA-2015-12908
FEDORA:FEDORA-2015-12917
FEDORA:FEDORA-2015-13391
FEDORA:FEDORA-2015-13396
MISC:git.kernel.org:MLIST:[oss-security] 20150728 CVE request: Linux kernel - information leak in md driver
MLIST:[oss-security] 20150728 CVE request: Linux kernel - information leak in md driver
OSS:2015/Q3/235
Oracle:CVE-2015-6937
RH:CVE-2015-5697
SECTRACK:1033211
SMASH Issue 119329
UBUNTU:CVE-2015-5697
UBUNTU:USN-2731-1
UBUNTU:USN-2732-1
UBUNTU:USN-2748-1
UBUNTU:USN-2749-1
UBUNTU:USN-2751-1
UBUNTU:USN-2752-1
bnc#939994
linux.git:commit:4e6b6ee253ce58aa156d7f1448d1038679b26783
rh#1202855
rh#1243852
rh#1249011
CVE-2015-6937kernel-source-rt:Not affectedmoderate ()BID:76767
CONFIRM:git.kernel.org:CVE-2015-6937
CONFIRM:github.com:CVE-2015-6937
CONFIRM:github.com:CVE-2016-9287
CVE-2015-6937
D:CVE-2015-6937
D:CVE-2022-2590
DSA-3364
FEDORA:FEDORA-2015-16417
FEDORA:FEDORA-2015-16440
FEDORA:FEDORA-2015-16441
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20151027 Re: CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c
MLIST:[oss-security] 20150914 CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c
OSS:2015/Q3/545
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
RH:CVE-2015-6937
SECTRACK:1034453
SMASH Issue 156567
UBUNTU:CVE-2015-6937
bdo#796036
bnc#945825
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:8c7188b23474cca017b3ef354c4a58456f68303a
rh#1263139
rh#1276437
rh#1384344
rh#2116175
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-7510systemd:Unsupportedimportant ()CONFIRM:github.com:CVE-2015-7510
CVE-2015-7510
RH:CVE-2015-7510
SMASH Issue 159055
UBUNTU:CVE-2015-7510
bnc#956712
rh#1284642
CVE-2015-7550kernel-source-rt:Already fixedmoderate ()BID:79903
CONFIRM:git.kernel.org:CVE-2015-7550
CONFIRM:security-tracker.debian.org:CVE-2015-7550
CONFIRM:www.kernel.org:CVE-2015-8575
CVE-2015-7550
D:CVE-2022-2590
DSA-3434
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
RH:CVE-2015-7550
SMASH Issue 159733
UBUNTU:CVE-2015-7550
UBUNTU:USN-2911-1
UBUNTU:USN-2911-2
bdo#808293
bdo#808602
bdo#808953
bdo#808973
bnc#958951
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:b4a1b4f5047e4f54e194681125c74c0aa64d637d
rh#1291197
rh#1384344
rh#2116175
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-7613kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:76977
CONFIRM:git.kernel.org:CVE-2015-7613
CONFIRM:github.com:CVE-2015-7613
CONFIRM:kc.mcafee.com:CVE-2015-7613
CVE-2015-7613
DSA-3372
MISC:github.com:MLIST:[oss-security] 20151001 CVE Request: Unauthorized access to IPC objects with SysV shm
MLIST:[oss-security] 20151001 CVE Request: Unauthorized access to IPC objects with SysV shm
OSS:2015/Q4/7
Oracle:CVE-2015-6937
RH:CVE-2015-7613
RHSA-2015:2152
RHSA-2015:2411
RHSA-2015:2587
RHSA-2015:2636
SECTRACK:1034094
SMASH Issue 157258
UBUNTU:CVE-2015-7613
UBUNTU:USN-2761-1
UBUNTU:USN-2762-1
UBUNTU:USN-2763-1
UBUNTU:USN-2764-1
UBUNTU:USN-2765-1
bnc#948536
bnc#948701
rh#1243852
rh#1268270
CVE-2015-7799kernel-source-rt:Not affectedlow ()BID:77033
CVE-2015-7799
D:CVE-2022-2590
DSA-3426
MISC:code.google.com:CVE-2015-7799
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20151010 Re: CVE request - Android OS - Using the PPP character device driver caused the system to restart - Linux kernel
OSS:2015/Q4/57
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
RH:CVE-2015-7799
SECTRACK:1033809
SMASH Issue 157563
UBUNTU:CVE-2015-7799
UBUNTU:USN-2841-1
UBUNTU:USN-2841-2
UBUNTU:USN-2842-1
UBUNTU:USN-2842-2
UBUNTU:USN-2843-1
UBUNTU:USN-2843-2
UBUNTU:USN-2843-3
UBUNTU:USN-2844-1
bdo#813406
bnc#949936
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:4ab42d78e37a294ac7bc56901d563c642e03c4ae
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1243852
rh#1271134
rh#1384344
rh#2116175
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-7833kernel-source-rt:Ignoremoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:77030
BUGTRAQ:20151007 Re: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (usbvision driver)
CVE-2015-7833
D:CVE-2015-7833
DSA-3396
DSA-3426
MISC:bugzilla.redhat.com
MISC:www.os-s.net:CVE-2015-7833
OSS:2015/Q4/269
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5244
RH:CVE-2015-7833
RHSA-2013:0590
RHSA-2013:1752
RHSA-2013:1753
RHSA-2013:1779
RHSA-2014:0365
SECTRACK:1034452
SMASH Issue 157908
SMASH Issue 157909
SUSE:SUSE-SU-2016:1985
UBUNTU:CVE-2015-7833
UBUNTU:USN-2929-1
UBUNTU:USN-2929-2
UBUNTU:USN-2932-1
UBUNTU:USN-2947-1
UBUNTU:USN-2947-2
UBUNTU:USN-2947-3
UBUNTU:USN-2967-1
UBUNTU:USN-2967-2
bdo#813406
bnc#950998
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1016832
rh#1024552
rh#1034153
rh#1243489
rh#1243852
rh#1270158
rh#1324749
rh#2162080
rh#2162082
rh#2162084
rh#2162087
rh#426568
rh#804591
rh#807993
rh#837577
rh#909119
CVE-2015-7872kernel-source-rt:Already fixedmoderate ()BID:77544
CONFIRM:git.kernel.org:CVE-2015-7872
CONFIRM:github.com:CVE-2015-7872
CONFIRM:h20565.www2.hpe.com
CONFIRM:h20566.www2.hpe.com:CVE-2015-7872
CONFIRM:source.android.com:CVE-2016-8411
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-1351
CVE-2015-7872
D:CVE-2015-7872
D:CVE-2022-2590
DSA-3396
HP:HPSBGN03565
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20151020 Re: CVE request: crash when attempt to garbage collect an uninstantiated keyring - Linux kernel
OSS:2015/Q4/112
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
RH:CVE-2015-7872
RHSA-2015:2636
RHSA-2016:0185
RHSA-2016:0212
RHSA-2016:0224
SECTRACK:1034472
SMASH Issue 157949
SUSE:SUSE-SU-2015:2108
SUSE:SUSE-SU-2015:2194
SUSE:SUSE-SU-2015:2292
SUSE:SUSE-SU-2015:2339
SUSE:SUSE-SU-2015:2350
SUSE:SUSE-SU-2016:0335
SUSE:SUSE-SU-2016:0337
SUSE:SUSE-SU-2016:0354
SUSE:SUSE-SU-2016:0380
SUSE:SUSE-SU-2016:0381
SUSE:SUSE-SU-2016:0383
SUSE:SUSE-SU-2016:0384
SUSE:SUSE-SU-2016:0386
SUSE:SUSE-SU-2016:0387
SUSE:SUSE-SU-2016:0434
SUSE:SUSE-SU-2016:2074
SUSE:openSUSE-SU-2016:1008
UBUNTU:CVE-2015-7872
UBUNTU:USN-2823-1
UBUNTU:USN-2824-1
UBUNTU:USN-2826-1
UBUNTU:USN-2829-1
UBUNTU:USN-2829-2
UBUNTU:USN-2840-1
UBUNTU:USN-2840-2
UBUNTU:USN-2843-1
UBUNTU:USN-2843-2
UBUNTU:USN-2843-3
bnc#951440
bnc#951542
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1243465
rh#1243852
rh#1272172
rh#1272371
rh#1384344
rh#2116175
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-7990kernel-source-rt:Not affectedlow ()BID:77340
CONFIRM:git.kernel.org:CVE-2015-7990
CVE-2015-7990
D:CVE-2022-2590
DSA-3396
MLIST:[linux-kernel] 20151016 [PATCH] RDS: fix race condition when sending a message on unbound socket.
MLIST:[oss-security] 20151027 Re: CVE-2015-6937 - Linux kernel - NULL pointer dereference in net/rds/connection.c
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
RH:CVE-2015-7990
SMASH Issue 158320
UBUNTU:CVE-2015-7990
bnc#952384
bnc#953052
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:8c7188b23474cca017b3ef354c4a58456f68303a
rh#1243852
rh#1276437
rh#1384344
rh#2116175
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-8104kernel-source-rt:Not affectedmoderate ()BID:77524
BID:91787
CONFIRM:git.kernel.org:CVE-2015-8104
CONFIRM:kb.juniper.net:CVE-2017-2334
CONFIRM:support.citrix.com:CVE-2015-8104
CONFIRM:support.citrix.com:CVE-2015-8555
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-1351
CONFIRM:www.oracle.com:CVE-2015-7744
CONFIRM:www.oracle.com:CVE-2016-2105
CONFIRM:xenbits.xen.org:CVE-2015-8104
CVE-2015-8104
D:CVE-2015-8104
D:CVE-2022-2590
DSA-3414
DSA-3426
DSA-3454
FEDORA:FEDORA-2015-394835a3f6
FEDORA:FEDORA-2015-668d213dc3
FEDORA:FEDORA-2015-f150b2a8c8
MLIST:[oss-security] 20151110 CVE-2015-8104 kernel: kvm: guest to host DoS by triggering an infinite loop in microcode via #DB exception
OSS:2015/Q4/245
OSS:2015/Q4/249
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2015-8104
Oracle:CVE-2016-5195
RH:CVE-2015-8104
RHSA-2015:2552
RHSA-2015:2636
RHSA-2015:2645
RHSA-2016:0004
RHSA-2016:0024
RHSA-2016:0046
RHSA-2016:0103
SECTRACK:1034105
SMASH Issue 158684
SUSE:SUSE-SU-2015:2108
SUSE:SUSE-SU-2015:2194
SUSE:SUSE-SU-2015:2339
SUSE:SUSE-SU-2015:2350
SUSE:SUSE-SU-2016:0354
SUSE:SUSE-SU-2016:2074
SUSE:openSUSE-SU-2015:2232
SUSE:openSUSE-SU-2015:2250
SUSE:openSUSE-SU-2016:1008
UBUNTU:CVE-2015-8104
UBUNTU:USN-2840-1
UBUNTU:USN-2841-1
UBUNTU:USN-2841-2
UBUNTU:USN-2842-1
UBUNTU:USN-2842-2
UBUNTU:USN-2843-1
UBUNTU:USN-2843-2
UBUNTU:USN-2844-1
bdo#813406
bnc#954404
http://www.debian.org/security/2015/dsa-3426
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:cbdb967af3d54993f5814f1cee0ed311a055377d
rh#1278496
rh#1384344
rh#2116175
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-8324kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2015-8324
CONFIRM:github.com:CVE-2015-8324
CONFIRM:mirror.linux.org.au:CVE-2015-8324
CONFIRM:www.oracle.com:CVE-2015-8391
CVE-2015-8324
MISC:bugs.openvz.org:MLIST:[oss-security] 20151123 CVE request -- linux kernel: Null pointer dereference when mounting ext4 filesystem
MLIST:[oss-security] 20151123 CVE request -- linux kernel: Null pointer dereference when mounting ext4 filesystem
RH:CVE-2015-8324
RHSA-2016:0855
SMASH Issue 159056
UBUNTU:CVE-2015-8324
bnc#956707
rh#1267261
CVE-2015-8539kernel-source-rt:Not affectedimportant ()CONFIRM:git.kernel.org:CVE-2015-8539
CONFIRM:github.com:CVE-2015-8539
CVE-2015-8539
D:CVE-2022-2590
MISC:git.kernel.org:MLIST:[oss-security] 20151208 CVE request - Linux kernel - Fix handling of stored error in a negatively instantiated user key
MLIST:[oss-security] 20151208 CVE request - Linux kernel - Fix handling of stored error in a negatively instantiated user key
OSS:2015/Q4/465
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2015-8539
RHSA-2018:0151
RHSA-2018:0152
RHSA-2018:0181
SMASH Issue 159531
SUSE:SUSE-SU-2016:0335
SUSE:SUSE-SU-2016:0336
SUSE:SUSE-SU-2016:0337
SUSE:SUSE-SU-2016:0339
SUSE:SUSE-SU-2016:0380
SUSE:SUSE-SU-2016:0381
SUSE:SUSE-SU-2016:0383
SUSE:SUSE-SU-2016:0384
SUSE:SUSE-SU-2016:0386
SUSE:SUSE-SU-2016:0387
SUSE:SUSE-SU-2016:0434
SUSE:SUSE-SU-2016:0911
SUSE:SUSE-SU-2016:1102
SUSE:SUSE-SU-2016:1937
SUSE:SUSE-SU-2016:2074
UBUNTU:CVE-2015-8539
UBUNTU:USN-3798-1
UBUNTU:USN-3798-2
bnc#958463
bnc#958601
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1284450
rh#1324749
rh#1384344
rh#2116175
CVE-2015-8543kernel-source-rt:Not affectedmoderate ()BID:79698
CONFIRM:git.kernel.org:CVE-2015-8543
CONFIRM:www.oracle.com:CVE-2015-8391
CVE-2015-8543
D:CVE-2022-2590
DSA-3426
DSA-3434
MLIST:[oss-security] 20151209 Re: CVE request - Android kernel - IPv6 connect cause a denial of service
OSS:2015/Q4/473
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
RH:CVE-2015-8543
RHSA-2016:0855
RHSA-2016:2574
RHSA-2016:2584
SECTRACK:1034892
SMASH Issue 159693
SUSE:SUSE-SU-2016:0911
SUSE:SUSE-SU-2016:1102
SUSE:SUSE-SU-2016:2074
UBUNTU:CVE-2015-8543
UBUNTU:USN-2886-1
UBUNTU:USN-2888-1
UBUNTU:USN-2890-1
UBUNTU:USN-2890-2
UBUNTU:USN-2890-3
bdo#808293
bdo#808602
bdo#808953
bdo#808973
bdo#813406
bnc#958886
http://www.debian.org/security/2015/dsa-3426
http://www.debian.org/security/2016/dsa-3434
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:79462ad02e861803b3840cc782248c7359451cd9
rh#1290475
rh#1384344
rh#2116175
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-8659nghttp2:Analysismoderate ()CONFIRM:nghttp2.org:CVE-2015-8659
CVE-2015-8659
D:CVE-2015-8659
FEDORA:FEDORA-2016-54f85ec6e8
FEDORA:FEDORA-2016-8e13ac5754
GENTOO:GLSA-201612-06
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20151223 Re: Use after free in nghttp2
MLIST:[oss-security] 20151223 Use after free in nghttp2
OSS:2015/Q4/576
SECTRACK:1035353
SMASH Issue 160069
UBUNTU:CVE-2015-8659
bnc#960576
rh#1295351
CVE-2015-8746kernel-source-rt:Ignoremoderate ()CONFIRM:git.kernel.org:CVE-2015-8746
CONFIRM:github.com:CVE-2015-8746
CONFIRM:www.kernel.org:CVE-2015-8746
CVE-2015-8746
MISC:git.kernel.org:MLIST:[oss-security] 20160105 CVE request -- linux kernel: nfs: kernel panic occurs at nfs client when nfsv4.2 migration is executed
MLIST:[oss-security] 20160105 CVE request -- linux kernel: nfs: kernel panic occurs at nfs client when nfsv4.2 migration is executed
OSS:2016/Q1/27
OSS:2023/10/10/4
Oracle:CVE-2015-6937
RH:CVE-2015-8746
RHSA-2016:2574
RHSA-2016:2584
SECTRACK:1034594
SMASH Issue 160367
UBUNTU:CVE-2015-8746
bnc#960839
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
rh#1295802
rh#2162080
rh#2162082
rh#2162084
rh#2162087
CVE-2015-8785kernel-source-rt:Not affectedlow ()BID:81688
CONFIRM:git.kernel.org:CVE-2015-8785
CONFIRM:github.com:CVE-2015-8785
CONFIRM:www.oracle.com:CVE-2016-7039
CONFIRM:www.oracle.com:CVE-2016-7166
CVE-2015-8785
D:CVE-2015-8785
D:CVE-2022-2590
DSA-3503
MLIST:[oss-security] 20160124 CVE Request: Linux: fuse: possible denial of service in fuse_fill_write_pages()
OSS:2016/Q1/189
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2015-8785
SMASH Issue 161259
SUSE:SUSE-SU-2016:0911
SUSE:SUSE-SU-2016:1102
SUSE:SUSE-SU-2016:1764
SUSE:SUSE-SU-2016:2074
SUSE:openSUSE-SU-2016:1008
UBUNTU:CVE-2015-8785
UBUNTU:USN-2886-1
bnc#963765
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1290642
rh#1324749
rh#1384344
rh#2116175
CVE-2015-8812kernel-source-rt:Already fixedmoderate ()BID:83218
CONFIRM:git.kernel.org:CVE-2015-8812
CONFIRM:github.com:CVE-2015-8812
CVE-2015-8812
D:CVE-2022-2590
DSA-3503
MISC:git.kernel.org:MLIST:[oss-security] 20160211 Linux kernel: Flaw in CXGB3 driver.
MLIST:[oss-security] 20160211 Linux kernel: Flaw in CXGB3 driver.
OSS:2016/Q1/311
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2015-8812
RHSA-2016:2574
RHSA-2016:2584
SMASH Issue 161840
SUSE:SUSE-SU-2016:0911
SUSE:SUSE-SU-2016:1019
SUSE:SUSE-SU-2016:1031
SUSE:SUSE-SU-2016:1032
SUSE:SUSE-SU-2016:1033
SUSE:SUSE-SU-2016:1034
SUSE:SUSE-SU-2016:1035
SUSE:SUSE-SU-2016:1037
SUSE:SUSE-SU-2016:1038
SUSE:SUSE-SU-2016:1039
SUSE:SUSE-SU-2016:1040
SUSE:SUSE-SU-2016:1041
SUSE:SUSE-SU-2016:1045
SUSE:SUSE-SU-2016:1046
SUSE:SUSE-SU-2016:1102
SUSE:SUSE-SU-2016:1764
SUSE:SUSE-SU-2016:2074
SUSE:openSUSE-SU-2016:1008
UBUNTU:CVE-2015-8812
UBUNTU:USN-2946-1
UBUNTU:USN-2946-2
UBUNTU:USN-2947-1
UBUNTU:USN-2947-2
UBUNTU:USN-2947-3
UBUNTU:USN-2948-1
UBUNTU:USN-2948-2
UBUNTU:USN-2949-1
UBUNTU:USN-2967-1
UBUNTU:USN-2967-2
bnc#966437
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1303532
rh#1324749
rh#1384344
rh#2116175
CVE-2015-8816kernel-source-rt:Not affectedmoderate ()BID:83363
CONFIRM:git.kernel.org:CVE-2015-8816
CONFIRM:git.kernel.org:CVE-2016-8633
CONFIRM:github.com:CVE-2015-8816
CONFIRM:source.android.com:CVE-2016-3818
CONFIRM:www.kernel.org:CVE-2016-2070
CONFIRM:www.oracle.com:CVE-2016-5386
CONFIRM:www.oracle.com:CVE-2016-6304
CVE-2015-8816
D:CVE-2022-2590
DSA-3503
MISC:git.kernel.org:MLIST:[oss-security] 20160223 CVE Request: Linux kernel USB hub invalid memory access in hub_activate()
MLIST:[oss-security] 20160223 CVE Request: Linux kernel USB hub invalid memory access in hub_activate()
OSS:2016/Q1/413
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2015-8816
SMASH Issue 162166
SMASH Issue 168723
SUSE:SUSE-SU-2016:1019
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1690
SUSE:SUSE-SU-2016:1707
SUSE:SUSE-SU-2016:1764
SUSE:SUSE-SU-2016:1961
SUSE:SUSE-SU-2016:1994
SUSE:SUSE-SU-2016:1995
SUSE:SUSE-SU-2016:2001
SUSE:SUSE-SU-2016:2002
SUSE:SUSE-SU-2016:2005
SUSE:SUSE-SU-2016:2006
SUSE:SUSE-SU-2016:2007
SUSE:SUSE-SU-2016:2009
SUSE:SUSE-SU-2016:2010
SUSE:SUSE-SU-2016:2014
SUSE:SUSE-SU-2016:2074
UBUNTU:CVE-2015-8816
bnc#968010
bnc#979064
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1311589
rh#1324749
rh#1384344
rh#2116175
CVE-2015-8830kernel-source-rt:Not affectedimportant ()CONFIRM:git.kernel.org:CVE-2015-8830
CONFIRM:github.com:CVE-2015-8830
CVE-2015-8830
DSA-3503
OSS:2016/Q1/491
Oracle:CVE-2016-5244
RH:CVE-2015-8830
RHSA-2018:1854
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
SMASH Issue 162483
UBUNTU:CVE-2015-8830
bnc#969355
rh#1314275
rh#1324749
CVE-2015-8844kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2015-8844
CONFIRM:git.kernel.org:CVE-2015-8845
CONFIRM:github.com:CVE-2015-8844
CONFIRM:github.com:CVE-2015-8845
CONFIRM:www.kernel.org:CVE-2016-2549
CVE-2015-8844
CVE-2015-8845
MISC:git.kernel.org:MLIST:[oss-security] 20160413 CVE Request: Linux kernel: incorrect restoration of machine specific registers from signal handler.
MLIST:[oss-security] 20160413 CVE Request: Linux kernel: incorrect restoration of machine specific registers from signal handler.
OSS:2016/Q2/68
Oracle:CVE-2016-5244
RH:CVE-2015-8844
RH:CVE-2015-8845
RHSA-2016:2574
RHSA-2016:2584
SECTRACK:1035594
SMASH Issue 167801
SMASH Issue 167802
SMASH Issue 167831
UBUNTU:CVE-2015-8844
UBUNTU:CVE-2015-8845
bnc#975531
bnc#975533
rh#1324749
rh#1326540
CVE-2015-8845kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2015-8844
CONFIRM:git.kernel.org:CVE-2015-8845
CONFIRM:github.com:CVE-2015-8844
CONFIRM:github.com:CVE-2015-8845
CONFIRM:www.kernel.org:CVE-2016-2549
CVE-2015-8844
CVE-2015-8845
MISC:git.kernel.org:MLIST:[oss-security] 20160413 CVE Request: Linux kernel: incorrect restoration of machine specific registers from signal handler.
MLIST:[oss-security] 20160413 CVE Request: Linux kernel: incorrect restoration of machine specific registers from signal handler.
OSS:2016/Q2/68
Oracle:CVE-2016-5244
RH:CVE-2015-8844
RH:CVE-2015-8845
RHSA-2016:2574
RHSA-2016:2584
SECTRACK:1035594
SMASH Issue 167801
SMASH Issue 167831
UBUNTU:CVE-2015-8844
UBUNTU:CVE-2015-8845
bnc#975531
bnc#975533
rh#1324749
rh#1326540
CVE-2015-8863jq:Releasedlow ()CONFIRM:github.com:CVE-2015-8863
CONFIRM:github.com:CVE-2016-10166
CVE-2015-8863
CVE-2016-4074
D:CVE-2015-8863
D:CVE-2016-4074
GENTOO:GLSA-201612-20
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:github.com:CVE-2016-4074
MLIST:[oss-security] 20160423 CVE Request: jq: heap buffer overflow in tokenadd() function
MLIST:[oss-security] 20160423 Re: CVE Request: jq: heap buffer overflow in tokenadd() function
MLIST:[oss-security] 20160424 CVE Request: jq: stack exhaustion using jv_dump_term() function
MLIST:[oss-security] 20160424 Re: CVE Request: jq: stack exhaustion using jv_dump_term() function
OSS:2016/Q2/135
OSS:2016/Q2/141
RH:CVE-2015-8863
RH:CVE-2016-4074
RHSA-2016:1098
RHSA-2016:1099
RHSA-2016:1106
SMASH Issue 168253
SUSE:openSUSE-SU-2016:1212
SUSE:openSUSE-SU-2016:1214
UBUNTU:CVE-2015-8863
UBUNTU:CVE-2016-4074
bdo#802231
bnc#1014176
bnc#976992
rh#1328747
rh#1329982
CVE-2015-8927libarchive:Not affectedmoderate ()BID:91329
CVE-2015-8927
D:CVE-2015-8927
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:github.com:CVE-2015-8927
OSS:2016/Q2/566
RH:CVE-2015-8927
SMASH Issue 170293
UBUNTU:CVE-2015-8927
bnc#985712
rh#1348426
CVE-2015-8962kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:94187
CONFIRM:git.kernel.org:CVE-2015-8962
CONFIRM:github.com:CVE-2015-8962
CONFIRM:github.com:CVE-2016-10192
CONFIRM:source.android.com:CVE-2016-6828
CVE-2015-8962
Oracle:CVE-2016-5244
RH:CVE-2015-8962
SMASH Issue 176392
UBUNTU:CVE-2015-8962
bnc#1010501
rh#1400457
CVE-2015-8963kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:94207
CONFIRM:git.kernel.org:CVE-2015-8963
CONFIRM:github.com:CVE-2015-8963
CONFIRM:source.android.com:CVE-2016-7917
CVE-2015-8963
D:CVE-2015-8963
RH:CVE-2015-8963
SMASH Issue 176393
UBUNTU:CVE-2015-8963
bnc#1010502
rh#1411245
CVE-2015-8967kernel-source-rt:Unsupportedcritical ()BID:94680
CONFIRM:git.kernel.org:CVE-2015-8967
CONFIRM:github.com:CVE-2015-8967
CONFIRM:source.android.com:CVE-2016-9120
CVE-2015-8967
RH:CVE-2015-8967
SMASH Issue 177318
UBUNTU:CVE-2015-8967
bnc#1014749
rh#1404284
CVE-2015-8970kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)BID:94217
CONFIRM:git.kernel.org:CVE-2015-8970
CONFIRM:github.com:CVE-2015-8970
CONFIRM:github.com:CVE-2017-6429
CONFIRM:groups.google.com:CVE-2015-8970
CONFIRM:www.kernel.org:CVE-2015-8970
CVE-2015-8970
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20161104 Re: CVE request -- linux kernel: crypto: GPF in lrw_crypt caused by null-deref
MISC:git.kernel.org:OSS:2020/Q1/69
MLIST:[oss-security] 20161104 Re: CVE request -- linux kernel: crypto: GPF in lrw_crypt caused by null-deref
OSS:2016/Q4/330
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2015-8970
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2437
RHSA-2017:2444
SMASH Issue 174477
UBUNTU:CVE-2015-8970
bnc#1008374
bnc#1008850
bnc#1034670
bnc#1049603
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1386286
rh#1420236
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1481178
CVE-2015-8982glibc:Not affectedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)BID:72602
BID:72740
BID:72789
BID:76916
CONFIRM:sourceware.org:CVE-2015-8982
CONFIRM:sourceware.org:CVE-2015-8983
CONFIRM:sourceware.org:CVE-2015-8984
CVE-2015-8982
CVE-2015-8983
CVE-2015-8984
CVE-2015-8985
L3:64698
MLIST:[oss-security] 20150213 CVE Requests - glibc overflows (strxfrm)
MLIST:[oss-security] 20150226 CVE request: glibc: potential application crash due to overread in fnmatch
MLIST:[oss-security] 20170214 Re: Pending CVE requests for glibc
OSS:2017/Q1/437
SMASH Issue 180532
SMASH Issue 317059
UBUNTU:CVE-2015-8982
UBUNTU:CVE-2015-8983
UBUNTU:CVE-2015-8984
UBUNTU:CVE-2015-8985
bdo#779392
bnc#1193616
rh#1192525
rh#1195762
rh#1197730
rh#1197798
CVE-2015-8983glibc:Not affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H)BID:72602
BID:72740
BID:72789
BID:76916
CONFIRM:sourceware.org:CVE-2015-8982
CONFIRM:sourceware.org:CVE-2015-8983
CONFIRM:sourceware.org:CVE-2015-8984
CVE-2015-8982
CVE-2015-8983
CVE-2015-8984
CVE-2015-8985
L3:64698
MLIST:[oss-security] 20150213 CVE Requests - glibc overflows (strxfrm)
MLIST:[oss-security] 20150226 CVE request: glibc: potential application crash due to overread in fnmatch
MLIST:[oss-security] 20170214 Re: Pending CVE requests for glibc
OSS:2017/Q1/437
SMASH Issue 180532
SMASH Issue 317060
UBUNTU:CVE-2015-8982
UBUNTU:CVE-2015-8983
UBUNTU:CVE-2015-8984
UBUNTU:CVE-2015-8985
bdo#779392
bnc#1193615
rh#1192525
rh#1195762
rh#1197730
rh#1197798
CVE-2015-8985glibc:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:72602
BID:72740
BID:72789
BID:76916
CONFIRM:sourceware.org:CVE-2015-8982
CONFIRM:sourceware.org:CVE-2015-8983
CONFIRM:sourceware.org:CVE-2015-8984
CVE-2015-8982
CVE-2015-8983
CVE-2015-8984
CVE-2015-8985
D:CVE-2015-20109
MLIST:[oss-security] 20150213 CVE Requests - glibc overflows (strxfrm)
MLIST:[oss-security] 20150226 CVE request: glibc: potential application crash due to overread in fnmatch
MLIST:[oss-security] 20170214 Re: Pending CVE requests for glibc
OSS:2017/Q1/437
SMASH Issue 180532
SMASH Issue 317058
UBUNTU:CVE-2015-8982
UBUNTU:CVE-2015-8983
UBUNTU:CVE-2015-8984
UBUNTU:CVE-2015-8985
bdo#779392
bnc#1193625
bnc#920338
jsc#CAR-1325
rh#1165192
rh#1192525
rh#1195762
rh#1197730
rh#1197798
rh#2217330
CVE-2015-9004kernel-source-rt:Ignoremoderate ()BID:98166
CONFIRM:git.kernel.org:CVE-2015-9004
CONFIRM:github.com:CVE-2015-9004
CONFIRM:source.android.com:CVE-2017-0635
CVE-2015-9004
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
RH:CVE-2015-9004
SMASH Issue 184698
UBUNTU:CVE-2015-9004
bnc#1037306
rh#1447676
rh#1462147
rh#1462158
rh#1481178
CVE-2015-9261busybox:Releasedmoderate5.5 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)BUGTRAQ:20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
BUGTRAQ:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
CVE-2015-9261
FULLDISC:20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
FULLDISC:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
FULLDISC:20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S
FULLDISC:20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series
MISC:git.busybox.net:CVE-2015-9261
MISC:packetstormsecurity.com:CVE-2010-0296
MISC:packetstormsecurity.com:CVE-2015-9261
MISC:www.openwall.com:CVE-2015-9261
MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update
MLIST:[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update
OSS:2018/Q3/64
RH:CVE-2015-9261
SMASH Issue 211758
UBUNTU:CVE-2015-9261
USN-3935-1
bdo#803097
bnc#1102912
rh#1276427
CVE-2015-9289kernel-source-rt:Not affectedcritical ()CVE-2015-9289
D:CVE-2015-9289
MISC:git.kernel.org:CVE-2015-9289
MISC:github.com:CVE-2015-9289
MISC:mirrors.edge.kernel.org:CVE-2015-9289
RH:CVE-2015-9289
RHSA-2020:1016
RHSA-2020:1070
SMASH Issue 238133
UBUNTU:CVE-2015-9289
bnc#1143179
rh#1731000
rh#1734243
rh#1734246
rh#1735655
CVE-2016-0758kernel-source-rt:Already fixedimportant ()BID:90626
CONFIRM:git.kernel.org:CVE-2016-0758
CONFIRM:source.android.com:CVE-2016-7117
CONFIRM:www.oracle.com:CVE-2015-8391
CVE-2016-0758
HP:HPSBHF3548
MLIST:[oss-security] 20160513 CVE-2016-0758 - Linux kernel - Flaw in ASN.1 DER decoder for x509 certificate DER files.
OSS:2016/Q2/335
Oracle:CVE-2016-5244
RH:CVE-2016-0758
RHSA-2016:1033
RHSA-2016:1051
RHSA-2016:1055
SMASH Issue 169023
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1690
SUSE:SUSE-SU-2016:1937
SUSE:SUSE-SU-2016:1961
SUSE:SUSE-SU-2016:1985
SUSE:SUSE-SU-2016:1994
SUSE:SUSE-SU-2016:1995
SUSE:SUSE-SU-2016:2000
SUSE:SUSE-SU-2016:2001
SUSE:SUSE-SU-2016:2002
SUSE:SUSE-SU-2016:2003
SUSE:SUSE-SU-2016:2005
SUSE:SUSE-SU-2016:2006
SUSE:SUSE-SU-2016:2007
SUSE:SUSE-SU-2016:2009
SUSE:SUSE-SU-2016:2010
SUSE:SUSE-SU-2016:2011
SUSE:SUSE-SU-2016:2014
SUSE:SUSE-SU-2016:2105
SUSE:openSUSE-SU-2016:1641
SUSE:openSUSE-SU-2016:2184
UBUNTU:CVE-2016-0758
UBUNTU:USN-2979-4
bnc#979867
linux.git:commit:23c8a812dc3c621009e4f0e5342aa4e2ede1ceaa
rh#1300257
rh#1324749
CVE-2016-0821kernel-source-rt:Not affectedlow ()BID:84260
CONFIRM:git.kernel.org:CVE-2016-0821
CONFIRM:github.com:CVE-2016-0821
CONFIRM:source.android.com:CVE-2016-1621
CVE-2016-0821
CVE-2016-0823
DSA-3607
L3:45886
MLIST:[oss-security] 20150502 Re: CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam
Oracle:CVE-2016-5244
RH:CVE-2016-0821
SMASH Issue 163215
SMASH Issue 172056
UBUNTU:CVE-2016-0821
UBUNTU:USN-2967-1
UBUNTU:USN-2967-2
UBUNTU:USN-2968-1
UBUNTU:USN-2968-2
UBUNTU:USN-2969-1
UBUNTU:USN-2970-1
UBUNTU:USN-2971-1
UBUNTU:USN-2971-2
UBUNTU:USN-2971-3
bnc#987709
bnc#994624
rh#1317571
CVE-2016-0823kernel-source-rt:Ignoremoderate ()BID:61995
BID:71082
BID:72842
BID:84260
BID:84265
CONFIRM:git.kernel.org:CVE-2013-5634
CONFIRM:git.kernel.org:CVE-2014-2889
CONFIRM:git.kernel.org:CVE-2014-4157
CONFIRM:git.kernel.org:CVE-2014-7843
CONFIRM:git.kernel.org:CVE-2015-0239
CONFIRM:git.kernel.org:CVE-2016-0821
CONFIRM:git.kernel.org:CVE-2016-0823
CONFIRM:github.com:CVE-2013-5634
CONFIRM:github.com:CVE-2014-2889
CONFIRM:github.com:CVE-2014-4157
CONFIRM:github.com:CVE-2014-7843
CONFIRM:github.com:CVE-2016-0821
CONFIRM:github.com:CVE-2016-0823
CONFIRM:source.android.com:CVE-2016-1621
CONFIRM:www.codeaurora.org:CVE-2014-4322
CONFIRM:www.kernel.org:CVE-2013-5634
CONFIRM:www.kernel.org:CVE-2014-2889
CONFIRM:www.kernel.org:CVE-2014-8884
CONFIRM:www.kernel.org:CVE-2015-1573
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-1351
CONFIRM:www.oracle.com:CVE-2015-8472
CONFIRM:www.oracle.com:CVE-2016-2802
CVE-2013-5634
CVE-2014-2889
CVE-2014-4157
CVE-2014-4322
CVE-2014-7843
CVE-2015-0239
CVE-2016-0821
CVE-2016-0823
D:CVE-2014-2889
D:CVE-2014-4157
D:CVE-2014-7843
D:CVE-2015-0239
D:CVE-2022-2590
DSA-3170
DSA-3607
L3:45886
MANDRIVA:MDVSA-2015:058
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:/
MISC:git.kernel.org:MLIST:[oss-security] 20140418 Re: CVE request Linux kernel: arch: x86: net: bpf_jit: an off-by-one bug in x86_64 cond jump target
MISC:googleprojectzero.blogspot.com:CVE-2016-0823
MLIST:[bk-commits-head] 20150123 KVM: x86: SYSENTER emulation is broken
MLIST:[oss-security] 20130826 Re: CVE request: Linux Kernel: ARM: KVM: NULL pointer dereferences
MLIST:[oss-security] 20140418 Re: CVE request Linux kernel: arch: x86: net: bpf_jit: an off-by-one bug in x86_64 cond jump target
MLIST:[oss-security] 20141113 CVE-2014-7843 Linux kernel: aarch64: copying from /dev/zero causes local DoS
MLIST:[oss-security] 20150127 KVM SYSENTER emulation vulnerability - CVE-2015-0239
MLIST:[oss-security] 20150502 Re: CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam
OSS:11000
OSS:2014/Q4/603
OSS:2015/Q1/271
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2013-5634
RH:CVE-2014-2889
RH:CVE-2014-4157
RH:CVE-2014-7843
RH:CVE-2015-0239
RH:CVE-2016-0821
RH:CVE-2016-0823
RHSA-2015:1272
RHSA-2015:2152
SMASH Issue 110718
SMASH Issue 111821
SMASH Issue 113160
SMASH Issue 163215
SMASH Issue 163217
SMASH Issue 172055
SMASH Issue 172056
SMASH Issue 172067
SMASH Issue 92645
SMASH Issue 98276
SMASH Issue 99946
UBUNTU:CVE-2013-5634
UBUNTU:CVE-2014-2889
UBUNTU:CVE-2014-4157
UBUNTU:CVE-2014-4322
UBUNTU:CVE-2014-7843
UBUNTU:CVE-2015-0239
UBUNTU:CVE-2016-0821
UBUNTU:CVE-2016-0823
UBUNTU:USN-2513-1
UBUNTU:USN-2514-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
UBUNTU:USN-2967-1
UBUNTU:USN-2967-2
UBUNTU:USN-2968-1
UBUNTU:USN-2968-2
UBUNTU:USN-2969-1
UBUNTU:USN-2970-1
UBUNTU:USN-2971-1
UBUNTU:USN-2971-2
UBUNTU:USN-2971-3
bdo#751417
bnc#987709
bnc#994618
bnc#994624
bnc#994751
bnc#994752
bnc#994755
bnc#994757
bnc#994758
bnc#994759
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=97fc15436b36ee3956efad83e22a557991f7d19d
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a03ffcf873fe0f2565386ca8ef832144c42e67fa
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e8180dcaa8470ceca21109f143876fdcd9fe050a
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:f3747379accba8e95d70cec0eae0582c8c182050
rh#1163744
rh#1186448
rh#1317571
rh#1317576
rh#1384344
rh#2116175
CVE-2016-10044kernel-source-rt:Not affectedlow7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:96122
CONFIRM:git.kernel.org:CVE-2016-10044
CONFIRM:github.com:CVE-2016-10044
CONFIRM:source.android.com:CVE-2016-10044
CONFIRM:www.kernel.org:CVE-2016-10044
CVE-2016-10044
Oracle:CVE-2017-6074
RH:CVE-2016-10044
SECTRACK:1037798
SMASH Issue 180010
UBUNTU:CVE-2016-10044
bnc#1023992
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1435719
CVE-2016-10088kernel-source-rt:Already fixedimportant ()BID:94821
BID:95169
CONFIRM:git.kernel.org:CVE-2016-10088
CONFIRM:git.kernel.org:CVE-2016-9576
CONFIRM:github.com:CVE-2016-10088
CONFIRM:github.com:CVE-2016-10167
CONFIRM:github.com:CVE-2016-10190
CONFIRM:github.com:CVE-2016-9576
CONFIRM:www.kernel.org:CVE-2016-9793
CVE-2016-10088
CVE-2016-9576
D:CVE-2016-10088
D:CVE-2016-9576
L3:47394
MISC:anonscm.debian.org:MLIST:[oss-security] 20161230 Re: Linux Kernel use-after-free in SCSI generic device interface
MLIST:[oss-security] 20161209 Linux Kernel use-after-free in SCSI generic device interface
MLIST:[oss-security] 20161230 Re: Linux Kernel use-after-free in SCSI generic device interface
OSS:2016/Q4/644
OSS:2016/Q4/779
OSS:2016/Q4/781
Oracle:CVE-2016-5244
RH:CVE-2016-10088
RH:CVE-2016-9576
RHSA-2017:0817
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
SECTRACK:1037538
SMASH Issue 177214
SMASH Issue 178176
SUSE:SUSE-SU-2016:3146
SUSE:SUSE-SU-2016:3188
SUSE:SUSE-SU-2016:3203
SUSE:SUSE-SU-2016:3217
SUSE:SUSE-SU-2016:3248
SUSE:SUSE-SU-2016:3252
SUSE:openSUSE-SU-2016:3085
SUSE:openSUSE-SU-2016:3086
SUSE:openSUSE-SU-2016:3118
UBUNTU:CVE-2016-10088
UBUNTU:CVE-2016-9576
bnc#1013604
bnc#1014271
bnc#1017710
bnc#1019079
bnc#1024055
rh#1403145
rh#1412210
CVE-2016-10147kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)BID:95677
CONFIRM:git.kernel.org:CVE-2016-10147
CONFIRM:github.com:CVE-2016-10147
CONFIRM:www.kernel.org:CVE-2016-10147
CVE-2016-10147
MISC:git.kernel.org:MLIST:[oss-security] 20170117 CVE request -- linux kernel: crash by spawning mcrypt(alg) with incompatible algorithm
MLIST:[linux-crypto] 20161202 Crash in crypto mcryptd
MLIST:[oss-security] 20170117 CVE request -- linux kernel: crash by spawning mcrypt(alg) with incompatible algorithm
OSS:2017/Q1/127
RH:CVE-2016-10147
RHSA-2017:1842
RHSA-2017:2077
SMASH Issue 178739
SMASH Issue 178815
UBUNTU:CVE-2016-10147
bnc#1020381
bnc#1020429
rh#1404200
CVE-2016-10150kernel-source-rt:Unsupportedmoderate ()BID:95672
CONFIRM:git.kernel.org:CVE-2016-10150
CONFIRM:github.com:CVE-2016-10150
CONFIRM:www.kernel.org:CVE-2016-10150
CVE-2016-10150
MLIST:[oss-security] 20170118 CVE request Kernel: kvm: use-after-free issue while creating devices
OSS:2017/Q1/141
RH:CVE-2016-10150
SMASH Issue 178846
SMASH Issue 178917
UBUNTU:CVE-2016-10150
bnc#1020693
rh#1414506
CVE-2016-10200kernel-source-rt:Already fixedlow ()BID:101783
CONFIRM:git.kernel.org:CVE-2016-10200
CONFIRM:github.com:CVE-2016-10200
CONFIRM:github.com:CVE-2017-5506
CONFIRM:source.android.com:CVE-2016-10200
CONFIRM:www.kernel.org:CVE-2016-9793
CVE-2016-10200
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2017/Q3/526
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2016-10200
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2437
RHSA-2017:2444
SECTRACK:1037965
SECTRACK:1037968
SMASH Issue 181313
UBUNTU:CVE-2016-10200
bnc#1028415
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1430347
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1481178
CVE-2016-10208kernel-source-rt:Not affectedimportant6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:94354
CONFIRM:git.kernel.org:CVE-2016-10208
CONFIRM:github.com:CVE-2016-10208
CONFIRM:github.com:CVE-2017-6059
CVE-2016-10208
FULLDISC:20161115 OS-S 2016-22 - Local DoS: Linux Kernel EXT4 Memory Corruption / SLAB-Out-of-Bounds Read
MISC:bugzilla.redhat.com:MLIST:[oss-security] 20170204 Re: Local DoS: Linux Kernel EXT4 Memory Corruption / SLAB-Out-of-Bounds Read
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20170204 Re: Local DoS: Linux Kernel EXT4 Memory Corruption / SLAB-Out-of-Bounds Read
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
MLIST:[oss-security] 20170204 Re: Local DoS: Linux Kernel EXT4 Memory Corruption / SLAB-Out-of-Bounds Read
OSS:2017/Q1/313
Oracle:CVE-2017-6074
RH:CVE-2016-10208
RHSA-2017:1297
RHSA-2017:1298
RHSA-2017:1308
SMASH Issue 179913
UBUNTU:CVE-2016-10208
bnc#1023377
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1395190
rh#1420236
rh#1435719
CVE-2016-10228glibc:Unsupportedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)BID:96525
CONFIRM:openwall.com:CVE-2016-10228
CONFIRM:sourceware.org:CVE-2016-10228
CVE-2016-10228
GLSA-202101-20
L3:61064
MISC:www.oracle.com:CVE-2022-21498
MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
OSS:2017/Q1/538
RH:CVE-2016-10228
RHSA-2021:1585
SMASH Issue 181063
UBUNTU:CVE-2016-10228
bnc#1027496
bnc#1187775
jsc#CAR-1305
rh#1428290
rh#1684374
CVE-2016-10229kernel-source-rt:Not affectedcritical ()BID:97397
CONFIRM:git.kernel.org:CVE-2016-10229
CONFIRM:github.com:CVE-2016-10229
CONFIRM:security.paloaltonetworks.com:CVE-2016-10229
CONFIRM:securityadvisories.paloaltonetworks.com:CVE-2016-10229
CONFIRM:source.android.com:CVE-2016-10229
CVE-2016-10229
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2017/Q2/256
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
RH:CVE-2016-10229
SECTRACK:1038201
SMASH Issue 182832
UBUNTU:CVE-2016-10229
bnc#1032268
rh#1439740
rh#1462147
rh#1462158
rh#1481178
CVE-2016-10739glibc:Not affectedmoderate4.5 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)BID:106672
CVE-2016-10739
D:CVE-2016-10739
MISC:sourceware.org:CVE-2016-10739
RH:CVE-2016-10739
RHBA-2020:0547
RHSA-2019:2118
RHSA-2019:3513
RHSA-2020:4273
RHSA-2020:4285
SMASH Issue 223510
SUSE:openSUSE-SU-2019:1250
UBUNTU:CVE-2016-10739
bnc#1122729
rh#1347549
rh#1683683
rh#1684057
rh#1727276
CVE-2016-10741kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2016-10741
RH:CVE-2016-10741
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
SMASH Issue 224072
UBUNTU:CVE-2016-10741
bnc#1114920
bnc#1124010
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1609664
rh#1660375
rh#1660385
rh#1667782
rh#1671869
rh#1686136
rh#1701224
rh#1701842
CVE-2016-10905kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H)BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
CVE-2016-10905
MISC:git.kernel.org:CVE-2016-10905
MISC:packetstormsecurity.com:CVE-2019-0136
MISC:packetstormsecurity.com:CVE-2019-15098
MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
RH:CVE-2016-10905
SMASH Issue 240420
UBUNTU:CVE-2016-10905
USN-4145-1
bnc#1146312
https://support.f5.com/csp/article/K31332013
https://support.f5.com/csp/article/K31332013?utm_source=f5support&utm_medium=RSS
rh#1757356
CVE-2016-10907kernel-source-rt:Unsupportedimportant ()CVE-2016-10907
MISC:cdn.kernel.org:CVE-2016-10907
MISC:git.kernel.org:CVE-2016-10907
RH:CVE-2016-10907
SMASH Issue 240422
UBUNTU:CVE-2016-10907
bnc#1146302
rh#1757372
CVE-2016-1237kernel-source-rt:Not affectedlow ()BID:91456
CONFIRM:git.kernel.org:CVE-2016-1237
CONFIRM:github.com:CVE-2016-1237
CVE-2016-1237
D:CVE-2016-1237
D:CVE-2022-2590
DSA-3607
MLIST:[oss-security] 20160625 Linux CVE-2016-1237: nfsd: any user can set a file's ACL over NFS and grant access to it
OSS:2016/Q2/602
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
RH:CVE-2016-1237
SMASH Issue 170513
UBUNTU:CVE-2016-1237
UBUNTU:USN-3053-1
UBUNTU:USN-3070-1
UBUNTU:USN-3070-2
UBUNTU:USN-3070-3
UBUNTU:USN-3070-4
bnc#986570
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1350845
rh#1384344
rh#2116175
CVE-2016-1283pcre:Not affectedcritical ()BID:79825
CONFIRM:bto.bluecoat.com:CVE-2016-3191
CONFIRM:bugs.exim.org:CVE-2016-1283
CONFIRM:www.oracle.com:CVE-2016-4957
CONFIRM:www.tenable.com:CVE-2016-9261
CONFIRM:www.tenable.com:CVE-2017-3736
CVE-2016-1283
FEDORA:FEDORA-2016-65833b5dbc
FEDORA:FEDORA-2016-f5af8e27ce
GENTOO:GLSA-201607-02
OSS:2016/Q1/2
RH:CVE-2016-1283
RHSA-2016:1132
SECTRACK:1034555
SLACKWARE:SSA:2016-172-02
SMASH Issue 160250
SMASH Issue 176113
UBUNTU:CVE-2016-1283
bnc#960837
rh#1287629
rh#1295385
rh#1311503
CVE-2016-1583kernel-source-rt:Not affectedimportant8.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)BID:91157
CONFIRM:git.kernel.org:CVE-2016-1583
CONFIRM:github.com:CVE-2016-1583
CONFIRM:www.kernel.org:CVE-2016-1583
CVE-2016-1583
D:CVE-2016-1583
DSA-3607
EXPLOIT-DB:39992
MISC:bugs.chromium.org:CVE-2016-1583
MISC:git.kernel.org:MLIST:[oss-security] 20160622 Re: [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ
MISC:packetstormsecurity.com:CVE-2016-1583
MLIST:[oss-security] 20160610 [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ
MLIST:[oss-security] 20160622 Re: [vs-plain] Linux kernel stack overflow via ecryptfs and /proc/$pid/environ
OSS:2016/Q2/522
Oracle:CVE-2016-5244
RH:CVE-2016-1583
RHSA-2016:2124
RHSA-2016:2766
RHSA-2017:2760
SECTRACK:1036763
SMASH Issue 169791
SMASH Issue 169792
SUSE:SUSE-SU-2016:1596
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1696
SUSE:SUSE-SU-2016:1937
SUSE:SUSE-SU-2016:1961
SUSE:SUSE-SU-2016:1985
SUSE:SUSE-SU-2016:1994
SUSE:SUSE-SU-2016:1995
SUSE:SUSE-SU-2016:2000
SUSE:SUSE-SU-2016:2002
SUSE:SUSE-SU-2016:2005
SUSE:SUSE-SU-2016:2006
SUSE:SUSE-SU-2016:2007
SUSE:SUSE-SU-2016:2009
SUSE:SUSE-SU-2016:2010
SUSE:SUSE-SU-2016:2014
SUSE:SUSE-SU-2016:2105
SUSE:openSUSE-SU-2016:1641
SUSE:openSUSE-SU-2016:2184
UBUNTU:CVE-2016-1583
UBUNTU:USN-2996-1
UBUNTU:USN-2997-1
UBUNTU:USN-2998-1
UBUNTU:USN-2999-1
UBUNTU:USN-3000-1
UBUNTU:USN-3001-1
UBUNTU:USN-3002-1
UBUNTU:USN-3003-1
UBUNTU:USN-3004-1
UBUNTU:USN-3005-1
UBUNTU:USN-3006-1
UBUNTU:USN-3007-1
UBUNTU:USN-3008-1
bnc#983143
bnc#983144
linux.git:commit:b987c759d21a1c7551357e3bc74e7f8026e696a2
linux.git:commit:f0fe970df3838c202ef6c07a4c2b36838ef0a88b
rh#1324749
rh#1344721
CVE-2016-20012openssh:Ignorelow3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)CONFIRM:security.netapp.com:CVE-2016-20012
CVE-2016-20012
D:CVE-2016-20012
MISC:github.com:CVE-2016-20012
MISC:rushter.com:CVE-2016-20012
MISC:utcc.utoronto.ca:CVE-2016-20012
MISC:www.openwall.com:CVE-2016-20012
MISC:www.openwall.com:OSS:2018/Q3/180
SMASH Issue 310247
bnc#1190600
jsc#CAR-1070
rh#2048523
CVE-2016-20013glibc:Won't fixmoderate ()CVE-2016-20013
D:CVE-2016-20013
MISC:akkadia.org:CVE-2016-20013
MISC:pthree.org:CVE-2016-20013
MISC:twitter.com:CVE-2016-20013
SMASH Issue 324369
bnc#1196928
CVE-2016-2053kernel-source-rt:Ignoremoderate ()CONFIRM:git.kernel.org:CVE-2016-2053
CONFIRM:github.com:CVE-2016-2053
CVE-2016-2053
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20160125 Re: Linux kernel : Denial of service with specially crafted key file.
OSS:2016/Q1/197
Oracle:CVE-2016-5244
RH:CVE-2016-2053
RHSA-2016:2574
RHSA-2016:2584
SMASH Issue 161263
SMASH Issue 168761
UBUNTU:CVE-2016-2053
bnc#963762
bnc#979074
rh#1300237
rh#1324749
CVE-2016-2070kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2016-2070
CONFIRM:github.com:CVE-2016-2070
CONFIRM:www.kernel.org:CVE-2016-2070
CVE-2016-2070
MLIST:[oss-security] 20160125 Linux potential division by zero in TCP code
OSS:2016/Q1/211
RH:CVE-2016-2070
SMASH Issue 161290
UBUNTU:CVE-2016-2070
bnc#963761
rh#1302219
CVE-2016-2143kernel-source-rt:Already fixedimportant ()CONFIRM:git.kernel.org:CVE-2016-2143
CONFIRM:security-tracker.debian.org:CVE-2016-2143
CONFIRM:www.oracle.com:CVE-2016-5386
CVE-2016-2143
D:CVE-2022-2590
DSA-3607
L3:46375
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-2143
RHSA-2016:1539
RHSA-2016:2766
SMASH Issue 163041
SUSE:SUSE-SU-2016:1019
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1690
SUSE:SUSE-SU-2016:1707
SUSE:SUSE-SU-2016:1764
SUSE:SUSE-SU-2016:2074
UBUNTU:CVE-2016-2143
bnc#970504
bnc#993872
linux.git:commit:2da33f9f96dabd62d6c7780cbce15818c2a6ce24
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:3446c13b268af86391d06611327006b059b8bab1
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1308908
rh#1324749
rh#1384344
rh#2116175
CVE-2016-2147busybox:Releasedimportant ()BUGTRAQ:20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
BUGTRAQ:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
CONFIRM:busybox.net:CVE-2016-2148
CONFIRM:git.busybox.net:CVE-2016-2147
CONFIRM:git.busybox.net:CVE-2016-2148
CVE-2016-2147
FULLDISC:20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
FULLDISC:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
FULLDISC:20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S
GENTOO:GLSA-201612-04
MISC:packetstormsecurity.com:CVE-2010-0296
MISC:packetstormsecurity.com:CVE-2015-9261
MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update
MLIST:[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update
MLIST:[oss-security] 20160311 two udhcpc (busybox) issues
OSS:2016/Q1/614
RH:CVE-2016-2147
SMASH Issue 163032
UBUNTU:CVE-2016-2147
USN-3935-1
bnc#970663
rh#1316554
CVE-2016-2148busybox:Releasedmoderate ()BUGTRAQ:20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
BUGTRAQ:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
CONFIRM:busybox.net:CVE-2016-2148
CONFIRM:git.busybox.net:CVE-2016-2147
CONFIRM:git.busybox.net:CVE-2016-2148
CVE-2016-2148
FULLDISC:20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
FULLDISC:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
FULLDISC:20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S
GENTOO:GLSA-201612-04
MISC:packetstormsecurity.com:CVE-2010-0296
MISC:packetstormsecurity.com:CVE-2015-9261
MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update
MLIST:[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update
MLIST:[oss-security] 20160311 two udhcpc (busybox) issues
OSS:2016/Q1/614
RH:CVE-2016-2148
SMASH Issue 163033
UBUNTU:CVE-2016-2148
USN-3935-1
bnc#970662
rh#1316556
CVE-2016-2184kernel-source-rt:Already fixedmoderate ()BID:84340
BUGTRAQ:20160310 oss-2016-16: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (snd-usb-audio driver)
BUGTRAQ:20160310 oss-2016-17: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes (multiple free) on invalid USB device descriptors (snd-usb-audio driver)
BUGTRAQ:20160314 Re: oss-2016-17: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes (multiple free) on invalid USB device descriptors (snd-usb-audio driver)
CONFIRM:git.kernel.org:CVE-2016-2184
CONFIRM:github.com:CVE-2016-2184
CONFIRM:source.android.com:CVE-2016-6828
CONFIRM:www.kernel.org:CVE-2016-2184
CVE-2016-2184
D:CVE-2022-2590
DSA-3607
EXPLOIT-DB:39555
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-2184
SMASH Issue 163287
SUSE:SUSE-SU-2016:1019
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1690
SUSE:SUSE-SU-2016:1707
SUSE:SUSE-SU-2016:1764
SUSE:SUSE-SU-2016:2074
SUSE:openSUSE-SU-2016:1008
UBUNTU:CVE-2016-2184
UBUNTU:USN-2968-1
UBUNTU:USN-2968-2
UBUNTU:USN-2969-1
UBUNTU:USN-2970-1
UBUNTU:USN-2971-1
UBUNTU:USN-2971-2
UBUNTU:USN-2971-3
UBUNTU:USN-2996-1
UBUNTU:USN-2997-1
bnc#971125
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1317012
rh#1324749
rh#1384344
rh#2116175
CVE-2016-2187kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:85425
CONFIRM:git.kernel.org:CVE-2016-2187
CONFIRM:github.com:CVE-2016-2187
CVE-2016-2187
D:CVE-2016-2187
DSA-3607
OSS:2016/Q3/323
Oracle:CVE-2016-5244
RH:CVE-2016-2187
SMASH Issue 163680
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1985
UBUNTU:CVE-2016-2187
UBUNTU:USN-2989-1
UBUNTU:USN-2996-1
UBUNTU:USN-2997-1
UBUNTU:USN-2998-1
UBUNTU:USN-3000-1
UBUNTU:USN-3001-1
UBUNTU:USN-3002-1
UBUNTU:USN-3003-1
UBUNTU:USN-3004-1
UBUNTU:USN-3005-1
UBUNTU:USN-3006-1
UBUNTU:USN-3007-1
bnc#971919
bnc#971944
rh#1317017
rh#1324749
CVE-2016-2188kernel-source-rt:Already fixedmoderate ()BUGTRAQ:20160310 oss-2016-15: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (iowarrior driver)
BUGTRAQ:20160315 Re: oss-2016-15: Local RedHat Enterprise Linux DoS - RHEL 7.1 Kernel crashes on invalid USB device descriptors (iowarrior driver)
CONFIRM:git.kernel.org:CVE-2016-2188
CONFIRM:github.com:CVE-2016-2188
CONFIRM:www.kernel.org:CVE-2016-9685
CVE-2016-2188
D:CVE-2016-2188
D:CVE-2022-2590
EXPLOIT-DB:39556
OSS:2016/Q3/323
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2017-6074
RH:CVE-2016-2188
SMASH Issue 163290
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1690
SUSE:SUSE-SU-2016:1696
SUSE:SUSE-SU-2016:1707
SUSE:SUSE-SU-2016:1764
SUSE:SUSE-SU-2016:2074
SUSE:openSUSE-SU-2016:1382
UBUNTU:CVE-2016-2188
UBUNTU:USN-2968-1
UBUNTU:USN-2968-2
UBUNTU:USN-2969-1
UBUNTU:USN-2970-1
UBUNTU:USN-2971-1
UBUNTU:USN-2971-2
UBUNTU:USN-2971-3
UBUNTU:USN-2996-1
UBUNTU:USN-2997-1
bnc#970956
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:f5527fffff3f002b0a6b376163613b82f69de073
rh#1317018
rh#1324749
rh#1384344
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#2116175
CVE-2016-2383kernel-source-rt:Unsupportedlow ()CONFIRM:git.kernel.org:CVE-2016-2383
CONFIRM:github.com:CVE-2016-2383
CVE-2016-2383
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20160214 CVE Request: Linux: Incorrect branch fixups for eBPF allow arbitrary read
OSS:2016/Q1/333
OSS:2016/Q2/266
OSS:2023/10/10/4
RH:CVE-2016-2383
SMASH Issue 161884
SUSE:openSUSE-SU-2016:1008
UBUNTU:CVE-2016-2383
UBUNTU:USN-2947-1
UBUNTU:USN-2947-2
UBUNTU:USN-2947-3
bnc#966684
rh#1308452
CVE-2016-2384kernel-source-rt:Not affectedmoderate ()BID:83256
CONFIRM:git.kernel.org:CVE-2016-2384
CONFIRM:github.com:CVE-2016-2384
CVE-2016-2384
D:CVE-2016-2384
D:CVE-2022-2590
DSA-3503
MISC:github.com:CVE-2016-2384
MLIST:[oss-security] 20160214 CVE Request: Linux: ALSA: usb-audio: double-free triggered by invalid USB descriptor
OSS:2016/Q1/334
OSS:2016/Q3/323
OSS:2016/Q3/325
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-2384
RHSA-2016:2574
RHSA-2016:2584
RHSA-2017:0817
SECTRACK:1035072
SMASH Issue 161883
SMASH Issue 162118
SUSE:SUSE-SU-2016:1019
SUSE:SUSE-SU-2016:1031
SUSE:SUSE-SU-2016:1032
SUSE:SUSE-SU-2016:1033
SUSE:SUSE-SU-2016:1034
SUSE:SUSE-SU-2016:1035
SUSE:SUSE-SU-2016:1037
SUSE:SUSE-SU-2016:1038
SUSE:SUSE-SU-2016:1039
SUSE:SUSE-SU-2016:1040
SUSE:SUSE-SU-2016:1041
SUSE:SUSE-SU-2016:1045
SUSE:SUSE-SU-2016:1046
UBUNTU:CVE-2016-2384
UBUNTU:USN-2928-1
UBUNTU:USN-2928-2
bnc#966693
bnc#967773
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1308444
rh#1324749
rh#1384344
rh#2116175
CVE-2016-2545kernel-source-rt:Already fixedmoderate ()BID:83381
CONFIRM:git.kernel.org:CVE-2016-2543
CONFIRM:git.kernel.org:CVE-2016-2544
CONFIRM:git.kernel.org:CVE-2016-2545
CONFIRM:git.kernel.org:CVE-2016-2546
CONFIRM:git.kernel.org:CVE-2016-2548
CONFIRM:git.kernel.org:CVE-2016-2549
CONFIRM:github.com:CVE-2016-2545
CVE-2016-2545
D:CVE-2016-2545
D:CVE-2022-2590
DSA-3503
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
OSS:2016/Q1/410
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-2545
SECTRACK:1035296
SMASH Issue 162152
UBUNTU:CVE-2016-2545
bnc#967974
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1311560
rh#1324749
rh#1384344
rh#2116175
CVE-2016-2546kernel-source-rt:Already fixedmoderate ()BID:83384
CONFIRM:git.kernel.org:CVE-2016-2543
CONFIRM:git.kernel.org:CVE-2016-2544
CONFIRM:git.kernel.org:CVE-2016-2545
CONFIRM:git.kernel.org:CVE-2016-2546
CONFIRM:git.kernel.org:CVE-2016-2548
CONFIRM:git.kernel.org:CVE-2016-2549
CONFIRM:github.com:CVE-2016-2546
CVE-2016-2546
D:CVE-2016-2546
D:CVE-2022-2590
DSA-3503
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
OSS:2016/Q1/410
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-2546
SECTRACK:1035301
SMASH Issue 162155
UBUNTU:CVE-2016-2546
bnc#967975
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1311564
rh#1324749
rh#1384344
rh#2116175
CVE-2016-2547kernel-source-rt:Already fixedmoderate ()BID:83378
CONFIRM:git.kernel.org:CVE-2016-2543
CONFIRM:git.kernel.org:CVE-2016-2544
CONFIRM:git.kernel.org:CVE-2016-2545
CONFIRM:git.kernel.org:CVE-2016-2546
CONFIRM:git.kernel.org:CVE-2016-2548
CONFIRM:git.kernel.org:CVE-2016-2549
CONFIRM:github.com:CVE-2016-2548
CVE-2016-2547
D:CVE-2016-2547
D:CVE-2022-2590
DSA-3503
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
OSS:2016/Q1/410
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-2547
SECTRACK:1035298
SMASH Issue 162154
UBUNTU:CVE-2016-2547
bnc#968011
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1311566
rh#1324749
rh#1384344
rh#2116175
CVE-2016-2548kernel-source-rt:Already fixedmoderate ()BID:83383
CONFIRM:git.kernel.org:CVE-2016-2543
CONFIRM:git.kernel.org:CVE-2016-2544
CONFIRM:git.kernel.org:CVE-2016-2545
CONFIRM:git.kernel.org:CVE-2016-2546
CONFIRM:git.kernel.org:CVE-2016-2548
CONFIRM:git.kernel.org:CVE-2016-2549
CVE-2016-2548
D:CVE-2016-2548
D:CVE-2022-2590
DSA-3503
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
OSS:2016/Q1/410
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-2548
SECTRACK:1035306
SMASH Issue 162158
UBUNTU:CVE-2016-2548
bnc#968012
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1311568
rh#1324749
rh#1384344
rh#2116175
CVE-2016-2549kernel-source-rt:Already fixedmoderate ()BID:83382
CONFIRM:git.kernel.org:CVE-2016-2543
CONFIRM:git.kernel.org:CVE-2016-2544
CONFIRM:git.kernel.org:CVE-2016-2545
CONFIRM:git.kernel.org:CVE-2016-2546
CONFIRM:git.kernel.org:CVE-2016-2548
CONFIRM:git.kernel.org:CVE-2016-2549
CONFIRM:github.com:CVE-2016-2549
CVE-2016-2549
D:CVE-2016-2549
D:CVE-2022-2590
DSA-3503
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
OSS:2016/Q1/410
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-2549
SMASH Issue 162157
UBUNTU:CVE-2016-2549
bnc#968013
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1311570
rh#1324749
rh#1384344
rh#2116175
CVE-2016-2847kernel-source-rt:Releasedmoderate ()BID:83870
CONFIRM:git.kernel.org:CVE-2016-2847
CONFIRM:www.oracle.com:CVE-2016-5386
CONFIRM:www.oracle.com:CVE-2016-6304
CVE-2013-4312
CVE-2016-2847
D:CVE-2016-2847
D:CVE-2022-2590
DSA-3503
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20160301 CVE request -- linux kernel: pipe: limit the per-user amount of pages allocated in pipes
OSS:2016/Q1/538
OSS:2016/Q1/733
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-2847
RHSA-2016:2574
RHSA-2016:2584
RHSA-2017:0217
SMASH Issue 162725
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1690
SUSE:SUSE-SU-2016:1696
SUSE:SUSE-SU-2016:1707
SUSE:SUSE-SU-2016:1937
SUSE:SUSE-SU-2016:2074
SUSE:openSUSE-SU-2016:1382
UBUNTU:CVE-2016-2847
UBUNTU:USN-2946-1
UBUNTU:USN-2946-2
UBUNTU:USN-2947-1
UBUNTU:USN-2947-2
UBUNTU:USN-2947-3
UBUNTU:USN-2948-1
UBUNTU:USN-2948-2
UBUNTU:USN-2949-1
UBUNTU:USN-2967-1
UBUNTU:USN-2967-2
bnc#970948
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:759c01142a5d0f364a462346168a56de28a80f52
rh#1313428
rh#1324749
rh#1384344
rh#2116175
CVE-2016-2853kernel-obs-build:Analysis, kernel-rt:Analysis, kernel-rt_debug:Analysis, kernel-source-rt:Analysis, kernel-syms-rt:Analysisimportant ()BID:96839
CVE-2016-2853
D:CVE-2016-2853
MISC:bugs.launchpad.net:MLIST:[oss-security] 20160224 User Namespaces Overlayfs Xattr Setgid Privilege Escalation: Overlayfs
MISC:www.halfdog.net:CVE-2016-2854
MLIST:[aufs] 20160219 aufs3 and aufs4 GIT release
MLIST:[oss-security] 20160224 Aufs Union Filesystem Privilege Escalation In User Namespaces
OSS:2016/Q1/542
OSS:2021/10/18/1
RH:CVE-2016-2853
SMASH Issue 162732
UBUNTU:CVE-2016-2853
bnc#982781
rh#1871722
CVE-2016-2854kernel-source-rt:Unsupportedimportant ()BID:96838
CVE-2016-2854
D:CVE-2016-2854
MISC:www.halfdog.net:CVE-2016-2854
MLIST:[aufs] 20160219 aufs3 and aufs4 GIT release
MLIST:[oss-security] 20160224 Aufs Union Filesystem Privilege Escalation In User Namespaces
OSS:2016/Q1/542
RH:CVE-2016-2854
SMASH Issue 162731
UBUNTU:CVE-2016-2854
bnc#982780
rh#1871727
CVE-2016-3070kernel-source-rt:Not affectedlow ()BID:90518
CONFIRM:git.kernel.org:CVE-2016-3070
CONFIRM:github.com:CVE-2016-3070
CONFIRM:security-tracker.debian.org:CVE-2016-3070
CVE-2016-3070
DSA-3607
Oracle:CVE-2017-6074
RH:CVE-2016-3070
RHSA-2016:2574
RHSA-2016:2584
SMASH Issue 168780
UBUNTU:CVE-2016-3070
UBUNTU:USN-3034-1
UBUNTU:USN-3034-2
UBUNTU:USN-3035-1
UBUNTU:USN-3035-2
UBUNTU:USN-3035-3
UBUNTU:USN-3036-1
UBUNTU:USN-3037-1
bnc#979215
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1308846
rh#1420236
rh#1435719
CVE-2016-3134kernel-source-rt:Not affectedmoderate ()BID:84305
CONFIRM:git.kernel.org:CVE-2016-3134
CONFIRM:github.com:CVE-2016-3134
CONFIRM:www.oracle.com:CVE-2016-5386
CONFIRM:www.oracle.com:CVE-2016-6304
CVE-2016-3134
D:CVE-2016-3134
D:CVE-2022-2590
DSA-3607
MISC:bugs.chromium.org:MLIST:[oss-security] 20160624 Linux CVE-2016-4997 (local privilege escalation) and CVE-2016-4998 (out of bounds memory access)
MISC:code.google.com:CVE-2016-3135
MISC:git.kernel.org:MLIST:[oss-security] 20160624 Linux CVE-2016-4997 (local privilege escalation) and CVE-2016-4998 (out of bounds memory access)
OSS:2016/Q1/619
OSS:2016/Q2/599
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-3134
RHSA-2016:1847
RHSA-2016:1875
RHSA-2016:1883
SECTRACK:1036763
SMASH Issue 163274
SMASH Issue 163585
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1690
SUSE:SUSE-SU-2016:1696
SUSE:SUSE-SU-2016:1764
SUSE:SUSE-SU-2016:1961
SUSE:SUSE-SU-2016:1985
SUSE:SUSE-SU-2016:1994
SUSE:SUSE-SU-2016:1995
SUSE:SUSE-SU-2016:2000
SUSE:SUSE-SU-2016:2001
SUSE:SUSE-SU-2016:2002
SUSE:SUSE-SU-2016:2005
SUSE:SUSE-SU-2016:2006
SUSE:SUSE-SU-2016:2007
SUSE:SUSE-SU-2016:2009
SUSE:SUSE-SU-2016:2010
SUSE:SUSE-SU-2016:2014
SUSE:SUSE-SU-2016:2074
SUSE:openSUSE-SU-2016:1641
UBUNTU:CVE-2016-3134
UBUNTU:USN-2929-1
UBUNTU:USN-2929-2
UBUNTU:USN-2930-1
UBUNTU:USN-2930-2
UBUNTU:USN-2930-3
UBUNTU:USN-2931-1
UBUNTU:USN-2932-1
UBUNTU:USN-3049-1
UBUNTU:USN-3050-1
bnc#971126
bnc#971793
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1317383
rh#1324749
rh#1384344
rh#2116175
CVE-2016-3135kernel-source-rt:Unsupportedimportant ()BID:84305
CONFIRM:git.kernel.org:CVE-2016-3135
CONFIRM:github.com:CVE-2016-3135
CVE-2016-3135
D:CVE-2016-3135
MISC:code.google.com:CVE-2016-3135
OSS:2016/Q1/619
RH:CVE-2016-3135
SMASH Issue 163273
UBUNTU:CVE-2016-3135
UBUNTU:USN-2930-1
UBUNTU:USN-2930-2
UBUNTU:USN-2930-3
UBUNTU:USN-3054-1
UBUNTU:USN-3055-1
UBUNTU:USN-3056-1
UBUNTU:USN-3057-1
bnc#970904
bnc#971794
rh#1317386
CVE-2016-3137kernel-source-rt:Already fixedmoderate ()BID:84300
CONFIRM:git.kernel.org:CVE-2016-3137
CONFIRM:www.kernel.org:CVE-2016-9685
CVE-2016-3137
D:CVE-2016-3137
D:CVE-2022-2590
DSA-3607
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:seclists.org:MLIST:[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (cypress_m8 driver)
MLIST:[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (cypress_m8 driver)
OSS:2016/Q1/621
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-3137
SMASH Issue 163271
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1690
SUSE:SUSE-SU-2016:1696
SUSE:SUSE-SU-2016:1707
SUSE:SUSE-SU-2016:1764
SUSE:SUSE-SU-2016:2074
SUSE:openSUSE-SU-2016:1382
UBUNTU:CVE-2016-3137
UBUNTU:USN-2968-1
UBUNTU:USN-2968-2
UBUNTU:USN-2970-1
UBUNTU:USN-2971-1
UBUNTU:USN-2971-2
UBUNTU:USN-2971-3
UBUNTU:USN-2996-1
UBUNTU:USN-2997-1
UBUNTU:USN-3000-1
bnc#970970
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:c55aee1bf0e6b6feec8b2927b43f7a09a6d5f754
rh#1283368
rh#1316996
rh#1324749
rh#1384344
rh#2116175
CVE-2016-3138kernel-source-rt:Already fixedmoderate ()CONFIRM:git.kernel.org:CVE-2016-3138
CONFIRM:git.kernel.org:CVE-2016-8650
CONFIRM:github.com:CVE-2016-3138
CONFIRM:www.kernel.org:CVE-2016-9685
CVE-2016-3138
D:CVE-2016-3138
D:CVE-2022-2590
DSA-3607
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:seclists.org:MLIST:[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (cdc_acm driver)
MLIST:[oss-security] 20160314 Re: CVE request -- linux kernel: crash on invalid USB device descriptors (cdc_acm driver)
OSS:2016/Q1/622
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-3138
SMASH Issue 163270
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1690
SUSE:SUSE-SU-2016:1696
SUSE:SUSE-SU-2016:1707
SUSE:SUSE-SU-2016:1764
SUSE:SUSE-SU-2016:2074
SUSE:openSUSE-SU-2016:1382
UBUNTU:CVE-2016-3138
UBUNTU:USN-2968-1
UBUNTU:USN-2968-2
UBUNTU:USN-2969-1
UBUNTU:USN-2970-1
UBUNTU:USN-2971-1
UBUNTU:USN-2971-2
UBUNTU:USN-2971-3
UBUNTU:USN-2996-1
UBUNTU:USN-2997-1
bnc#970911
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1283366
rh#1316204
rh#1324749
rh#1384344
rh#2116175
CVE-2016-3139kernel-source-rt:Not affectedmoderate ()CONFIRM:security-tracker.debian.org:CVE-2016-3139
CVE-2016-3139
D:CVE-2016-3139
D:CVE-2022-2590
EXPLOIT-DB:39538
MISC:git.kernel.org:CVE-2016-3139
MISC:github.com:CVE-2016-3139
OSS:2016/Q1/623
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-3139
SMASH Issue 163269
SUSE:SUSE-SU-2016:1019
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1690
SUSE:SUSE-SU-2016:1707
SUSE:SUSE-SU-2016:1764
SUSE:SUSE-SU-2016:2074
UBUNTU:CVE-2016-3139
bnc#970909
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1283375
rh#1283377
rh#1316993
rh#1324749
rh#1384344
rh#2116175
CVE-2016-3191pcre:Not affectedlow3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)BID:84810
CONFIRM:bugs.exim.org:CVE-2016-3191
CONFIRM:vcs.pcre.org:CVE-2016-3191
CVE-2016-3191
D:CVE-2016-3191
RH:CVE-2016-3191
RHSA-2016:1025
RHSA-2016:1132
SMASH Issue 163559
SMASH Issue 176112
UBUNTU:CVE-2016-3191
ZDI-16-477
bdo#815920
bdo#815921
bnc#971741
rh#1287629
rh#1311503
CVE-2016-3695kernel-source-rt:Releasedlow2.2 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:L)BID:102327
CONFIRM:github.com:CVE-2016-3695
CVE-2016-3695
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2016-3695
SMASH Issue 179623
UBUNTU:CVE-2016-3695
bnc#1023051
jsc#CAR-1810
rh#1322755
rh#1435719
CVE-2016-3709libxml2:Releasedmoderate6.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N)CVE-2016-3709
MISC:mail.gnome.org:CVE-2016-3709
RHSA-2022:7715
RHSA-2023:4767
SMASH Issue 338444
bnc#1201978
jsc#CAR-1938
rh#2112766
CVE-2016-3713kernel-source-rt:Already fixedmoderate ()CONFIRM:git.kernel.org:CVE-2016-3713
CONFIRM:www.kernel.org:CVE-2016-9754
CVE-2016-3713
D:CVE-2016-3713
MLIST:[oss-security] 20160516 CVE-2016-3713 Linux kernel: kvm: OOB r/w access issue with MSR 0x2F8
OSS:2016/Q2/348
RH:CVE-2016-3713
SMASH Issue 169071
UBUNTU:CVE-2016-3713
bnc#979715
linux.git:commit:9842df62004f366b9fed2423e24df10542ee0dc5
rh#1332139
CVE-2016-3841kernel-source-rt:Not affectedmoderate ()BID:92227
CONFIRM:git.kernel.org:CVE-2016-3841
CONFIRM:github.com:CVE-2016-3841
CONFIRM:source.android.com:CVE-2016-3857
CONFIRM:www.kernel.org:CVE-2016-3841
CVE-2016-3841
D:CVE-2022-2590
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-3841
RHSA-2016:0855
RHSA-2016:2574
RHSA-2016:2584
RHSA-2016:2695
SMASH Issue 171689
UBUNTU:CVE-2016-3841
bnc#992566
bnc#992569
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=45f6fad84cc305103b28d73482b344d7f5b76f39
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1364971
rh#1384344
rh#2116175
CVE-2016-3951kernel-source-rt:Not affectedmoderate ()BID:91028
CONFIRM:git.kernel.org:CVE-2016-3951
CONFIRM:github.com:CVE-2016-3951
CVE-2016-3951
D:CVE-2016-3951
DSA-3607
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20160406 Fwd: CVE Request: Linux: usbnet: memory corruption triggered by invalid USB descriptor
MLIST:[netdev] 20160304 Re: Possible double-free in the usbnet driver
MLIST:[oss-security] 20160406 Fwd: CVE Request: Linux: usbnet: memory corruption triggered by invalid USB descriptor
OSS:2016/Q2/19
Oracle:CVE-2016-5244
RH:CVE-2016-3951
SMASH Issue 166533
UBUNTU:CVE-2016-3951
bnc#974418
rh#1324749
rh#1324782
CVE-2016-4070perl:Already fixedlow ()APPLE:APPLE-SA-2010-03-29-1
APPLE:APPLE-SA-2016-03-21-1
APPLE:APPLE-SA-2016-03-21-2
APPLE:APPLE-SA-2016-03-21-3
APPLE:APPLE-SA-2016-03-21-5
APPLE:APPLE-SA-2016-05-16-4
APPLE:APPLE-SA-2016-07-18-1
APPLE:APPLE-SA-2016-07-18-2
APPLE:APPLE-SA-2016-07-18-3
APPLE:APPLE-SA-2016-07-18-4
APPLE:APPLE-SA-2016-07-18-6
APPLE:APPLE-SA-2016-09-20
BID:100503
BID:100514
BID:100861
BID:103144
BID:103415
BID:103782
BID:103796
BID:103846
BID:103848
BID:103954
BID:104222
BID:104764
BID:104765
BID:104768
BID:104773
BID:104774
BID:104775
BID:104780
BID:104782
BID:105117
BID:105118
BID:105126
BID:105587
BID:105590
BID:105591
BID:105597
BID:105601
BID:105602
BID:105608
BID:105615
BID:105617
BID:105619
BID:105622
BID:105624
BID:105635
BID:105637
BID:105647
BID:105656
BID:105658
BID:106619
BID:106622
BID:106625
BID:106626
BID:106627
BID:106628
BID:67121
BID:69257
BID:70142
BID:74073
BID:74075
BID:74078
BID:74081
BID:74085
BID:74095
BID:74112
BID:76157
BID:76187
BID:76282
BID:76289
BID:76291
BID:79091
BID:82307
BID:82990
BID:84220
BID:84223
BID:84271
BID:85572
BID:85576
BID:85801
BID:86957
BID:90876
BID:91067
BID:91068
BID:91081
BID:91566
BID:91787
BID:91869
BID:92912
BID:93132
BID:93287
BID:93604
BID:93685
BID:93687
BID:93697
BID:93711
BID:93718
BID:93728
BID:93744
BID:94371
BID:94377
BID:94925
BID:95019
BID:95131
BID:95429
BID:95849
BID:96389
BID:96392
BID:96409
BID:96410
BID:96434
BID:96435
BID:96436
BID:97102
BID:97725
BID:97742
BID:97763
BID:97765
BID:97776
BID:97791
BID:97812
BID:97818
BID:97831
BID:97848
BID:97849
BID:97851
BID:99046
BUGTRAQ:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
BUGTRAQ:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
CISCO:20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016
CONFIRM:access.redhat.com:CVE-2014-0114
CONFIRM:access.redhat.com:CVE-2014-3577
CONFIRM:access.redhat.com:CVE-2015-0293
CONFIRM:access.redhat.com:CVE-2015-3456
CONFIRM:advisories.mageia.org:CVE-2014-0114
CONFIRM:advisories.mageia.org:CVE-2014-4330
CONFIRM:bto.bluecoat.com:CVE-2016-1950
CONFIRM:bto.bluecoat.com:CVE-2016-3191
CONFIRM:bto.bluecoat.com:CVE-2016-7052
CONFIRM:bugs.eclipse.org:CVE-2018-12539
CONFIRM:bugs.exim.org:CVE-2015-8381
CONFIRM:bugs.exim.org:CVE-2015-8382
CONFIRM:bugs.jython.org:CVE-2016-4000
CONFIRM:bugs.launchpad.net:CVE-2015-8866
CONFIRM:bugs.launchpad.net:CVE-2015-8867
CONFIRM:bugs.php.net:CVE-2015-8866
CONFIRM:bugs.php.net:CVE-2015-8867
CONFIRM:bugs.php.net:CVE-2015-8878
CONFIRM:bugs.php.net:CVE-2016-3141
CONFIRM:bugs.php.net:CVE-2016-4070
CONFIRM:bugzilla.mozilla.org:CVE-2016-1950
CONFIRM:bugzilla.mozilla.org:CVE-2016-1955
CONFIRM:bugzilla.mozilla.org:CVE-2016-1956
CONFIRM:bugzilla.mozilla.org:CVE-2016-1959
CONFIRM:bugzilla.mozilla.org:CVE-2016-1967
CONFIRM:bugzilla.mozilla.org:CVE-2016-1968
CONFIRM:bugzilla.mozilla.org:CVE-2016-1969
CONFIRM:bugzilla.mozilla.org:CVE-2016-1970
CONFIRM:bugzilla.mozilla.org:CVE-2016-1971
CONFIRM:bugzilla.mozilla.org:CVE-2016-1972
CONFIRM:bugzilla.mozilla.org:CVE-2016-1973
CONFIRM:bugzilla.mozilla.org:CVE-2016-1975
CONFIRM:bugzilla.mozilla.org:CVE-2016-1976
CONFIRM:bugzilla.redhat.com:CVE-2015-7559
CONFIRM:bugzilla.redhat.com:CVE-2016-9583
CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-412672.pdf
CONFIRM:codereview.chromium.org:CVE-2016-1675
CONFIRM:codereview.chromium.org:CVE-2016-1676
CONFIRM:codereview.chromium.org:CVE-2016-1677
CONFIRM:codereview.chromium.org:CVE-2016-1678
CONFIRM:codereview.chromium.org:CVE-2016-1679
CONFIRM:codereview.chromium.org:CVE-2016-1680
CONFIRM:codereview.chromium.org:CVE-2016-1681
CONFIRM:codereview.chromium.org:CVE-2016-1682
CONFIRM:codereview.chromium.org:CVE-2016-1685
CONFIRM:codereview.chromium.org:CVE-2016-1686
CONFIRM:codereview.chromium.org:CVE-2016-1687
CONFIRM:codereview.chromium.org:CVE-2016-1688
CONFIRM:codereview.chromium.org:CVE-2016-1689
CONFIRM:codereview.chromium.org:CVE-2016-1691
CONFIRM:codereview.chromium.org:CVE-2016-1692
CONFIRM:codereview.chromium.org:CVE-2016-1693
CONFIRM:codereview.chromium.org:CVE-2016-1694
CONFIRM:codereview.chromium.org:CVE-2016-1701
CONFIRM:commons.apache.org:CVE-2014-0114
CONFIRM:crbug.com:CVE-2016-1672
CONFIRM:crbug.com:CVE-2016-1673
CONFIRM:crbug.com:CVE-2016-1674
CONFIRM:crbug.com:CVE-2016-1675
CONFIRM:crbug.com:CVE-2016-1676
CONFIRM:crbug.com:CVE-2016-1677
CONFIRM:crbug.com:CVE-2016-1678
CONFIRM:crbug.com:CVE-2016-1679
CONFIRM:crbug.com:CVE-2016-1680
CONFIRM:crbug.com:CVE-2016-1681
CONFIRM:crbug.com:CVE-2016-1682
CONFIRM:crbug.com:CVE-2016-1683
CONFIRM:crbug.com:CVE-2016-1684
CONFIRM:crbug.com:CVE-2016-1685
CONFIRM:crbug.com:CVE-2016-1686
CONFIRM:crbug.com:CVE-2016-1687
CONFIRM:crbug.com:CVE-2016-1688
CONFIRM:crbug.com:CVE-2016-1689
CONFIRM:crbug.com:CVE-2016-1690
CONFIRM:crbug.com:CVE-2016-1691
CONFIRM:crbug.com:CVE-2016-1692
CONFIRM:crbug.com:CVE-2016-1693
CONFIRM:crbug.com:CVE-2016-1694
CONFIRM:crbug.com:CVE-2016-1695
CONFIRM:curl.haxx.se:CVE-2016-0755
CONFIRM:curl.haxx.se:CVE-2016-9586
CONFIRM:curl.haxx.se:CVE-2018-1000121
CONFIRM:developer.mozilla.org:CVE-2016-1950
CONFIRM:git.gnome.org:CVE-2016-1683
CONFIRM:git.gnome.org:CVE-2016-1684
CONFIRM:git.gnupg.org:CVE-2017-9526
CONFIRM:git.php.net:CVE-2015-8382
CONFIRM:git.php.net:CVE-2015-8866
CONFIRM:git.php.net:CVE-2015-8867
CONFIRM:git.php.net:CVE-2016-3141
CONFIRM:git.savannah.gnu.org:CVE-2014-9746
CONFIRM:git.savannah.gnu.org:CVE-2014-9747
CONFIRM:github.com:CVE-2013-7330
CONFIRM:github.com:CVE-2014-2058
CONFIRM:github.com:CVE-2014-2059
CONFIRM:github.com:CVE-2014-2061
CONFIRM:github.com:CVE-2014-2062
CONFIRM:github.com:CVE-2014-2063
CONFIRM:github.com:CVE-2014-2064
CONFIRM:github.com:CVE-2014-2065
CONFIRM:github.com:CVE-2014-2066
CONFIRM:github.com:CVE-2014-2067
CONFIRM:github.com:CVE-2014-2068
CONFIRM:github.com:CVE-2016-1182
CONFIRM:github.com:CVE-2016-4979
CONFIRM:github.com:CVE-2016-9389
CONFIRM:github.com:CVE-2016-9394
CONFIRM:github.com:CVE-2016-9583
CONFIRM:github.com:CVE-2016-9586
CONFIRM:github.com:CVE-2016-9840
CONFIRM:github.com:CVE-2016-9841
CONFIRM:github.com:CVE-2016-9842
CONFIRM:github.com:CVE-2016-9843
CONFIRM:github.com:CVE-2017-1000071
CONFIRM:github.com:CVE-2017-14735
CONFIRM:googlechromereleases.blogspot.com:CVE-2016-1695
CONFIRM:h20566.www2.hpe.com:CVE-2016-0763
CONFIRM:h20566.www2.hpe.com:CVE-2016-2014
CONFIRM:h20566.www2.hpe.com:CVE-2016-2183
CONFIRM:h20566.www2.hpe.com:CVE-2016-5388
CONFIRM:h20566.www2.hpe.com:CVE-2016-5773
CONFIRM:h20566.www2.hpe.com:CVE-2016-6306
CONFIRM:h20566.www2.hpe.com:CVE-2016-8518
CONFIRM:h20566.www2.hpe.com:CVE-2017-5787
CONFIRM:hg.mozilla.org:CVE-2016-1975
CONFIRM:hg.python.org:CVE-2016-4000
CONFIRM:httpd.apache.org:CVE-2016-4979
CONFIRM:issues.apache.org:CVE-2014-0114
CONFIRM:issues.apache.org:CVE-2015-1832
CONFIRM:issues.apache.org:CVE-2015-7559
CONFIRM:issues.apache.org:CVE-2016-1000031
CONFIRM:jenkins.io:CVE-2017-1000403
CONFIRM:jira.mariadb.org:CVE-2016-6662
CONFIRM:kb.juniper.net:CVE-2015-3209
CONFIRM:kb.juniper.net:CVE-2016-7052
CONFIRM:kb.pulsesecure.net:CVE-2016-6306
CONFIRM:kc.mcafee.com:CVE-2016-6306
CONFIRM:mariadb.com:CVE-2015-2571
CONFIRM:mariadb.com:CVE-2016-6662
CONFIRM:metacpan.org:CVE-2014-4330
CONFIRM:nodejs.org:CVE-2016-7099
CONFIRM:nodesecurity.io:CVE-2013-7454
CONFIRM:nodesecurity.io:CVE-2014-9772
CONFIRM:nodesecurity.io:CVE-2015-8315
CONFIRM:nodesecurity.io:CVE-2015-8854
CONFIRM:nodesecurity.io:CVE-2015-8855
CONFIRM:nodesecurity.io:CVE-2015-8856
CONFIRM:nodesecurity.io:CVE-2015-8858
CONFIRM:nodesecurity.io:CVE-2015-8859
CONFIRM:nodesecurity.io:CVE-2015-8860
CONFIRM:nodesecurity.io:CVE-2015-8862
CONFIRM:nodesecurity.io:CVE-2016-4055
CONFIRM:php.net:CVE-2016-3142
CONFIRM:pivotal.io:CVE-2018-1258
CONFIRM:rwkbp.makekb.com:CVE-2015-8965
CONFIRM:security-tracker.debian.org:CVE-2016-1181
CONFIRM:security-tracker.debian.org:CVE-2016-1182
CONFIRM:security.netapp.com:CVE-2014-0114
CONFIRM:security.netapp.com:CVE-2015-2575
CONFIRM:security.netapp.com:CVE-2016-1000031
CONFIRM:security.netapp.com:CVE-2016-1182
CONFIRM:security.netapp.com:CVE-2016-4979
CONFIRM:security.netapp.com:CVE-2016-9843
CONFIRM:security.netapp.com:CVE-2017-10388
CONFIRM:security.netapp.com:CVE-2017-5645
CONFIRM:security.netapp.com:CVE-2018-1305
CONFIRM:security.netapp.com:CVE-2018-2973
CONFIRM:security.netapp.com:CVE-2019-2435
CONFIRM:support.apple.com:CVE-2009-0689
CONFIRM:support.apple.com:CVE-2016-1950
CONFIRM:support.apple.com:CVE-2016-4073
CONFIRM:support.apple.com:CVE-2016-4616
CONFIRM:support.apple.com:CVE-2016-4653
CONFIRM:support.apple.com:CVE-2016-7582
CONFIRM:support.apple.com:CVE-2017-13873
CONFIRM:support.apple.com:CVE-2017-13877
CONFIRM:support.apple.com:CVE-2017-6464
CONFIRM:support.f5.com:CVE-2015-8854
CONFIRM:support.f5.com:CVE-2016-2178
CONFIRM:support.hpe.com:CVE-2016-6306
CONFIRM:support.hpe.com:CVE-2016-7052
CONFIRM:support.hpe.com:CVE-2018-2940
CONFIRM:support.hpe.com:CVE-2018-2973
CONFIRM:svn.apache.org:CVE-2012-6153
CONFIRM:svn.apache.org:CVE-2015-1832
CONFIRM:vcs.pcre.org:CVE-2015-8382
CONFIRM:vcs.pcre.org:CVE-2015-8395
CONFIRM:www-01.ibm.com:CVE-2014-0114
CONFIRM:www-01.ibm.com:CVE-2014-3022
CONFIRM:www-01.ibm.com:CVE-2015-1832
CONFIRM:www-01.ibm.com:CVE-2016-3191
CONFIRM:www-01.ibm.com:CVE-2016-7052
CONFIRM:www.apache.org:CVE-2016-4979
CONFIRM:www.huawei.com:CVE-2016-6306
CONFIRM:www.ibm.com:CVE-2014-0963
CONFIRM:www.ibm.com:CVE-2018-1656
CONFIRM:www.lsexperts.de:CVE-2014-4330
CONFIRM:www.mozilla.org:CVE-2016-1950
CONFIRM:www.mozilla.org:CVE-2016-1955
CONFIRM:www.mozilla.org:CVE-2016-1956
CONFIRM:www.mozilla.org:CVE-2016-1959
CONFIRM:www.mozilla.org:CVE-2016-1967
CONFIRM:www.mozilla.org:CVE-2016-1968
CONFIRM:www.mozilla.org:CVE-2016-1969
CONFIRM:www.mozilla.org:CVE-2016-1973
CONFIRM:www.mozilla.org:CVE-2016-1976
CONFIRM:www.oracle.com:CVE-2014-0114
CONFIRM:www.oracle.com:CVE-2014-4271
CONFIRM:www.oracle.com:CVE-2014-6564
CONFIRM:www.oracle.com:CVE-2015-0437
CONFIRM:www.oracle.com:CVE-2015-2568
CONFIRM:www.oracle.com:CVE-2015-2579
CONFIRM:www.oracle.com:CVE-2015-4879
CONFIRM:www.oracle.com:CVE-2015-8391
CONFIRM:www.oracle.com:CVE-2016-0778
CONFIRM:www.oracle.com:CVE-2016-2802
CONFIRM:www.oracle.com:CVE-2016-4957
CONFIRM:www.oracle.com:CVE-2016-5240
CONFIRM:www.oracle.com:CVE-2016-5477
CONFIRM:www.oracle.com:CVE-2016-6302
CONFIRM:www.oracle.com:CVE-2016-6304
CONFIRM:www.oracle.com:CVE-2016-7039
CONFIRM:www.oracle.com:CVE-2016-7154
CONFIRM:www.oracle.com:CVE-2016-8296
CONFIRM:www.oracle.com:CVE-2017-10365
CONFIRM:www.oracle.com:CVE-2017-3456
CONFIRM:www.oracle.com:CVE-2017-3626
CONFIRM:www.oracle.com:CVE-2017-3636
CONFIRM:www.oracle.com:CVE-2017-5689
CONFIRM:www.oracle.com:CVE-2017-5709
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CONFIRM:www.oracle.com:CVE-2018-18223
CONFIRM:www.oracle.com:CVE-2018-2639
CONFIRM:www.oracle.com:CVE-2018-2819
CONFIRM:www.oracle.com:CVE-2018-3081
CONFIRM:www.oracle.com:CVE-2018-3125
CONFIRM:www.pcre.org:CVE-2015-2325
CONFIRM:www.percona.com:CVE-2016-6662
CONFIRM:www.php.net:CVE-2009-3558
CONFIRM:www.php.net:CVE-2016-9935
CONFIRM:www.php.net:CVE-2016-9936
CONFIRM:www.splunk.com:CVE-2016-6304
CONFIRM:www.tenable.com:CVE-2016-4055
CONFIRM:www.tenable.com:CVE-2016-7052
CONFIRM:www.tenable.com:CVE-2016-8625
CONFIRM:www.tenable.com:CVE-2016-9260
CONFIRM:www.tenable.com:CVE-2016-9261
CONFIRM:www.vmware.com:CVE-2014-0114
CONFIRM:www.vmware.com:CVE-2014-8371
CONFIRM:x-stream.github.io:CVE-2013-7285
CVE-2009-3559
CVE-2012-6153
CVE-2013-7285
CVE-2013-7451
CVE-2013-7452
CVE-2013-7453
CVE-2013-7454
CVE-2014-0114
CVE-2014-0245
CVE-2014-3540
CVE-2014-4172
CVE-2014-4330
CVE-2014-4651
CVE-2014-7192
CVE-2014-9745
CVE-2014-9746
CVE-2014-9747
CVE-2014-9772
CVE-2015-0405
CVE-2015-0423
CVE-2015-0433
CVE-2015-0438
CVE-2015-0439
CVE-2015-0441
CVE-2015-0498
CVE-2015-0499
CVE-2015-0500
CVE-2015-0501
CVE-2015-0503
CVE-2015-0505
CVE-2015-0506
CVE-2015-0507
CVE-2015-0508
CVE-2015-0511
CVE-2015-0852
CVE-2015-1832
CVE-2015-2325
CVE-2015-2326
CVE-2015-2566
CVE-2015-2567
CVE-2015-2568
CVE-2015-2571
CVE-2015-2573
CVE-2015-2575
CVE-2015-2576
CVE-2015-2613
CVE-2015-5125
CVE-2015-5127
CVE-2015-5128
CVE-2015-5129
CVE-2015-5130
CVE-2015-5131
CVE-2015-5132
CVE-2015-5134
CVE-2015-5328
CVE-2015-5539
CVE-2015-5540
CVE-2015-5541
CVE-2015-5544
CVE-2015-5545
CVE-2015-5551
CVE-2015-5552
CVE-2015-5553
CVE-2015-5554
CVE-2015-5555
CVE-2015-5556
CVE-2015-5557
CVE-2015-5558
CVE-2015-5559
CVE-2015-5560
CVE-2015-5561
CVE-2015-5564
CVE-2015-5565
CVE-2015-5566
CVE-2015-7559
CVE-2015-7940
CVE-2015-8315
CVE-2015-8381
CVE-2015-8382
CVE-2015-8383
CVE-2015-8384
CVE-2015-8385
CVE-2015-8386
CVE-2015-8387
CVE-2015-8388
CVE-2015-8389
CVE-2015-8390
CVE-2015-8391
CVE-2015-8392
CVE-2015-8393
CVE-2015-8394
CVE-2015-8395
CVE-2015-8854
CVE-2015-8855
CVE-2015-8856
CVE-2015-8857
CVE-2015-8858
CVE-2015-8859
CVE-2015-8860
CVE-2015-8861
CVE-2015-8862
CVE-2015-8878
CVE-2015-8965
CVE-2015-9251
CVE-2016-0635
CVE-2016-0755
CVE-2016-1000031
CVE-2016-1181
CVE-2016-1182
CVE-2016-1672
CVE-2016-1673
CVE-2016-1674
CVE-2016-1675
CVE-2016-1676
CVE-2016-1677
CVE-2016-1678
CVE-2016-1679
CVE-2016-1680
CVE-2016-1681
CVE-2016-1682
CVE-2016-1683
CVE-2016-1684
CVE-2016-1685
CVE-2016-1686
CVE-2016-1687
CVE-2016-1688
CVE-2016-1689
CVE-2016-1690
CVE-2016-1691
CVE-2016-1692
CVE-2016-1693
CVE-2016-1694
CVE-2016-1695
CVE-2016-1950
CVE-2016-1955
CVE-2016-1956
CVE-2016-1959
CVE-2016-1967
CVE-2016-1968
CVE-2016-1969
CVE-2016-1970
CVE-2016-1971
CVE-2016-1972
CVE-2016-1973
CVE-2016-1975
CVE-2016-1976
CVE-2016-2178
CVE-2016-2515
CVE-2016-2537
CVE-2016-3141
CVE-2016-3142
CVE-2016-4000
CVE-2016-4055
CVE-2016-4070
CVE-2016-4612
CVE-2016-4619
CVE-2016-4979
CVE-2016-5483
CVE-2016-5501
CVE-2016-5538
CVE-2016-5605
CVE-2016-5608
CVE-2016-5610
CVE-2016-5611
CVE-2016-5613
CVE-2016-5616
CVE-2016-5617
CVE-2016-5684
CVE-2016-6662
CVE-2016-6814
CVE-2016-9389
CVE-2016-9392
CVE-2016-9583
CVE-2016-9586
CVE-2016-9840
CVE-2016-9841
CVE-2016-9842
CVE-2017-0379
CVE-2017-13745
CVE-2017-14229
CVE-2017-14735
CVE-2017-15095
CVE-2017-16012
CVE-2017-3308
CVE-2017-3309
CVE-2017-3329
CVE-2017-3453
CVE-2017-3454
CVE-2017-3456
CVE-2017-3461
CVE-2017-3462
CVE-2017-3463
CVE-2017-3464
CVE-2017-3468
CVE-2017-3600
CVE-2017-9526
CVE-2018-1000121
CVE-2018-12539
CVE-2018-1258
CVE-2018-1517
CVE-2018-1656
CVE-2018-2767
CVE-2018-2797
CVE-2018-2815
CVE-2018-2825
CVE-2018-2826
CVE-2018-2909
CVE-2018-2938
CVE-2018-2940
CVE-2018-2941
CVE-2018-2952
CVE-2018-2964
CVE-2018-2972
CVE-2018-2973
CVE-2018-3005
CVE-2018-3055
CVE-2018-3085
CVE-2018-3086
CVE-2018-3087
CVE-2018-3088
CVE-2018-3089
CVE-2018-3090
CVE-2018-3091
CVE-2018-3127
CVE-2018-3134
CVE-2018-3136
CVE-2018-3139
CVE-2018-3149
CVE-2018-3150
CVE-2018-3169
CVE-2018-3180
CVE-2018-3183
CVE-2018-3209
CVE-2018-3211
CVE-2018-3214
CVE-2018-3287
CVE-2018-3288
CVE-2018-3289
CVE-2018-3290
CVE-2018-3291
CVE-2018-3292
CVE-2018-3293
CVE-2018-3294
CVE-2018-3295
CVE-2018-3296
CVE-2018-3297
CVE-2018-3298
CVE-2019-2422
CVE-2019-2426
CVE-2019-2449
CVE-2019-2455
CVE-2019-2481
CVE-2019-2482
CVE-2019-2503
CVE-2019-2507
CVE-2019-2510
CVE-2019-2513
CVE-2019-2528
CVE-2019-2529
CVE-2019-2530
CVE-2019-2531
CVE-2019-2532
CVE-2019-2533
CVE-2019-2534
CVE-2019-2535
CVE-2019-2536
CVE-2019-2537
CVE-2019-2539
CVE-2019-2540
CVE-2024-2466
D:CVE-2015-2301
D:CVE-2015-2571
D:CVE-2015-2573
D:CVE-2015-2575
D:CVE-2015-2576
D:CVE-2015-5557
D:CVE-2015-5558
D:CVE-2015-5559
D:CVE-2015-5560
D:CVE-2015-5561
D:CVE-2015-5562
D:CVE-2015-5563
D:CVE-2015-5564
D:CVE-2015-5565
D:CVE-2015-8386
D:CVE-2015-8387
D:CVE-2015-8388
D:CVE-2015-8389
D:CVE-2015-8390
D:CVE-2015-8391
D:CVE-2015-8392
D:CVE-2015-8393
D:CVE-2015-8394
D:CVE-2015-8395
D:CVE-2016-1674
D:CVE-2016-1682
D:CVE-2016-1694
D:CVE-2016-1695
D:CVE-2016-1950
D:CVE-2016-1970
D:CVE-2016-1973
D:CVE-2016-2178
D:CVE-2016-3141
D:CVE-2016-4055
D:CVE-2016-4070
D:CVE-2016-5608
D:CVE-2016-5610
D:CVE-2016-6662
D:CVE-2016-9586
D:CVE-2017-9526
D:CVE-2018-1517
D:CVE-2018-1656
D:CVE-2018-3297
D:CVE-2018-3298
D:CVE-2022-2590
DEBIAN:DSA-3959
DEBIAN:DSA-4136
DEBIAN:DSA-4268
DEBIAN:DSA-4281
DEBIAN:DSA-4341
DSA-2940
DSA-3229
DSA-3311
DSA-3370
DSA-3392
DSA-3417
DSA-3455
DSA-3510
DSA-3520
DSA-3560
DSA-3590
DSA-3605
DSA-3621
DSA-3666
DSA-3673
DSA-3688
DSA-3834
DSA-3880
DSA-3893
DSA-3944
DSA-4136
DSA-4281
DSA-5378
EXPLOIT-DB:37852
EXPLOIT-DB:37854
EXPLOIT-DB:37855
EXPLOIT-DB:37856
EXPLOIT-DB:37857
EXPLOIT-DB:37859
EXPLOIT-DB:37861
EXPLOIT-DB:40360
FEDORA:FEDORA-2014-11453
FEDORA:FEDORA-2014-9380
FEDORA:FEDORA-2015-16104
FEDORA:FEDORA-2015-16105
FEDORA:FEDORA-2015-16106
FEDORA:FEDORA-2015-7d95466eda
FEDORA:FEDORA-2015-992342e82f
FEDORA:FEDORA-2015-decbab7c9f
FEDORA:FEDORA-2015-eb896290d3
FEDORA:FEDORA-2016-3fa315a5dd
FEDORA:FEDORA-2016-55137a3adb
FEDORA:FEDORA-2016-57bebab3b6
FEDORA:FEDORA-2016-5a141de5d9
FREEBSD:FreeBSD-SA-16:26
FULLDISC:20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
FULLDISC:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
FULLDISC:20160706 CVE-2016-4979: HTTPD webserver - X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs]
FULLDISC:20160912 CVE-2016-6662 - MySQL Remote Root Code Execution / Privilege Escalation ( 0day )
FULLDISC:20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities
GENTOO:GLSA-201507-19
GENTOO:GLSA-201605-06
GENTOO:GLSA-201607-02
GENTOO:GLSA-201607-07
GENTOO:GLSA-201607-09
GENTOO:GLSA-201610-02
GENTOO:GLSA-201612-16
GENTOO:GLSA-201612-27
GENTOO:GLSA-201701-01
GENTOO:GLSA-201701-47
GENTOO:GLSA-201701-56
GENTOO:GLSA-201701-68
GENTOO:GLSA-201710-28
GLSA-201908-24
GLSA-202007-54
HP:HPSBGN03041
HP:HPSBMU03090
HP:HPSBST03160
IBM Security Bulletin 0713459 (Cognos Business Intelligence)
IBM Security Bulletin 0713487 (Rational Collaborative Lifecycle Management)
IBM Security Bulletin 0715641 (Cognos Business Intelligence)
IBM Security Bulletin 0715721 (Agile Lifecycle Manager)
IBM Security Bulletin 0716285 (Cognos TM1)
IBM Security Bulletin 0716289 (Cognos Insight)
IBM Security Bulletin 0717693 (Tivoli Monitoring V6)
IBM Security Bulletin 0717727 (Tivoli Monitoring V6)
IBM Security Bulletin 0717895 (Rational Business Developer)
IBM Security Bulletin 0718381 (Platform Symphony)
IBM Security Bulletin 0718421 (InfoSphere Guardium Data Redaction)
IBM Security Bulletin 0718447 (Cognos Planning)
IBM Security Bulletin 0718949 (Cloud Manager with Openstack)
IBM Security Bulletin 0719163 (Rational Reporting for Development Intelligence)
IBM Security Bulletin 0719165 (Rational Insight)
IBM Security Bulletin 0720115 (Spectrum Conductor with Spark)
IBM Security Bulletin 0728577 (Content Classification)
IBM Security Bulletin 0729341 (ILOG CPLEX Optimization Studio)
IBM Security Bulletin 0729343 (Decision Optimization Center)
IBM Security Bulletin 0729607 (WebSphere Application Server)
IBM Security Bulletin 0735319 (Tivoli System Automation Application Manager)
IBM Security Bulletin 0735477 (Spectrum Conductor)
IBM Security Bulletin 0737281 (Application Delivery Intelligence)
IBM Security Bulletin 0738853 (Tivoli Monitoring V6)
IBM Security Bulletin 0739057 (Sterling Connect:Direct for Microsoft Windows)
IBM Security Bulletin 0739549 (Sterling Connect:Direct File Agent)
IBM Security Bulletin 0739701 (Sterling Connect:Direct FTP+)
IBM Security Bulletin 0739763 (Sterling Connect:Direct for UNIX)
IBM Security Bulletin 0743351 (Workload Scheduler)
IBM Security Bulletin 0792275 (Tivoli Netcool/Impact)
IBM Security Bulletin 2015806 (Runtimes for Java Technology)
IBM Security Bulletin 2016406 (Decision Optimization Center)
IBM Security Bulletin 2016663 (Tivoli Netcool OMNIbus)
IBM Security Bulletin 2016776 (Content Collector)
IBM Security Bulletin 2016781 (Content Collector for SAP Applications)
IBM Security Bulletin 2016827 (MessageSight)
IBM Security Bulletin 2017431 (PureApplication System)
IBM Security Bulletin 2017432 (PureApplication System)
IBM Security Bulletin 2017449 (Web Experience Factory)
IBM Security Bulletin 2017554 (Rational Software Architect)
IBM Security Bulletin 715641 (Cognos Business Intelligence Server)
IBM Security Bulletin 717121 (Cognos Controller)
IBM Security Bulletin 717125 (MQ Appliance)
IBM Security Bulletin 719933 (Tivoli Application Dependency Discovery Manager)
IBM Security Bulletin 720173 (Transformation Extender)
IBM Security Bulletin 725491 (DB2 for Linux, UNIX and Windows)
IBM Security Bulletin 726009 (DataPower Gateways)
IBM Security Bulletin 728399 (WebSphere Service Registry and Repository)
IBM Security Bulletin 728567 (Algo Credit Manager)
IBM Security Bulletin 728607 (PureApplication System)
IBM Security Bulletin 729116 (Spectrum Protect Plus)
IBM Security Bulletin 729699 (QRadar SIEM)
IBM Security Bulletin 729745 (WebSphere Application Server Patterns)
IBM Security Bulletin 730083 (Rational ClearCase)
IBM Security Bulletin 730311 (Cognos Command Center)
IBM Security Bulletin 730799 (Spectrum Control Standard Edition)
IBM Security Bulletin 730909 (AIX family)
IBM Security Bulletin 731323 (Financial Transaction Manager)
IBM Security Bulletin 731325 (Financial Transaction Manager)
IBM Security Bulletin 731329 (i)
IBM Security Bulletin 731331 (Financial Transaction Manager)
IBM Security Bulletin 731337 (Financial Transaction Manager)
IBM Security Bulletin 731339 (Financial Transaction Manager)
IBM Security Bulletin 731419 (Rational Software Architect Designer)
IBM Security Bulletin 731507 (Rational Software Architect Design Manager)
IBM Security Bulletin 731615 (Process Designer)
IBM Security Bulletin 731641 (InfoSphere Guardium Data Redaction)
IBM Security Bulletin 731875 (FileNet System Monitor)
IBM Security Bulletin 732375 (Initiate Master Data Service)
IBM Security Bulletin 732455 (Rational Performance Tester)
IBM Security Bulletin 732457 (Rational Service Tester for SOA Quality)
IBM Security Bulletin 732723 (Tivoli Application Dependency Discovery Manager)
IBM Security Bulletin 732753 (Agile Lifecycle Manager)
IBM Security Bulletin 732785 (Security Guardium)
IBM Security Bulletin 732846 (Spectrum Symphony)
IBM Security Bulletin 732850 (App Connect Enterprise)
IBM Security Bulletin 732896 (Planning Analytics)
IBM Security Bulletin 732932 (SPSS Statistics)
IBM Security Bulletin 733068 (Liberty for Java for Bluemix)
IBM Security Bulletin 733457 (Tivoli Netcool/OMNIbus)
IBM Security Bulletin 733543 (Tivoli Netcool/Impact)
IBM Security Bulletin 733845 (Integration Designer)
IBM Security Bulletin 733857 (Rational DOORS Web Access)
IBM Security Bulletin 733869 (DataPower Gateways)
IBM Security Bulletin 733905 (Rational Application Developer for WebSphere Software)
IBM Security Bulletin 734161 (WebSphere Application Server in Cloud)
IBM Security Bulletin 734595 (Rational Build Forge)
IBM Security Bulletin 735325 (Tivoli System Automation for Multiplatforms)
IBM Security Bulletin 735421 (MessageSight)
IBM Security Bulletin 735481 (Rational Directory Server)
IBM Security Bulletin 735515 (Rational Host On-Demand)
IBM Security Bulletin 735541 (Rational Method Composer)
IBM Security Bulletin 735551 (Runtimes for Java Technology)
IBM Security Bulletin 735807 (Tivoli Monitoring V6)
IBM Security Bulletin 737495 (Cloud App Management)
IBM Security Bulletin 737775 (Web Experience Factory)
IBM Security Bulletin 737813 (Content Collector for SAP Applications)
IBM Security Bulletin 738337 (Monitoring)
IBM Security Bulletin 738347 (Rational Publishing Engine)
IBM Security Bulletin 738633 (WebSphere Service Registry and Repository)
IBM Security Bulletin 738729 (Installation Manager)
IBM Security Bulletin 738743 (Rational Developer for i)
IBM Security Bulletin 738905 (Cognos Insight)
IBM Security Bulletin 738907 (Cognos TM1)
IBM Security Bulletin 738985 (WebSphere MQ)
IBM Security Bulletin 738997 (MQ)
IBM Security Bulletin 739183 (http://www.ibm.com/support/docview.wss?uid=ibm10739183)
IBM Security Bulletin 739227 (Cloud Orchestrator)
IBM Security Bulletin 739231 (Algo Credit Manager)
IBM Security Bulletin 739251 (Decision Optimization Center)
IBM Security Bulletin 739261 (Monitoring)
IBM Security Bulletin 739387 (Spectrum Protect for Virtual Environments)
IBM Security Bulletin 739455 (Spectrum Protect Snapshot)
IBM Security Bulletin 739941 (Content Collector)
IBM Security Bulletin 739985 (WebSphere Application Server Patterns)
IBM Security Bulletin 740269 (Notes)
IBM Security Bulletin 740383 (Sterling Connect:Direct Browser User Interface)
IBM Security Bulletin 740419 (Security Access Manager Appliance)
IBM Security Bulletin 740447 (Operational Decision Manager)
IBM Security Bulletin 740467 (Tivoli Storage Manager FastBack)
IBM Security Bulletin 740673 (Control Center)
IBM Security Bulletin 741745 (Tivoli Composite Application Manager (ITCAM) for Transactions)
IBM Security Bulletin 742369 (Security SiteProtector System)
IBM Security Bulletin 742729 (QRadar SIEM)
IBM Security Bulletin 743071 (Rational Asset Analyzer)
IBM Security Bulletin 743149 (Financial Transaction Manager)
IBM Security Bulletin 743157 (Financial Transaction Manager)
IBM Security Bulletin 743193 (Spectrum Protect)
IBM Security Bulletin 743961 (Rational Publishing Engine)
IBM Security Bulletin 744823 (Rational Collaborative Lifecycle Management)
IBM Security Bulletin 787583 (API Connect)
IBM Security Bulletin 787833 (AIX family)
IBM Security Bulletin 788277 (WebSphere Cast Iron)
IBM Security Bulletin 789805 (WebSphere MQ)
IBM Security Bulletin 791171 (Rational DOORS Web Access)
IBM Security Bulletin 791855 (WebSphere eXtreme Scale)
IBM Security Bulletin 791861 (WebSphere DataPower XC10 Appliance)
IBM Security Bulletin 792239 (Cloud Manager with Openstack)
IBM Security Bulletin T1027807 (AIX family)
JVN:JVN#03188560
JVN:JVN#65044642
JVNDB:JVNDB-2016-000096
JVNDB:JVNDB-2016-000097
L3:42159
L3:44989
L3:45334
L3:45906
L3:47274
L3:53225
MANDRIVA:MDVSA-2009:302
MANDRIVA:MDVSA-2014:095
MANDRIVA:MDVSA-2015:136
MANDRIVA:MDVSA-2015:227
MISC:access.redhat.com:CVE-2014-0245
MISC:access.redhat.com:MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MISC:blog.diniscruz.com:CVE-2013-7285
MISC:blogs.gentoo.org:CVE-2016-9399
MISC:bugs.exim.org:CVE-2015-2325
MISC:bugs.exim.org:CVE-2015-2326
MISC:bugs.launchpad.net:MLIST:[oss-security] 20150911 CVE Request: 2 FreeType issues
MISC:bugs.php.net:CVE-2009-3559
MISC:bugzilla.redhat.com:CVE-2014-0245
MISC:bugzilla.redhat.com:CVE-2016-9586
MISC:curl.haxx.se
MISC:curl.haxx.se:OSS:2018/Q1/235
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:developer.mozilla.org:CVE-2016-1979
MISC:eprint.iacr.org:CVE-2016-2178
MISC:eprint.iacr.org:CVE-2017-0379
MISC:exchange.xforce.ibmcloud.com:CVE-2014-4172
MISC:fortiguard.com:CVE-2015-2325
MISC:fortiguard.com:CVE-2015-2326
MISC:git.gnupg.org:CVE-2017-0379
MISC:git.openssl.org:MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MISC:github.com:CVE-2014-4172
MISC:github.com:CVE-2015-9251
MISC:github.com:CVE-2017-14229
MISC:github.com:MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
MISC:github.com:OSS:2018/Q1/235
MISC:github.com:OSS:2024/Q1/256
MISC:ics-cert.us-cert.gov:CVE-2015-9251
MISC:issues.apache.org:CVE-2014-4651
MISC:issues.jasig.org:CVE-2014-4172
MISC:legalhackers.com:CVE-2016-6662
MISC:lists.apache.org:CVE-2018-1305
MISC:lists.debian.org:CVE-2017-0379
MISC:lists.fedoraproject.org:CVE-2014-4172
MISC:mail-archives.apache.org:CVE-2016-6814
MISC:nodesecurity.io:CVE-2014-10064
MISC:nodesecurity.io:CVE-2015-8857
MISC:nodesecurity.io:MLIST:[oss-security] 20160420 various vulnerabilities in Node.js packages
MISC:packetstormsecurity.com:CVE-2014-4330
MISC:packetstormsecurity.com:CVE-2016-0755
MISC:packetstormsecurity.com:CVE-2016-4979
MISC:savannah.nongnu.org:CVE-2014-9747
MISC:seclists.org:CVE-2014-4651
MISC:security-tracker.debian.org:CVE-2016-4000
MISC:security-tracker.debian.org:CVE-2017-0379
MISC:snyk.io:CVE-2015-9251
MISC:snyk.io:CVE-2016-4000
MISC:sw.aveva.com:CVE-2015-9251
MISC:web-in-security.blogspot.ca:CVE-2015-7940
MISC:web.archive.org:CVE-2013-7285
MISC:wiki.mozilla.org:CVE-2016-9843
MISC:www.arista.com:CVE-2016-6306
MISC:www.debian.org:CVE-2014-4172
MISC:www.mail-archive.com:CVE-2014-4172
MISC:www.openssl.org:CVE-2016-6302
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2014-0107
MISC:www.oracle.com:CVE-2015-7501
MISC:www.oracle.com:CVE-2016-1000031
MISC:www.sourceclear.com:CVE-2015-8861
MISC:www.talosintelligence.com:CVE-2016-5684
MISC:www.tenable.com:CVE-2016-1000031
MISC:www.tenable.com:CVE-2016-6793
MLIST:[activemq-issues] 20190718 [jira] [Updated] (AMQ-7236) SEV-1 Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring framework) and xstream-1.4.10.jar
MLIST:[activemq-issues] 20190826 [jira] [Created] (AMQ-7288) Security Vulnerabilities in ActiveMQ dependent libraries.
MLIST:[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior
MLIST:[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[debian-lts-announce] 20180306 [SECURITY] [DLA 1301-1] tomcat7 security update
MLIST:[debian-lts-announce] 20180318 [SECURITY] [DLA 1309-1] curl security update
MLIST:[debian-lts-announce] 20180627 [SECURITY] [DLA 1400-1] tomcat7 security update
MLIST:[debian-lts-announce] 20180729 [SECURITY] [DLA 1450-1] tomcat8 security update
MLIST:[debian-lts-announce] 20181105 [SECURITY] [DLA 1566-1] mysql-5.5 security update
MLIST:[debian-lts-announce] 20181106 [SECURITY] [DLA 1568-1] curl security update
MLIST:[debian-lts-announce] 20181122 [SECURITY] [DLA 1590-1] openjdk-7 security update
MLIST:[debian-lts-announce] 20190201 [SECURITY] [DLA 1655-1] mariadb-10.0 security update
MLIST:[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update
MLIST:[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update
MLIST:[flink-dev] 20190811 Apache flink 1.7.2 security issues
MLIST:[flink-user] 20190811 Apache flink 1.7.2 security issues
MLIST:[flink-user] 20190813 Apache flink 1.7.2 security issues
MLIST:[flink-user] 20190813 Re: Apache flink 1.7.2 security issues
MLIST:[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20....
MLIST:[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20....
MLIST:[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20....
MLIST:[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20....
MLIST:[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
MLIST:[httpd-cvs] 20210330 svn commit: r1073139 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
MLIST:[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html secu...
MLIST:[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html se...
MLIST:[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
MLIST:[httpd-cvs] 20210330 svn commit: r1073149 [10/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
MLIST:[httpd-cvs] 20210330 svn commit: r1888194 [10/13] - /httpd/site/trunk/content/security/json/
MLIST:[httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.h...
MLIST:[oss-security] 20091120 CVE request: php 5.3.1 update
MLIST:[oss-security] 20091120 Re: CVE request: php 5.3.1 update
MLIST:[oss-security] 20140109 Re: CVE request: remote code execution via deserialization in XStream
MLIST:[oss-security] 20140220 Re: Possible CVE Requests: several issues fixed in Jenkins (Advisory 2014-02-14)
MLIST:[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE
MLIST:[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE
MLIST:[oss-security] 20140925 LSE Leading Security Experts GmbH - LSE-2014-06-10 - Perl CORE - Deep Recursion Stack Overflow
MLIST:[oss-security] 20150804 Re: CVE Request: Information disclosure in pcre
MLIST:[oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp
MLIST:[oss-security] 20150911 CVE Request: 2 FreeType issues
MLIST:[oss-security] 20150925 Re: CVE Request: 2 FreeType issues
MLIST:[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle
MLIST:[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle
MLIST:[oss-security] 20151128 Re: Heap Overflow in PCRE
MLIST:[oss-security] 20160420 various vulnerabilities in Node.js packages
MLIST:[oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases
MLIST:[oss-security] 20160608 CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MLIST:[oss-security] 20160608 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MLIST:[oss-security] 20160609 Re: CVE-2016-2178: OpenSSL DSA follows a non-constant time codepath for certain operations
MLIST:[oss-security] 20160705 CVE-2016-4979: HTTPD webserver - X509 Client certificate based authentication can be bypassed when HTTP/2 is used [vs]
MLIST:[oss-security] 20160912 CVE-2016-6662 - MySQL Remote Root Code Execution / Privilege Escalation ( 0day )
MLIST:[oss-security] 20161117 Re: jasper: multiple assertion failures
MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
MLIST:[perl.perl5.porters] 20140918 fix for CVE-2014-4330 present in blead
MLIST:[php-announce] 20091119 5.3.1 Release announcement
MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
MLIST:[xstream-user] 20130717 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper
MLIST:[xstream-user] 20130718 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper
OSS:2015/Q4/414
OSS:2015/Q4/419
OSS:2015/Q4/422
OSS:2016/Q1/258
OSS:2016/Q1/625
OSS:2016/Q2/122
OSS:2016/Q2/138
OSS:2016/Q2/493
OSS:2016/Q3/481
OSS:2016/Q3/602
OSS:2016/Q4/602
OSS:2016/Q4/719
OSS:2017/Q2/418
OSS:2017/Q4/297
OSS:2017/Q4/298
OSS:2017/Q4/299
OSS:2017/Q4/300
OSS:2017/Q4/301
OSS:2017/Q4/59
OSS:2017/Q4/60
OSS:2018/Q1/174
OSS:2018/Q1/235
OSS:2018/Q2/21
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/11/10/2
OSS:2022/Q3/99
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2024/03/27/4
OSS:2024/Q1/256
Oracle:CVE-2011-4461
Oracle:CVE-2013-1768
Oracle:CVE-2014-0114
Oracle:CVE-2014-3490
Oracle:CVE-2014-3577
Oracle:CVE-2015-0204
Oracle:CVE-2015-0235
Oracle:CVE-2015-0405
Oracle:CVE-2015-0423
Oracle:CVE-2015-0433
Oracle:CVE-2015-0438
Oracle:CVE-2015-0439
Oracle:CVE-2015-0441
Oracle:CVE-2015-0498
Oracle:CVE-2015-0499
Oracle:CVE-2015-0500
Oracle:CVE-2015-0501
Oracle:CVE-2015-0503
Oracle:CVE-2015-0505
Oracle:CVE-2015-0506
Oracle:CVE-2015-0507
Oracle:CVE-2015-0508
Oracle:CVE-2015-0511
Oracle:CVE-2015-1832
Oracle:CVE-2015-2566
Oracle:CVE-2015-2567
Oracle:CVE-2015-2568
Oracle:CVE-2015-2571
Oracle:CVE-2015-2573
Oracle:CVE-2015-2575
Oracle:CVE-2015-2576
Oracle:CVE-2015-5600
Oracle:CVE-2015-6937
Oracle:CVE-2015-7501
Oracle:CVE-2015-7940
Oracle:CVE-2015-8965
Oracle:CVE-2015-9251
Oracle:CVE-2016-0635
Oracle:CVE-2016-0714
Oracle:CVE-2016-0729
Oracle:CVE-2016-1000031
Oracle:CVE-2016-1181
Oracle:CVE-2016-1182
Oracle:CVE-2016-1950
Oracle:CVE-2016-2099
Oracle:CVE-2016-2107
Oracle:CVE-2016-2176
Oracle:CVE-2016-2179
Oracle:CVE-2016-2183
Oracle:CVE-2016-3092
Oracle:CVE-2016-3506
Oracle:CVE-2016-4000
Oracle:CVE-2016-4055
Oracle:CVE-2016-4979
Oracle:CVE-2016-5007
Oracle:CVE-2016-5019
Oracle:CVE-2016-5080
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2016-5501
Oracle:CVE-2016-5538
Oracle:CVE-2016-5605
Oracle:CVE-2016-5608
Oracle:CVE-2016-5610
Oracle:CVE-2016-5611
Oracle:CVE-2016-5613
Oracle:CVE-2016-5616
Oracle:CVE-2016-5617
Oracle:CVE-2016-5684
Oracle:CVE-2016-6304
Oracle:CVE-2016-6662
Oracle:CVE-2016-6814
Oracle:CVE-2016-7103
Oracle:CVE-2016-7167
Oracle:CVE-2016-9583
Oracle:CVE-2016-9841
Oracle:CVE-2016-9843
Oracle:CVE-2016-9878
Oracle:CVE-2017-0379
Oracle:CVE-2017-10068
Oracle:CVE-2017-12617
Oracle:CVE-2017-13077
Oracle:CVE-2017-13745
Oracle:CVE-2017-14229
Oracle:CVE-2017-14735
Oracle:CVE-2017-15095
Oracle:CVE-2017-17562
Oracle:CVE-2017-3308
Oracle:CVE-2017-3309
Oracle:CVE-2017-3329
Oracle:CVE-2017-3453
Oracle:CVE-2017-3454
Oracle:CVE-2017-3456
Oracle:CVE-2017-3461
Oracle:CVE-2017-3462
Oracle:CVE-2017-3463
Oracle:CVE-2017-3464
Oracle:CVE-2017-3468
Oracle:CVE-2017-3600
Oracle:CVE-2017-3633
Oracle:CVE-2017-3732
Oracle:CVE-2017-3736
Oracle:CVE-2017-3737
Oracle:CVE-2017-5533
Oracle:CVE-2017-5645
Oracle:CVE-2017-5662
Oracle:CVE-2017-5664
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-6074
Oracle:CVE-2017-7525
Oracle:CVE-2017-7805
Oracle:CVE-2017-9798
Oracle:CVE-2018-0732
Oracle:CVE-2018-0734
Oracle:CVE-2018-0739
Oracle:CVE-2018-1000120
Oracle:CVE-2018-1000300
Oracle:CVE-2018-10933
Oracle:CVE-2018-11039
Oracle:CVE-2018-1171
Oracle:CVE-2018-11763
Oracle:CVE-2018-11776
Oracle:CVE-2018-11784
Oracle:CVE-2018-1258
Oracle:CVE-2018-1275
Oracle:CVE-2018-1305
Oracle:CVE-2018-13785
Oracle:CVE-2018-1656
Oracle:CVE-2018-2562
Oracle:CVE-2018-2563
Oracle:CVE-2018-2572
Oracle:CVE-2018-2587
Oracle:CVE-2018-2598
Oracle:CVE-2018-2612
Oracle:CVE-2018-2622
Oracle:CVE-2018-2628
Oracle:CVE-2018-2640
Oracle:CVE-2018-2665
Oracle:CVE-2018-2668
Oracle:CVE-2018-2676
Oracle:CVE-2018-2685
Oracle:CVE-2018-2686
Oracle:CVE-2018-2687
Oracle:CVE-2018-2688
Oracle:CVE-2018-2689
Oracle:CVE-2018-2690
Oracle:CVE-2018-2693
Oracle:CVE-2018-2694
Oracle:CVE-2018-2698
Oracle:CVE-2018-2718
Oracle:CVE-2018-2737
Oracle:CVE-2018-2738
Oracle:CVE-2018-2739
Oracle:CVE-2018-2742
Oracle:CVE-2018-2746
Oracle:CVE-2018-2747
Oracle:CVE-2018-2748
Oracle:CVE-2018-2749
Oracle:CVE-2018-2750
Oracle:CVE-2018-2752
Oracle:CVE-2018-2753
Oracle:CVE-2018-2754
Oracle:CVE-2018-2755
Oracle:CVE-2018-2756
Oracle:CVE-2018-2758
Oracle:CVE-2018-2759
Oracle:CVE-2018-2760
Oracle:CVE-2018-2761
Oracle:CVE-2018-2762
Oracle:CVE-2018-2763
Oracle:CVE-2018-2764
Oracle:CVE-2018-2765
Oracle:CVE-2018-2766
Oracle:CVE-2018-2767
Oracle:CVE-2018-2768
Oracle:CVE-2018-2769
Oracle:CVE-2018-2770
Oracle:CVE-2018-2771
Oracle:CVE-2018-2772
Oracle:CVE-2018-2773
Oracle:CVE-2018-2774
Oracle:CVE-2018-2775
Oracle:CVE-2018-2776
Oracle:CVE-2018-2777
Oracle:CVE-2018-2778
Oracle:CVE-2018-2779
Oracle:CVE-2018-2780
Oracle:CVE-2018-2781
Oracle:CVE-2018-2782
Oracle:CVE-2018-2783
Oracle:CVE-2018-2784
Oracle:CVE-2018-2785
Oracle:CVE-2018-2786
Oracle:CVE-2018-2787
Oracle:CVE-2018-2788
Oracle:CVE-2018-2789
Oracle:CVE-2018-2790
Oracle:CVE-2018-2791
Oracle:CVE-2018-2792
Oracle:CVE-2018-2793
Oracle:CVE-2018-2794
Oracle:CVE-2018-2795
Oracle:CVE-2018-2796
Oracle:CVE-2018-2797
Oracle:CVE-2018-2798
Oracle:CVE-2018-2799
Oracle:CVE-2018-2800
Oracle:CVE-2018-2801
Oracle:CVE-2018-2804
Oracle:CVE-2018-2805
Oracle:CVE-2018-2806
Oracle:CVE-2018-2807
Oracle:CVE-2018-2808
Oracle:CVE-2018-2809
Oracle:CVE-2018-2810
Oracle:CVE-2018-2811
Oracle:CVE-2018-2812
Oracle:CVE-2018-2813
Oracle:CVE-2018-2814
Oracle:CVE-2018-2815
Oracle:CVE-2018-2816
Oracle:CVE-2018-2817
Oracle:CVE-2018-2818
Oracle:CVE-2018-2819
Oracle:CVE-2018-2820
Oracle:CVE-2018-2821
Oracle:CVE-2018-2822
Oracle:CVE-2018-2823
Oracle:CVE-2018-2825
Oracle:CVE-2018-2826
Oracle:CVE-2018-2827
Oracle:CVE-2018-2828
Oracle:CVE-2018-2830
Oracle:CVE-2018-2831
Oracle:CVE-2018-2832
Oracle:CVE-2018-2834
Oracle:CVE-2018-2835
Oracle:CVE-2018-2836
Oracle:CVE-2018-2837
Oracle:CVE-2018-2838
Oracle:CVE-2018-2839
Oracle:CVE-2018-2840
Oracle:CVE-2018-2841
Oracle:CVE-2018-2842
Oracle:CVE-2018-2843
Oracle:CVE-2018-2844
Oracle:CVE-2018-2845
Oracle:CVE-2018-2846
Oracle:CVE-2018-2849
Oracle:CVE-2018-2850
Oracle:CVE-2018-2852
Oracle:CVE-2018-2854
Oracle:CVE-2018-2855
Oracle:CVE-2018-2856
Oracle:CVE-2018-2857
Oracle:CVE-2018-2858
Oracle:CVE-2018-2859
Oracle:CVE-2018-2860
Oracle:CVE-2018-2861
Oracle:CVE-2018-2862
Oracle:CVE-2018-2863
Oracle:CVE-2018-2864
Oracle:CVE-2018-2865
Oracle:CVE-2018-2866
Oracle:CVE-2018-2867
Oracle:CVE-2018-2868
Oracle:CVE-2018-2869
Oracle:CVE-2018-2870
Oracle:CVE-2018-2871
Oracle:CVE-2018-2872
Oracle:CVE-2018-2873
Oracle:CVE-2018-2874
Oracle:CVE-2018-2876
Oracle:CVE-2018-2877
Oracle:CVE-2018-2878
Oracle:CVE-2018-2879
Oracle:CVE-2018-2881
Oracle:CVE-2018-2882
Oracle:CVE-2018-2887
Oracle:CVE-2018-2888
Oracle:CVE-2018-2889
Oracle:CVE-2018-2891
Oracle:CVE-2018-2892
Oracle:CVE-2018-2893
Oracle:CVE-2018-2894
Oracle:CVE-2018-2895
Oracle:CVE-2018-2896
Oracle:CVE-2018-2897
Oracle:CVE-2018-2898
Oracle:CVE-2018-2899
Oracle:CVE-2018-2900
Oracle:CVE-2018-2901
Oracle:CVE-2018-2902
Oracle:CVE-2018-2903
Oracle:CVE-2018-2904
Oracle:CVE-2018-2905
Oracle:CVE-2018-2906
Oracle:CVE-2018-2907
Oracle:CVE-2018-2908
Oracle:CVE-2018-2909
Oracle:CVE-2018-2911
Oracle:CVE-2018-2912
Oracle:CVE-2018-2913
Oracle:CVE-2018-2914
Oracle:CVE-2018-2915
Oracle:CVE-2018-2916
Oracle:CVE-2018-2917
Oracle:CVE-2018-2918
Oracle:CVE-2018-2919
Oracle:CVE-2018-2920
Oracle:CVE-2018-2921
Oracle:CVE-2018-2922
Oracle:CVE-2018-2923
Oracle:CVE-2018-2924
Oracle:CVE-2018-2925
Oracle:CVE-2018-2926
Oracle:CVE-2018-2927
Oracle:CVE-2018-2928
Oracle:CVE-2018-2929
Oracle:CVE-2018-2930
Oracle:CVE-2018-2932
Oracle:CVE-2018-2933
Oracle:CVE-2018-2934
Oracle:CVE-2018-2935
Oracle:CVE-2018-2936
Oracle:CVE-2018-2937
Oracle:CVE-2018-2938
Oracle:CVE-2018-2939
Oracle:CVE-2018-2940
Oracle:CVE-2018-2941
Oracle:CVE-2018-2942
Oracle:CVE-2018-2943
Oracle:CVE-2018-2944
Oracle:CVE-2018-2945
Oracle:CVE-2018-2946
Oracle:CVE-2018-2947
Oracle:CVE-2018-2948
Oracle:CVE-2018-2949
Oracle:CVE-2018-2950
Oracle:CVE-2018-2951
Oracle:CVE-2018-2952
Oracle:CVE-2018-2953
Oracle:CVE-2018-2954
Oracle:CVE-2018-2955
Oracle:CVE-2018-2956
Oracle:CVE-2018-2957
Oracle:CVE-2018-2958
Oracle:CVE-2018-2959
Oracle:CVE-2018-2960
Oracle:CVE-2018-2961
Oracle:CVE-2018-2962
Oracle:CVE-2018-2963
Oracle:CVE-2018-2964
Oracle:CVE-2018-2965
Oracle:CVE-2018-2966
Oracle:CVE-2018-2967
Oracle:CVE-2018-2968
Oracle:CVE-2018-2969
Oracle:CVE-2018-2970
Oracle:CVE-2018-2971
Oracle:CVE-2018-2972
Oracle:CVE-2018-2973
Oracle:CVE-2018-2974
Oracle:CVE-2018-2975
Oracle:CVE-2018-2976
Oracle:CVE-2018-2977
Oracle:CVE-2018-2979
Oracle:CVE-2018-2980
Oracle:CVE-2018-2981
Oracle:CVE-2018-2982
Oracle:CVE-2018-2984
Oracle:CVE-2018-2985
Oracle:CVE-2018-2986
Oracle:CVE-2018-2987
Oracle:CVE-2018-2988
Oracle:CVE-2018-2989
Oracle:CVE-2018-2990
Oracle:CVE-2018-2991
Oracle:CVE-2018-2992
Oracle:CVE-2018-2993
Oracle:CVE-2018-2994
Oracle:CVE-2018-2995
Oracle:CVE-2018-2996
Oracle:CVE-2018-2997
Oracle:CVE-2018-2998
Oracle:CVE-2018-2999
Oracle:CVE-2018-3000
Oracle:CVE-2018-3001
Oracle:CVE-2018-3002
Oracle:CVE-2018-3003
Oracle:CVE-2018-3004
Oracle:CVE-2018-3005
Oracle:CVE-2018-3006
Oracle:CVE-2018-3007
Oracle:CVE-2018-3008
Oracle:CVE-2018-3009
Oracle:CVE-2018-3010
Oracle:CVE-2018-3011
Oracle:CVE-2018-3012
Oracle:CVE-2018-3013
Oracle:CVE-2018-3014
Oracle:CVE-2018-3015
Oracle:CVE-2018-3016
Oracle:CVE-2018-3017
Oracle:CVE-2018-3018
Oracle:CVE-2018-3019
Oracle:CVE-2018-3020
Oracle:CVE-2018-3021
Oracle:CVE-2018-3022
Oracle:CVE-2018-3023
Oracle:CVE-2018-3024
Oracle:CVE-2018-3025
Oracle:CVE-2018-3026
Oracle:CVE-2018-3027
Oracle:CVE-2018-3028
Oracle:CVE-2018-3029
Oracle:CVE-2018-3030
Oracle:CVE-2018-3031
Oracle:CVE-2018-3032
Oracle:CVE-2018-3033
Oracle:CVE-2018-3034
Oracle:CVE-2018-3035
Oracle:CVE-2018-3036
Oracle:CVE-2018-3037
Oracle:CVE-2018-3038
Oracle:CVE-2018-3039
Oracle:CVE-2018-3040
Oracle:CVE-2018-3041
Oracle:CVE-2018-3042
Oracle:CVE-2018-3043
Oracle:CVE-2018-3044
Oracle:CVE-2018-3045
Oracle:CVE-2018-3046
Oracle:CVE-2018-3047
Oracle:CVE-2018-3048
Oracle:CVE-2018-3049
Oracle:CVE-2018-3050
Oracle:CVE-2018-3051
Oracle:CVE-2018-3052
Oracle:CVE-2018-3053
Oracle:CVE-2018-3054
Oracle:CVE-2018-3055
Oracle:CVE-2018-3056
Oracle:CVE-2018-3057
Oracle:CVE-2018-3058
Oracle:CVE-2018-3059
Oracle:CVE-2018-3060
Oracle:CVE-2018-3061
Oracle:CVE-2018-3062
Oracle:CVE-2018-3063
Oracle:CVE-2018-3064
Oracle:CVE-2018-3065
Oracle:CVE-2018-3066
Oracle:CVE-2018-3067
Oracle:CVE-2018-3068
Oracle:CVE-2018-3069
Oracle:CVE-2018-3070
Oracle:CVE-2018-3071
Oracle:CVE-2018-3072
Oracle:CVE-2018-3073
Oracle:CVE-2018-3074
Oracle:CVE-2018-3075
Oracle:CVE-2018-3076
Oracle:CVE-2018-3077
Oracle:CVE-2018-3078
Oracle:CVE-2018-3079
Oracle:CVE-2018-3080
Oracle:CVE-2018-3081
Oracle:CVE-2018-3082
Oracle:CVE-2018-3084
Oracle:CVE-2018-3085
Oracle:CVE-2018-3086
Oracle:CVE-2018-3087
Oracle:CVE-2018-3088
Oracle:CVE-2018-3089
Oracle:CVE-2018-3090
Oracle:CVE-2018-3091
Oracle:CVE-2018-3092
Oracle:CVE-2018-3093
Oracle:CVE-2018-3094
Oracle:CVE-2018-3095
Oracle:CVE-2018-3096
Oracle:CVE-2018-3097
Oracle:CVE-2018-3098
Oracle:CVE-2018-3099
Oracle:CVE-2018-3100
Oracle:CVE-2018-3101
Oracle:CVE-2018-3102
Oracle:CVE-2018-3103
Oracle:CVE-2018-3104
Oracle:CVE-2018-3105
Oracle:CVE-2018-3108
Oracle:CVE-2018-3109
Oracle:CVE-2018-3115
Oracle:CVE-2018-3122
Oracle:CVE-2018-3125
Oracle:CVE-2018-3126
Oracle:CVE-2018-3127
Oracle:CVE-2018-3128
Oracle:CVE-2018-3129
Oracle:CVE-2018-3130
Oracle:CVE-2018-3131
Oracle:CVE-2018-3132
Oracle:CVE-2018-3133
Oracle:CVE-2018-3134
Oracle:CVE-2018-3135
Oracle:CVE-2018-3136
Oracle:CVE-2018-3137
Oracle:CVE-2018-3138
Oracle:CVE-2018-3139
Oracle:CVE-2018-3140
Oracle:CVE-2018-3141
Oracle:CVE-2018-3142
Oracle:CVE-2018-3143
Oracle:CVE-2018-3144
Oracle:CVE-2018-3145
Oracle:CVE-2018-3146
Oracle:CVE-2018-3147
Oracle:CVE-2018-3148
Oracle:CVE-2018-3149
Oracle:CVE-2018-3150
Oracle:CVE-2018-3151
Oracle:CVE-2018-3152
Oracle:CVE-2018-3153
Oracle:CVE-2018-3154
Oracle:CVE-2018-3155
Oracle:CVE-2018-3156
Oracle:CVE-2018-3157
Oracle:CVE-2018-3158
Oracle:CVE-2018-3159
Oracle:CVE-2018-3160
Oracle:CVE-2018-3161
Oracle:CVE-2018-3162
Oracle:CVE-2018-3163
Oracle:CVE-2018-3164
Oracle:CVE-2018-3165
Oracle:CVE-2018-3166
Oracle:CVE-2018-3167
Oracle:CVE-2018-3168
Oracle:CVE-2018-3169
Oracle:CVE-2018-3170
Oracle:CVE-2018-3171
Oracle:CVE-2018-3172
Oracle:CVE-2018-3173
Oracle:CVE-2018-3174
Oracle:CVE-2018-3175
Oracle:CVE-2018-3176
Oracle:CVE-2018-3177
Oracle:CVE-2018-3178
Oracle:CVE-2018-3179
Oracle:CVE-2018-3180
Oracle:CVE-2018-3181
Oracle:CVE-2018-3182
Oracle:CVE-2018-3183
Oracle:CVE-2018-3184
Oracle:CVE-2018-3185
Oracle:CVE-2018-3186
Oracle:CVE-2018-3187
Oracle:CVE-2018-3188
Oracle:CVE-2018-3189
Oracle:CVE-2018-3190
Oracle:CVE-2018-3191
Oracle:CVE-2018-3192
Oracle:CVE-2018-3193
Oracle:CVE-2018-3194
Oracle:CVE-2018-3195
Oracle:CVE-2018-3196
Oracle:CVE-2018-3197
Oracle:CVE-2018-3198
Oracle:CVE-2018-3200
Oracle:CVE-2018-3201
Oracle:CVE-2018-3202
Oracle:CVE-2018-3203
Oracle:CVE-2018-3204
Oracle:CVE-2018-3205
Oracle:CVE-2018-3206
Oracle:CVE-2018-3207
Oracle:CVE-2018-3208
Oracle:CVE-2018-3209
Oracle:CVE-2018-3210
Oracle:CVE-2018-3211
Oracle:CVE-2018-3212
Oracle:CVE-2018-3213
Oracle:CVE-2018-3214
Oracle:CVE-2018-3215
Oracle:CVE-2018-3217
Oracle:CVE-2018-3218
Oracle:CVE-2018-3219
Oracle:CVE-2018-3220
Oracle:CVE-2018-3221
Oracle:CVE-2018-3222
Oracle:CVE-2018-3223
Oracle:CVE-2018-3224
Oracle:CVE-2018-3225
Oracle:CVE-2018-3226
Oracle:CVE-2018-3227
Oracle:CVE-2018-3228
Oracle:CVE-2018-3229
Oracle:CVE-2018-3230
Oracle:CVE-2018-3231
Oracle:CVE-2018-3232
Oracle:CVE-2018-3233
Oracle:CVE-2018-3234
Oracle:CVE-2018-3235
Oracle:CVE-2018-3236
Oracle:CVE-2018-3237
Oracle:CVE-2018-3238
Oracle:CVE-2018-3239
Oracle:CVE-2018-3241
Oracle:CVE-2018-3242
Oracle:CVE-2018-3243
Oracle:CVE-2018-3244
Oracle:CVE-2018-3245
Oracle:CVE-2018-3246
Oracle:CVE-2018-3247
Oracle:CVE-2018-3248
Oracle:CVE-2018-3249
Oracle:CVE-2018-3250
Oracle:CVE-2018-3251
Oracle:CVE-2018-3252
Oracle:CVE-2018-3253
Oracle:CVE-2018-3254
Oracle:CVE-2018-3255
Oracle:CVE-2018-3256
Oracle:CVE-2018-3257
Oracle:CVE-2018-3258
Oracle:CVE-2018-3259
Oracle:CVE-2018-3261
Oracle:CVE-2018-3262
Oracle:CVE-2018-3263
Oracle:CVE-2018-3264
Oracle:CVE-2018-3265
Oracle:CVE-2018-3266
Oracle:CVE-2018-3267
Oracle:CVE-2018-3268
Oracle:CVE-2018-3269
Oracle:CVE-2018-3270
Oracle:CVE-2018-3271
Oracle:CVE-2018-3272
Oracle:CVE-2018-3273
Oracle:CVE-2018-3274
Oracle:CVE-2018-3275
Oracle:CVE-2018-3276
Oracle:CVE-2018-3277
Oracle:CVE-2018-3278
Oracle:CVE-2018-3279
Oracle:CVE-2018-3280
Oracle:CVE-2018-3281
Oracle:CVE-2018-3282
Oracle:CVE-2018-3283
Oracle:CVE-2018-3284
Oracle:CVE-2018-3285
Oracle:CVE-2018-3286
Oracle:CVE-2018-3287
Oracle:CVE-2018-3288
Oracle:CVE-2018-3289
Oracle:CVE-2018-3290
Oracle:CVE-2018-3291
Oracle:CVE-2018-3292
Oracle:CVE-2018-3293
Oracle:CVE-2018-3294
Oracle:CVE-2018-3295
Oracle:CVE-2018-3296
Oracle:CVE-2018-3297
Oracle:CVE-2018-3298
Oracle:CVE-2018-3299
Oracle:CVE-2018-3301
Oracle:CVE-2018-3302
Oracle:CVE-2018-3303
Oracle:CVE-2018-3304
Oracle:CVE-2018-3305
Oracle:CVE-2018-3309
Oracle:CVE-2018-3311
Oracle:CVE-2018-3639
Oracle:CVE-2018-7489
Oracle:CVE-2018-8013
Oracle:CVE-2018-8014
Oracle:CVE-2018-8037
Oracle:CVE-2019-10173
Oracle:CVE-2019-1543
Oracle:CVE-2019-2395
Oracle:CVE-2019-2396
Oracle:CVE-2019-2397
Oracle:CVE-2019-2398
Oracle:CVE-2019-2399
Oracle:CVE-2019-2400
Oracle:CVE-2019-2401
Oracle:CVE-2019-2402
Oracle:CVE-2019-2403
Oracle:CVE-2019-2404
Oracle:CVE-2019-2405
Oracle:CVE-2019-2406
Oracle:CVE-2019-2407
Oracle:CVE-2019-2408
Oracle:CVE-2019-2409
Oracle:CVE-2019-2410
Oracle:CVE-2019-2411
Oracle:CVE-2019-2412
Oracle:CVE-2019-2413
Oracle:CVE-2019-2414
Oracle:CVE-2019-2415
Oracle:CVE-2019-2416
Oracle:CVE-2019-2417
Oracle:CVE-2019-2418
Oracle:CVE-2019-2419
Oracle:CVE-2019-2420
Oracle:CVE-2019-2421
Oracle:CVE-2019-2422
Oracle:CVE-2019-2423
Oracle:CVE-2019-2425
Oracle:CVE-2019-2426
Oracle:CVE-2019-2427
Oracle:CVE-2019-2429
Oracle:CVE-2019-2430
Oracle:CVE-2019-2431
Oracle:CVE-2019-2432
Oracle:CVE-2019-2433
Oracle:CVE-2019-2434
Oracle:CVE-2019-2435
Oracle:CVE-2019-2436
Oracle:CVE-2019-2437
Oracle:CVE-2019-2438
Oracle:CVE-2019-2439
Oracle:CVE-2019-2440
Oracle:CVE-2019-2441
Oracle:CVE-2019-2442
Oracle:CVE-2019-2443
Oracle:CVE-2019-2444
Oracle:CVE-2019-2445
Oracle:CVE-2019-2446
Oracle:CVE-2019-2447
Oracle:CVE-2019-2448
Oracle:CVE-2019-2449
Oracle:CVE-2019-2450
Oracle:CVE-2019-2451
Oracle:CVE-2019-2452
Oracle:CVE-2019-2453
Oracle:CVE-2019-2455
Oracle:CVE-2019-2456
Oracle:CVE-2019-2457
Oracle:CVE-2019-2458
Oracle:CVE-2019-2459
Oracle:CVE-2019-2460
Oracle:CVE-2019-2461
Oracle:CVE-2019-2462
Oracle:CVE-2019-2463
Oracle:CVE-2019-2464
Oracle:CVE-2019-2465
Oracle:CVE-2019-2466
Oracle:CVE-2019-2467
Oracle:CVE-2019-2468
Oracle:CVE-2019-2469
Oracle:CVE-2019-2470
Oracle:CVE-2019-2471
Oracle:CVE-2019-2472
Oracle:CVE-2019-2473
Oracle:CVE-2019-2474
Oracle:CVE-2019-2475
Oracle:CVE-2019-2476
Oracle:CVE-2019-2477
Oracle:CVE-2019-2478
Oracle:CVE-2019-2479
Oracle:CVE-2019-2480
Oracle:CVE-2019-2481
Oracle:CVE-2019-2482
Oracle:CVE-2019-2485
Oracle:CVE-2019-2486
Oracle:CVE-2019-2487
Oracle:CVE-2019-2488
Oracle:CVE-2019-2489
Oracle:CVE-2019-2490
Oracle:CVE-2019-2491
Oracle:CVE-2019-2492
Oracle:CVE-2019-2493
Oracle:CVE-2019-2494
Oracle:CVE-2019-2495
Oracle:CVE-2019-2496
Oracle:CVE-2019-2497
Oracle:CVE-2019-2498
Oracle:CVE-2019-2499
Oracle:CVE-2019-2500
Oracle:CVE-2019-2501
Oracle:CVE-2019-2502
Oracle:CVE-2019-2503
Oracle:CVE-2019-2504
Oracle:CVE-2019-2505
Oracle:CVE-2019-2506
Oracle:CVE-2019-2507
Oracle:CVE-2019-2508
Oracle:CVE-2019-2509
Oracle:CVE-2019-2510
Oracle:CVE-2019-2511
Oracle:CVE-2019-2512
Oracle:CVE-2019-2513
Oracle:CVE-2019-2519
Oracle:CVE-2019-2520
Oracle:CVE-2019-2521
Oracle:CVE-2019-2522
Oracle:CVE-2019-2523
Oracle:CVE-2019-2524
Oracle:CVE-2019-2525
Oracle:CVE-2019-2526
Oracle:CVE-2019-2527
Oracle:CVE-2019-2528
Oracle:CVE-2019-2529
Oracle:CVE-2019-2530
Oracle:CVE-2019-2531
Oracle:CVE-2019-2532
Oracle:CVE-2019-2533
Oracle:CVE-2019-2534
Oracle:CVE-2019-2535
Oracle:CVE-2019-2536
Oracle:CVE-2019-2537
Oracle:CVE-2019-2538
Oracle:CVE-2019-2539
Oracle:CVE-2019-2540
Oracle:CVE-2019-2541
Oracle:CVE-2019-2543
Oracle:CVE-2019-2544
Oracle:CVE-2019-2545
Oracle:CVE-2019-2546
Oracle:CVE-2019-2547
Oracle:CVE-2019-2548
Oracle:CVE-2019-2549
Oracle:CVE-2019-2550
Oracle:CVE-2019-2552
Oracle:CVE-2019-2553
Oracle:CVE-2019-2554
Oracle:CVE-2019-2555
Oracle:CVE-2019-2556
Oracle:CVE-2019-2574
Oracle:CVE-2019-2656
Oracle:CVE-2019-2657
Oracle:CVE-2019-2678
Oracle:CVE-2019-2679
Oracle:CVE-2019-2680
Oracle:CVE-2019-2690
Oracle:CVE-2019-2696
Oracle:CVE-2019-2703
Oracle:CVE-2019-2721
Oracle:CVE-2019-2722
Oracle:CVE-2019-2723
Oracle:CVE-2019-2848
Oracle:CVE-2019-2850
Oracle:CVE-2019-2859
Oracle:CVE-2019-2863
Oracle:CVE-2019-2864
Oracle:CVE-2019-2865
Oracle:CVE-2019-2866
Oracle:CVE-2019-2867
Oracle:CVE-2019-2873
Oracle:CVE-2019-2874
Oracle:CVE-2019-2875
Oracle:CVE-2019-2876
Oracle:CVE-2019-2877
RH:CVE-2009-3559
RH:CVE-2012-6153
RH:CVE-2013-7285
RH:CVE-2014-3540
RH:CVE-2014-4330
RH:CVE-2014-4651
RH:CVE-2014-9746
RH:CVE-2014-9747
RH:CVE-2015-0405
RH:CVE-2015-0423
RH:CVE-2015-0433
RH:CVE-2015-0438
RH:CVE-2015-0439
RH:CVE-2015-0441
RH:CVE-2015-0498
RH:CVE-2015-0499
RH:CVE-2015-0500
RH:CVE-2015-0501
RH:CVE-2015-0503
RH:CVE-2015-0505
RH:CVE-2015-0506
RH:CVE-2015-0507
RH:CVE-2015-0508
RH:CVE-2015-0511
RH:CVE-2015-2325
RH:CVE-2015-2326
RH:CVE-2015-2566
RH:CVE-2015-2567
RH:CVE-2015-2568
RH:CVE-2015-2571
RH:CVE-2015-2573
RH:CVE-2015-2575
RH:CVE-2015-2576
RH:CVE-2015-5125
RH:CVE-2015-5127
RH:CVE-2015-5129
RH:CVE-2015-5130
RH:CVE-2015-5131
RH:CVE-2015-5132
RH:CVE-2015-5134
RH:CVE-2015-5539
RH:CVE-2015-5540
RH:CVE-2015-5541
RH:CVE-2015-5544
RH:CVE-2015-5545
RH:CVE-2015-5551
RH:CVE-2015-5552
RH:CVE-2015-5553
RH:CVE-2015-5554
RH:CVE-2015-5555
RH:CVE-2015-5556
RH:CVE-2015-5557
RH:CVE-2015-5558
RH:CVE-2015-5559
RH:CVE-2015-5560
RH:CVE-2015-5561
RH:CVE-2015-5564
RH:CVE-2015-5565
RH:CVE-2015-5566
RH:CVE-2015-7559
RH:CVE-2015-8315
RH:CVE-2015-8381
RH:CVE-2015-8382
RH:CVE-2015-8383
RH:CVE-2015-8384
RH:CVE-2015-8385
RH:CVE-2015-8386
RH:CVE-2015-8387
RH:CVE-2015-8388
RH:CVE-2015-8389
RH:CVE-2015-8390
RH:CVE-2015-8391
RH:CVE-2015-8392
RH:CVE-2015-8393
RH:CVE-2015-8394
RH:CVE-2015-8395
RH:CVE-2015-8855
RH:CVE-2015-8860
RH:CVE-2016-0755
RH:CVE-2016-1672
RH:CVE-2016-1673
RH:CVE-2016-1674
RH:CVE-2016-1675
RH:CVE-2016-1676
RH:CVE-2016-1677
RH:CVE-2016-1678
RH:CVE-2016-1679
RH:CVE-2016-1680
RH:CVE-2016-1681
RH:CVE-2016-1682
RH:CVE-2016-1683
RH:CVE-2016-1684
RH:CVE-2016-1685
RH:CVE-2016-1686
RH:CVE-2016-1687
RH:CVE-2016-1688
RH:CVE-2016-1689
RH:CVE-2016-1690
RH:CVE-2016-1691
RH:CVE-2016-1692
RH:CVE-2016-1693
RH:CVE-2016-1694
RH:CVE-2016-1695
RH:CVE-2016-1950
RH:CVE-2016-1955
RH:CVE-2016-1956
RH:CVE-2016-1959
RH:CVE-2016-1967
RH:CVE-2016-1968
RH:CVE-2016-1969
RH:CVE-2016-1970
RH:CVE-2016-1971
RH:CVE-2016-1972
RH:CVE-2016-1973
RH:CVE-2016-1975
RH:CVE-2016-1976
RH:CVE-2016-3141
RH:CVE-2016-4055
RH:CVE-2016-4070
RH:CVE-2016-4979
RH:CVE-2016-5483
RH:CVE-2016-5617
RH:CVE-2016-6662
RH:CVE-2016-9586
RH:CVE-2016-9840
RH:CVE-2016-9841
RH:CVE-2016-9842
RH:CVE-2016-9843
RH:CVE-2017-3308
RH:CVE-2017-3309
RH:CVE-2017-3329
RH:CVE-2017-3453
RH:CVE-2017-3454
RH:CVE-2017-3456
RH:CVE-2017-3461
RH:CVE-2017-3462
RH:CVE-2017-3463
RH:CVE-2017-3464
RH:CVE-2017-3468
RH:CVE-2017-3600
RH:CVE-2017-9526
RH:CVE-2018-1000121
RH:CVE-2018-12539
RH:CVE-2018-1305
RH:CVE-2018-1517
RH:CVE-2018-1656
RH:CVE-2018-2767
RH:CVE-2018-2938
RH:CVE-2018-2940
RH:CVE-2018-2952
RH:CVE-2018-2973
RH:CVE-2019-2455
RH:CVE-2019-2481
RH:CVE-2019-2482
RH:CVE-2019-2503
RH:CVE-2019-2507
RH:CVE-2019-2510
RH:CVE-2019-2513
RH:CVE-2019-2528
RH:CVE-2019-2529
RH:CVE-2019-2530
RH:CVE-2019-2531
RH:CVE-2019-2532
RH:CVE-2019-2533
RH:CVE-2019-2534
RH:CVE-2019-2535
RH:CVE-2019-2536
RH:CVE-2019-2537
RH:CVE-2019-2539
RHBA-2015:1659
RHBA-2015:1762
RHBA-2015:1763
RHBA-2019:0327
RHSA-2014:0216
RHSA-2014:0294
RHSA-2014:0323
RHSA-2014:0371
RHSA-2014:0372
RHSA-2014:0374
RHSA-2014:0389
RHSA-2014:0452
RHSA-2014:0474
RHSA-2014:0497
RHSA-2014:0498
RHSA-2014:0500
RHSA-2014:0511
RHSA-2014:0702
RHSA-2014:1007
RHSA-2014:1059
RHSA-2014:1082
RHSA-2014:1098
RHSA-2014:1146
RHSA-2014:1162
RHSA-2014:1163
RHSA-2014:1166
RHSA-2014:1320
RHSA-2014:1321
RHSA-2014:1322
RHSA-2014:1323
RHSA-2014:1833
RHSA-2014:1834
RHSA-2014:1835
RHSA-2014:1836
RHSA-2014:1891
RHSA-2014:1892
RHSA-2014:1904
RHSA-2014:2019
RHSA-2014:2020
RHSA-2015:0125
RHSA-2015:0158
RHSA-2015:0234
RHSA-2015:0235
RHSA-2015:0675
RHSA-2015:0720
RHSA-2015:0765
RHSA-2015:0850
RHSA-2015:0851
RHSA-2015:1009
RHSA-2015:1176
RHSA-2015:1177
RHSA-2015:1603
RHSA-2015:1628
RHSA-2015:1629
RHSA-2015:1646
RHSA-2015:1647
RHSA-2015:1665
RHSA-2015:1888
RHSA-2016:0197
RHSA-2016:0370
RHSA-2016:0371
RHSA-2016:0373
RHSA-2016:0495
RHSA-2016:1025
RHSA-2016:1132
RHSA-2016:1190
RHSA-2016:1420
RHSA-2016:1773
RHSA-2016:1931
RHSA-2016:1940
RHSA-2016:2035
RHSA-2016:2036
RHSA-2016:2058
RHSA-2016:2059
RHSA-2016:2060
RHSA-2016:2061
RHSA-2016:2062
RHSA-2016:2077
RHSA-2016:2130
RHSA-2016:2131
RHSA-2016:2595
RHSA-2016:2749
RHSA-2016:2750
RHSA-2016:2927
RHSA-2016:2928
RHSA-2016:2957
RHSA-2017:0184
RHSA-2017:0193
RHSA-2017:0194
RHSA-2017:0272
RHSA-2017:0868
RHSA-2017:1208
RHSA-2017:1220
RHSA-2017:1221
RHSA-2017:1222
RHSA-2017:1658
RHSA-2017:1659
RHSA-2017:2192
RHSA-2017:2486
RHSA-2017:2596
RHSA-2017:2787
RHSA-2017:2886
RHSA-2017:2999
RHSA-2017:3046
RHSA-2017:3047
RHSA-2017:3189
RHSA-2017:3190
RHSA-2017:3453
RHSA-2018:0279
RHSA-2018:0342
RHSA-2018:0465
RHSA-2018:0466
RHSA-2018:0478
RHSA-2018:0479
RHSA-2018:0480
RHSA-2018:0481
RHSA-2018:0501
RHSA-2018:0574
RHSA-2018:0576
RHSA-2018:0577
RHSA-2018:1320
RHSA-2018:1447
RHSA-2018:1448
RHSA-2018:1449
RHSA-2018:1450
RHSA-2018:1451
RHSA-2018:2241
RHSA-2018:2242
RHSA-2018:2253
RHSA-2018:2254
RHSA-2018:2255
RHSA-2018:2256
RHSA-2018:2283
RHSA-2018:2286
RHSA-2018:2439
RHSA-2018:2568
RHSA-2018:2569
RHSA-2018:2575
RHSA-2018:2576
RHSA-2018:2669
RHSA-2018:2712
RHSA-2018:2713
RHSA-2018:2729
RHSA-2018:2927
RHSA-2018:2939
RHSA-2018:3007
RHSA-2018:3008
RHSA-2018:3157
RHSA-2018:3558
RHSA-2019:1258
RHSA-2019:1543
RHSA-2019:1822
RHSA-2019:1823
RHSA-2019:2205
RHSA-2019:2327
RHSA-2019:2413
RHSA-2019:2484
RHSA-2019:2511
RHSA-2019:2995
RHSA-2019:3708
RHSA-2019:3892
RHSA-2019:4352
RHSA-2020:0445
RHSA-2020:0544
RHSA-2020:0594
RHSA-2020:0727
RHSA-2020:0983
RHSA-2020:5663
SECTRACK ID: 1041302
SECTRACK:1032121
SECTRACK:1034077
SECTRACK:1034882
SECTRACK:1035215
SECTRACK:1035255
SECTRACK:1035981
SECTRACK:1036054
SECTRACK:1036056
SECTRACK:1036225
SECTRACK:1036377
SECTRACK:1036378
SECTRACK:1036393
SECTRACK:1036397
SECTRACK:1036769
SECTRACK:1037036
SECTRACK:1037046
SECTRACK:1037053
SECTRACK:1037515
SECTRACK:1037640
SECTRACK:1038287
SECTRACK:1039427
SECTRACK:1039596
SECTRACK:1039600
SECTRACK:1040428
SECTRACK:1040529
SECTRACK:1041294
SECTRACK:1041296
SECTRACK:1041302
SECTRACK:1041765
SECTRACK:1041887
SECTRACK:1041888
SECTRACK:1041896
SECUNIA:57477
SECUNIA:58710
SECUNIA:58851
SECUNIA:58947
SECUNIA:59014
SECUNIA:59118
SECUNIA:59228
SECUNIA:59245
SECUNIA:59246
SECUNIA:59430
SECUNIA:59464
SECUNIA:59479
SECUNIA:59480
SECUNIA:59704
SECUNIA:59718
SECUNIA:60177
SECUNIA:60703
SECUNIA:61441
SECUNIA:61961
SLACKWARE:SSA:2016-039-01
SMASH Issue 106174
SMASH Issue 106399
SMASH Issue 115944
SMASH Issue 115951
SMASH Issue 116060
SMASH Issue 121091
SMASH Issue 122403
SMASH Issue 157079
SMASH Issue 157080
SMASH Issue 159315
SMASH Issue 159316
SMASH Issue 159358
SMASH Issue 159359
SMASH Issue 159360
SMASH Issue 159361
SMASH Issue 159362
SMASH Issue 159363
SMASH Issue 159364
SMASH Issue 159365
SMASH Issue 159366
SMASH Issue 159367
SMASH Issue 159368
SMASH Issue 159369
SMASH Issue 159370
SMASH Issue 159501
SMASH Issue 161165
SMASH Issue 161277
SMASH Issue 162768
SMASH Issue 162800
SMASH Issue 162870
SMASH Issue 163267
SMASH Issue 168106
SMASH Issue 168107
SMASH Issue 168108
SMASH Issue 168109
SMASH Issue 168110
SMASH Issue 168111
SMASH Issue 168112
SMASH Issue 168113
SMASH Issue 168114
SMASH Issue 168115
SMASH Issue 168116
SMASH Issue 168117
SMASH Issue 168118
SMASH Issue 168119
SMASH Issue 168120
SMASH Issue 168267
SMASH Issue 169465
SMASH Issue 169466
SMASH Issue 169472
SMASH Issue 169820
SMASH Issue 169849
SMASH Issue 170597
SMASH Issue 170598
SMASH Issue 172509
SMASH Issue 173284
SMASH Issue 173285
SMASH Issue 173743
SMASH Issue 173744
SMASH Issue 173746
SMASH Issue 173747
SMASH Issue 173748
SMASH Issue 173749
SMASH Issue 173750
SMASH Issue 177157
SMASH Issue 177158
SMASH Issue 177160
SMASH Issue 177510
SMASH Issue 177997
SMASH Issue 180273
SMASH Issue 183785
SMASH Issue 183803
SMASH Issue 183804
SMASH Issue 186176
SMASH Issue 186594
SMASH Issue 195320
SMASH Issue 200729
SMASH Issue 2012
SMASH Issue 201476
SMASH Issue 201809
SMASH Issue 203304
SMASH Issue 205710
SMASH Issue 210804
SMASH Issue 210805
SMASH Issue 210807
SMASH Issue 210809
SMASH Issue 210923
SMASH Issue 210972
SMASH Issue 211000
SMASH Issue 211001
SMASH Issue 211002
SMASH Issue 211003
SMASH Issue 211004
SMASH Issue 211005
SMASH Issue 211006
SMASH Issue 211038
SMASH Issue 211039
SMASH Issue 211040
SMASH Issue 211041
SMASH Issue 211042
SMASH Issue 211051
SMASH Issue 212718
SMASH Issue 212765
SMASH Issue 212925
SMASH Issue 216708
SMASH Issue 216720
SMASH Issue 216727
SMASH Issue 216869
SMASH Issue 216870
SMASH Issue 216871
SMASH Issue 216872
SMASH Issue 216873
SMASH Issue 216874
SMASH Issue 216875
SMASH Issue 216876
SMASH Issue 216877
SMASH Issue 216878
SMASH Issue 216879
SMASH Issue 216880
SMASH Issue 216904
SMASH Issue 222884
SMASH Issue 222951
SMASH Issue 77111
SUSE:SUSE-SU-2015:0946
SUSE:SUSE-SU-2016:0727
SUSE:SUSE-SU-2016:0777
SUSE:SUSE-SU-2016:0820
SUSE:SUSE-SU-2016:0909
SUSE:SUSE-SU-2016:1277
SUSE:SUSE-SU-2016:2387
SUSE:SUSE-SU-2016:2394
SUSE:SUSE-SU-2016:2458
SUSE:SUSE-SU-2016:2468
SUSE:SUSE-SU-2016:2469
SUSE:SUSE-SU-2016:2470
SUSE:SUSE-SU-2017:2699
SUSE:SUSE-SU-2017:2700
SUSE:openSUSE-SU-2015:0858
SUSE:openSUSE-SU-2015:0967
SUSE:openSUSE-SU-2015:1911
SUSE:openSUSE-SU-2016:0360
SUSE:openSUSE-SU-2016:0373
SUSE:openSUSE-SU-2016:0376
SUSE:openSUSE-SU-2016:0731
SUSE:openSUSE-SU-2016:0733
SUSE:openSUSE-SU-2016:1274
SUSE:openSUSE-SU-2016:1373
SUSE:openSUSE-SU-2016:1430
SUSE:openSUSE-SU-2016:1433
SUSE:openSUSE-SU-2016:1496
SUSE:openSUSE-SU-2016:1557
SUSE:openSUSE-SU-2016:2391
SUSE:openSUSE-SU-2016:2407
SUSE:openSUSE-SU-2016:2496
SUSE:openSUSE-SU-2016:2537
SUSE:openSUSE-SU-2016:3202
SUSE:openSUSE-SU-2017:0077
SUSE:openSUSE-SU-2017:0080
SUSE:openSUSE-SU-2018:0458
SUSE:openSUSE-SU-2019:1814
UBUNTU:CVE-2009-3559
UBUNTU:CVE-2012-6153
UBUNTU:CVE-2013-7285
UBUNTU:CVE-2013-7451
UBUNTU:CVE-2013-7452
UBUNTU:CVE-2013-7453
UBUNTU:CVE-2013-7454
UBUNTU:CVE-2014-4330
UBUNTU:CVE-2014-9746
UBUNTU:CVE-2014-9747
UBUNTU:CVE-2014-9772
UBUNTU:CVE-2015-0405
UBUNTU:CVE-2015-0423
UBUNTU:CVE-2015-0433
UBUNTU:CVE-2015-0438
UBUNTU:CVE-2015-0439
UBUNTU:CVE-2015-0441
UBUNTU:CVE-2015-0498
UBUNTU:CVE-2015-0499
UBUNTU:CVE-2015-0500
UBUNTU:CVE-2015-0501
UBUNTU:CVE-2015-0503
UBUNTU:CVE-2015-0505
UBUNTU:CVE-2015-0506
UBUNTU:CVE-2015-0507
UBUNTU:CVE-2015-0508
UBUNTU:CVE-2015-0511
UBUNTU:CVE-2015-2325
UBUNTU:CVE-2015-2326
UBUNTU:CVE-2015-2566
UBUNTU:CVE-2015-2567
UBUNTU:CVE-2015-2568
UBUNTU:CVE-2015-2571
UBUNTU:CVE-2015-2573
UBUNTU:CVE-2015-2575
UBUNTU:CVE-2015-5125
UBUNTU:CVE-2015-5127
UBUNTU:CVE-2015-5128
UBUNTU:CVE-2015-5129
UBUNTU:CVE-2015-5130
UBUNTU:CVE-2015-5131
UBUNTU:CVE-2015-5132
UBUNTU:CVE-2015-5134
UBUNTU:CVE-2015-5539
UBUNTU:CVE-2015-5540
UBUNTU:CVE-2015-5541
UBUNTU:CVE-2015-5544
UBUNTU:CVE-2015-5545
UBUNTU:CVE-2015-5551
UBUNTU:CVE-2015-5552
UBUNTU:CVE-2015-5553
UBUNTU:CVE-2015-5554
UBUNTU:CVE-2015-5555
UBUNTU:CVE-2015-5556
UBUNTU:CVE-2015-5557
UBUNTU:CVE-2015-5558
UBUNTU:CVE-2015-5559
UBUNTU:CVE-2015-5560
UBUNTU:CVE-2015-5561
UBUNTU:CVE-2015-5564
UBUNTU:CVE-2015-5565
UBUNTU:CVE-2015-5566
UBUNTU:CVE-2015-7559
UBUNTU:CVE-2015-8381
UBUNTU:CVE-2015-8382
UBUNTU:CVE-2015-8383
UBUNTU:CVE-2015-8384
UBUNTU:CVE-2015-8385
UBUNTU:CVE-2015-8386
UBUNTU:CVE-2015-8387
UBUNTU:CVE-2015-8388
UBUNTU:CVE-2015-8389
UBUNTU:CVE-2015-8390
UBUNTU:CVE-2015-8391
UBUNTU:CVE-2015-8392
UBUNTU:CVE-2015-8393
UBUNTU:CVE-2015-8394
UBUNTU:CVE-2015-8395
UBUNTU:CVE-2015-8854
UBUNTU:CVE-2015-8855
UBUNTU:CVE-2015-8856
UBUNTU:CVE-2015-8857
UBUNTU:CVE-2015-8858
UBUNTU:CVE-2015-8859
UBUNTU:CVE-2015-8860
UBUNTU:CVE-2015-8861
UBUNTU:CVE-2015-8862
UBUNTU:CVE-2016-0755
UBUNTU:CVE-2016-1672
UBUNTU:CVE-2016-1673
UBUNTU:CVE-2016-1674
UBUNTU:CVE-2016-1675
UBUNTU:CVE-2016-1676
UBUNTU:CVE-2016-1677
UBUNTU:CVE-2016-1678
UBUNTU:CVE-2016-1679
UBUNTU:CVE-2016-1680
UBUNTU:CVE-2016-1681
UBUNTU:CVE-2016-1682
UBUNTU:CVE-2016-1683
UBUNTU:CVE-2016-1684
UBUNTU:CVE-2016-1685
UBUNTU:CVE-2016-1686
UBUNTU:CVE-2016-1687
UBUNTU:CVE-2016-1688
UBUNTU:CVE-2016-1689
UBUNTU:CVE-2016-1690
UBUNTU:CVE-2016-1691
UBUNTU:CVE-2016-1692
UBUNTU:CVE-2016-1693
UBUNTU:CVE-2016-1694
UBUNTU:CVE-2016-1695
UBUNTU:CVE-2016-1950
UBUNTU:CVE-2016-1955
UBUNTU:CVE-2016-1956
UBUNTU:CVE-2016-1959
UBUNTU:CVE-2016-1967
UBUNTU:CVE-2016-1968
UBUNTU:CVE-2016-1969
UBUNTU:CVE-2016-1970
UBUNTU:CVE-2016-1971
UBUNTU:CVE-2016-1972
UBUNTU:CVE-2016-1973
UBUNTU:CVE-2016-1975
UBUNTU:CVE-2016-1976
UBUNTU:CVE-2016-2178
UBUNTU:CVE-2016-3141
UBUNTU:CVE-2016-4055
UBUNTU:CVE-2016-4070
UBUNTU:CVE-2016-4619
UBUNTU:CVE-2016-4979
UBUNTU:CVE-2016-5483
UBUNTU:CVE-2016-5501
UBUNTU:CVE-2016-5538
UBUNTU:CVE-2016-5605
UBUNTU:CVE-2016-5608
UBUNTU:CVE-2016-5610
UBUNTU:CVE-2016-5611
UBUNTU:CVE-2016-5613
UBUNTU:CVE-2016-6662
UBUNTU:CVE-2016-9586
UBUNTU:CVE-2016-9840
UBUNTU:CVE-2016-9841
UBUNTU:CVE-2016-9842
UBUNTU:CVE-2016-9843
UBUNTU:CVE-2017-3308
UBUNTU:CVE-2017-3309
UBUNTU:CVE-2017-3329
UBUNTU:CVE-2017-3453
UBUNTU:CVE-2017-3454
UBUNTU:CVE-2017-3456
UBUNTU:CVE-2017-3461
UBUNTU:CVE-2017-3462
UBUNTU:CVE-2017-3463
UBUNTU:CVE-2017-3464
UBUNTU:CVE-2017-3468
UBUNTU:CVE-2017-3600
UBUNTU:CVE-2017-9526
UBUNTU:CVE-2018-1000121
UBUNTU:CVE-2018-1258
UBUNTU:CVE-2018-1305
UBUNTU:CVE-2018-1517
UBUNTU:CVE-2018-1656
UBUNTU:CVE-2018-2767
UBUNTU:CVE-2018-2909
UBUNTU:CVE-2018-2938
UBUNTU:CVE-2018-2940
UBUNTU:CVE-2018-2952
UBUNTU:CVE-2018-2973
UBUNTU:CVE-2018-3005
UBUNTU:CVE-2018-3055
UBUNTU:CVE-2018-3085
UBUNTU:CVE-2018-3086
UBUNTU:CVE-2018-3087
UBUNTU:CVE-2018-3088
UBUNTU:CVE-2018-3089
UBUNTU:CVE-2018-3090
UBUNTU:CVE-2018-3091
UBUNTU:CVE-2018-3287
UBUNTU:CVE-2018-3288
UBUNTU:CVE-2018-3289
UBUNTU:CVE-2018-3290
UBUNTU:CVE-2018-3291
UBUNTU:CVE-2018-3292
UBUNTU:CVE-2018-3293
UBUNTU:CVE-2018-3294
UBUNTU:CVE-2018-3295
UBUNTU:CVE-2018-3296
UBUNTU:CVE-2018-3297
UBUNTU:CVE-2018-3298
UBUNTU:CVE-2019-2455
UBUNTU:CVE-2019-2481
UBUNTU:CVE-2019-2482
UBUNTU:CVE-2019-2503
UBUNTU:CVE-2019-2507
UBUNTU:CVE-2019-2510
UBUNTU:CVE-2019-2513
UBUNTU:CVE-2019-2528
UBUNTU:CVE-2019-2529
UBUNTU:CVE-2019-2530
UBUNTU:CVE-2019-2531
UBUNTU:CVE-2019-2532
UBUNTU:CVE-2019-2533
UBUNTU:CVE-2019-2534
UBUNTU:CVE-2019-2535
UBUNTU:CVE-2019-2536
UBUNTU:CVE-2019-2537
UBUNTU:CVE-2019-2539
UBUNTU:USN-2575-1
UBUNTU:USN-2769-1
UBUNTU:USN-2882-1
UBUNTU:USN-2916-1
UBUNTU:USN-2917-1
UBUNTU:USN-2917-2
UBUNTU:USN-2917-3
UBUNTU:USN-2924-1
UBUNTU:USN-2934-1
UBUNTU:USN-2952-1
UBUNTU:USN-2952-2
UBUNTU:USN-2992-1
UBUNTU:USN-3598-1
UBUNTU:USN-3598-2
UBUNTU:USN-3665-1
UBUNTU:USN-3693-1
UBUNTU:USN-3725-1
UBUNTU:USN-3725-2
UBUNTU:USN-3727-1
UBUNTU:USN-3734-1
UBUNTU:USN-3735-1
UBUNTU:USN-3747-1
USN-3087-1
USN-3087-2
USN-3867-1
USN-4246-1
USN-4292-1
XF:perl-cve20144330-dos(96216)
ZDI-16-570
ZDI-18-1232ZDI-CAN-6635
ZDI-18-1233ZDI-CAN-6591
ZDI-18-1234ZDI-CAN-6592
ZDI-18-1292ZDI-CAN-7329
bdo#1033297
bdo#583651
bdo#759718
bdo#782645
bdo#797165
bdo#798619
bdo#798620
bdo#802671
bdo#802971
bdo#854713
bdo#860544
bdo#864859
bdo#867247
bdo#873383
bdo#885345
bdo#898444
bdo#898445
bdo#912848
bnc#1003579
bnc#1003580
bnc#1005621
bnc#1015332
bnc#1016653
bnc#1021757
bnc#1022633
bnc#1042326
bnc#1043777
bnc#1084524
bnc#1085215
bnc#1088681
bnc#1101644
bnc#1101645
bnc#1101656
bnc#1101667
bnc#1101675
bnc#1104668
bnc#1112097
bnc#1120866
bnc#1122198
bnc#885963
bnc#896715
bnc#927623
bnc#941239
bnc#947966
bnc#957598
bnc#958373
bnc#962983
bnc#969821
bnc#969894
bnc#970257
bnc#970377
bnc#970378
bnc#970379
bnc#970380
bnc#970381
bnc#970431
bnc#970433
bnc#976547
bnc#976997
bnc#977050
bnc#981886
bnc#983249
bnc#983519
bnc#987365
bnc#988162
bnc#998309
http://www.debian.org/security/2016/dsa-3560
https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=95433e8e339dbb6b5d5541473c1661db6ba2c451
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BO2RMVVZVV6NFTU46B5RYRK7ZCXYARZS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M6BJG6RGDH7ZWVVAUFBFI5L32RSMQN2S/
https://security.netapp.com/advisory/ntap-20230216-0002/
https://support.f5.com/csp/article/K05052081?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K46337613?utm_source=f5support&%3Butm_medium=RSS
https://support.f5.com/csp/article/K46337613?utm_source=f5support&utm_medium=RSS
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
openssl.git:commit:399944622df7bd81af62e67ea967c470534090e2
rh#1051277
rh#1091938
rh#1101303
rh#1104858
rh#1107544
rh#1112877
rh#1116665
rh#1129074
rh#1129916
rh#1131350
rh#1139700
rh#1167537
rh#1183461
rh#1187225
rh#1202366
rh#1202380
rh#1202384
rh#1202395
rh#1202418
rh#1203195
rh#1207198
rh#1207202
rh#1209496
rh#1209501
rh#1212753
rh#1212755
rh#1212757
rh#1212758
rh#1212759
rh#1212760
rh#1212763
rh#1212764
rh#1212765
rh#1212767
rh#1212768
rh#1212769
rh#1212770
rh#1212771
rh#1212772
rh#1212774
rh#1212776
rh#1212777
rh#1212779
rh#1212780
rh#1212781
rh#1212782
rh#1212783
rh#1237223
rh#1252697
rh#1252707
rh#1256449
rh#1262373
rh#1277888
rh#1287614
rh#1287623
rh#1287629
rh#1287636
rh#1287646
rh#1287654
rh#1287659
rh#1287666
rh#1287671
rh#1287690
rh#1287695
rh#1287702
rh#1287711
rh#1291742
rh#1293972
rh#1302263
rh#1304645
rh#1310509
rh#1311503
rh#1315312
rh#1315328
rh#1315570
rh#1315571
rh#1315575
rh#1315776
rh#1315777
rh#1315780
rh#1315782
rh#1317560
rh#1323114
rh#1323749
rh#1329533
rh#1329552
rh#1340005
rh#1340006
rh#1340007
rh#1340008
rh#1340009
rh#1340010
rh#1340011
rh#1340012
rh#1340013
rh#1340014
rh#1340015
rh#1340016
rh#1340017
rh#1340018
rh#1340019
rh#1340021
rh#1340022
rh#1340023
rh#1340024
rh#1340026
rh#1340027
rh#1340028
rh#1340029
rh#1340030
rh#1341821
rh#1343400
rh#1343538
rh#1343540
rh#1352476
rh#1369383
rh#1375198
rh#1378936
rh#1384344
rh#1386562
rh#1386564
rh#1393454
rh#1396963
rh#1396971
rh#1397485
rh#1399546
rh#1402345
rh#1402346
rh#1402348
rh#1402351
rh#1405148
rh#1406712
rh#1414133
rh#1414429
rh#1433010
rh#1443358
rh#1443359
rh#1443360
rh#1443365
rh#1443366
rh#1443369
rh#1443376
rh#1443377
rh#1443378
rh#1443379
rh#1443385
rh#1443387
rh#1459887
rh#1485274
rh#1501812
rh#1501813
rh#1501814
rh#1501815
rh#1501816
rh#1501817
rh#1501818
rh#1501819
rh#1501820
rh#1516791
rh#1519780
rh#1548282
rh#1552631
rh#1553413
rh#1564965
rh#1578582
rh#1591854
rh#1600925
rh#1602141
rh#1602145
rh#1602146
rh#1607582
rh#1608073
rh#1614973
rh#1618767
rh#1618869
rh#1618871
rh#1666742
rh#1666743
rh#1666744
rh#1666749
rh#1666750
rh#1666751
rh#1666752
rh#1666753
rh#1666755
rh#1666756
rh#1666757
rh#1666758
rh#1666759
rh#1666760
rh#1666761
rh#1666762
rh#1666763
rh#1666764
rh#1714979
rh#1716448
rh#1716453
rh#1716454
rh#1722971
rh#1731271
rh#2061700
rh#2116175
rh#2119127
rh#2161287
rh#2270497
rh#539529
rh#873317
xf#141681
xf#141953
xf#141971
xf#141981
xf#141982
xf#144882
xf#146672
xf#146803
xf#146804
xf#146815
xf#146827
xf#146834
xf#146835
xf#151452
xf#151455
xf#151465
xf#151466
xf#151486
xf#151497
xf#151500
xf#151525
xf#151527
xf#151530
xf#155741
xf#155744
xf#155766
xf#155850
CVE-2016-4074jq:Releasedlow ()CONFIRM:github.com:CVE-2015-8863
CONFIRM:github.com:CVE-2016-10166
CVE-2015-8863
CVE-2016-4074
D:CVE-2015-8863
D:CVE-2016-4074
GENTOO:GLSA-201612-20
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:github.com:CVE-2016-4074
MLIST:[oss-security] 20160423 CVE Request: jq: heap buffer overflow in tokenadd() function
MLIST:[oss-security] 20160423 Re: CVE Request: jq: heap buffer overflow in tokenadd() function
MLIST:[oss-security] 20160424 CVE Request: jq: stack exhaustion using jv_dump_term() function
MLIST:[oss-security] 20160424 Re: CVE Request: jq: stack exhaustion using jv_dump_term() function
OSS:2016/Q2/135
OSS:2016/Q2/141
RH:CVE-2015-8863
RH:CVE-2016-4074
RHSA-2016:1098
RHSA-2016:1099
RHSA-2016:1106
SMASH Issue 168253
SMASH Issue 168268
SMASH Issue 177202
SUSE:openSUSE-SU-2016:1212
SUSE:openSUSE-SU-2016:1214
UBUNTU:CVE-2015-8863
UBUNTU:CVE-2016-4074
bdo#802231
bnc#1014176
bnc#976992
rh#1328747
rh#1329982
CVE-2016-4470kernel-source-rt:Already fixedmoderate ()CONFIRM:git.kernel.org:CVE-2016-4470
CONFIRM:github.com:CVE-2016-4470
CONFIRM:www.oracle.com:CVE-2016-2105
CONFIRM:www.oracle.com:CVE-2016-5386
CONFIRM:www.oracle.com:CVE-2016-6304
CONFIRM:www.oracle.com:CVE-2016-7039
CONFIRM:www.oracle.com:CVE-2016-7154
CONFIRM:www.oracle.com:CVE-2016-7166
CVE-2016-4470
D:CVE-2016-4470
DSA-3607
MLIST:[oss-security] 20160615 CVE-2016-4470: Linux kernel Uninitialized variable in request_key handling user controlled kfree().
OSS:2016/Q2/553
Oracle:CVE-2016-5244
RH:CVE-2016-4470
RHSA-2016:1532
RHSA-2016:1539
RHSA-2016:1541
RHSA-2016:1657
RHSA-2016:2006
RHSA-2016:2074
RHSA-2016:2076
RHSA-2016:2128
RHSA-2016:2133
SECTRACK:1036763
SMASH Issue 170099
SMASH Issue 170104
SUSE:SUSE-SU-2016:1937
SUSE:SUSE-SU-2016:1961
SUSE:SUSE-SU-2016:1985
SUSE:SUSE-SU-2016:1994
SUSE:SUSE-SU-2016:1995
SUSE:SUSE-SU-2016:1998
SUSE:SUSE-SU-2016:1999
SUSE:SUSE-SU-2016:2000
SUSE:SUSE-SU-2016:2001
SUSE:SUSE-SU-2016:2002
SUSE:SUSE-SU-2016:2003
SUSE:SUSE-SU-2016:2005
SUSE:SUSE-SU-2016:2006
SUSE:SUSE-SU-2016:2007
SUSE:SUSE-SU-2016:2009
SUSE:SUSE-SU-2016:2010
SUSE:SUSE-SU-2016:2011
SUSE:SUSE-SU-2016:2014
SUSE:SUSE-SU-2016:2018
SUSE:SUSE-SU-2016:2105
SUSE:openSUSE-SU-2016:2184
UBUNTU:CVE-2016-4470
UBUNTU:USN-3049-1
UBUNTU:USN-3050-1
UBUNTU:USN-3051-1
UBUNTU:USN-3052-1
UBUNTU:USN-3053-1
UBUNTU:USN-3054-1
UBUNTU:USN-3055-1
UBUNTU:USN-3056-1
UBUNTU:USN-3057-1
bnc#984755
bnc#984764
rh#1324749
rh#1341716
CVE-2016-4482kernel-source-rt:Not affectedlow ()BID:90029
CONFIRM:git.kernel.org:CVE-2016-4482
CONFIRM:github.com:CVE-2016-4482
CVE-2016-4482
DSA-3607
FEDORA:FEDORA-2016-4ce97823af
MLIST:[oss-security] 20160503 CVE Request: information leak in devio of Linux kernel
OSS:2016/Q2/213
Oracle:CVE-2016-5244
RH:CVE-2016-4482
SMASH Issue 168587
SMASH Issue 168609
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1690
SUSE:SUSE-SU-2016:1696
SUSE:SUSE-SU-2016:1937
SUSE:SUSE-SU-2016:1985
SUSE:SUSE-SU-2016:2105
SUSE:openSUSE-SU-2016:1641
SUSE:openSUSE-SU-2016:2184
UBUNTU:CVE-2016-4482
UBUNTU:USN-3016-1
UBUNTU:USN-3016-2
UBUNTU:USN-3016-3
UBUNTU:USN-3016-4
UBUNTU:USN-3017-1
UBUNTU:USN-3017-2
UBUNTU:USN-3017-3
UBUNTU:USN-3018-1
UBUNTU:USN-3018-2
UBUNTU:USN-3019-1
UBUNTU:USN-3020-1
UBUNTU:USN-3021-1
UBUNTU:USN-3021-2
bnc#978401
bnc#978445
rh#1332931
CVE-2016-4485kernel-source-rt:Already fixedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)BID:90015
CONFIRM:git.kernel.org:CVE-2016-4485
CONFIRM:github.com:CVE-2016-4485
CONFIRM:www.kernel.org:CVE-2016-6198
CVE-2016-4485
DSA-3607
MLIST:[oss-security] 20160503 CVE Request: kernel information leak vulnerability in llc module
OSS:2016/Q2/236
Oracle:CVE-2016-5244
RH:CVE-2016-4485
SMASH Issue 168619
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1985
SUSE:openSUSE-SU-2016:1641
UBUNTU:CVE-2016-4485
UBUNTU:USN-2989-1
UBUNTU:USN-2996-1
UBUNTU:USN-2997-1
UBUNTU:USN-2998-1
UBUNTU:USN-3000-1
UBUNTU:USN-3001-1
UBUNTU:USN-3002-1
UBUNTU:USN-3003-1
UBUNTU:USN-3004-1
UBUNTU:USN-3005-1
UBUNTU:USN-3006-1
UBUNTU:USN-3007-1
bnc#978821
rh#1324749
rh#1333309
CVE-2016-4486kernel-source-rt:Already fixedlow ()BID:90051
CONFIRM:git.kernel.org:CVE-2016-4486
CONFIRM:github.com:CVE-2016-4486
CONFIRM:www.kernel.org:CVE-2016-6198
CVE-2016-4486
D:CVE-2022-2590
DSA-3607
EXPLOIT-DB:46006
MLIST:[oss-security] 20160504 CVE Request: kernel information leak vulnerability in rtnetlink
OSS:2016/Q2/237
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-4486
SMASH Issue 168618
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1690
SUSE:SUSE-SU-2016:1696
SUSE:SUSE-SU-2016:1937
SUSE:SUSE-SU-2016:1985
SUSE:SUSE-SU-2016:2074
SUSE:SUSE-SU-2016:2105
SUSE:openSUSE-SU-2016:1641
SUSE:openSUSE-SU-2016:2184
UBUNTU:CVE-2016-4486
UBUNTU:USN-2989-1
UBUNTU:USN-2996-1
UBUNTU:USN-2997-1
UBUNTU:USN-2998-1
UBUNTU:USN-3000-1
UBUNTU:USN-3001-1
UBUNTU:USN-3002-1
UBUNTU:USN-3003-1
UBUNTU:USN-3004-1
UBUNTU:USN-3005-1
UBUNTU:USN-3006-1
UBUNTU:USN-3007-1
bnc#978822
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1324749
rh#1333316
rh#1384344
rh#2116175
CVE-2016-4487gcc:Not affectedlow ()BID:90025
CONFIRM:gcc.gnu.org:CVE-2016-4488
CVE-2016-4487
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[gcc-patches] 20160630 Fix fir PR71696 in Libiberty Demangler (6)
OSS:2016/Q2/240
OSS:2016/Q2/630
RH:CVE-2016-4487
SMASH Issue 168626
UBUNTU:CVE-2016-4487
bnc#978813
rh#1333330
CVE-2016-4488gcc:Not affectedlow ()CVE-2016-4488
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[gcc-patches] 20160630 Fix fir PR71696 in Libiberty Demangler (6)
OSS:2016/Q2/240
OSS:2016/Q2/630
RH:CVE-2016-4488
SMASH Issue 168624
UBUNTU:CVE-2016-4488
bnc#978814
rh#1333332
CVE-2016-4489gcc:Not affectedlow ()BID:90017
CONFIRM:gcc.gnu.org:CVE-2016-4489
CVE-2016-4489
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[gcc-patches] 20160630 Fix fir PR71696 in Libiberty Demangler (6)
OSS:2016/Q2/240
OSS:2016/Q2/630
RH:CVE-2016-4489
SMASH Issue 168625
UBUNTU:CVE-2016-4489
bnc#978815
rh#1333336
CVE-2016-4490gcc:Not affectedlow ()BID:90019
CONFIRM:gcc.gnu.org:CVE-2016-4490
CVE-2016-4490
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[gcc-patches] 20160630 Fix fir PR71696 in Libiberty Demangler (6)
OSS:2016/Q2/240
OSS:2016/Q2/630
RH:CVE-2016-4490
SMASH Issue 168629
UBUNTU:CVE-2016-4490
bnc#978816
rh#1333366
CVE-2016-4558kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2016-4558
CONFIRM:github.com:CVE-2016-4558
CONFIRM:www.kernel.org:CVE-2016-6198
CVE-2016-4558
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20160506 CVE Requests: Linux: BPF flaws (one use-after-free / local root privilege escalation)
OSS:2016/Q2/266
RH:CVE-2016-4558
SMASH Issue 168689
UBUNTU:CVE-2016-4558
UBUNTU:USN-3005-1
UBUNTU:USN-3006-1
UBUNTU:USN-3007-1
bnc#979019
rh#1334303
CVE-2016-4565kernel-source-rt:Not affectedmoderate ()BID:90301
CONFIRM:git.kernel.org:CVE-2016-4565
CONFIRM:github.com:CVE-2016-4565
CONFIRM:www.kernel.org:CVE-2016-7914
CONFIRM:www.oracle.com:CVE-2015-8391
CONFIRM:www.oracle.com:CVE-2016-2105
CONFIRM:www.oracle.com:CVE-2016-5386
CVE-2016-4565
DSA-3607
MLIST:[oss-security] 20160507 CVE Request: Linux: IB/security: Restrict use of the write() interface'
OSS:2016/Q2/274
OSS:2016/Q2/353
Oracle:CVE-2016-5244
RH:CVE-2016-4565
RHSA-2016:1277
RHSA-2016:1301
RHSA-2016:1341
RHSA-2016:1406
RHSA-2016:1489
RHSA-2016:1581
RHSA-2016:1617
RHSA-2016:1640
RHSA-2016:1657
RHSA-2016:1814
SMASH Issue 168718
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1690
SUSE:SUSE-SU-2016:1937
SUSE:SUSE-SU-2016:1961
SUSE:SUSE-SU-2016:1985
SUSE:SUSE-SU-2016:1994
SUSE:SUSE-SU-2016:1995
SUSE:SUSE-SU-2016:2000
SUSE:SUSE-SU-2016:2001
SUSE:SUSE-SU-2016:2002
SUSE:SUSE-SU-2016:2003
SUSE:SUSE-SU-2016:2005
SUSE:SUSE-SU-2016:2006
SUSE:SUSE-SU-2016:2007
SUSE:SUSE-SU-2016:2009
SUSE:SUSE-SU-2016:2010
SUSE:SUSE-SU-2016:2011
SUSE:SUSE-SU-2016:2014
SUSE:SUSE-SU-2016:2105
SUSE:openSUSE-SU-2016:1641
SUSE:openSUSE-SU-2016:2184
UBUNTU:CVE-2016-4565
UBUNTU:USN-3001-1
UBUNTU:USN-3002-1
UBUNTU:USN-3003-1
UBUNTU:USN-3004-1
UBUNTU:USN-3005-1
UBUNTU:USN-3006-1
UBUNTU:USN-3007-1
UBUNTU:USN-3018-1
UBUNTU:USN-3018-2
UBUNTU:USN-3019-1
UBUNTU:USN-3021-1
UBUNTU:USN-3021-2
bnc#979548
rh#1310570
rh#1324749
rh#1334217
CVE-2016-4568kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2016-4568
CONFIRM:github.com:CVE-2016-4568
CONFIRM:www.kernel.org:CVE-2016-7914
CVE-2016-4568
MLIST:[oss-security] 20160507 CVE Request: Linux: [media] videobuf2-v4l2: Verify planes array in buffer dequeueing
OSS:2016/Q2/273
RH:CVE-2016-4568
SMASH Issue 168719
UBUNTU:CVE-2016-4568
bnc#979022
rh#1334316
CVE-2016-4569kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)BID:90347
CONFIRM:git.kernel.org:CVE-2016-4569
CONFIRM:github.com:CVE-2016-4569
CVE-2016-4569
DSA-3607
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20160509 Re: CVE Request: kernel information leak vulnerability in Linux sound module
OSS:2016/Q2/296
OSS:2016/Q2/315
OSS:2016/Q2/316
Oracle:CVE-2016-5244
RH:CVE-2016-4569
RHSA-2016:2574
RHSA-2016:2584
SMASH Issue 168777
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1690
SUSE:SUSE-SU-2016:1696
SUSE:SUSE-SU-2016:1937
SUSE:SUSE-SU-2016:1985
SUSE:SUSE-SU-2016:2105
SUSE:openSUSE-SU-2016:1641
SUSE:openSUSE-SU-2016:2184
UBUNTU:CVE-2016-4569
UBUNTU:USN-3016-1
UBUNTU:USN-3016-2
UBUNTU:USN-3016-3
UBUNTU:USN-3016-4
UBUNTU:USN-3017-1
UBUNTU:USN-3017-2
UBUNTU:USN-3017-3
UBUNTU:USN-3018-1
UBUNTU:USN-3018-2
UBUNTU:USN-3019-1
UBUNTU:USN-3020-1
UBUNTU:USN-3021-1
UBUNTU:USN-3021-2
bnc#979213
rh#1334643
CVE-2016-4578kernel-source-rt:Already fixedlow ()BID:90535
CONFIRM:git.kernel.org:CVE-2016-4578
CONFIRM:github.com:CVE-2016-4578
CVE-2016-4578
D:CVE-2016-4578
DSA-3607
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20160511 Re: CVE Request: alsa: kernel information leak vulnerability in Linux sound/core/timer
MLIST:[oss-security] 20160511 Re: CVE Request: alsa: kernel information leak vulnerability in Linux sound/core/timer
OSS:2016/Q2/316
Oracle:CVE-2016-5244
RH:CVE-2016-4578
RHSA-2016:2574
RHSA-2016:2584
SMASH Issue 169005
UBUNTU:CVE-2016-4578
bnc#979879
rh#1335215
CVE-2016-4581kernel-source-rt:Unsupportedmoderate ()BID:90607
CONFIRM:git.kernel.org:CVE-2016-4581
CONFIRM:github.com:CVE-2016-4581
CONFIRM:www.kernel.org:CVE-2016-7916
CONFIRM:www.oracle.com:CVE-2016-5386
CONFIRM:www.oracle.com:CVE-2016-6304
CONFIRM:www.oracle.com:CVE-2016-7039
CONFIRM:www.oracle.com:CVE-2016-7166
CVE-2016-4581
D:CVE-2016-4581
DSA-3607
MISC:git.kernel.org:MLIST:[oss-security] 20160511 CVE request: Mishandling the first propagated copy being a slave
MLIST:[oss-security] 20160511 CVE request: Mishandling the first propagated copy being a slave
OSS:2016/Q2/318
Oracle:CVE-2016-5244
RH:CVE-2016-4581
RHSA-2016:2574
RHSA-2016:2584
SMASH Issue 169007
SUSE:openSUSE-SU-2016:1641
UBUNTU:CVE-2016-4581
UBUNTU:USN-2989-1
UBUNTU:USN-2998-1
UBUNTU:USN-3000-1
UBUNTU:USN-3001-1
UBUNTU:USN-3002-1
UBUNTU:USN-3003-1
UBUNTU:USN-3004-1
UBUNTU:USN-3005-1
UBUNTU:USN-3006-1
UBUNTU:USN-3007-1
bnc#979913
rh#1324749
rh#1333712
CVE-2016-4794kernel-source-rt:Not affectedmoderate ()BID:90625
CONFIRM:source.android.com:CVE-2016-8411
CVE-2016-4794
D:CVE-2016-4794
MLIST:[linux-kernel] 20160417 Re: bpf: use-after-free in array_map_alloc
MLIST:[oss-security] 20160512 Linux Kernel bpf related UAF
OSS:2016/Q2/336
RH:CVE-2016-4794
RHSA-2016:2574
RHSA-2016:2584
SMASH Issue 169080
SMASH Issue 169416
UBUNTU:CVE-2016-4794
UBUNTU:USN-3053-1
UBUNTU:USN-3054-1
UBUNTU:USN-3055-1
UBUNTU:USN-3056-1
UBUNTU:USN-3057-1
bnc#980265
bnc#981517
rh#1335889
CVE-2016-4913kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)BID:90730
CONFIRM:git.kernel.org:CVE-2016-4913
CONFIRM:git.kernel.org:CVE-2017-8062
CONFIRM:git.kernel.org:CVE-2017-8063
CONFIRM:github.com:CVE-2016-4913
CONFIRM:github.com:CVE-2017-8064
CONFIRM:github.com:CVE-2017-8065
CONFIRM:github.com:CVE-2017-8066
CONFIRM:www.kernel.org:CVE-2016-6198
CONFIRM:www.oracle.com:CVE-2016-5386
CONFIRM:www.oracle.com:CVE-2016-6304
CONFIRM:www.oracle.com:CVE-2016-7039
CONFIRM:www.oracle.com:CVE-2016-7166
CVE-2016-4913
D:CVE-2016-4913
DSA-3607
L3:45677
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20160518 CVE Request: Linux: information leak in Rock Ridge Extensions to iso9660 -- fs/isofs/rock.c
MLIST:[oss-security] 20160518 Re: CVE Request: Linux: information leak in Rock Ridge Extensions to iso9660 -- fs/isofs/rock.c
OSS:2016/Q2/365
Oracle:CVE-2016-5244
RH:CVE-2016-4913
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
SMASH Issue 169190
SMASH Issue 169841
SUSE:SUSE-SU-2016:1672
SUSE:SUSE-SU-2016:1985
UBUNTU:CVE-2016-4913
UBUNTU:USN-3016-1
UBUNTU:USN-3016-2
UBUNTU:USN-3016-3
UBUNTU:USN-3016-4
UBUNTU:USN-3017-1
UBUNTU:USN-3017-2
UBUNTU:USN-3017-3
UBUNTU:USN-3018-1
UBUNTU:USN-3018-2
UBUNTU:USN-3019-1
UBUNTU:USN-3020-1
UBUNTU:USN-3021-1
UBUNTU:USN-3021-2
bnc#980725
bnc#983469
rh#1324749
rh#1337528
CVE-2016-4951kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2016-4951
CONFIRM:github.com:CVE-2016-4951
CONFIRM:www.oracle.com:CVE-2016-5386
CONFIRM:www.oracle.com:CVE-2016-6304
CONFIRM:www.oracle.com:CVE-2016-7039
CONFIRM:www.oracle.com:CVE-2016-7166
CVE-2016-4951
D:CVE-2016-4951
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[netdev] 20160514 BUG: net/tipc: NULL-ptr dereference in tipc_nl_publ_dump
MLIST:[oss-security] 20160521 Re: CVE request: -- Linux kernel: Null pointer dereference in tipc_nl_publ_dump
OSS:2016/Q2/386
Oracle:CVE-2016-5244
RH:CVE-2016-4951
SMASH Issue 169318
SUSE:openSUSE-SU-2016:1641
UBUNTU:CVE-2016-4951
UBUNTU:USN-3016-1
UBUNTU:USN-3016-2
UBUNTU:USN-3016-3
UBUNTU:USN-3016-4
UBUNTU:USN-3017-1
UBUNTU:USN-3017-2
UBUNTU:USN-3017-3
UBUNTU:USN-3020-1
bnc#981058
rh#1324749
rh#1338625
CVE-2016-4997kernel-source-rt:Already fixedimportant ()BID:91451
CONFIRM:git.kernel.org:CVE-2016-4997
CONFIRM:github.com:CVE-2016-4997
CONFIRM:h20566.www2.hpe.com:CVE-2016-5195
CONFIRM:www.kernel.org:CVE-2016-9806
CONFIRM:www.oracle.com:CVE-2016-5386
CONFIRM:www.oracle.com:CVE-2016-6304
CONFIRM:www.oracle.com:CVE-2016-7039
CONFIRM:www.oracle.com:CVE-2016-7166
CVE-2016-4997
D:CVE-2016-4997
D:CVE-2022-2590
DSA-3607
EXPLOIT-DB:40435
EXPLOIT-DB:40489
MISC:bugs.chromium.org:MLIST:[oss-security] 20160624 Linux CVE-2016-4997 (local privilege escalation) and CVE-2016-4998 (out of bounds memory access)
MISC:git.kernel.org:MLIST:[oss-security] 20160624 Linux CVE-2016-4997 (local privilege escalation) and CVE-2016-4998 (out of bounds memory access)
MISC:github.com:CVE-2016-4997
MLIST:[oss-security] 20160624 Linux CVE-2016-4997 (local privilege escalation) and CVE-2016-4998 (out of bounds memory access)
MLIST:[oss-security] 20160929 CVE request - Linux kernel through 4.6.2 allows escalade privileges via IP6T_SO_SET_REPLACE compat setsockopt call
OSS:2016/Q2/599
OSS:2016/Q3/662
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2017-6074
RH:CVE-2016-4997
RHSA-2016:1847
RHSA-2016:1875
RHSA-2016:1883
SECTRACK:1036171
SMASH Issue 170491
SMASH Issue 170493
SUSE:SUSE-SU-2016:1709
SUSE:SUSE-SU-2016:1710
SUSE:SUSE-SU-2016:1937
SUSE:SUSE-SU-2016:1985
SUSE:SUSE-SU-2016:2018
SUSE:SUSE-SU-2016:2105
SUSE:SUSE-SU-2016:2174
SUSE:SUSE-SU-2016:2177
SUSE:SUSE-SU-2016:2178
SUSE:SUSE-SU-2016:2179
SUSE:SUSE-SU-2016:2180
SUSE:SUSE-SU-2016:2181
SUSE:openSUSE-SU-2016:2184
UBUNTU:CVE-2016-4997
UBUNTU:USN-3016-1
UBUNTU:USN-3016-2
UBUNTU:USN-3016-3
UBUNTU:USN-3016-4
UBUNTU:USN-3017-1
UBUNTU:USN-3017-2
UBUNTU:USN-3017-3
UBUNTU:USN-3018-1
UBUNTU:USN-3018-2
UBUNTU:USN-3019-1
UBUNTU:USN-3020-1
bnc#986362
bnc#986377
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1324749
rh#1349722
rh#1384344
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#2116175
CVE-2016-5195kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:93793
BUGTRAQ:20161020 [CVE-2016-5195] "Dirty COW" Linux privilege escalation vulnerability
BUGTRAQ:20170310 [security bulletin] HPESBGN03707 rev.1 - HPE ConvergedSystem 700 2.0 VMware Kit, Remote Increase of Privilege
BUGTRAQ:20170331 [security bulletin] HPESBGN03722 rev.1 - HPE Operations Agent, Local Escalation of Privilege
BUGTRAQ:20170615 [security bulletin] HPESBGN03761 rev.1 - HPE Virtualization Performance Viewer (VPV)/ Cloud Optimizer using Linux, Remote Escalation of Privilege
CERT-VN:VU#243144
CISCO:20161026 Vulnerability in Linux Kernel Affecting Cisco Products: October 2016
CISCO:20181107 Cisco TelePresence Video Communication Server Test Validation Script Issue
CONFIRM:access.redhat.com:CVE-2016-5195
CONFIRM:bto.bluecoat.com:CVE-2016-9555
CONFIRM:fortiguard.com:CVE-2016-5195
CONFIRM:git.kernel.org:CVE-2016-5195
CONFIRM:github.com:CVE-2016-5195
CONFIRM:h20566.www2.hpe.com:CVE-2016-5195
CONFIRM:h20566.www2.hpe.com:CVE-2016-7457
CONFIRM:help.ecostruxureit.com:CVE-2017-5754
CONFIRM:kb.juniper.net:CVE-2016-5195
CONFIRM:kc.mcafee.com:CVE-2016-5195
CONFIRM:people.canonical.com:CVE-2016-5195
CONFIRM:security.netapp.com:CVE-2016-5195
CONFIRM:security.paloaltonetworks.com:CVE-2016-5195
CONFIRM:securityadvisories.paloaltonetworks.com:CVE-2016-5195
CONFIRM:source.android.com:CVE-2016-6828
CONFIRM:source.android.com:CVE-2016-8411
CONFIRM:www.huawei.com:CVE-2016-5195
CONFIRM:www.kernel.org:CVE-2016-5195
CONFIRM:www.oracle.com:CVE-2017-6074
CONFIRM:www.oracle.com:CVE-2018-3081
CVE-2016-5195
D:CVE-2022-2590
DSA-3696
EXPLOIT-DB:40611
EXPLOIT-DB:40616
EXPLOIT-DB:40839
EXPLOIT-DB:40847
FEDORA:FEDORA-2016-c3558808cd
FEDORA:FEDORA-2016-c8a0c7eece
FEDORA:FEDORA-2016-db4b75b352
L3:47235
MISC:access.redhat.com:MLIST:[oss-security] 20161021 CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability
MISC:dirtycow.ninja:CVE-2016-5195
MISC:git.kernel.org:MLIST:[oss-security] 20161021 CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability
MISC:github.com:CVE-2016-5195
MISC:github.com:MLIST:[oss-security] 20161027 CVE-2016-5195 test case
MISC:lists.openwall.net:OSS:2022/08/08/2
MISC:packetstormsecurity.com:CVE-2016-5195
MISC:security-tracker.debian.org:MLIST:[oss-security] 20161021 CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability
MISC:www.arista.com:CVE-2016-5195
MLIST:[oss-security] 20161021 CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability
MLIST:[oss-security] 20161026 Re: CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability
MLIST:[oss-security] 20161027 CVE-2016-5195 test case
MLIST:[oss-security] 20161030 Re: CVE-2016-5195 test case
MLIST:[oss-security] 20161103 Re: CVE-2016-5195 "Dirty COW" Linux kernel privilege escalation vulnerability
OSS:2016/Q4/204
OSS:2016/Q4/263
OSS:2017/Q3/182
OSS:2022/03/07/1
OSS:2022/08/08/1
OSS:2022/08/08/2
OSS:2022/08/08/7
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q1/170
OSS:2022/Q3/99
OSS:2023/10/10/4
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
RH:CVE-2016-5195
RHSA-2016:2098
RHSA-2016:2105
RHSA-2016:2106
RHSA-2016:2107
RHSA-2016:2110
RHSA-2016:2118
RHSA-2016:2120
RHSA-2016:2124
RHSA-2016:2126
RHSA-2016:2127
RHSA-2016:2128
RHSA-2016:2132
RHSA-2016:2133
RHSA-2017:0372
RHSA-2018:0180
SECTRACK:1037078
SMASH Issue 173542
SMASH Issue 173543
SUSE:SUSE-SU-2016:2585
SUSE:SUSE-SU-2016:2592
SUSE:SUSE-SU-2016:2593
SUSE:SUSE-SU-2016:2596
SUSE:SUSE-SU-2016:2614
SUSE:SUSE-SU-2016:2629
SUSE:SUSE-SU-2016:2630
SUSE:SUSE-SU-2016:2631
SUSE:SUSE-SU-2016:2632
SUSE:SUSE-SU-2016:2633
SUSE:SUSE-SU-2016:2634
SUSE:SUSE-SU-2016:2635
SUSE:SUSE-SU-2016:2636
SUSE:SUSE-SU-2016:2637
SUSE:SUSE-SU-2016:2638
SUSE:SUSE-SU-2016:2655
SUSE:SUSE-SU-2016:2657
SUSE:SUSE-SU-2016:2658
SUSE:SUSE-SU-2016:2659
SUSE:SUSE-SU-2016:2673
SUSE:SUSE-SU-2016:3069
SUSE:SUSE-SU-2016:3304
SUSE:openSUSE-SU-2016:2583
SUSE:openSUSE-SU-2016:2584
SUSE:openSUSE-SU-2016:2625
SUSE:openSUSE-SU-2016:2649
SUSE:openSUSE-SU-2020:0554
UBUNTU:CVE-2016-5195
USN-3104-1
USN-3104-2
USN-3105-1
USN-3105-2
USN-3106-1
USN-3106-2
USN-3106-3
USN-3106-4
USN-3107-1
USN-3107-2
bdo#831014
bnc#1004418
bnc#1004419
bnc#1004436
bnc#1014395
bnc#1019873
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1384344
rh#1516514
rh#2116175
CVE-2016-5389kernel-source-rt:Not affectedmoderate4.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)BID:91704
CONFIRM:bto.bluecoat.com:CVE-2016-5696
CONFIRM:git.kernel.org:CVE-2016-5696
CONFIRM:github.com:CVE-2016-5696
CONFIRM:kc.mcafee.com:CVE-2016-5696
CONFIRM:security.paloaltonetworks.com:CVE-2016-5696
CONFIRM:securityadvisories.paloaltonetworks.com:CVE-2016-5696
CONFIRM:source.android.com:CVE-2016-7117
CONFIRM:www.oracle.com:CVE-2016-7154
CONFIRM:www.oracle.com:CVE-2016-7166
CVE-2016-5389
CVE-2016-5696
D:CVE-2022-2590
DSA-3659
L3:46157
L3:46331
MISC:github.com:CVE-2016-5696
MISC:www.arista.com:CVE-2016-5696
MISC:www.prnewswire.com:CVE-2016-5696
MISC:www.usenix.org:CVE-2015-2877
MISC:www.usenix.org:CVE-2016-5696
MLIST:[oss-security] 20160712 Re: CVE-2016-5389: linux kernel - challange ack information leak.
OSS:2016/Q3/44
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-5696
RHSA-2016:1631
RHSA-2016:1632
RHSA-2016:1633
RHSA-2016:1657
RHSA-2016:1664
RHSA-2016:1814
RHSA-2016:1815
RHSA-2016:1939
SECTRACK:1036625
SMASH Issue 170826
SMASH Issue 170974
UBUNTU:CVE-2016-5696
UBUNTU:USN-3070-1
UBUNTU:USN-3070-2
UBUNTU:USN-3070-3
UBUNTU:USN-3070-4
UBUNTU:USN-3071-1
UBUNTU:USN-3071-2
UBUNTU:USN-3072-1
UBUNTU:USN-3072-2
bnc#989152
bnc#994167
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1354708
rh#1384344
rh#2116175
CVE-2016-5412kernel-source-rt:Not affectedmoderate5.4 (CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H)CONFIRM:git.kernel.org:CVE-2016-5412
CONFIRM:github.com:CVE-2016-5412
CVE-2016-5412
D:CVE-2016-5412
MLIST:[oss-security] 20160728 CVE-2016-5412 Kernel: powerpc: kvm: Infinite loop via H_CEDE hypercall when running under hypervisor-mode
OSS:2016/Q3/181
RH:CVE-2016-5412
RHSA-2016:2574
SMASH Issue 171418
UBUNTU:CVE-2016-5412
bnc#991065
linux.git:commit:601045bff74569374b3d5b34dbb9bad71adf3aa5
linux.git:commit:93d17397e4e2182fdaad503e2f9da46202c0f1c3
rh#1349916
CVE-2016-5417glibc:Not affectedimportant ()BID:92257
CONFIRM:sourceware.org:CVE-2016-5417
CVE-2016-5417
MLIST:[libc-alpha] 20160804 The GNU C Library version 2.24 is now available
MLIST:[oss-security] 20160802 glibc: Per-thread memory leak in __res_vinit with IPv6 nameservers (CVE-2016-5417)
OSS:2016/Q3/225
RH:CVE-2016-5417
SMASH Issue 171553
UBUNTU:CVE-2016-5417
bnc#991670
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commitdiff%3Bh=2212c1420c92a33b0e0bd9a34938c9814a56c0f7
rh#1362534
CVE-2016-5696kernel-source-rt:Not affectedmoderate4.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)BID:91704
CONFIRM:bto.bluecoat.com:CVE-2016-5696
CONFIRM:git.kernel.org:CVE-2016-5696
CONFIRM:github.com:CVE-2016-5696
CONFIRM:kc.mcafee.com:CVE-2016-5696
CONFIRM:security.paloaltonetworks.com:CVE-2016-5696
CONFIRM:securityadvisories.paloaltonetworks.com:CVE-2016-5696
CONFIRM:source.android.com:CVE-2016-7117
CONFIRM:www.oracle.com:CVE-2016-7154
CONFIRM:www.oracle.com:CVE-2016-7166
CVE-2016-5389
CVE-2016-5696
D:CVE-2022-2590
DSA-3659
L3:46157
L3:46331
MISC:github.com:CVE-2016-5696
MISC:www.arista.com:CVE-2016-5696
MISC:www.prnewswire.com:CVE-2016-5696
MISC:www.usenix.org:CVE-2015-2877
MISC:www.usenix.org:CVE-2016-5696
MLIST:[oss-security] 20160712 Re: CVE-2016-5389: linux kernel - challange ack information leak.
OSS:2016/Q3/44
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-5696
RHSA-2016:1631
RHSA-2016:1632
RHSA-2016:1633
RHSA-2016:1657
RHSA-2016:1664
RHSA-2016:1814
RHSA-2016:1815
RHSA-2016:1939
SECTRACK:1036625
SMASH Issue 170974
SMASH Issue 170986
UBUNTU:CVE-2016-5696
UBUNTU:USN-3070-1
UBUNTU:USN-3070-2
UBUNTU:USN-3070-3
UBUNTU:USN-3070-4
UBUNTU:USN-3071-1
UBUNTU:USN-3071-2
UBUNTU:USN-3072-1
UBUNTU:USN-3072-2
bnc#989152
bnc#994167
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1354708
rh#1384344
rh#2116175
CVE-2016-5728kernel-source-rt:Unsupportedlow ()BUGTRAQ:20160630 [CVE-2016-5728] Double-Fetch Vulnerability in Linux-4.5/drivers/misc/mic/host/mic_virtio.c
CONFIRM:bugzilla.kernel.org:CVE-2016-5728
CONFIRM:git.kernel.org:CVE-2016-5728
CONFIRM:github.com:CVE-2016-5728
CVE-2016-5728
D:CVE-2016-5728
DSA-3616
RH:CVE-2016-5728
SMASH Issue 170536
UBUNTU:CVE-2016-5728
bdo#828914
bnc#986827
rh#1350811
CVE-2016-5828kernel-source-rt:Not affectedmoderate ()BID:91415
CVE-2016-5828
D:CVE-2016-5828
DSA-3616
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:patchwork.ozlabs.org:CVE-2016-5828
MLIST:[oss-security] 20160625 Re: CVE Request: Linux: powerpc/tm: Always reclaim in start_thread() for exec() class syscalls - Linux kernel
OSS:2016/Q2/607
Oracle:CVE-2016-5244
RH:CVE-2016-5828
RHSA-2016:2574
SMASH Issue 170523
SUSE:SUSE-SU-2016:1937
SUSE:SUSE-SU-2016:2105
SUSE:openSUSE-SU-2016:2184
UBUNTU:CVE-2016-5828
UBUNTU:USN-3070-1
UBUNTU:USN-3070-2
UBUNTU:USN-3070-3
UBUNTU:USN-3070-4
UBUNTU:USN-3071-1
UBUNTU:USN-3071-2
bdo#828914
bnc#986569
linux.git:commit:8e96a87c5431c256feb65bcfc5aec92d9f7839b6
rh#1324749
rh#1349917
CVE-2016-5829kernel-source-rt:Ignoremoderate ()BID:91450
CONFIRM:git.kernel.org:CVE-2016-5829
CONFIRM:github.com:CVE-2016-5829
CONFIRM:www.oracle.com:CVE-2016-6304
CVE-2016-5829
D:CVE-2016-5829
DSA-3616
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20160626 Re: CVE Request: Linux kernel HID: hiddev buffer overflows
MLIST:[oss-security] 20160626 Re: CVE Request: Linux kernel HID: hiddev buffer overflows
OSS:2016/Q2/609
Oracle:CVE-2016-5244
RH:CVE-2016-5829
RHSA-2016:2006
RHSA-2016:2574
RHSA-2016:2584
SMASH Issue 170524
SUSE:SUSE-SU-2016:1937
SUSE:SUSE-SU-2016:1985
SUSE:SUSE-SU-2016:2018
SUSE:SUSE-SU-2016:2105
SUSE:SUSE-SU-2016:2174
SUSE:SUSE-SU-2016:2175
SUSE:SUSE-SU-2016:2177
SUSE:SUSE-SU-2016:2178
SUSE:SUSE-SU-2016:2179
SUSE:SUSE-SU-2016:2180
SUSE:SUSE-SU-2016:2181
SUSE:openSUSE-SU-2016:2184
UBUNTU:CVE-2016-5829
UBUNTU:USN-3070-1
UBUNTU:USN-3070-2
UBUNTU:USN-3070-3
UBUNTU:USN-3070-4
UBUNTU:USN-3071-1
UBUNTU:USN-3071-2
UBUNTU:USN-3072-1
UBUNTU:USN-3072-2
bdo#828914
bnc#986572
bnc#986573
rh#1324749
rh#1350509
CVE-2016-6130kernel-source-rt:Not affectedmoderate2.2 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N)BID:91540
BUGTRAQ:20160630 [CVE-2016-6130] Double-Fetch Vulnerability in Linux-4.5/drivers/s390/char/sclp_ctl.c
CONFIRM:bugzilla.kernel.org:CVE-2016-6130
CONFIRM:git.kernel.org:CVE-2016-6130
CONFIRM:github.com:CVE-2016-6130
CVE-2016-6130
D:CVE-2022-2590
DSA-3616
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
RH:CVE-2016-6130
SMASH Issue 170611
UBUNTU:CVE-2016-6130
bdo#828914
bnc#987542
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1352558
rh#1384344
rh#2116175
CVE-2016-6136kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H)BID:91558
BUGTRAQ:20160704 [CVE-2016-6136] Double-Fetch Vulnerability in Linux-4.6/kernel/auditsc.c
CONFIRM:bugzilla.kernel.org:CVE-2016-6136
CONFIRM:git.kernel.org:CVE-2016-6136
CONFIRM:github.com:CVE-2016-6136
CVE-2016-6136
DSA-3659
RH:CVE-2016-6136
RHSA-2016:2574
RHSA-2016:2584
RHSA-2017:0307
SMASH Issue 170678
UBUNTU:CVE-2016-6136
bnc#988153
rh#1353533
CVE-2016-6156kernel-source-rt:Unsupportedlow ()BID:91553
BUGTRAQ:20160704 [CVE-2016-6156] Double-Fetch Vulnerability in Linux-4.6/drivers/platform/chrome/cros_ec_dev.c
CONFIRM:git.kernel.org:CVE-2016-6156
CONFIRM:github.com:CVE-2016-6156
CVE-2016-6156
MISC:bugzilla.kernel.org:CVE-2016-6156
RH:CVE-2016-6156
SMASH Issue 170669
UBUNTU:CVE-2016-6156
bnc#988025
rh#1353490
CVE-2016-6162kernel-source-rt:Unsupportedmoderate ()CVE-2016-6162
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20160705 Re: BUG_ON crash in linux 4.7-rc6/master skbuff.c
OSS:2016/Q3/15
RH:CVE-2016-6162
SMASH Issue 170649
UBUNTU:CVE-2016-6162
bnc#988013
linux.git:commit:a612769774a30e4fc143c4cb6395c12573415660
rh#1353538
CVE-2016-6197kernel-source-rt:Not affectedmoderate ()BID:91709
CONFIRM:git.kernel.org:CVE-2016-6197
CONFIRM:git.kernel.org:CVE-2016-6198
CONFIRM:github.com:CVE-2016-6197
CONFIRM:github.com:CVE-2016-6198
CONFIRM:www.kernel.org:CVE-2016-6198
CONFIRM:www.oracle.com:CVE-2016-7154
CONFIRM:www.oracle.com:CVE-2016-7166
CVE-2016-6197
CVE-2016-6198
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20160711 Re: cvs request: local DoS using rename syscall on overlayfs on top of xfs to crash the kernel - Linux kernel
MLIST:[oss-security] 20160711 Re: cvs request: local DoS using rename syscall on overlayfs on top of xfs to crash the kernel - Linux kernel
OSS:2016/Q3/42
RH:CVE-2016-6197
RH:CVE-2016-6198
RHSA-2016:1847
RHSA-2016:1875
RHSA-2016:2574
RHSA-2016:2584
SECTRACK:1036273
SMASH Issue 170728
UBUNTU:CVE-2016-6197
UBUNTU:CVE-2016-6198
UBUNTU:USN-3070-1
UBUNTU:USN-3070-2
UBUNTU:USN-3070-3
UBUNTU:USN-3070-4
bnc#988708
rh#1355650
rh#1355654
CVE-2016-6198kernel-source-rt:Not affectedmoderate ()BID:91709
CONFIRM:git.kernel.org:CVE-2016-6197
CONFIRM:git.kernel.org:CVE-2016-6198
CONFIRM:github.com:CVE-2016-6197
CONFIRM:github.com:CVE-2016-6198
CONFIRM:www.kernel.org:CVE-2016-6198
CONFIRM:www.oracle.com:CVE-2016-7154
CONFIRM:www.oracle.com:CVE-2016-7166
CVE-2016-6197
CVE-2016-6198
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20160711 Re: cvs request: local DoS using rename syscall on overlayfs on top of xfs to crash the kernel - Linux kernel
MLIST:[oss-security] 20160711 Re: cvs request: local DoS using rename syscall on overlayfs on top of xfs to crash the kernel - Linux kernel
OSS:2016/Q3/42
RH:CVE-2016-6197
RH:CVE-2016-6198
RHSA-2016:1847
RHSA-2016:1875
RHSA-2016:2574
RHSA-2016:2584
SECTRACK:1036273
SMASH Issue 170727
SMASH Issue 170728
UBUNTU:CVE-2016-6197
UBUNTU:CVE-2016-6198
UBUNTU:USN-3070-1
UBUNTU:USN-3070-2
UBUNTU:USN-3070-3
UBUNTU:USN-3070-4
bnc#988708
rh#1355650
rh#1355654
CVE-2016-6301busybox:Releasedmoderate ()BID:92277
BUGTRAQ:20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
BUGTRAQ:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
CONFIRM:git.busybox.net:CVE-2016-6301
CVE-2016-6301
FULLDISC:20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
FULLDISC:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
FULLDISC:20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router & TC Cloud Client
FULLDISC:20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S
GENTOO:GLSA-201701-05
MISC:packetstormsecurity.com:CVE-2010-0296
MISC:packetstormsecurity.com:CVE-2015-9261
MLIST:[oss-security] 20160803 CVE-2016-6301: busybox: NTP server denial of service flaw
OSS:2016/Q3/240
RH:CVE-2016-6301
SMASH Issue 171602
UBUNTU:CVE-2016-6301
bnc#991940
rh#1363710
CVE-2016-6327kernel-source-rt:Already fixedmoderate ()BID:92549
CONFIRM:git.kernel.org:CVE-2016-6327
CONFIRM:github.com:CVE-2016-6327
CONFIRM:www.kernel.org:CVE-2016-9685
CVE-2016-6327
D:CVE-2016-6327
D:CVE-2022-2590
MISC:git.kernel.org:MLIST:[oss-security] 20160819 Re: CVE-2016-6327 | Linux kernel crash in infiniband subsystem.
MLIST:[oss-security] 20160819 Re: CVE-2016-6327 | Linux kernel crash in infiniband subsystem.
OSS:2016/Q3/334
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
RH:CVE-2016-6327
RHSA-2016:2574
RHSA-2016:2584
SMASH Issue 172033
UBUNTU:CVE-2016-6327
bnc#994748
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1354525
rh#1384344
rh#2116175
CVE-2016-6480kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:92214
BUGTRAQ:20160801 [CVE-2016-6480] Double-Fetch Vulnerability in Linux-4.5/drivers/scsi/aacraid/commctrl.c
CVE-2016-6480
D:CVE-2022-2590
DSA-3659
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-6480
RHSA-2016:2574
RHSA-2016:2584
RHSA-2017:0817
SMASH Issue 171543
SMASH Issue 171556
SUSE:SUSE-SU-2016:2230
UBUNTU:CVE-2016-6480
bnc#991608
bnc#991667
bnc#992568
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:fa00c437eef8dc2e7b25f8cd868cfa405fcc2bb3
rh#1362466
rh#1384344
rh#2116175
CVE-2016-6786kernel-source-rt:Not affectedmoderate ()BID:94679
BID:96264
CONFIRM:git.kernel.org:CVE-2016-6787
CONFIRM:git.kernel.org:CVE-2017-6001
CONFIRM:github.com:CVE-2016-6787
CONFIRM:github.com:CVE-2017-6001
CONFIRM:source.android.com:CVE-2016-9120
CONFIRM:source.android.com:CVE-2017-6001
CONFIRM:www.kernel.org:CVE-2017-6001
CVE-2016-6786
CVE-2016-6787
CVE-2017-6001
D:CVE-2016-6787
D:CVE-2017-6001
DSA-3791
MLIST:[oss-security] 20170216 Linux: CVE-2017-6001: Incomplete fix for CVE-2016-6786: perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race
OSS:2017/Q1/446
RH:CVE-2016-6786
RH:CVE-2016-6787
RH:CVE-2017-6001
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
RHSA-2018:1854
SMASH Issue 177440
SMASH Issue 177441
UBUNTU:CVE-2016-6786
UBUNTU:CVE-2016-6787
UBUNTU:CVE-2017-6001
bnc#1015160
rh#1403842
rh#1422825
CVE-2016-6787kernel-source-rt:Not affectedmoderate ()BID:94679
BID:96264
CONFIRM:git.kernel.org:CVE-2016-6787
CONFIRM:git.kernel.org:CVE-2017-6001
CONFIRM:github.com:CVE-2016-6787
CONFIRM:github.com:CVE-2017-6001
CONFIRM:source.android.com:CVE-2016-9120
CONFIRM:source.android.com:CVE-2017-6001
CONFIRM:www.kernel.org:CVE-2017-6001
CVE-2016-6786
CVE-2016-6787
CVE-2017-6001
D:CVE-2016-6787
D:CVE-2017-6001
DSA-3791
MLIST:[oss-security] 20170216 Linux: CVE-2017-6001: Incomplete fix for CVE-2016-6786: perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race
OSS:2017/Q1/446
RH:CVE-2016-6786
RH:CVE-2016-6787
RH:CVE-2017-6001
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
RHSA-2018:1854
SMASH Issue 177440
UBUNTU:CVE-2016-6786
UBUNTU:CVE-2016-6787
UBUNTU:CVE-2017-6001
bnc#1015160
rh#1403842
rh#1422825
CVE-2016-6828kernel-source-rt:Not affectedmoderate ()BID:92452
CONFIRM:git.kernel.org:CVE-2016-6828
CONFIRM:github.com:CVE-2016-6828
CONFIRM:source.android.com:CVE-2016-6828
CONFIRM:www.kernel.org:CVE-2016-9178
CVE-2016-6828
D:CVE-2016-6828
D:CVE-2022-2590
DSA-3659
MISC:marcograss.github.io:CVE-2016-6828
MLIST:[oss-security] 20160815 Linux tcp_xmit_retransmit_queue use after free on 4.8-rc1 / master
OSS:2016/Q3/312
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-6828
RHSA-2017:0036
RHSA-2017:0086
RHSA-2017:0091
RHSA-2017:0113
SMASH Issue 171990
UBUNTU:CVE-2016-6828
bnc#994296
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1367091
rh#1384344
rh#2116175
CVE-2016-7039kernel-source-rt:Already fixedimportant ()BID:93476
BID:93562
CONFIRM:bto.bluecoat.com:CVE-2016-9555
CONFIRM:git.kernel.org:CVE-2016-8666
CONFIRM:github.com:CVE-2016-8666
CONFIRM:patchwork.ozlabs.org:CVE-2016-7039
CONFIRM:www.oracle.com:CVE-2016-6304
CONFIRM:www.oracle.com:CVE-2016-7039
CVE-2016-7039
CVE-2016-8666
D:CVE-2016-7039
D:CVE-2016-8666
D:CVE-2022-2590
MLIST:[oss-security] 20161010 CVE-2016-7039 Kernel: net: unbounded recursion in the vlan GRO processing
MLIST:[oss-security] 20161013 CVE Request: another recursion in GRE
OSS:2016/Q4/121
OSS:2016/Q4/125
OSS:2016/Q4/91
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
RH:CVE-2016-7039
RH:CVE-2016-8666
RHSA-2016:2047
RHSA-2016:2107
RHSA-2016:2110
RHSA-2017:0004
RHSA-2017:0372
SMASH Issue 172974
SMASH Issue 172975
SMASH Issue 173374
UBUNTU:CVE-2016-7039
UBUNTU:CVE-2016-8666
bnc#1001486
bnc#1001487
bnc#1003964
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:fcd91dd449867c6bfe56a81cabba76b829fd05cd
rh#1375944
rh#1384344
rh#1384991
rh#2116175
CVE-2016-7042kernel-source-rt:Already fixedmoderate ()BID:93544
CVE-2016-7042
D:CVE-2016-7042
D:CVE-2022-2590
DSA-3696
MLIST:[oss-security] 20161013 kernel: Stack corruption while reading /proc/keys (CVE-2016-7042)
OSS:2016/Q4/115
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
RH:CVE-2016-7042
RHSA-2017:0817
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
SMASH Issue 173566
UBUNTU:CVE-2016-7042
bdo#831014
bnc#1004517
linux.git:commit:03dab869b7b239c4e013ec82aea22e181e441cfc
linux.git:commit:43937003de5b677781b2fe4c871d628ab00cc341
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1373499
rh#1373966
rh#1384344
rh#2116175
CVE-2016-7118kernel-source-rt:Analysismoderate ()BID:92697
CVE-2016-7118
D:CVE-2016-7118
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20160831 CVE request: Kernel Oops when issuing fcntl on an AUFS directory
MLIST:[oss-security] 20160831 Re: CVE request: Kernel Oops when issuing fcntl on an AUFS directory
OSS:2016/Q3/397
SMASH Issue 172266
UBUNTU:CVE-2016-7118
bnc#996563
CVE-2016-7415icu:Not affectedmoderate ()BID:93022
CONFIRM:bugs.php.net:CVE-2016-7416
CVE-2016-7415
D:CVE-2016-7415
DSA-3725
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
OSS:2016/Q3/518
RH:CVE-2016-7415
SMASH Issue 172665
UBUNTU:CVE-2016-7415
bdo#838694
bnc#999822
rh#1377361
CVE-2016-7912kernel-source-rt:Unsupportedmoderate ()BID:94197
CONFIRM:git.kernel.org:CVE-2016-7912
CONFIRM:github.com:CVE-2016-7912
CONFIRM:source.android.com:CVE-2016-7917
CONFIRM:www.kernel.org:CVE-2016-7914
CVE-2016-7912
D:CVE-2016-7912
RH:CVE-2016-7912
SMASH Issue 176397
UBUNTU:CVE-2016-7912
bnc#1010480
bnc#1010481
rh#1403747
CVE-2016-7913kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)BID:94201
CONFIRM:git.kernel.org:CVE-2016-7913
CONFIRM:github.com:CVE-2016-7913
CONFIRM:source.android.com:CVE-2016-7917
CVE-2016-7913
D:CVE-2016-7913
RH:CVE-2016-7913
RHSA-2018:0676
RHSA-2018:1062
RHSA-2019:1170
RHSA-2019:1190
SMASH Issue 176398
UBUNTU:CVE-2016-7913
UBUNTU:USN-3798-1
UBUNTU:USN-3798-2
bnc#1010478
rh#1402885
CVE-2016-7915kernel-source-rt:Already fixedmoderate ()CONFIRM:git.kernel.org:CVE-2016-7915
CONFIRM:github.com:CVE-2016-7915
CVE-2016-7915
D:CVE-2016-7915
DSA-5378
MISC:git.kernel.org:OSS:2014/03/05/6
OSS:2014/03/05/6
OSS:2022/11/10/2
OSS:2022/12/27/3
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2022/Q4/244
Oracle:CVE-2017-0861
Oracle:CVE-2017-5715
RH:CVE-2016-7915
RHSA-2016:2574
SMASH Issue 176400
UBUNTU:CVE-2016-7915
bdo#1033297
bnc#1010470
rh#1243852
rh#1404733
rh#1495089
rh#1498016
rh#1519780
rh#1539599
rh#2061700
rh#2119127
CVE-2016-8630kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H)BID:94459
CONFIRM:git.kernel.org:CVE-2016-8630
CONFIRM:www.kernel.org:CVE-2016-9313
CVE-2016-8630
MLIST:[oss-security] 20161122 CVE-2016-8630 kernel: kvm: x86: NULL pointer dereference duringinstruction decode
OSS:2016/Q4/489
RH:CVE-2016-8630
RHSA-2017:0386
RHSA-2017:0387
SMASH Issue 175219
UBUNTU:CVE-2016-8630
bnc#1009222
linux.git:commit:66cecb67894b35c6af17eb4e6b6aaec6c8957c2e
linux.git:commit:d9092f52d7e61dd1557f2db2400ddb430e85937e
rh#1393350
CVE-2016-8632kernel-source-rt:Not affectedmoderate ()BID:94211
CVE-2016-8632
MLIST:[netdev] 20161018 [PATCH net] tipc: Guard against tiny MTU in tipc_msg_build()
MLIST:[oss-security] 20161108 CVE-2016-8632 -- Linux kernel: tipc_msg_build() doesn't validate MTU that can trigger heap overflow
OSS:2016/Q4/359
OSS:2016/Q4/395
Oracle:CVE-2016-5244
RH:CVE-2016-8632
SMASH Issue 174934
SMASH Issue 177071
UBUNTU:CVE-2016-8632
bnc#1008831
bnc#1012852
https://www.mail-archive.com/netdev%40vger.kernel.org/msg133205.html
linux.git:commit:3de81b758853f0b29c61e246679d20b513c4cfec
rh#1390832
CVE-2016-8633kernel-source-rt:Not affectedmoderate6.8 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)BID:94149
CONFIRM:git.kernel.org:CVE-2016-8633
CONFIRM:github.com:CVE-2016-8633
CONFIRM:www.kernel.org:CVE-2016-9313
CVE-2016-8633
MISC:eyalitkin.wordpress.com:CVE-2016-8633
MISC:eyalitkin.wordpress.com:MLIST:[oss-security] 20161106 Re: [engineering.redhat.com #426293] CVE Request - firewire driver RCE - linux 4.8
MLIST:[oss-security] 20161106 Re: [engineering.redhat.com #426293] CVE Request - firewire driver RCE - linux 4.8
Oracle:CVE-2016-5244
RH:CVE-2016-8633
RHSA-2018:0676
RHSA-2018:1062
RHSA-2019:1170
RHSA-2019:1190
SMASH Issue 174961
UBUNTU:CVE-2016-8633
bnc#1008833
rh#1391490
CVE-2016-8636kernel-source-rt:Ignoreimportant ()BID:96189
CONFIRM:git.kernel.org:CVE-2016-8636
CONFIRM:github.com:CVE-2016-8636
CONFIRM:www.kernel.org:CVE-2016-8636
CVE-2016-8636
MISC:eyalitkin.wordpress.com:CVE-2016-8636
MLIST:[oss-security] 20170211 CVE publication request - CVE 2016-8636
RH:CVE-2016-8636
SMASH Issue 180351
UBUNTU:CVE-2016-8636
bnc#1024908
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1421981
rh#1575472
rh#1575866
rh#1667782
rh#1701224
rh#1701842
rh#1890354
CVE-2016-8645kernel-source-rt:Not affectedmoderate ()BID:94264
CONFIRM:git.kernel.org:CVE-2016-8645
CONFIRM:github.com:CVE-2016-8645
CONFIRM:www.kernel.org:CVE-2016-8645
CVE-2016-8645
D:CVE-2016-8645
MLIST:[oss-security] 20161111 CVE-2016-8645: linux kernel: net: a BUG() statement can be hit in net/ipv4/tcp_input.c
MLIST:[oss-security] 20161130 Re: CVE-2016-8645: linux kernel: net: a BUG() statement can be hit in net/ipv4/tcp_input.c
OSS:2016/Q4/397
RH:CVE-2016-8645
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
SECTRACK:1037285
SMASH Issue 176287
SMASH Issue 177657
UBUNTU:CVE-2016-8645
bnc#1009969
rh#1393904
CVE-2016-8646kernel-source-rt:Not affectedmoderate ()BID:94309
CONFIRM:git.kernel.org:CVE-2016-8646
CONFIRM:github.com:CVE-2016-8646
CONFIRM:www.kernel.org:CVE-2016-8646
CVE-2016-8646
D:CVE-2016-8646
MISC:git.kernel.org:MLIST:[oss-security] 20161115 CVE-2016-8646: linux kernel - oops in shash_async_export()
MLIST:[oss-security] 20161115 CVE-2016-8646: linux kernel - oops in shash_async_export()
OSS:2016/Q4/429
Oracle:CVE-2016-5244
RH:CVE-2016-8646
RHSA-2017:1297
RHSA-2017:1298
RHSA-2017:1308
SMASH Issue 176331
UBUNTU:CVE-2016-8646
bnc#1010150
rh#1388821
CVE-2016-8650kernel-source-rt:Not affectedimportant8.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)BID:94532
CONFIRM:git.kernel.org:CVE-2016-8650
CVE-2016-8650
D:CVE-2016-8650
FULLDISC:20161115 OS-S 2016-21 - Local DoS: Linux Kernel Nullpointer Dereference via keyctl
L3:46825
MISC:source.android.com:CVE-2017-0537
MLIST:[oss-security] 20161125 Linux kernel: CVE-2016-8650 : Local denial of service with in key subsystem
OSS:2016/Q4/523
RH:CVE-2016-8650
RHSA-2017:0931
RHSA-2017:0932
RHSA-2017:0933
RHSA-2018:1854
SECTRACK:1037968
SMASH Issue 176713
UBUNTU:CVE-2016-8650
bnc#1011768
bnc#1011820
linux.git:commit:86b01b5419fd303a3699b2ce6f4b9bfbdaa4ed37
linux.git:commit:f5527fffff3f002b0a6b376163613b82f69de073
rh#1395187
CVE-2016-8655kernel-source-rt:Ignoremoderate ()BID:94692
CONFIRM:git.kernel.org:CVE-2016-8655
CONFIRM:github.com:CVE-2016-8655
CVE-2016-8655
D:CVE-2016-8655
EXPLOIT-DB:40871
EXPLOIT-DB:44696
MISC:git.kernel.org:MLIST:[oss-security] 20161206 CVE-2016-8655 Linux af_packet.c race condition (local root)
MISC:github.com:MLIST:[oss-security] 20161206 CVE-2016-8655 Linux af_packet.c race condition (local root)
MISC:packetstormsecurity.com:CVE-2016-8655
MISC:packetstormsecurity.com:CVE-2017-6895
MISC:patchwork.ozlabs.org
MISC:source.android.com:CVE-2017-0537
MLIST:[oss-security] 20161206 CVE-2016-8655 Linux af_packet.c race condition (local root)
OSS:2016/Q4/607
OSS:2016/Q4/664
OSS:2017/Q3/182
OSS:2017/Q3/279
RH:CVE-2016-8655
RHSA-2017:0386
RHSA-2017:0387
RHSA-2017:0402
SECTRACK:1037403
SECTRACK:1037968
SMASH Issue 176931
SMASH Issue 177072
SUSE:SUSE-SU-2016:3096
SUSE:SUSE-SU-2016:3113
SUSE:SUSE-SU-2016:3116
SUSE:SUSE-SU-2016:3117
SUSE:SUSE-SU-2016:3169
SUSE:SUSE-SU-2016:3183
SUSE:SUSE-SU-2016:3197
SUSE:SUSE-SU-2016:3205
SUSE:SUSE-SU-2016:3206
SUSE:SUSE-SU-2016:3247
UBUNTU:CVE-2016-8655
UBUNTU:USN-3149-1
UBUNTU:USN-3149-2
UBUNTU:USN-3150-1
UBUNTU:USN-3150-2
UBUNTU:USN-3151-1
UBUNTU:USN-3151-2
UBUNTU:USN-3151-3
UBUNTU:USN-3151-4
UBUNTU:USN-3152-1
UBUNTU:USN-3152-2
bnc#1012754
bnc#1013822
rh#1400019
CVE-2016-8658kernel-source-rt:Already fixedmoderate ()BID:93541
CONFIRM:git.kernel.org:CVE-2016-8658
CONFIRM:github.com:CVE-2016-8658
CVE-2016-8658
D:CVE-2016-8658
D:CVE-2022-2590
MISC:git.kernel.org:MLIST:[oss-security] 20161013 Re: CVE Request -- Broadcom Wifi Driver Brcmfmac brcmf_cfg80211_start_ap Buffer Overflow
MISC:patchwork.kernel.org:MLIST:[oss-security] 20161013 Re: CVE Request -- Broadcom Wifi Driver Brcmfmac brcmf_cfg80211_start_ap Buffer Overflow
MLIST:[oss-security] 20161013 Re: CVE Request -- Broadcom Wifi Driver Brcmfmac brcmf_cfg80211_start_ap Buffer Overflow
OSS:2016/Q4/113
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
RH:CVE-2016-8658
SMASH Issue 173544
UBUNTU:CVE-2016-8658
bnc#1004462
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1384344
rh#1384403
rh#2116175
CVE-2016-8666kernel-source-rt:Already fixedimportant ()BID:93476
BID:93562
CONFIRM:bto.bluecoat.com:CVE-2016-9555
CONFIRM:git.kernel.org:CVE-2016-8666
CONFIRM:github.com:CVE-2016-8666
CONFIRM:patchwork.ozlabs.org:CVE-2016-7039
CONFIRM:www.oracle.com:CVE-2016-6304
CONFIRM:www.oracle.com:CVE-2016-7039
CVE-2016-7039
CVE-2016-8666
D:CVE-2016-7039
D:CVE-2016-8666
D:CVE-2022-2590
MLIST:[oss-security] 20161010 CVE-2016-7039 Kernel: net: unbounded recursion in the vlan GRO processing
MLIST:[oss-security] 20161013 CVE Request: another recursion in GRE
OSS:2016/Q4/121
OSS:2016/Q4/125
OSS:2016/Q4/91
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
RH:CVE-2016-7039
RH:CVE-2016-8666
RHSA-2016:2047
RHSA-2016:2107
RHSA-2016:2110
RHSA-2017:0004
RHSA-2017:0372
SMASH Issue 172974
SMASH Issue 173594
UBUNTU:CVE-2016-7039
UBUNTU:CVE-2016-8666
bnc#1001486
bnc#1003964
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:fcd91dd449867c6bfe56a81cabba76b829fd05cd
rh#1375944
rh#1384344
rh#1384991
rh#2116175
CVE-2016-9191kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)BID:94129
CONFIRM:git.kernel.org:CVE-2016-9191
CONFIRM:support.hpe.com:CVE-2016-9191
CVE-2016-9191
D:CVE-2016-9191
DSA-3791
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20161105 Re: CVE request: linux kernel - local DoS with cgroup offline code
OSS:2016/Q4/346
Oracle:CVE-2017-6074
RH:CVE-2016-9191
SMASH Issue 174733
UBUNTU:CVE-2016-9191
bnc#1008842
linux.git:commit:93362fa47fe98b62e4a34ab408c4a418432e7939
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1392439
rh#1420236
rh#1435719
rh#1462147
rh#1462158
CVE-2016-9555kernel-source-rt:Not affectedimportant5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:94479
CONFIRM:bto.bluecoat.com:CVE-2016-9555
CONFIRM:git.kernel.org:CVE-2016-9555
CONFIRM:github.com:CVE-2016-9555
CONFIRM:groups.google.com:CVE-2016-9555
CONFIRM:www.kernel.org:CVE-2016-9555
CVE-2016-9555
D:CVE-2016-9555
MLIST:[oss-security] 20161122 CVE Request: Linux: net/sctp: slab-out-of-bounds in sctp_sf_ootb
OSS:2016/Q4/509
Oracle:CVE-2016-5244
RH:CVE-2016-9555
RHSA-2017:0086
RHSA-2017:0091
RHSA-2017:0113
RHSA-2017:0307
SECTRACK:1037339
SMASH Issue 176677
SMASH Issue 176690
SMASH Issue 177073
SUSE:SUSE-SU-2016:3096
SUSE:SUSE-SU-2016:3113
SUSE:SUSE-SU-2016:3116
SUSE:SUSE-SU-2016:3117
SUSE:SUSE-SU-2016:3169
SUSE:SUSE-SU-2016:3183
SUSE:SUSE-SU-2016:3197
SUSE:SUSE-SU-2016:3205
SUSE:SUSE-SU-2016:3206
SUSE:SUSE-SU-2016:3247
UBUNTU:CVE-2016-9555
bnc#1011685
bnc#1012183
rh#1397930
CVE-2016-9576kernel-source-rt:Already fixedimportant ()BID:94821
BID:95169
CONFIRM:git.kernel.org:CVE-2016-10088
CONFIRM:git.kernel.org:CVE-2016-9576
CONFIRM:github.com:CVE-2016-10088
CONFIRM:github.com:CVE-2016-10167
CONFIRM:github.com:CVE-2016-10190
CONFIRM:github.com:CVE-2016-9576
CONFIRM:www.kernel.org:CVE-2016-9793
CVE-2016-10088
CVE-2016-9576
D:CVE-2016-10088
D:CVE-2016-9576
L3:47394
MISC:anonscm.debian.org:MLIST:[oss-security] 20161230 Re: Linux Kernel use-after-free in SCSI generic device interface
MLIST:[oss-security] 20161209 Linux Kernel use-after-free in SCSI generic device interface
MLIST:[oss-security] 20161230 Re: Linux Kernel use-after-free in SCSI generic device interface
OSS:2016/Q4/644
OSS:2016/Q4/779
OSS:2016/Q4/781
Oracle:CVE-2016-5244
RH:CVE-2016-10088
RH:CVE-2016-9576
RHSA-2017:0817
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
SECTRACK:1037538
SMASH Issue 177214
SMASH Issue 177216
SUSE:SUSE-SU-2016:3146
SUSE:SUSE-SU-2016:3188
SUSE:SUSE-SU-2016:3203
SUSE:SUSE-SU-2016:3217
SUSE:SUSE-SU-2016:3248
SUSE:SUSE-SU-2016:3252
SUSE:openSUSE-SU-2016:3085
SUSE:openSUSE-SU-2016:3086
SUSE:openSUSE-SU-2016:3118
UBUNTU:CVE-2016-10088
UBUNTU:CVE-2016-9576
bnc#1013604
bnc#1014271
bnc#1017710
bnc#1019079
bnc#1019668
bnc#1024055
rh#1403145
rh#1412210
CVE-2016-9588kernel-source-rt:Not affectedmoderate3.5 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)BID:94933
CONFIRM:git.kernel.org:CVE-2016-9588
CONFIRM:github.com:CVE-2016-9588
CVE-2016-9588
D:CVE-2016-9588
DSA-3804
MLIST:[oss-security] 20161215 CVE-2016-9588 Kernel: kvm: nVMX: uncaught software exceptions in L1 guest lead to DoS
OSS:2016/Q4/684
Oracle:CVE-2017-6074
RH:CVE-2016-9588
RHSA-2017:1842
RHSA-2017:2077
SMASH Issue 177683
UBUNTU:CVE-2016-9588
UBUNTU:USN-3822-1
UBUNTU:USN-3822-2
bnc#1015703
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1404924
rh#1420236
rh#1435719
CVE-2016-9594curl:Not affectedimportant ()BID:95094
CONFIRM:curl.haxx.se:CVE-2016-9594
CONFIRM:www.tenable.com:CVE-2017-3732
CVE-2016-9594
GENTOO:GLSA-201701-47
MISC:bugzilla.redhat.com:CVE-2016-9594
MISC:curl.haxx.se
MISC:github.com
OSS:2016/Q4/743
RH:CVE-2016-9594
SECTRACK:1037528
SMASH Issue 178016
UBUNTU:CVE-2016-9594
bnc#1016738
bnc#1017161
rh#1408385
CVE-2016-9604kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N)BID:102135
CONFIRM:bugzilla.novell.com:CVE-2016-9604
CONFIRM:bugzilla.redhat.com:CVE-2016-9604
CONFIRM:git.kernel.org:CVE-2016-9604
CVE-2016-9604
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2016-9604
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
SMASH Issue 184071
UBUNTU:CVE-2016-9604
bnc#1035576
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:ee8f844e3c5a73b999edf733df1c529d6503ec2f
linux.git:commit:f205b5dc1c9e62237ac6e21642724d8cbc85f7ee
rh#1389433
rh#1420236
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1481178
CVE-2016-9754kernel-source-rt:Ignoremoderate ()BID:95278
CONFIRM:git.kernel.org:CVE-2016-9754
CONFIRM:github.com:CVE-2016-9754
CONFIRM:source.android.com:CVE-2017-0404
CONFIRM:www.kernel.org:CVE-2016-9754
CVE-2016-9754
D:CVE-2016-9754
RH:CVE-2016-9754
SMASH Issue 178262
UBUNTU:CVE-2016-9754
bnc#1018342
bnc#1020787
rh#1410370
CVE-2016-9755kernel-source-rt:Unsupportedimportant ()BID:94626
CONFIRM:git.kernel.org:CVE-2016-9755
CONFIRM:github.com:CVE-2016-9755
CONFIRM:groups.google.com:CVE-2016-9755
CVE-2016-9755
D:CVE-2016-9755
MLIST:[netdev] 20161130 [PATCH 10/11] netfilter: ipv6: nf_defrag: drop mangled skb on ream error
MLIST:[oss-security] 20161201 CVE Request: Linux: net: out-of-bounds due do a signedness issue when defragging ipv6
OSS:2016/Q4/560
RH:CVE-2016-9755
SMASH Issue 177015
UBUNTU:CVE-2016-9755
bnc#1013060
rh#1400904
CVE-2016-9793kernel-source-rt:Ignoremoderate ()BID:94655
CONFIRM:git.kernel.org:CVE-2016-9793
CONFIRM:github.com:CVE-2012-6704
CONFIRM:github.com:CVE-2016-9793
CONFIRM:www.kernel.org:CVE-2016-9793
CVE-2016-9793
D:CVE-2016-9793
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:github.com:CVE-2016-9793
MISC:source.android.com:CVE-2017-0537
MLIST:[oss-security] 20161202 Re: CVE Request: Linux: signed overflows for SO_{SND|RCV}BUFFORCE
OSS:2016/Q4/574
Oracle:CVE-2016-5244
RH:CVE-2016-9793
RHSA-2017:0931
RHSA-2017:0932
RHSA-2017:0933
SECTRACK:1037968
SMASH Issue 177084
SMASH Issue 177658
UBUNTU:CVE-2016-9793
bnc#1013531
rh#1402013
rh#1402024
CVE-2016-9794kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:94654
CONFIRM:git.kernel.org:CVE-2016-9794
CONFIRM:github.com:CVE-2016-9794
CONFIRM:patchwork.kernel.org:CVE-2016-9794
CONFIRM:source.android.com:CVE-2017-0635
CVE-2016-9794
D:CVE-2016-9794
MLIST:[oss-security] 20161203 CVE request: -- Linux kernel: ALSA: use-after-free in,kill_fasync
OSS:2016/Q4/576
RH:CVE-2016-9794
RHSA-2016:2574
SMASH Issue 177086
SMASH Issue 177087
SUSE:SUSE-SU-2016:3146
SUSE:SUSE-SU-2016:3188
SUSE:SUSE-SU-2016:3203
SUSE:SUSE-SU-2016:3217
SUSE:SUSE-SU-2016:3248
SUSE:SUSE-SU-2016:3252
SUSE:openSUSE-SU-2016:3118
UBUNTU:CVE-2016-9794
bnc#1013533
bnc#1013543
rh#1401494
CVE-2016-9919kernel-source-rt:Ignoremoderate ()BID:94824
CONFIRM:git.kernel.org:CVE-2016-9919
CONFIRM:github.com:CVE-2016-9919
CVE-2016-9919
D:CVE-2016-9919
MISC:bugzilla.kernel.org:MLIST:[oss-security] 20161208 CVE request: Linux panic on fragemented IPv6 traffic (icmp6_send)
MISC:git.kernel.org:MLIST:[oss-security] 20161208 CVE request: Linux panic on fragemented IPv6 traffic (icmp6_send)
MLIST:[oss-security] 20161208 CVE request: Linux panic on fragemented IPv6 traffic (icmp6_send)
OSS:2016/Q4/641
RH:CVE-2016-9919
SMASH Issue 177310
SMASH Issue 177659
UBUNTU:CVE-2016-9919
bnc#1014701
bnc#1014743
rh#1403260
CVE-2017-1000251kernel-source-rt:Not affectedimportant8.8 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)BID:100809
CERT-VN:VU#240311
CONFIRM:access.redhat.com:CVE-2017-1000251
CONFIRM:nvidia.custhelp.com:CVE-2017-6273
CONFIRM:www.synology.com:CVE-2017-1000251
CVE-2017-1000251
DSA-3981
DSA-5378
EXPLOIT-DB:42762
MISC:git.kernel.org
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:github.com:CVE-2017-1000251
MISC:www.armis.com:CVE-2017-14315
OSS:2017/Q3/439
OSS:2017/Q3/558
OSS:2017/Q4/357
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-1000251
RHSA-2017:2679
RHSA-2017:2680
RHSA-2017:2681
RHSA-2017:2682
RHSA-2017:2683
RHSA-2017:2704
RHSA-2017:2705
RHSA-2017:2706
RHSA-2017:2707
RHSA-2017:2731
RHSA-2017:2732
SECTRACK:1039373
SMASH Issue 191511
UBUNTU:CVE-2017-1000251
bdo#1033297
bdo#866511
bdo#875881
bnc#1057389
bnc#1057950
rh#1462147
rh#1462158
rh#1481178
rh#1489716
rh#1519780
rh#2061700
rh#2119127
CVE-2017-1000252kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)BID:101022
CONFIRM:git.kernel.org:CVE-2017-1000252
CONFIRM:github.com:CVE-2017-1000252
CONFIRM:marc.info
CONFIRM:marc.info:CVE-2017-1000252
CONFIRM:www.openwall.com
CVE-2017-1000252
D:CVE-2017-1000252
DSA-3981
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:security-tracker.debian.org
OSS:2017/Q3/465
OSS:2017/Q3/562
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
RH:CVE-2017-1000252
RHSA-2018:0676
RHSA-2018:1062
RHSA-2018:1130
SMASH Issue 191713
UBUNTU:CVE-2017-1000252
bdo#866511
bdo#875881
bnc#1058038
linux.git:commit:3a8b0677fc6180a467e26cc32ce6b0c09a32f9bb
rh#1462147
rh#1462158
rh#1481178
rh#1490781
CVE-2017-1000365kernel-source-rt:Already fixedlow2.9 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)BID:99156
CVE-2017-1000365
DSA-3927
DSA-3945
MISC:git.kernel.org
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:www.qualys.com:CVE-2017-1085
OSS:2017/Q2/500
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-1000365
RHSA-2010:0631
RHSA-2010:0660
RHSA-2010:0661
RHSA-2010:0670
RHSA-2010:0676
RHSA-2010:0677
RHSA-2010:0882
RHSA-2020:1524
SMASH Issue 185357
UBUNTU:CVE-2017-1000365
bnc#1039354
linux.git:commit:98da7d08850fb8bdeb395d6368ed15753304aa0c
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1481178
rh#606611
CVE-2017-1000370kernel-source-rt:Not affectedlow2.9 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)BID:99131
BID:99149
CVE-2017-1000370
CVE-2017-1000371
DSA-3981
EXPLOIT-DB:42273
EXPLOIT-DB:42274
EXPLOIT-DB:42276
MISC:git.kernel.org
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:www.qualys.com:CVE-2017-1085
OSS:2017/Q2/500
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-1000370
RH:CVE-2017-1000371
RHSA-2010:0631
RHSA-2010:0660
RHSA-2010:0661
RHSA-2010:0670
RHSA-2010:0676
RHSA-2010:0677
RHSA-2010:0882
RHSA-2020:1524
SMASH Issue 185356
UBUNTU:CVE-2017-1000370
UBUNTU:CVE-2017-1000371
bdo#866511
bdo#875881
bnc#1039349
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:eab09532d40090698b05a07c1c87f39fdbc5fab5
rh#1435719
rh#1462147
rh#1462153
rh#1462158
rh#1481178
rh#606611
CVE-2017-1000371kernel-source-rt:Not affectedlow2.9 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)BID:99131
BID:99149
CVE-2017-1000370
CVE-2017-1000371
DSA-3981
EXPLOIT-DB:42273
EXPLOIT-DB:42274
EXPLOIT-DB:42276
MISC:git.kernel.org
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:www.qualys.com:CVE-2017-1085
OSS:2017/Q2/500
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-1000370
RH:CVE-2017-1000371
RHSA-2010:0631
RHSA-2010:0660
RHSA-2010:0661
RHSA-2010:0670
RHSA-2010:0676
RHSA-2010:0677
RHSA-2010:0882
RHSA-2020:1524
SMASH Issue 185356
UBUNTU:CVE-2017-1000370
UBUNTU:CVE-2017-1000371
bdo#866511
bdo#875881
bnc#1039349
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:eab09532d40090698b05a07c1c87f39fdbc5fab5
rh#1435719
rh#1462147
rh#1462153
rh#1462158
rh#1481178
rh#606611
CVE-2017-10661kernel-source-rt:Not affectedimportant7.4 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)BID:100215
CONFIRM:bugzilla.redhat.com:CVE-2018-10880
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CONFIRM:git.kernel.org:CVE-2017-10661
CONFIRM:github.com:CVE-2017-10661
CONFIRM:source.android.com:CVE-2017-10663
CONFIRM:www.kernel.org:CVE-2017-10661
CVE-2017-10661
CVE-2018-10880
CVE-2018-10882
CVE-2018-13405
D:CVE-2017-10661
DSA-3981
EXPLOIT-DB:43345
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2017/Q3/526
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-10661
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
RHSA-2019:4057
RHSA-2019:4058
RHSA-2020:0036
SMASH Issue 190204
UBUNTU:CVE-2017-10661
bdo#866511
bdo#875881
bnc#1053152
bnc#1053153
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1435719
rh#1462147
rh#1462158
rh#1481136
rh#1481178
rh#1596812
rh#1596842
rh#1599161
rh#2027239
rh#2044863
CVE-2017-10662kernel-source-rt:Unsupportedimportant ()BID:100215
CONFIRM:git.kernel.org:CVE-2017-10662
CONFIRM:github.com:CVE-2017-10662
CONFIRM:source.android.com:CVE-2017-10663
CONFIRM:www.kernel.org:CVE-2017-10662
CVE-2017-10662
D:CVE-2017-10662
RH:CVE-2017-10662
SMASH Issue 190207
UBUNTU:CVE-2017-10662
bnc#1053154
rh#1481146
CVE-2017-10663kernel-source-rt:Unsupportedimportant ()BID:100215
CONFIRM:git.kernel.org:CVE-2017-10663
CONFIRM:github.com:CVE-2017-10663
CONFIRM:source.android.com:CVE-2017-10663
CONFIRM:www.kernel.org:CVE-2017-10663
CVE-2017-10663
D:CVE-2017-10663
RH:CVE-2017-10663
SMASH Issue 190208
UBUNTU:CVE-2017-10663
bnc#1053155
rh#1481149
CVE-2017-10810kernel-source-rt:Already fixedmoderate5.1 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:99433
CONFIRM:git.kernel.org:CVE-2017-10810
CONFIRM:github.com:CVE-2017-10810
CONFIRM:lkml.org:CVE-2017-10810
CVE-2017-10810
D:CVE-2017-10810
DSA-3927
OSS:2017/Q3/79
RH:CVE-2017-10810
SMASH Issue 187832
UBUNTU:CVE-2017-10810
bnc#1047277
rh#1462147
rh#1462158
rh#1468023
CVE-2017-11164pcre:Ignorelow3.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)BID:99575
CVE-2017-11164
MISC:bugs.launchpad.net:OSS:2023/04/12/1
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:openwall.com:CVE-2017-11164
MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
OSS:2017/07/11/3
OSS:2017/Q3/111
OSS:2023/04/11/1
OSS:2023/04/12/1
OSS:2023/Q2/12
RH:CVE-2017-11164
SMASH Issue 188271
UBUNTU:CVE-2017-11164
bnc#1048266
jsc#CAR-1027
rh#1470107
CVE-2017-11176kernel-source-rt:Not affectedimportant7.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)BID:99919
CONFIRM:git.kernel.org:CVE-2017-11176
CONFIRM:github.com:CVE-2017-11176
CONFIRM:help.ecostruxureit.com:CVE-2017-5754
CVE-2017-11176
DSA-3927
DSA-3945
EXPLOIT-DB:45553
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-11176
RHSA-2017:2918
RHSA-2017:2930
RHSA-2017:2931
RHSA-2018:0169
RHSA-2018:3822
SMASH Issue 188369
UBUNTU:CVE-2017-11176
bnc#1048275
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1470659
rh#1481178
CVE-2017-11473kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)BID:100010
CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/
CONFIRM:git.kernel.org:CVE-2017-11473
CONFIRM:source.android.com:CVE-2017-15850
CVE-2017-11473
MISC:git.kernel.org:CVE-2017-11473
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-11473
RHSA-2018:0654
SMASH Issue 188809
UBUNTU:CVE-2017-11473
UBUNTU:USN-3754-1
bnc#1049603
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1473209
rh#1481178
CVE-2017-11600kernel-source-rt:Not affectedimportant7.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)BID:99928
CONFIRM:source.android.com:CVE-2017-6001
CVE-2017-11600
CVE-2017-9614
D:CVE-2017-9614
DSA-3981
DSA-5378
EXPLOIT-DB:42391
MISC:github.com:CVE-2017-9614
MISC:packetstormsecurity.com:CVE-2017-9614
MISC:seclists.org:CVE-2017-11600
MISC:seclists.org:CVE-2017-9614
OSS:2017/Q3/526
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
Oracle:CVE-2018-3646
RH:CVE-2017-11600
RH:CVE-2017-9614
RHSA-2018:1965
RHSA-2018:2003
RHSA-2019:1170
RHSA-2019:1190
SMASH Issue 189055
SMASH Issue 207615
SUSE:SUSE-SU-2018:0011
UBUNTU:CVE-2017-11600
UBUNTU:CVE-2017-9614
bdo#1033297
bdo#866511
bdo#875881
bnc#1050231
bnc#1096564
linux.git:commit:7bab09631c2a303f87a7eb7e3d69e888673b9b7e
rh#1474928
rh#1475742
rh#1519780
rh#2061700
rh#2119127
CVE-2017-12153kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)BID:100855
BID:101556
CONFIRM:bugzilla.novell.com:CVE-2017-12153
CONFIRM:bugzilla.redhat.com:CVE-2017-15087
CONFIRM:git.kernel.org:CVE-2017-12153
CONFIRM:marc.info
CONFIRM:marc.info:CVE-2017-12153
CVE-2017-12153
CVE-2017-15087
DSA-3981
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2017/Q3/437
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
RH:CVE-2017-12153
RH:CVE-2017-15087
RHSA-2017:3110
SMASH Issue 191845
UBUNTU:CVE-2017-12153
UBUNTU:CVE-2017-15087
UBUNTU:USN-3583-1
UBUNTU:USN-3583-2
bdo#866511
bdo#875881
bnc#1058410
linux.git:commit:e785fa0a164aa11001cba931367c7f94ffaff888
rh#1462147
rh#1462158
rh#1481178
rh#1491046
rh#1505788
CVE-2017-12154kernel-source-rt:Already fixedmoderate5.6 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H)BID:100856
CONFIRM:git.kernel.org:CVE-2017-12154
CONFIRM:www.spinics.net:CVE-2017-12154
CVE-2017-12154
D:CVE-2017-12154
DSA-3981
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:security-tracker.debian.org
OSS:2017/Q3/526
OSS:2017/Q3/528
OSS:2017/Q3/562
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
RH:CVE-2017-12154
RHSA-2018:0676
RHSA-2018:1062
RHSA-2019:1946
SMASH Issue 191960
UBUNTU:CVE-2017-12154
UBUNTU:USN-3698-1
UBUNTU:USN-3698-2
bdo#866511
bdo#875881
bnc#1058507
linux.git:commit:51aa68e7d57e3217192d88ce90fd5b8ef29ec94f
rh#1462147
rh#1462158
rh#1481178
rh#1491224
CVE-2017-12168kernel-source-rt:Unsupportedmoderate6.2 (CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H)CONFIRM:git.kernel.org:CVE-2017-12168
CONFIRM:github.com:CVE-2017-12168
CONFIRM:www.kernel.org:CVE-2017-12168
CVE-2017-12168
RH:CVE-2017-12168
RHEA-2017:3163
SMASH Issue 192162
UBUNTU:CVE-2017-12168
bnc#1059448
rh#1492984
CVE-2017-12188kernel-source-rt:Not affectedimportant7.6 (CVSS:3.0/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)BID:101267
CONFIRM:patchwork.kernel.org:CVE-2017-12188
CVE-2017-12188
OSS:2017/Q4/77
OSS:2018/09/18/4
OSS:2018/09/25/4
RH:CVE-2017-12188
RHSA-2018:0395
RHSA-2018:0412
SMASH Issue 193097
SMASH Issue 193102
UBUNTU:CVE-2017-12188
bnc#1062604
linux.git:commit:829ee279aed43faa5cb1e4d65c0cad52f2426c53
linux.git:commit:fd19d3b45164466a4adce7cbff448ba9189e1427
rh#1500380
rh#1575866
rh#1890354
CVE-2017-12193kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:101678
CONFIRM:git.kernel.org:CVE-2017-12193
CVE-2017-12193
DSA-5378
MISC:git.kernel.org:OSS:2017/Q4/181
MISC:www.kernel.org:CVE-2017-16939
OSS:2017/Q4/181
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-12193
RHSA-2018:0151
RHSA-2018:0152
RHSA-2018:0181
SMASH Issue 194390
UBUNTU:CVE-2017-12193
UBUNTU:USN-3698-1
UBUNTU:USN-3698-2
bdo#1033297
bnc#1066192
linux.git:commit:ea6789980fdaa610d7eb63602c746bf6ec70cd2b
rh#1501215
rh#1519780
rh#2061700
rh#2119127
CVE-2017-13077kernel-source-rt:Releasedimportant8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)BID:101274
CERT-VN:VU#228519
CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
CONFIRM:access.redhat.com:CVE-2017-13088
CONFIRM:cert-portal.siemens.com:CVE-2017-13088
CONFIRM:cert.vde.com:CVE-2017-13080
CONFIRM:cert.vde.com:CVE-2017-13088
CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080
CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082
CONFIRM:source.android.com:CVE-2017-5754
CONFIRM:source.android.com:CVE-2017-6264
CONFIRM:source.android.com:CVE-2017-6294
CONFIRM:support.apple.com:CVE-2017-13852
CONFIRM:support.apple.com:CVE-2017-13904
CONFIRM:support.apple.com:CVE-2017-3169
CONFIRM:support.hpe.com:CVE-2017-13081
CONFIRM:support.lenovo.com:CVE-2017-13088
CONFIRM:www.arubanetworks.com:CVE-2017-13088
CONFIRM:www.intel.com:CVE-2017-13080
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
CVE-2017-13084
CVE-2017-13086
CVE-2017-13087
CVE-2017-13088
CVE-2024-2466
D:CVE-2022-2590
DSA-3999
DSA-5378
FREEBSD:FreeBSD-SA-17:07
GENTOO:GLSA-201711-03
MISC:github.com:CVE-2017-13082
MISC:github.com:OSS:2024/Q1/256
MISC:ics-cert.us-cert.gov:CVE-2017-13082
MISC:w1.fi
MISC:w1.fi:CVE-2017-13088
MISC:www.krackattacks.com:CVE-2017-13088
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update
OSS:2017/Q4/83
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/11/10/2
OSS:2022/Q3/99
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2024/03/27/4
OSS:2024/Q1/256
Oracle:CVE-2011-4461
Oracle:CVE-2013-1768
Oracle:CVE-2014-0114
Oracle:CVE-2014-3490
Oracle:CVE-2014-3577
Oracle:CVE-2015-0204
Oracle:CVE-2015-0235
Oracle:CVE-2015-5600
Oracle:CVE-2015-6937
Oracle:CVE-2015-7501
Oracle:CVE-2015-7940
Oracle:CVE-2015-9251
Oracle:CVE-2016-0635
Oracle:CVE-2016-0714
Oracle:CVE-2016-0729
Oracle:CVE-2016-1000031
Oracle:CVE-2016-1181
Oracle:CVE-2016-1182
Oracle:CVE-2016-2099
Oracle:CVE-2016-2107
Oracle:CVE-2016-2176
Oracle:CVE-2016-2179
Oracle:CVE-2016-2183
Oracle:CVE-2016-3092
Oracle:CVE-2016-3506
Oracle:CVE-2016-4000
Oracle:CVE-2016-4055
Oracle:CVE-2016-5007
Oracle:CVE-2016-5019
Oracle:CVE-2016-5080
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2016-6304
Oracle:CVE-2016-6814
Oracle:CVE-2016-7103
Oracle:CVE-2016-7167
Oracle:CVE-2016-9843
Oracle:CVE-2016-9878
Oracle:CVE-2017-0379
Oracle:CVE-2017-10068
Oracle:CVE-2017-12617
Oracle:CVE-2017-13077
Oracle:CVE-2017-13082
Oracle:CVE-2017-14735
Oracle:CVE-2017-15095
Oracle:CVE-2017-17562
Oracle:CVE-2017-3633
Oracle:CVE-2017-3736
Oracle:CVE-2017-3737
Oracle:CVE-2017-5533
Oracle:CVE-2017-5645
Oracle:CVE-2017-5662
Oracle:CVE-2017-5664
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-6074
Oracle:CVE-2017-7525
Oracle:CVE-2017-7805
Oracle:CVE-2017-9798
Oracle:CVE-2018-0732
Oracle:CVE-2018-0739
Oracle:CVE-2018-1000120
Oracle:CVE-2018-1000300
Oracle:CVE-2018-11039
Oracle:CVE-2018-1171
Oracle:CVE-2018-11776
Oracle:CVE-2018-1258
Oracle:CVE-2018-1275
Oracle:CVE-2018-1305
Oracle:CVE-2018-13785
Oracle:CVE-2018-1656
Oracle:CVE-2018-2563
Oracle:CVE-2018-2572
Oracle:CVE-2018-2587
Oracle:CVE-2018-2598
Oracle:CVE-2018-2628
Oracle:CVE-2018-2718
Oracle:CVE-2018-2737
Oracle:CVE-2018-2738
Oracle:CVE-2018-2739
Oracle:CVE-2018-2742
Oracle:CVE-2018-2746
Oracle:CVE-2018-2747
Oracle:CVE-2018-2748
Oracle:CVE-2018-2749
Oracle:CVE-2018-2750
Oracle:CVE-2018-2752
Oracle:CVE-2018-2753
Oracle:CVE-2018-2754
Oracle:CVE-2018-2755
Oracle:CVE-2018-2756
Oracle:CVE-2018-2758
Oracle:CVE-2018-2759
Oracle:CVE-2018-2760
Oracle:CVE-2018-2761
Oracle:CVE-2018-2762
Oracle:CVE-2018-2763
Oracle:CVE-2018-2764
Oracle:CVE-2018-2765
Oracle:CVE-2018-2766
Oracle:CVE-2018-2767
Oracle:CVE-2018-2768
Oracle:CVE-2018-2769
Oracle:CVE-2018-2770
Oracle:CVE-2018-2771
Oracle:CVE-2018-2772
Oracle:CVE-2018-2773
Oracle:CVE-2018-2774
Oracle:CVE-2018-2775
Oracle:CVE-2018-2776
Oracle:CVE-2018-2777
Oracle:CVE-2018-2778
Oracle:CVE-2018-2779
Oracle:CVE-2018-2780
Oracle:CVE-2018-2781
Oracle:CVE-2018-2782
Oracle:CVE-2018-2783
Oracle:CVE-2018-2784
Oracle:CVE-2018-2785
Oracle:CVE-2018-2786
Oracle:CVE-2018-2787
Oracle:CVE-2018-2788
Oracle:CVE-2018-2789
Oracle:CVE-2018-2790
Oracle:CVE-2018-2791
Oracle:CVE-2018-2792
Oracle:CVE-2018-2793
Oracle:CVE-2018-2794
Oracle:CVE-2018-2795
Oracle:CVE-2018-2796
Oracle:CVE-2018-2797
Oracle:CVE-2018-2798
Oracle:CVE-2018-2799
Oracle:CVE-2018-2800
Oracle:CVE-2018-2801
Oracle:CVE-2018-2804
Oracle:CVE-2018-2805
Oracle:CVE-2018-2806
Oracle:CVE-2018-2807
Oracle:CVE-2018-2808
Oracle:CVE-2018-2809
Oracle:CVE-2018-2810
Oracle:CVE-2018-2811
Oracle:CVE-2018-2812
Oracle:CVE-2018-2813
Oracle:CVE-2018-2814
Oracle:CVE-2018-2815
Oracle:CVE-2018-2816
Oracle:CVE-2018-2817
Oracle:CVE-2018-2818
Oracle:CVE-2018-2819
Oracle:CVE-2018-2820
Oracle:CVE-2018-2821
Oracle:CVE-2018-2822
Oracle:CVE-2018-2823
Oracle:CVE-2018-2825
Oracle:CVE-2018-2826
Oracle:CVE-2018-2827
Oracle:CVE-2018-2828
Oracle:CVE-2018-2830
Oracle:CVE-2018-2831
Oracle:CVE-2018-2832
Oracle:CVE-2018-2834
Oracle:CVE-2018-2835
Oracle:CVE-2018-2836
Oracle:CVE-2018-2837
Oracle:CVE-2018-2838
Oracle:CVE-2018-2839
Oracle:CVE-2018-2840
Oracle:CVE-2018-2841
Oracle:CVE-2018-2842
Oracle:CVE-2018-2843
Oracle:CVE-2018-2844
Oracle:CVE-2018-2845
Oracle:CVE-2018-2846
Oracle:CVE-2018-2849
Oracle:CVE-2018-2850
Oracle:CVE-2018-2852
Oracle:CVE-2018-2854
Oracle:CVE-2018-2855
Oracle:CVE-2018-2856
Oracle:CVE-2018-2857
Oracle:CVE-2018-2858
Oracle:CVE-2018-2859
Oracle:CVE-2018-2860
Oracle:CVE-2018-2861
Oracle:CVE-2018-2862
Oracle:CVE-2018-2863
Oracle:CVE-2018-2864
Oracle:CVE-2018-2865
Oracle:CVE-2018-2866
Oracle:CVE-2018-2867
Oracle:CVE-2018-2868
Oracle:CVE-2018-2869
Oracle:CVE-2018-2870
Oracle:CVE-2018-2871
Oracle:CVE-2018-2872
Oracle:CVE-2018-2873
Oracle:CVE-2018-2874
Oracle:CVE-2018-2876
Oracle:CVE-2018-2877
Oracle:CVE-2018-2878
Oracle:CVE-2018-2879
Oracle:CVE-2018-2881
Oracle:CVE-2018-2882
Oracle:CVE-2018-2887
Oracle:CVE-2018-2888
Oracle:CVE-2018-2889
Oracle:CVE-2018-2891
Oracle:CVE-2018-2892
Oracle:CVE-2018-2893
Oracle:CVE-2018-2894
Oracle:CVE-2018-2895
Oracle:CVE-2018-2896
Oracle:CVE-2018-2897
Oracle:CVE-2018-2898
Oracle:CVE-2018-2899
Oracle:CVE-2018-2900
Oracle:CVE-2018-2901
Oracle:CVE-2018-2902
Oracle:CVE-2018-2903
Oracle:CVE-2018-2904
Oracle:CVE-2018-2905
Oracle:CVE-2018-2906
Oracle:CVE-2018-2907
Oracle:CVE-2018-2908
Oracle:CVE-2018-2909
Oracle:CVE-2018-2911
Oracle:CVE-2018-2912
Oracle:CVE-2018-2913
Oracle:CVE-2018-2914
Oracle:CVE-2018-2915
Oracle:CVE-2018-2916
Oracle:CVE-2018-2917
Oracle:CVE-2018-2918
Oracle:CVE-2018-2919
Oracle:CVE-2018-2920
Oracle:CVE-2018-2921
Oracle:CVE-2018-2922
Oracle:CVE-2018-2923
Oracle:CVE-2018-2924
Oracle:CVE-2018-2925
Oracle:CVE-2018-2926
Oracle:CVE-2018-2927
Oracle:CVE-2018-2928
Oracle:CVE-2018-2929
Oracle:CVE-2018-2930
Oracle:CVE-2018-2932
Oracle:CVE-2018-2933
Oracle:CVE-2018-2934
Oracle:CVE-2018-2935
Oracle:CVE-2018-2936
Oracle:CVE-2018-2937
Oracle:CVE-2018-2938
Oracle:CVE-2018-2939
Oracle:CVE-2018-2940
Oracle:CVE-2018-2941
Oracle:CVE-2018-2942
Oracle:CVE-2018-2943
Oracle:CVE-2018-2944
Oracle:CVE-2018-2945
Oracle:CVE-2018-2946
Oracle:CVE-2018-2947
Oracle:CVE-2018-2948
Oracle:CVE-2018-2949
Oracle:CVE-2018-2950
Oracle:CVE-2018-2951
Oracle:CVE-2018-2952
Oracle:CVE-2018-2953
Oracle:CVE-2018-2954
Oracle:CVE-2018-2955
Oracle:CVE-2018-2956
Oracle:CVE-2018-2957
Oracle:CVE-2018-2958
Oracle:CVE-2018-2959
Oracle:CVE-2018-2960
Oracle:CVE-2018-2961
Oracle:CVE-2018-2962
Oracle:CVE-2018-2963
Oracle:CVE-2018-2964
Oracle:CVE-2018-2965
Oracle:CVE-2018-2966
Oracle:CVE-2018-2967
Oracle:CVE-2018-2968
Oracle:CVE-2018-2969
Oracle:CVE-2018-2970
Oracle:CVE-2018-2971
Oracle:CVE-2018-2972
Oracle:CVE-2018-2973
Oracle:CVE-2018-2974
Oracle:CVE-2018-2975
Oracle:CVE-2018-2976
Oracle:CVE-2018-2977
Oracle:CVE-2018-2979
Oracle:CVE-2018-2980
Oracle:CVE-2018-2981
Oracle:CVE-2018-2982
Oracle:CVE-2018-2984
Oracle:CVE-2018-2985
Oracle:CVE-2018-2986
Oracle:CVE-2018-2987
Oracle:CVE-2018-2988
Oracle:CVE-2018-2989
Oracle:CVE-2018-2990
Oracle:CVE-2018-2991
Oracle:CVE-2018-2992
Oracle:CVE-2018-2993
Oracle:CVE-2018-2994
Oracle:CVE-2018-2995
Oracle:CVE-2018-2996
Oracle:CVE-2018-2997
Oracle:CVE-2018-2998
Oracle:CVE-2018-2999
Oracle:CVE-2018-3000
Oracle:CVE-2018-3001
Oracle:CVE-2018-3002
Oracle:CVE-2018-3003
Oracle:CVE-2018-3004
Oracle:CVE-2018-3005
Oracle:CVE-2018-3006
Oracle:CVE-2018-3007
Oracle:CVE-2018-3008
Oracle:CVE-2018-3009
Oracle:CVE-2018-3010
Oracle:CVE-2018-3011
Oracle:CVE-2018-3012
Oracle:CVE-2018-3013
Oracle:CVE-2018-3014
Oracle:CVE-2018-3015
Oracle:CVE-2018-3016
Oracle:CVE-2018-3017
Oracle:CVE-2018-3018
Oracle:CVE-2018-3019
Oracle:CVE-2018-3020
Oracle:CVE-2018-3021
Oracle:CVE-2018-3022
Oracle:CVE-2018-3023
Oracle:CVE-2018-3024
Oracle:CVE-2018-3025
Oracle:CVE-2018-3026
Oracle:CVE-2018-3027
Oracle:CVE-2018-3028
Oracle:CVE-2018-3029
Oracle:CVE-2018-3030
Oracle:CVE-2018-3031
Oracle:CVE-2018-3032
Oracle:CVE-2018-3033
Oracle:CVE-2018-3034
Oracle:CVE-2018-3035
Oracle:CVE-2018-3036
Oracle:CVE-2018-3037
Oracle:CVE-2018-3038
Oracle:CVE-2018-3039
Oracle:CVE-2018-3040
Oracle:CVE-2018-3041
Oracle:CVE-2018-3042
Oracle:CVE-2018-3043
Oracle:CVE-2018-3044
Oracle:CVE-2018-3045
Oracle:CVE-2018-3046
Oracle:CVE-2018-3047
Oracle:CVE-2018-3048
Oracle:CVE-2018-3049
Oracle:CVE-2018-3050
Oracle:CVE-2018-3051
Oracle:CVE-2018-3052
Oracle:CVE-2018-3053
Oracle:CVE-2018-3054
Oracle:CVE-2018-3055
Oracle:CVE-2018-3056
Oracle:CVE-2018-3057
Oracle:CVE-2018-3058
Oracle:CVE-2018-3059
Oracle:CVE-2018-3060
Oracle:CVE-2018-3061
Oracle:CVE-2018-3062
Oracle:CVE-2018-3063
Oracle:CVE-2018-3064
Oracle:CVE-2018-3065
Oracle:CVE-2018-3066
Oracle:CVE-2018-3067
Oracle:CVE-2018-3068
Oracle:CVE-2018-3069
Oracle:CVE-2018-3070
Oracle:CVE-2018-3071
Oracle:CVE-2018-3072
Oracle:CVE-2018-3073
Oracle:CVE-2018-3074
Oracle:CVE-2018-3075
Oracle:CVE-2018-3076
Oracle:CVE-2018-3077
Oracle:CVE-2018-3078
Oracle:CVE-2018-3079
Oracle:CVE-2018-3080
Oracle:CVE-2018-3081
Oracle:CVE-2018-3082
Oracle:CVE-2018-3084
Oracle:CVE-2018-3085
Oracle:CVE-2018-3086
Oracle:CVE-2018-3087
Oracle:CVE-2018-3088
Oracle:CVE-2018-3089
Oracle:CVE-2018-3090
Oracle:CVE-2018-3091
Oracle:CVE-2018-3092
Oracle:CVE-2018-3093
Oracle:CVE-2018-3094
Oracle:CVE-2018-3095
Oracle:CVE-2018-3096
Oracle:CVE-2018-3097
Oracle:CVE-2018-3098
Oracle:CVE-2018-3099
Oracle:CVE-2018-3100
Oracle:CVE-2018-3101
Oracle:CVE-2018-3102
Oracle:CVE-2018-3103
Oracle:CVE-2018-3104
Oracle:CVE-2018-3105
Oracle:CVE-2018-3108
Oracle:CVE-2018-3109
Oracle:CVE-2018-3115
Oracle:CVE-2018-3122
Oracle:CVE-2018-3126
Oracle:CVE-2018-3127
Oracle:CVE-2018-3128
Oracle:CVE-2018-3129
Oracle:CVE-2018-3130
Oracle:CVE-2018-3131
Oracle:CVE-2018-3132
Oracle:CVE-2018-3133
Oracle:CVE-2018-3134
Oracle:CVE-2018-3135
Oracle:CVE-2018-3136
Oracle:CVE-2018-3137
Oracle:CVE-2018-3138
Oracle:CVE-2018-3139
Oracle:CVE-2018-3140
Oracle:CVE-2018-3141
Oracle:CVE-2018-3142
Oracle:CVE-2018-3143
Oracle:CVE-2018-3144
Oracle:CVE-2018-3145
Oracle:CVE-2018-3146
Oracle:CVE-2018-3147
Oracle:CVE-2018-3148
Oracle:CVE-2018-3149
Oracle:CVE-2018-3150
Oracle:CVE-2018-3151
Oracle:CVE-2018-3152
Oracle:CVE-2018-3153
Oracle:CVE-2018-3154
Oracle:CVE-2018-3155
Oracle:CVE-2018-3156
Oracle:CVE-2018-3157
Oracle:CVE-2018-3158
Oracle:CVE-2018-3159
Oracle:CVE-2018-3160
Oracle:CVE-2018-3161
Oracle:CVE-2018-3162
Oracle:CVE-2018-3163
Oracle:CVE-2018-3164
Oracle:CVE-2018-3165
Oracle:CVE-2018-3166
Oracle:CVE-2018-3167
Oracle:CVE-2018-3168
Oracle:CVE-2018-3169
Oracle:CVE-2018-3170
Oracle:CVE-2018-3171
Oracle:CVE-2018-3172
Oracle:CVE-2018-3173
Oracle:CVE-2018-3174
Oracle:CVE-2018-3175
Oracle:CVE-2018-3176
Oracle:CVE-2018-3177
Oracle:CVE-2018-3178
Oracle:CVE-2018-3179
Oracle:CVE-2018-3180
Oracle:CVE-2018-3181
Oracle:CVE-2018-3182
Oracle:CVE-2018-3183
Oracle:CVE-2018-3184
Oracle:CVE-2018-3185
Oracle:CVE-2018-3186
Oracle:CVE-2018-3187
Oracle:CVE-2018-3188
Oracle:CVE-2018-3189
Oracle:CVE-2018-3190
Oracle:CVE-2018-3191
Oracle:CVE-2018-3192
Oracle:CVE-2018-3193
Oracle:CVE-2018-3194
Oracle:CVE-2018-3195
Oracle:CVE-2018-3196
Oracle:CVE-2018-3197
Oracle:CVE-2018-3198
Oracle:CVE-2018-3200
Oracle:CVE-2018-3201
Oracle:CVE-2018-3202
Oracle:CVE-2018-3203
Oracle:CVE-2018-3204
Oracle:CVE-2018-3205
Oracle:CVE-2018-3206
Oracle:CVE-2018-3207
Oracle:CVE-2018-3208
Oracle:CVE-2018-3209
Oracle:CVE-2018-3210
Oracle:CVE-2018-3211
Oracle:CVE-2018-3212
Oracle:CVE-2018-3213
Oracle:CVE-2018-3214
Oracle:CVE-2018-3215
Oracle:CVE-2018-3217
Oracle:CVE-2018-3218
Oracle:CVE-2018-3219
Oracle:CVE-2018-3220
Oracle:CVE-2018-3221
Oracle:CVE-2018-3222
Oracle:CVE-2018-3223
Oracle:CVE-2018-3224
Oracle:CVE-2018-3225
Oracle:CVE-2018-3226
Oracle:CVE-2018-3227
Oracle:CVE-2018-3228
Oracle:CVE-2018-3229
Oracle:CVE-2018-3230
Oracle:CVE-2018-3231
Oracle:CVE-2018-3232
Oracle:CVE-2018-3233
Oracle:CVE-2018-3234
Oracle:CVE-2018-3235
Oracle:CVE-2018-3236
Oracle:CVE-2018-3237
Oracle:CVE-2018-3238
Oracle:CVE-2018-3239
Oracle:CVE-2018-3241
Oracle:CVE-2018-3242
Oracle:CVE-2018-3243
Oracle:CVE-2018-3244
Oracle:CVE-2018-3245
Oracle:CVE-2018-3246
Oracle:CVE-2018-3247
Oracle:CVE-2018-3248
Oracle:CVE-2018-3249
Oracle:CVE-2018-3250
Oracle:CVE-2018-3251
Oracle:CVE-2018-3252
Oracle:CVE-2018-3253
Oracle:CVE-2018-3254
Oracle:CVE-2018-3255
Oracle:CVE-2018-3256
Oracle:CVE-2018-3257
Oracle:CVE-2018-3258
Oracle:CVE-2018-3259
Oracle:CVE-2018-3261
Oracle:CVE-2018-3262
Oracle:CVE-2018-3263
Oracle:CVE-2018-3264
Oracle:CVE-2018-3265
Oracle:CVE-2018-3266
Oracle:CVE-2018-3267
Oracle:CVE-2018-3268
Oracle:CVE-2018-3269
Oracle:CVE-2018-3270
Oracle:CVE-2018-3271
Oracle:CVE-2018-3272
Oracle:CVE-2018-3273
Oracle:CVE-2018-3274
Oracle:CVE-2018-3275
Oracle:CVE-2018-3276
Oracle:CVE-2018-3277
Oracle:CVE-2018-3278
Oracle:CVE-2018-3279
Oracle:CVE-2018-3280
Oracle:CVE-2018-3281
Oracle:CVE-2018-3282
Oracle:CVE-2018-3283
Oracle:CVE-2018-3284
Oracle:CVE-2018-3285
Oracle:CVE-2018-3286
Oracle:CVE-2018-3287
Oracle:CVE-2018-3288
Oracle:CVE-2018-3289
Oracle:CVE-2018-3290
Oracle:CVE-2018-3291
Oracle:CVE-2018-3292
Oracle:CVE-2018-3293
Oracle:CVE-2018-3294
Oracle:CVE-2018-3295
Oracle:CVE-2018-3296
Oracle:CVE-2018-3297
Oracle:CVE-2018-3298
Oracle:CVE-2018-3299
Oracle:CVE-2018-3301
Oracle:CVE-2018-3302
Oracle:CVE-2018-7489
Oracle:CVE-2018-8013
Oracle:CVE-2018-8014
Oracle:CVE-2018-8037
RH:CVE-2017-13077
RH:CVE-2017-13078
RH:CVE-2017-13079
RH:CVE-2017-13080
RH:CVE-2017-13081
RH:CVE-2017-13082
RH:CVE-2017-13084
RH:CVE-2017-13086
RH:CVE-2017-13087
RH:CVE-2017-13088
RHSA-2017:2907
RHSA-2017:2911
SECTRACK:1039570
SECTRACK:1039571
SECTRACK:1039572
SECTRACK:1039573
SECTRACK:1039576
SECTRACK:1039577
SECTRACK:1039578
SECTRACK:1039581
SECTRACK:1039585
SECTRACK:1039703
SECTRACK:1041432
SMASH Issue 191142
SUSE:SUSE-SU-2017:2745
SUSE:SUSE-SU-2017:2752
SUSE:openSUSE-SU-2017:2755
UBUNTU:CVE-2017-13077
UBUNTU:CVE-2017-13078
UBUNTU:CVE-2017-13079
UBUNTU:CVE-2017-13080
UBUNTU:CVE-2017-13081
UBUNTU:CVE-2017-13082
UBUNTU:CVE-2017-13084
UBUNTU:CVE-2017-13086
UBUNTU:CVE-2017-13087
UBUNTU:CVE-2017-13088
UBUNTU:USN-3455-1
bdo#1033297
bnc#1056061
linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
rh#1167537
rh#1183461
rh#1202366
rh#1202380
rh#1202384
rh#1202395
rh#1202418
rh#1293972
rh#1369383
rh#1384344
rh#1393454
rh#1397485
rh#1399546
rh#1491692
rh#1491693
rh#1491694
rh#1491696
rh#1491697
rh#1491698
rh#1500301
rh#1500302
rh#1500303
rh#1500304
rh#1519780
rh#1553413
rh#1591854
rh#1607582
rh#1608073
rh#1731271
rh#2044599
rh#2044602
rh#2061700
rh#2116175
rh#2119127
rh#2161287
rh#2270497
CVE-2017-13078kernel-source-rt:Releasedimportant8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)BID:101274
CERT-VN:VU#228519
CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
CONFIRM:access.redhat.com:CVE-2017-13088
CONFIRM:cert-portal.siemens.com:CVE-2017-13088
CONFIRM:cert.vde.com:CVE-2017-13080
CONFIRM:cert.vde.com:CVE-2017-13088
CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080
CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082
CONFIRM:source.android.com:CVE-2017-5754
CONFIRM:source.android.com:CVE-2017-6264
CONFIRM:source.android.com:CVE-2017-6294
CONFIRM:support.apple.com:CVE-2017-13852
CONFIRM:support.apple.com:CVE-2017-13904
CONFIRM:support.apple.com:CVE-2017-3169
CONFIRM:support.hpe.com:CVE-2017-13081
CONFIRM:support.lenovo.com:CVE-2017-13088
CONFIRM:www.arubanetworks.com:CVE-2017-13088
CONFIRM:www.intel.com:CVE-2017-13080
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
CVE-2017-13084
CVE-2017-13086
CVE-2017-13087
CVE-2017-13088
CVE-2024-2466
D:CVE-2022-2590
DSA-3999
DSA-5378
FREEBSD:FreeBSD-SA-17:07
GENTOO:GLSA-201711-03
MISC:github.com:CVE-2017-13082
MISC:github.com:OSS:2024/Q1/256
MISC:ics-cert.us-cert.gov:CVE-2017-13082
MISC:w1.fi
MISC:w1.fi:CVE-2017-13088
MISC:www.krackattacks.com:CVE-2017-13088
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update
OSS:2017/Q4/83
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/11/10/2
OSS:2022/Q3/99
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2024/03/27/4
OSS:2024/Q1/256
Oracle:CVE-2011-4461
Oracle:CVE-2013-1768
Oracle:CVE-2014-0114
Oracle:CVE-2014-3490
Oracle:CVE-2014-3577
Oracle:CVE-2015-0204
Oracle:CVE-2015-0235
Oracle:CVE-2015-5600
Oracle:CVE-2015-6937
Oracle:CVE-2015-7501
Oracle:CVE-2015-7940
Oracle:CVE-2015-9251
Oracle:CVE-2016-0635
Oracle:CVE-2016-0714
Oracle:CVE-2016-0729
Oracle:CVE-2016-1000031
Oracle:CVE-2016-1181
Oracle:CVE-2016-1182
Oracle:CVE-2016-2099
Oracle:CVE-2016-2107
Oracle:CVE-2016-2176
Oracle:CVE-2016-2179
Oracle:CVE-2016-2183
Oracle:CVE-2016-3092
Oracle:CVE-2016-3506
Oracle:CVE-2016-4000
Oracle:CVE-2016-4055
Oracle:CVE-2016-5007
Oracle:CVE-2016-5019
Oracle:CVE-2016-5080
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2016-6304
Oracle:CVE-2016-6814
Oracle:CVE-2016-7103
Oracle:CVE-2016-7167
Oracle:CVE-2016-9843
Oracle:CVE-2016-9878
Oracle:CVE-2017-0379
Oracle:CVE-2017-10068
Oracle:CVE-2017-12617
Oracle:CVE-2017-13077
Oracle:CVE-2017-13082
Oracle:CVE-2017-14735
Oracle:CVE-2017-15095
Oracle:CVE-2017-17562
Oracle:CVE-2017-3633
Oracle:CVE-2017-3736
Oracle:CVE-2017-3737
Oracle:CVE-2017-5533
Oracle:CVE-2017-5645
Oracle:CVE-2017-5662
Oracle:CVE-2017-5664
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-6074
Oracle:CVE-2017-7525
Oracle:CVE-2017-7805
Oracle:CVE-2017-9798
Oracle:CVE-2018-0732
Oracle:CVE-2018-0739
Oracle:CVE-2018-1000120
Oracle:CVE-2018-1000300
Oracle:CVE-2018-11039
Oracle:CVE-2018-1171
Oracle:CVE-2018-11776
Oracle:CVE-2018-1258
Oracle:CVE-2018-1275
Oracle:CVE-2018-1305
Oracle:CVE-2018-13785
Oracle:CVE-2018-1656
Oracle:CVE-2018-2563
Oracle:CVE-2018-2572
Oracle:CVE-2018-2587
Oracle:CVE-2018-2598
Oracle:CVE-2018-2628
Oracle:CVE-2018-2718
Oracle:CVE-2018-2737
Oracle:CVE-2018-2738
Oracle:CVE-2018-2739
Oracle:CVE-2018-2742
Oracle:CVE-2018-2746
Oracle:CVE-2018-2747
Oracle:CVE-2018-2748
Oracle:CVE-2018-2749
Oracle:CVE-2018-2750
Oracle:CVE-2018-2752
Oracle:CVE-2018-2753
Oracle:CVE-2018-2754
Oracle:CVE-2018-2755
Oracle:CVE-2018-2756
Oracle:CVE-2018-2758
Oracle:CVE-2018-2759
Oracle:CVE-2018-2760
Oracle:CVE-2018-2761
Oracle:CVE-2018-2762
Oracle:CVE-2018-2763
Oracle:CVE-2018-2764
Oracle:CVE-2018-2765
Oracle:CVE-2018-2766
Oracle:CVE-2018-2767
Oracle:CVE-2018-2768
Oracle:CVE-2018-2769
Oracle:CVE-2018-2770
Oracle:CVE-2018-2771
Oracle:CVE-2018-2772
Oracle:CVE-2018-2773
Oracle:CVE-2018-2774
Oracle:CVE-2018-2775
Oracle:CVE-2018-2776
Oracle:CVE-2018-2777
Oracle:CVE-2018-2778
Oracle:CVE-2018-2779
Oracle:CVE-2018-2780
Oracle:CVE-2018-2781
Oracle:CVE-2018-2782
Oracle:CVE-2018-2783
Oracle:CVE-2018-2784
Oracle:CVE-2018-2785
Oracle:CVE-2018-2786
Oracle:CVE-2018-2787
Oracle:CVE-2018-2788
Oracle:CVE-2018-2789
Oracle:CVE-2018-2790
Oracle:CVE-2018-2791
Oracle:CVE-2018-2792
Oracle:CVE-2018-2793
Oracle:CVE-2018-2794
Oracle:CVE-2018-2795
Oracle:CVE-2018-2796
Oracle:CVE-2018-2797
Oracle:CVE-2018-2798
Oracle:CVE-2018-2799
Oracle:CVE-2018-2800
Oracle:CVE-2018-2801
Oracle:CVE-2018-2804
Oracle:CVE-2018-2805
Oracle:CVE-2018-2806
Oracle:CVE-2018-2807
Oracle:CVE-2018-2808
Oracle:CVE-2018-2809
Oracle:CVE-2018-2810
Oracle:CVE-2018-2811
Oracle:CVE-2018-2812
Oracle:CVE-2018-2813
Oracle:CVE-2018-2814
Oracle:CVE-2018-2815
Oracle:CVE-2018-2816
Oracle:CVE-2018-2817
Oracle:CVE-2018-2818
Oracle:CVE-2018-2819
Oracle:CVE-2018-2820
Oracle:CVE-2018-2821
Oracle:CVE-2018-2822
Oracle:CVE-2018-2823
Oracle:CVE-2018-2825
Oracle:CVE-2018-2826
Oracle:CVE-2018-2827
Oracle:CVE-2018-2828
Oracle:CVE-2018-2830
Oracle:CVE-2018-2831
Oracle:CVE-2018-2832
Oracle:CVE-2018-2834
Oracle:CVE-2018-2835
Oracle:CVE-2018-2836
Oracle:CVE-2018-2837
Oracle:CVE-2018-2838
Oracle:CVE-2018-2839
Oracle:CVE-2018-2840
Oracle:CVE-2018-2841
Oracle:CVE-2018-2842
Oracle:CVE-2018-2843
Oracle:CVE-2018-2844
Oracle:CVE-2018-2845
Oracle:CVE-2018-2846
Oracle:CVE-2018-2849
Oracle:CVE-2018-2850
Oracle:CVE-2018-2852
Oracle:CVE-2018-2854
Oracle:CVE-2018-2855
Oracle:CVE-2018-2856
Oracle:CVE-2018-2857
Oracle:CVE-2018-2858
Oracle:CVE-2018-2859
Oracle:CVE-2018-2860
Oracle:CVE-2018-2861
Oracle:CVE-2018-2862
Oracle:CVE-2018-2863
Oracle:CVE-2018-2864
Oracle:CVE-2018-2865
Oracle:CVE-2018-2866
Oracle:CVE-2018-2867
Oracle:CVE-2018-2868
Oracle:CVE-2018-2869
Oracle:CVE-2018-2870
Oracle:CVE-2018-2871
Oracle:CVE-2018-2872
Oracle:CVE-2018-2873
Oracle:CVE-2018-2874
Oracle:CVE-2018-2876
Oracle:CVE-2018-2877
Oracle:CVE-2018-2878
Oracle:CVE-2018-2879
Oracle:CVE-2018-2881
Oracle:CVE-2018-2882
Oracle:CVE-2018-2887
Oracle:CVE-2018-2888
Oracle:CVE-2018-2889
Oracle:CVE-2018-2891
Oracle:CVE-2018-2892
Oracle:CVE-2018-2893
Oracle:CVE-2018-2894
Oracle:CVE-2018-2895
Oracle:CVE-2018-2896
Oracle:CVE-2018-2897
Oracle:CVE-2018-2898
Oracle:CVE-2018-2899
Oracle:CVE-2018-2900
Oracle:CVE-2018-2901
Oracle:CVE-2018-2902
Oracle:CVE-2018-2903
Oracle:CVE-2018-2904
Oracle:CVE-2018-2905
Oracle:CVE-2018-2906
Oracle:CVE-2018-2907
Oracle:CVE-2018-2908
Oracle:CVE-2018-2909
Oracle:CVE-2018-2911
Oracle:CVE-2018-2912
Oracle:CVE-2018-2913
Oracle:CVE-2018-2914
Oracle:CVE-2018-2915
Oracle:CVE-2018-2916
Oracle:CVE-2018-2917
Oracle:CVE-2018-2918
Oracle:CVE-2018-2919
Oracle:CVE-2018-2920
Oracle:CVE-2018-2921
Oracle:CVE-2018-2922
Oracle:CVE-2018-2923
Oracle:CVE-2018-2924
Oracle:CVE-2018-2925
Oracle:CVE-2018-2926
Oracle:CVE-2018-2927
Oracle:CVE-2018-2928
Oracle:CVE-2018-2929
Oracle:CVE-2018-2930
Oracle:CVE-2018-2932
Oracle:CVE-2018-2933
Oracle:CVE-2018-2934
Oracle:CVE-2018-2935
Oracle:CVE-2018-2936
Oracle:CVE-2018-2937
Oracle:CVE-2018-2938
Oracle:CVE-2018-2939
Oracle:CVE-2018-2940
Oracle:CVE-2018-2941
Oracle:CVE-2018-2942
Oracle:CVE-2018-2943
Oracle:CVE-2018-2944
Oracle:CVE-2018-2945
Oracle:CVE-2018-2946
Oracle:CVE-2018-2947
Oracle:CVE-2018-2948
Oracle:CVE-2018-2949
Oracle:CVE-2018-2950
Oracle:CVE-2018-2951
Oracle:CVE-2018-2952
Oracle:CVE-2018-2953
Oracle:CVE-2018-2954
Oracle:CVE-2018-2955
Oracle:CVE-2018-2956
Oracle:CVE-2018-2957
Oracle:CVE-2018-2958
Oracle:CVE-2018-2959
Oracle:CVE-2018-2960
Oracle:CVE-2018-2961
Oracle:CVE-2018-2962
Oracle:CVE-2018-2963
Oracle:CVE-2018-2964
Oracle:CVE-2018-2965
Oracle:CVE-2018-2966
Oracle:CVE-2018-2967
Oracle:CVE-2018-2968
Oracle:CVE-2018-2969
Oracle:CVE-2018-2970
Oracle:CVE-2018-2971
Oracle:CVE-2018-2972
Oracle:CVE-2018-2973
Oracle:CVE-2018-2974
Oracle:CVE-2018-2975
Oracle:CVE-2018-2976
Oracle:CVE-2018-2977
Oracle:CVE-2018-2979
Oracle:CVE-2018-2980
Oracle:CVE-2018-2981
Oracle:CVE-2018-2982
Oracle:CVE-2018-2984
Oracle:CVE-2018-2985
Oracle:CVE-2018-2986
Oracle:CVE-2018-2987
Oracle:CVE-2018-2988
Oracle:CVE-2018-2989
Oracle:CVE-2018-2990
Oracle:CVE-2018-2991
Oracle:CVE-2018-2992
Oracle:CVE-2018-2993
Oracle:CVE-2018-2994
Oracle:CVE-2018-2995
Oracle:CVE-2018-2996
Oracle:CVE-2018-2997
Oracle:CVE-2018-2998
Oracle:CVE-2018-2999
Oracle:CVE-2018-3000
Oracle:CVE-2018-3001
Oracle:CVE-2018-3002
Oracle:CVE-2018-3003
Oracle:CVE-2018-3004
Oracle:CVE-2018-3005
Oracle:CVE-2018-3006
Oracle:CVE-2018-3007
Oracle:CVE-2018-3008
Oracle:CVE-2018-3009
Oracle:CVE-2018-3010
Oracle:CVE-2018-3011
Oracle:CVE-2018-3012
Oracle:CVE-2018-3013
Oracle:CVE-2018-3014
Oracle:CVE-2018-3015
Oracle:CVE-2018-3016
Oracle:CVE-2018-3017
Oracle:CVE-2018-3018
Oracle:CVE-2018-3019
Oracle:CVE-2018-3020
Oracle:CVE-2018-3021
Oracle:CVE-2018-3022
Oracle:CVE-2018-3023
Oracle:CVE-2018-3024
Oracle:CVE-2018-3025
Oracle:CVE-2018-3026
Oracle:CVE-2018-3027
Oracle:CVE-2018-3028
Oracle:CVE-2018-3029
Oracle:CVE-2018-3030
Oracle:CVE-2018-3031
Oracle:CVE-2018-3032
Oracle:CVE-2018-3033
Oracle:CVE-2018-3034
Oracle:CVE-2018-3035
Oracle:CVE-2018-3036
Oracle:CVE-2018-3037
Oracle:CVE-2018-3038
Oracle:CVE-2018-3039
Oracle:CVE-2018-3040
Oracle:CVE-2018-3041
Oracle:CVE-2018-3042
Oracle:CVE-2018-3043
Oracle:CVE-2018-3044
Oracle:CVE-2018-3045
Oracle:CVE-2018-3046
Oracle:CVE-2018-3047
Oracle:CVE-2018-3048
Oracle:CVE-2018-3049
Oracle:CVE-2018-3050
Oracle:CVE-2018-3051
Oracle:CVE-2018-3052
Oracle:CVE-2018-3053
Oracle:CVE-2018-3054
Oracle:CVE-2018-3055
Oracle:CVE-2018-3056
Oracle:CVE-2018-3057
Oracle:CVE-2018-3058
Oracle:CVE-2018-3059
Oracle:CVE-2018-3060
Oracle:CVE-2018-3061
Oracle:CVE-2018-3062
Oracle:CVE-2018-3063
Oracle:CVE-2018-3064
Oracle:CVE-2018-3065
Oracle:CVE-2018-3066
Oracle:CVE-2018-3067
Oracle:CVE-2018-3068
Oracle:CVE-2018-3069
Oracle:CVE-2018-3070
Oracle:CVE-2018-3071
Oracle:CVE-2018-3072
Oracle:CVE-2018-3073
Oracle:CVE-2018-3074
Oracle:CVE-2018-3075
Oracle:CVE-2018-3076
Oracle:CVE-2018-3077
Oracle:CVE-2018-3078
Oracle:CVE-2018-3079
Oracle:CVE-2018-3080
Oracle:CVE-2018-3081
Oracle:CVE-2018-3082
Oracle:CVE-2018-3084
Oracle:CVE-2018-3085
Oracle:CVE-2018-3086
Oracle:CVE-2018-3087
Oracle:CVE-2018-3088
Oracle:CVE-2018-3089
Oracle:CVE-2018-3090
Oracle:CVE-2018-3091
Oracle:CVE-2018-3092
Oracle:CVE-2018-3093
Oracle:CVE-2018-3094
Oracle:CVE-2018-3095
Oracle:CVE-2018-3096
Oracle:CVE-2018-3097
Oracle:CVE-2018-3098
Oracle:CVE-2018-3099
Oracle:CVE-2018-3100
Oracle:CVE-2018-3101
Oracle:CVE-2018-3102
Oracle:CVE-2018-3103
Oracle:CVE-2018-3104
Oracle:CVE-2018-3105
Oracle:CVE-2018-3108
Oracle:CVE-2018-3109
Oracle:CVE-2018-3115
Oracle:CVE-2018-3122
Oracle:CVE-2018-3126
Oracle:CVE-2018-3127
Oracle:CVE-2018-3128
Oracle:CVE-2018-3129
Oracle:CVE-2018-3130
Oracle:CVE-2018-3131
Oracle:CVE-2018-3132
Oracle:CVE-2018-3133
Oracle:CVE-2018-3134
Oracle:CVE-2018-3135
Oracle:CVE-2018-3136
Oracle:CVE-2018-3137
Oracle:CVE-2018-3138
Oracle:CVE-2018-3139
Oracle:CVE-2018-3140
Oracle:CVE-2018-3141
Oracle:CVE-2018-3142
Oracle:CVE-2018-3143
Oracle:CVE-2018-3144
Oracle:CVE-2018-3145
Oracle:CVE-2018-3146
Oracle:CVE-2018-3147
Oracle:CVE-2018-3148
Oracle:CVE-2018-3149
Oracle:CVE-2018-3150
Oracle:CVE-2018-3151
Oracle:CVE-2018-3152
Oracle:CVE-2018-3153
Oracle:CVE-2018-3154
Oracle:CVE-2018-3155
Oracle:CVE-2018-3156
Oracle:CVE-2018-3157
Oracle:CVE-2018-3158
Oracle:CVE-2018-3159
Oracle:CVE-2018-3160
Oracle:CVE-2018-3161
Oracle:CVE-2018-3162
Oracle:CVE-2018-3163
Oracle:CVE-2018-3164
Oracle:CVE-2018-3165
Oracle:CVE-2018-3166
Oracle:CVE-2018-3167
Oracle:CVE-2018-3168
Oracle:CVE-2018-3169
Oracle:CVE-2018-3170
Oracle:CVE-2018-3171
Oracle:CVE-2018-3172
Oracle:CVE-2018-3173
Oracle:CVE-2018-3174
Oracle:CVE-2018-3175
Oracle:CVE-2018-3176
Oracle:CVE-2018-3177
Oracle:CVE-2018-3178
Oracle:CVE-2018-3179
Oracle:CVE-2018-3180
Oracle:CVE-2018-3181
Oracle:CVE-2018-3182
Oracle:CVE-2018-3183
Oracle:CVE-2018-3184
Oracle:CVE-2018-3185
Oracle:CVE-2018-3186
Oracle:CVE-2018-3187
Oracle:CVE-2018-3188
Oracle:CVE-2018-3189
Oracle:CVE-2018-3190
Oracle:CVE-2018-3191
Oracle:CVE-2018-3192
Oracle:CVE-2018-3193
Oracle:CVE-2018-3194
Oracle:CVE-2018-3195
Oracle:CVE-2018-3196
Oracle:CVE-2018-3197
Oracle:CVE-2018-3198
Oracle:CVE-2018-3200
Oracle:CVE-2018-3201
Oracle:CVE-2018-3202
Oracle:CVE-2018-3203
Oracle:CVE-2018-3204
Oracle:CVE-2018-3205
Oracle:CVE-2018-3206
Oracle:CVE-2018-3207
Oracle:CVE-2018-3208
Oracle:CVE-2018-3209
Oracle:CVE-2018-3210
Oracle:CVE-2018-3211
Oracle:CVE-2018-3212
Oracle:CVE-2018-3213
Oracle:CVE-2018-3214
Oracle:CVE-2018-3215
Oracle:CVE-2018-3217
Oracle:CVE-2018-3218
Oracle:CVE-2018-3219
Oracle:CVE-2018-3220
Oracle:CVE-2018-3221
Oracle:CVE-2018-3222
Oracle:CVE-2018-3223
Oracle:CVE-2018-3224
Oracle:CVE-2018-3225
Oracle:CVE-2018-3226
Oracle:CVE-2018-3227
Oracle:CVE-2018-3228
Oracle:CVE-2018-3229
Oracle:CVE-2018-3230
Oracle:CVE-2018-3231
Oracle:CVE-2018-3232
Oracle:CVE-2018-3233
Oracle:CVE-2018-3234
Oracle:CVE-2018-3235
Oracle:CVE-2018-3236
Oracle:CVE-2018-3237
Oracle:CVE-2018-3238
Oracle:CVE-2018-3239
Oracle:CVE-2018-3241
Oracle:CVE-2018-3242
Oracle:CVE-2018-3243
Oracle:CVE-2018-3244
Oracle:CVE-2018-3245
Oracle:CVE-2018-3246
Oracle:CVE-2018-3247
Oracle:CVE-2018-3248
Oracle:CVE-2018-3249
Oracle:CVE-2018-3250
Oracle:CVE-2018-3251
Oracle:CVE-2018-3252
Oracle:CVE-2018-3253
Oracle:CVE-2018-3254
Oracle:CVE-2018-3255
Oracle:CVE-2018-3256
Oracle:CVE-2018-3257
Oracle:CVE-2018-3258
Oracle:CVE-2018-3259
Oracle:CVE-2018-3261
Oracle:CVE-2018-3262
Oracle:CVE-2018-3263
Oracle:CVE-2018-3264
Oracle:CVE-2018-3265
Oracle:CVE-2018-3266
Oracle:CVE-2018-3267
Oracle:CVE-2018-3268
Oracle:CVE-2018-3269
Oracle:CVE-2018-3270
Oracle:CVE-2018-3271
Oracle:CVE-2018-3272
Oracle:CVE-2018-3273
Oracle:CVE-2018-3274
Oracle:CVE-2018-3275
Oracle:CVE-2018-3276
Oracle:CVE-2018-3277
Oracle:CVE-2018-3278
Oracle:CVE-2018-3279
Oracle:CVE-2018-3280
Oracle:CVE-2018-3281
Oracle:CVE-2018-3282
Oracle:CVE-2018-3283
Oracle:CVE-2018-3284
Oracle:CVE-2018-3285
Oracle:CVE-2018-3286
Oracle:CVE-2018-3287
Oracle:CVE-2018-3288
Oracle:CVE-2018-3289
Oracle:CVE-2018-3290
Oracle:CVE-2018-3291
Oracle:CVE-2018-3292
Oracle:CVE-2018-3293
Oracle:CVE-2018-3294
Oracle:CVE-2018-3295
Oracle:CVE-2018-3296
Oracle:CVE-2018-3297
Oracle:CVE-2018-3298
Oracle:CVE-2018-3299
Oracle:CVE-2018-3301
Oracle:CVE-2018-3302
Oracle:CVE-2018-7489
Oracle:CVE-2018-8013
Oracle:CVE-2018-8014
Oracle:CVE-2018-8037
RH:CVE-2017-13077
RH:CVE-2017-13078
RH:CVE-2017-13079
RH:CVE-2017-13080
RH:CVE-2017-13081
RH:CVE-2017-13082
RH:CVE-2017-13084
RH:CVE-2017-13086
RH:CVE-2017-13087
RH:CVE-2017-13088
RHSA-2017:2907
RHSA-2017:2911
SECTRACK:1039570
SECTRACK:1039571
SECTRACK:1039572
SECTRACK:1039573
SECTRACK:1039576
SECTRACK:1039577
SECTRACK:1039578
SECTRACK:1039581
SECTRACK:1039585
SECTRACK:1039703
SECTRACK:1041432
SMASH Issue 191142
SUSE:SUSE-SU-2017:2745
SUSE:SUSE-SU-2017:2752
SUSE:openSUSE-SU-2017:2755
UBUNTU:CVE-2017-13077
UBUNTU:CVE-2017-13078
UBUNTU:CVE-2017-13079
UBUNTU:CVE-2017-13080
UBUNTU:CVE-2017-13081
UBUNTU:CVE-2017-13082
UBUNTU:CVE-2017-13084
UBUNTU:CVE-2017-13086
UBUNTU:CVE-2017-13087
UBUNTU:CVE-2017-13088
UBUNTU:USN-3455-1
bdo#1033297
bnc#1056061
linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
rh#1167537
rh#1183461
rh#1202366
rh#1202380
rh#1202384
rh#1202395
rh#1202418
rh#1293972
rh#1369383
rh#1384344
rh#1393454
rh#1397485
rh#1399546
rh#1491692
rh#1491693
rh#1491694
rh#1491696
rh#1491697
rh#1491698
rh#1500301
rh#1500302
rh#1500303
rh#1500304
rh#1519780
rh#1553413
rh#1591854
rh#1607582
rh#1608073
rh#1731271
rh#2044599
rh#2044602
rh#2061700
rh#2116175
rh#2119127
rh#2161287
rh#2270497
CVE-2017-13079kernel-source-rt:Releasedimportant8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)BID:101274
CERT-VN:VU#228519
CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
CONFIRM:access.redhat.com:CVE-2017-13088
CONFIRM:cert-portal.siemens.com:CVE-2017-13088
CONFIRM:cert.vde.com:CVE-2017-13080
CONFIRM:cert.vde.com:CVE-2017-13088
CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080
CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082
CONFIRM:source.android.com:CVE-2017-5754
CONFIRM:source.android.com:CVE-2017-6264
CONFIRM:source.android.com:CVE-2017-6294
CONFIRM:support.apple.com:CVE-2017-13852
CONFIRM:support.apple.com:CVE-2017-13904
CONFIRM:support.apple.com:CVE-2017-3169
CONFIRM:support.hpe.com:CVE-2017-13081
CONFIRM:support.lenovo.com:CVE-2017-13088
CONFIRM:www.arubanetworks.com:CVE-2017-13088
CONFIRM:www.intel.com:CVE-2017-13080
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
CVE-2017-13084
CVE-2017-13086
CVE-2017-13087
CVE-2017-13088
CVE-2024-2466
D:CVE-2022-2590
DSA-3999
DSA-5378
FREEBSD:FreeBSD-SA-17:07
GENTOO:GLSA-201711-03
MISC:github.com:CVE-2017-13082
MISC:github.com:OSS:2024/Q1/256
MISC:ics-cert.us-cert.gov:CVE-2017-13082
MISC:w1.fi
MISC:w1.fi:CVE-2017-13088
MISC:www.krackattacks.com:CVE-2017-13088
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update
OSS:2017/Q4/83
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/11/10/2
OSS:2022/Q3/99
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2024/03/27/4
OSS:2024/Q1/256
Oracle:CVE-2011-4461
Oracle:CVE-2013-1768
Oracle:CVE-2014-0114
Oracle:CVE-2014-3490
Oracle:CVE-2014-3577
Oracle:CVE-2015-0204
Oracle:CVE-2015-0235
Oracle:CVE-2015-5600
Oracle:CVE-2015-6937
Oracle:CVE-2015-7501
Oracle:CVE-2015-7940
Oracle:CVE-2015-9251
Oracle:CVE-2016-0635
Oracle:CVE-2016-0714
Oracle:CVE-2016-0729
Oracle:CVE-2016-1000031
Oracle:CVE-2016-1181
Oracle:CVE-2016-1182
Oracle:CVE-2016-2099
Oracle:CVE-2016-2107
Oracle:CVE-2016-2176
Oracle:CVE-2016-2179
Oracle:CVE-2016-2183
Oracle:CVE-2016-3092
Oracle:CVE-2016-3506
Oracle:CVE-2016-4000
Oracle:CVE-2016-4055
Oracle:CVE-2016-5007
Oracle:CVE-2016-5019
Oracle:CVE-2016-5080
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2016-6304
Oracle:CVE-2016-6814
Oracle:CVE-2016-7103
Oracle:CVE-2016-7167
Oracle:CVE-2016-9843
Oracle:CVE-2016-9878
Oracle:CVE-2017-0379
Oracle:CVE-2017-10068
Oracle:CVE-2017-12617
Oracle:CVE-2017-13077
Oracle:CVE-2017-13082
Oracle:CVE-2017-14735
Oracle:CVE-2017-15095
Oracle:CVE-2017-17562
Oracle:CVE-2017-3633
Oracle:CVE-2017-3736
Oracle:CVE-2017-3737
Oracle:CVE-2017-5533
Oracle:CVE-2017-5645
Oracle:CVE-2017-5662
Oracle:CVE-2017-5664
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-6074
Oracle:CVE-2017-7525
Oracle:CVE-2017-7805
Oracle:CVE-2017-9798
Oracle:CVE-2018-0732
Oracle:CVE-2018-0739
Oracle:CVE-2018-1000120
Oracle:CVE-2018-1000300
Oracle:CVE-2018-11039
Oracle:CVE-2018-1171
Oracle:CVE-2018-11776
Oracle:CVE-2018-1258
Oracle:CVE-2018-1275
Oracle:CVE-2018-1305
Oracle:CVE-2018-13785
Oracle:CVE-2018-1656
Oracle:CVE-2018-2563
Oracle:CVE-2018-2572
Oracle:CVE-2018-2587
Oracle:CVE-2018-2598
Oracle:CVE-2018-2628
Oracle:CVE-2018-2718
Oracle:CVE-2018-2737
Oracle:CVE-2018-2738
Oracle:CVE-2018-2739
Oracle:CVE-2018-2742
Oracle:CVE-2018-2746
Oracle:CVE-2018-2747
Oracle:CVE-2018-2748
Oracle:CVE-2018-2749
Oracle:CVE-2018-2750
Oracle:CVE-2018-2752
Oracle:CVE-2018-2753
Oracle:CVE-2018-2754
Oracle:CVE-2018-2755
Oracle:CVE-2018-2756
Oracle:CVE-2018-2758
Oracle:CVE-2018-2759
Oracle:CVE-2018-2760
Oracle:CVE-2018-2761
Oracle:CVE-2018-2762
Oracle:CVE-2018-2763
Oracle:CVE-2018-2764
Oracle:CVE-2018-2765
Oracle:CVE-2018-2766
Oracle:CVE-2018-2767
Oracle:CVE-2018-2768
Oracle:CVE-2018-2769
Oracle:CVE-2018-2770
Oracle:CVE-2018-2771
Oracle:CVE-2018-2772
Oracle:CVE-2018-2773
Oracle:CVE-2018-2774
Oracle:CVE-2018-2775
Oracle:CVE-2018-2776
Oracle:CVE-2018-2777
Oracle:CVE-2018-2778
Oracle:CVE-2018-2779
Oracle:CVE-2018-2780
Oracle:CVE-2018-2781
Oracle:CVE-2018-2782
Oracle:CVE-2018-2783
Oracle:CVE-2018-2784
Oracle:CVE-2018-2785
Oracle:CVE-2018-2786
Oracle:CVE-2018-2787
Oracle:CVE-2018-2788
Oracle:CVE-2018-2789
Oracle:CVE-2018-2790
Oracle:CVE-2018-2791
Oracle:CVE-2018-2792
Oracle:CVE-2018-2793
Oracle:CVE-2018-2794
Oracle:CVE-2018-2795
Oracle:CVE-2018-2796
Oracle:CVE-2018-2797
Oracle:CVE-2018-2798
Oracle:CVE-2018-2799
Oracle:CVE-2018-2800
Oracle:CVE-2018-2801
Oracle:CVE-2018-2804
Oracle:CVE-2018-2805
Oracle:CVE-2018-2806
Oracle:CVE-2018-2807
Oracle:CVE-2018-2808
Oracle:CVE-2018-2809
Oracle:CVE-2018-2810
Oracle:CVE-2018-2811
Oracle:CVE-2018-2812
Oracle:CVE-2018-2813
Oracle:CVE-2018-2814
Oracle:CVE-2018-2815
Oracle:CVE-2018-2816
Oracle:CVE-2018-2817
Oracle:CVE-2018-2818
Oracle:CVE-2018-2819
Oracle:CVE-2018-2820
Oracle:CVE-2018-2821
Oracle:CVE-2018-2822
Oracle:CVE-2018-2823
Oracle:CVE-2018-2825
Oracle:CVE-2018-2826
Oracle:CVE-2018-2827
Oracle:CVE-2018-2828
Oracle:CVE-2018-2830
Oracle:CVE-2018-2831
Oracle:CVE-2018-2832
Oracle:CVE-2018-2834
Oracle:CVE-2018-2835
Oracle:CVE-2018-2836
Oracle:CVE-2018-2837
Oracle:CVE-2018-2838
Oracle:CVE-2018-2839
Oracle:CVE-2018-2840
Oracle:CVE-2018-2841
Oracle:CVE-2018-2842
Oracle:CVE-2018-2843
Oracle:CVE-2018-2844
Oracle:CVE-2018-2845
Oracle:CVE-2018-2846
Oracle:CVE-2018-2849
Oracle:CVE-2018-2850
Oracle:CVE-2018-2852
Oracle:CVE-2018-2854
Oracle:CVE-2018-2855
Oracle:CVE-2018-2856
Oracle:CVE-2018-2857
Oracle:CVE-2018-2858
Oracle:CVE-2018-2859
Oracle:CVE-2018-2860
Oracle:CVE-2018-2861
Oracle:CVE-2018-2862
Oracle:CVE-2018-2863
Oracle:CVE-2018-2864
Oracle:CVE-2018-2865
Oracle:CVE-2018-2866
Oracle:CVE-2018-2867
Oracle:CVE-2018-2868
Oracle:CVE-2018-2869
Oracle:CVE-2018-2870
Oracle:CVE-2018-2871
Oracle:CVE-2018-2872
Oracle:CVE-2018-2873
Oracle:CVE-2018-2874
Oracle:CVE-2018-2876
Oracle:CVE-2018-2877
Oracle:CVE-2018-2878
Oracle:CVE-2018-2879
Oracle:CVE-2018-2881
Oracle:CVE-2018-2882
Oracle:CVE-2018-2887
Oracle:CVE-2018-2888
Oracle:CVE-2018-2889
Oracle:CVE-2018-2891
Oracle:CVE-2018-2892
Oracle:CVE-2018-2893
Oracle:CVE-2018-2894
Oracle:CVE-2018-2895
Oracle:CVE-2018-2896
Oracle:CVE-2018-2897
Oracle:CVE-2018-2898
Oracle:CVE-2018-2899
Oracle:CVE-2018-2900
Oracle:CVE-2018-2901
Oracle:CVE-2018-2902
Oracle:CVE-2018-2903
Oracle:CVE-2018-2904
Oracle:CVE-2018-2905
Oracle:CVE-2018-2906
Oracle:CVE-2018-2907
Oracle:CVE-2018-2908
Oracle:CVE-2018-2909
Oracle:CVE-2018-2911
Oracle:CVE-2018-2912
Oracle:CVE-2018-2913
Oracle:CVE-2018-2914
Oracle:CVE-2018-2915
Oracle:CVE-2018-2916
Oracle:CVE-2018-2917
Oracle:CVE-2018-2918
Oracle:CVE-2018-2919
Oracle:CVE-2018-2920
Oracle:CVE-2018-2921
Oracle:CVE-2018-2922
Oracle:CVE-2018-2923
Oracle:CVE-2018-2924
Oracle:CVE-2018-2925
Oracle:CVE-2018-2926
Oracle:CVE-2018-2927
Oracle:CVE-2018-2928
Oracle:CVE-2018-2929
Oracle:CVE-2018-2930
Oracle:CVE-2018-2932
Oracle:CVE-2018-2933
Oracle:CVE-2018-2934
Oracle:CVE-2018-2935
Oracle:CVE-2018-2936
Oracle:CVE-2018-2937
Oracle:CVE-2018-2938
Oracle:CVE-2018-2939
Oracle:CVE-2018-2940
Oracle:CVE-2018-2941
Oracle:CVE-2018-2942
Oracle:CVE-2018-2943
Oracle:CVE-2018-2944
Oracle:CVE-2018-2945
Oracle:CVE-2018-2946
Oracle:CVE-2018-2947
Oracle:CVE-2018-2948
Oracle:CVE-2018-2949
Oracle:CVE-2018-2950
Oracle:CVE-2018-2951
Oracle:CVE-2018-2952
Oracle:CVE-2018-2953
Oracle:CVE-2018-2954
Oracle:CVE-2018-2955
Oracle:CVE-2018-2956
Oracle:CVE-2018-2957
Oracle:CVE-2018-2958
Oracle:CVE-2018-2959
Oracle:CVE-2018-2960
Oracle:CVE-2018-2961
Oracle:CVE-2018-2962
Oracle:CVE-2018-2963
Oracle:CVE-2018-2964
Oracle:CVE-2018-2965
Oracle:CVE-2018-2966
Oracle:CVE-2018-2967
Oracle:CVE-2018-2968
Oracle:CVE-2018-2969
Oracle:CVE-2018-2970
Oracle:CVE-2018-2971
Oracle:CVE-2018-2972
Oracle:CVE-2018-2973
Oracle:CVE-2018-2974
Oracle:CVE-2018-2975
Oracle:CVE-2018-2976
Oracle:CVE-2018-2977
Oracle:CVE-2018-2979
Oracle:CVE-2018-2980
Oracle:CVE-2018-2981
Oracle:CVE-2018-2982
Oracle:CVE-2018-2984
Oracle:CVE-2018-2985
Oracle:CVE-2018-2986
Oracle:CVE-2018-2987
Oracle:CVE-2018-2988
Oracle:CVE-2018-2989
Oracle:CVE-2018-2990
Oracle:CVE-2018-2991
Oracle:CVE-2018-2992
Oracle:CVE-2018-2993
Oracle:CVE-2018-2994
Oracle:CVE-2018-2995
Oracle:CVE-2018-2996
Oracle:CVE-2018-2997
Oracle:CVE-2018-2998
Oracle:CVE-2018-2999
Oracle:CVE-2018-3000
Oracle:CVE-2018-3001
Oracle:CVE-2018-3002
Oracle:CVE-2018-3003
Oracle:CVE-2018-3004
Oracle:CVE-2018-3005
Oracle:CVE-2018-3006
Oracle:CVE-2018-3007
Oracle:CVE-2018-3008
Oracle:CVE-2018-3009
Oracle:CVE-2018-3010
Oracle:CVE-2018-3011
Oracle:CVE-2018-3012
Oracle:CVE-2018-3013
Oracle:CVE-2018-3014
Oracle:CVE-2018-3015
Oracle:CVE-2018-3016
Oracle:CVE-2018-3017
Oracle:CVE-2018-3018
Oracle:CVE-2018-3019
Oracle:CVE-2018-3020
Oracle:CVE-2018-3021
Oracle:CVE-2018-3022
Oracle:CVE-2018-3023
Oracle:CVE-2018-3024
Oracle:CVE-2018-3025
Oracle:CVE-2018-3026
Oracle:CVE-2018-3027
Oracle:CVE-2018-3028
Oracle:CVE-2018-3029
Oracle:CVE-2018-3030
Oracle:CVE-2018-3031
Oracle:CVE-2018-3032
Oracle:CVE-2018-3033
Oracle:CVE-2018-3034
Oracle:CVE-2018-3035
Oracle:CVE-2018-3036
Oracle:CVE-2018-3037
Oracle:CVE-2018-3038
Oracle:CVE-2018-3039
Oracle:CVE-2018-3040
Oracle:CVE-2018-3041
Oracle:CVE-2018-3042
Oracle:CVE-2018-3043
Oracle:CVE-2018-3044
Oracle:CVE-2018-3045
Oracle:CVE-2018-3046
Oracle:CVE-2018-3047
Oracle:CVE-2018-3048
Oracle:CVE-2018-3049
Oracle:CVE-2018-3050
Oracle:CVE-2018-3051
Oracle:CVE-2018-3052
Oracle:CVE-2018-3053
Oracle:CVE-2018-3054
Oracle:CVE-2018-3055
Oracle:CVE-2018-3056
Oracle:CVE-2018-3057
Oracle:CVE-2018-3058
Oracle:CVE-2018-3059
Oracle:CVE-2018-3060
Oracle:CVE-2018-3061
Oracle:CVE-2018-3062
Oracle:CVE-2018-3063
Oracle:CVE-2018-3064
Oracle:CVE-2018-3065
Oracle:CVE-2018-3066
Oracle:CVE-2018-3067
Oracle:CVE-2018-3068
Oracle:CVE-2018-3069
Oracle:CVE-2018-3070
Oracle:CVE-2018-3071
Oracle:CVE-2018-3072
Oracle:CVE-2018-3073
Oracle:CVE-2018-3074
Oracle:CVE-2018-3075
Oracle:CVE-2018-3076
Oracle:CVE-2018-3077
Oracle:CVE-2018-3078
Oracle:CVE-2018-3079
Oracle:CVE-2018-3080
Oracle:CVE-2018-3081
Oracle:CVE-2018-3082
Oracle:CVE-2018-3084
Oracle:CVE-2018-3085
Oracle:CVE-2018-3086
Oracle:CVE-2018-3087
Oracle:CVE-2018-3088
Oracle:CVE-2018-3089
Oracle:CVE-2018-3090
Oracle:CVE-2018-3091
Oracle:CVE-2018-3092
Oracle:CVE-2018-3093
Oracle:CVE-2018-3094
Oracle:CVE-2018-3095
Oracle:CVE-2018-3096
Oracle:CVE-2018-3097
Oracle:CVE-2018-3098
Oracle:CVE-2018-3099
Oracle:CVE-2018-3100
Oracle:CVE-2018-3101
Oracle:CVE-2018-3102
Oracle:CVE-2018-3103
Oracle:CVE-2018-3104
Oracle:CVE-2018-3105
Oracle:CVE-2018-3108
Oracle:CVE-2018-3109
Oracle:CVE-2018-3115
Oracle:CVE-2018-3122
Oracle:CVE-2018-3126
Oracle:CVE-2018-3127
Oracle:CVE-2018-3128
Oracle:CVE-2018-3129
Oracle:CVE-2018-3130
Oracle:CVE-2018-3131
Oracle:CVE-2018-3132
Oracle:CVE-2018-3133
Oracle:CVE-2018-3134
Oracle:CVE-2018-3135
Oracle:CVE-2018-3136
Oracle:CVE-2018-3137
Oracle:CVE-2018-3138
Oracle:CVE-2018-3139
Oracle:CVE-2018-3140
Oracle:CVE-2018-3141
Oracle:CVE-2018-3142
Oracle:CVE-2018-3143
Oracle:CVE-2018-3144
Oracle:CVE-2018-3145
Oracle:CVE-2018-3146
Oracle:CVE-2018-3147
Oracle:CVE-2018-3148
Oracle:CVE-2018-3149
Oracle:CVE-2018-3150
Oracle:CVE-2018-3151
Oracle:CVE-2018-3152
Oracle:CVE-2018-3153
Oracle:CVE-2018-3154
Oracle:CVE-2018-3155
Oracle:CVE-2018-3156
Oracle:CVE-2018-3157
Oracle:CVE-2018-3158
Oracle:CVE-2018-3159
Oracle:CVE-2018-3160
Oracle:CVE-2018-3161
Oracle:CVE-2018-3162
Oracle:CVE-2018-3163
Oracle:CVE-2018-3164
Oracle:CVE-2018-3165
Oracle:CVE-2018-3166
Oracle:CVE-2018-3167
Oracle:CVE-2018-3168
Oracle:CVE-2018-3169
Oracle:CVE-2018-3170
Oracle:CVE-2018-3171
Oracle:CVE-2018-3172
Oracle:CVE-2018-3173
Oracle:CVE-2018-3174
Oracle:CVE-2018-3175
Oracle:CVE-2018-3176
Oracle:CVE-2018-3177
Oracle:CVE-2018-3178
Oracle:CVE-2018-3179
Oracle:CVE-2018-3180
Oracle:CVE-2018-3181
Oracle:CVE-2018-3182
Oracle:CVE-2018-3183
Oracle:CVE-2018-3184
Oracle:CVE-2018-3185
Oracle:CVE-2018-3186
Oracle:CVE-2018-3187
Oracle:CVE-2018-3188
Oracle:CVE-2018-3189
Oracle:CVE-2018-3190
Oracle:CVE-2018-3191
Oracle:CVE-2018-3192
Oracle:CVE-2018-3193
Oracle:CVE-2018-3194
Oracle:CVE-2018-3195
Oracle:CVE-2018-3196
Oracle:CVE-2018-3197
Oracle:CVE-2018-3198
Oracle:CVE-2018-3200
Oracle:CVE-2018-3201
Oracle:CVE-2018-3202
Oracle:CVE-2018-3203
Oracle:CVE-2018-3204
Oracle:CVE-2018-3205
Oracle:CVE-2018-3206
Oracle:CVE-2018-3207
Oracle:CVE-2018-3208
Oracle:CVE-2018-3209
Oracle:CVE-2018-3210
Oracle:CVE-2018-3211
Oracle:CVE-2018-3212
Oracle:CVE-2018-3213
Oracle:CVE-2018-3214
Oracle:CVE-2018-3215
Oracle:CVE-2018-3217
Oracle:CVE-2018-3218
Oracle:CVE-2018-3219
Oracle:CVE-2018-3220
Oracle:CVE-2018-3221
Oracle:CVE-2018-3222
Oracle:CVE-2018-3223
Oracle:CVE-2018-3224
Oracle:CVE-2018-3225
Oracle:CVE-2018-3226
Oracle:CVE-2018-3227
Oracle:CVE-2018-3228
Oracle:CVE-2018-3229
Oracle:CVE-2018-3230
Oracle:CVE-2018-3231
Oracle:CVE-2018-3232
Oracle:CVE-2018-3233
Oracle:CVE-2018-3234
Oracle:CVE-2018-3235
Oracle:CVE-2018-3236
Oracle:CVE-2018-3237
Oracle:CVE-2018-3238
Oracle:CVE-2018-3239
Oracle:CVE-2018-3241
Oracle:CVE-2018-3242
Oracle:CVE-2018-3243
Oracle:CVE-2018-3244
Oracle:CVE-2018-3245
Oracle:CVE-2018-3246
Oracle:CVE-2018-3247
Oracle:CVE-2018-3248
Oracle:CVE-2018-3249
Oracle:CVE-2018-3250
Oracle:CVE-2018-3251
Oracle:CVE-2018-3252
Oracle:CVE-2018-3253
Oracle:CVE-2018-3254
Oracle:CVE-2018-3255
Oracle:CVE-2018-3256
Oracle:CVE-2018-3257
Oracle:CVE-2018-3258
Oracle:CVE-2018-3259
Oracle:CVE-2018-3261
Oracle:CVE-2018-3262
Oracle:CVE-2018-3263
Oracle:CVE-2018-3264
Oracle:CVE-2018-3265
Oracle:CVE-2018-3266
Oracle:CVE-2018-3267
Oracle:CVE-2018-3268
Oracle:CVE-2018-3269
Oracle:CVE-2018-3270
Oracle:CVE-2018-3271
Oracle:CVE-2018-3272
Oracle:CVE-2018-3273
Oracle:CVE-2018-3274
Oracle:CVE-2018-3275
Oracle:CVE-2018-3276
Oracle:CVE-2018-3277
Oracle:CVE-2018-3278
Oracle:CVE-2018-3279
Oracle:CVE-2018-3280
Oracle:CVE-2018-3281
Oracle:CVE-2018-3282
Oracle:CVE-2018-3283
Oracle:CVE-2018-3284
Oracle:CVE-2018-3285
Oracle:CVE-2018-3286
Oracle:CVE-2018-3287
Oracle:CVE-2018-3288
Oracle:CVE-2018-3289
Oracle:CVE-2018-3290
Oracle:CVE-2018-3291
Oracle:CVE-2018-3292
Oracle:CVE-2018-3293
Oracle:CVE-2018-3294
Oracle:CVE-2018-3295
Oracle:CVE-2018-3296
Oracle:CVE-2018-3297
Oracle:CVE-2018-3298
Oracle:CVE-2018-3299
Oracle:CVE-2018-3301
Oracle:CVE-2018-3302
Oracle:CVE-2018-7489
Oracle:CVE-2018-8013
Oracle:CVE-2018-8014
Oracle:CVE-2018-8037
RH:CVE-2017-13077
RH:CVE-2017-13078
RH:CVE-2017-13079
RH:CVE-2017-13080
RH:CVE-2017-13081
RH:CVE-2017-13082
RH:CVE-2017-13084
RH:CVE-2017-13086
RH:CVE-2017-13087
RH:CVE-2017-13088
RHSA-2017:2907
RHSA-2017:2911
SECTRACK:1039570
SECTRACK:1039571
SECTRACK:1039572
SECTRACK:1039573
SECTRACK:1039576
SECTRACK:1039577
SECTRACK:1039578
SECTRACK:1039581
SECTRACK:1039585
SECTRACK:1039703
SECTRACK:1041432
SMASH Issue 191142
SUSE:SUSE-SU-2017:2745
SUSE:SUSE-SU-2017:2752
SUSE:openSUSE-SU-2017:2755
UBUNTU:CVE-2017-13077
UBUNTU:CVE-2017-13078
UBUNTU:CVE-2017-13079
UBUNTU:CVE-2017-13080
UBUNTU:CVE-2017-13081
UBUNTU:CVE-2017-13082
UBUNTU:CVE-2017-13084
UBUNTU:CVE-2017-13086
UBUNTU:CVE-2017-13087
UBUNTU:CVE-2017-13088
UBUNTU:USN-3455-1
bdo#1033297
bnc#1056061
linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
rh#1167537
rh#1183461
rh#1202366
rh#1202380
rh#1202384
rh#1202395
rh#1202418
rh#1293972
rh#1369383
rh#1384344
rh#1393454
rh#1397485
rh#1399546
rh#1491692
rh#1491693
rh#1491694
rh#1491696
rh#1491697
rh#1491698
rh#1500301
rh#1500302
rh#1500303
rh#1500304
rh#1519780
rh#1553413
rh#1591854
rh#1607582
rh#1608073
rh#1731271
rh#2044599
rh#2044602
rh#2061700
rh#2116175
rh#2119127
rh#2161287
rh#2270497
CVE-2017-13080kernel-source-rt:Releasedimportant8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)BID:101274
CERT-VN:VU#228519
CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
CONFIRM:access.redhat.com:CVE-2017-13088
CONFIRM:cert-portal.siemens.com:CVE-2017-13088
CONFIRM:cert.vde.com:CVE-2017-13080
CONFIRM:cert.vde.com:CVE-2017-13088
CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080
CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082
CONFIRM:source.android.com:CVE-2017-5754
CONFIRM:source.android.com:CVE-2017-6264
CONFIRM:source.android.com:CVE-2017-6294
CONFIRM:support.apple.com:CVE-2017-13852
CONFIRM:support.apple.com:CVE-2017-13904
CONFIRM:support.apple.com:CVE-2017-3169
CONFIRM:support.hpe.com:CVE-2017-13081
CONFIRM:support.lenovo.com:CVE-2017-13088
CONFIRM:www.arubanetworks.com:CVE-2017-13088
CONFIRM:www.intel.com:CVE-2017-13080
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
CVE-2017-13084
CVE-2017-13086
CVE-2017-13087
CVE-2017-13088
CVE-2024-2466
D:CVE-2022-2590
DSA-3999
DSA-5378
FREEBSD:FreeBSD-SA-17:07
GENTOO:GLSA-201711-03
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:github.com:CVE-2017-13082
MISC:github.com:OSS:2024/Q1/256
MISC:ics-cert.us-cert.gov:CVE-2017-13082
MISC:w1.fi
MISC:w1.fi:CVE-2017-13088
MISC:www.krackattacks.com:CVE-2017-13088
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update
OSS:2017/Q4/83
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/11/10/2
OSS:2022/Q3/99
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2024/03/27/4
OSS:2024/Q1/256
Oracle:CVE-2011-4461
Oracle:CVE-2013-1768
Oracle:CVE-2014-0114
Oracle:CVE-2014-3490
Oracle:CVE-2014-3577
Oracle:CVE-2015-0204
Oracle:CVE-2015-0235
Oracle:CVE-2015-5600
Oracle:CVE-2015-6937
Oracle:CVE-2015-7501
Oracle:CVE-2015-7940
Oracle:CVE-2015-9251
Oracle:CVE-2016-0635
Oracle:CVE-2016-0714
Oracle:CVE-2016-0729
Oracle:CVE-2016-1000031
Oracle:CVE-2016-1181
Oracle:CVE-2016-1182
Oracle:CVE-2016-2099
Oracle:CVE-2016-2107
Oracle:CVE-2016-2176
Oracle:CVE-2016-2179
Oracle:CVE-2016-2183
Oracle:CVE-2016-3092
Oracle:CVE-2016-3506
Oracle:CVE-2016-4000
Oracle:CVE-2016-4055
Oracle:CVE-2016-5007
Oracle:CVE-2016-5019
Oracle:CVE-2016-5080
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2016-6304
Oracle:CVE-2016-6814
Oracle:CVE-2016-7103
Oracle:CVE-2016-7167
Oracle:CVE-2016-9843
Oracle:CVE-2016-9878
Oracle:CVE-2017-0379
Oracle:CVE-2017-10068
Oracle:CVE-2017-12617
Oracle:CVE-2017-13077
Oracle:CVE-2017-13082
Oracle:CVE-2017-14735
Oracle:CVE-2017-15095
Oracle:CVE-2017-17558
Oracle:CVE-2017-17562
Oracle:CVE-2017-3633
Oracle:CVE-2017-3736
Oracle:CVE-2017-3737
Oracle:CVE-2017-5533
Oracle:CVE-2017-5645
Oracle:CVE-2017-5662
Oracle:CVE-2017-5664
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
Oracle:CVE-2017-6074
Oracle:CVE-2017-7525
Oracle:CVE-2017-7805
Oracle:CVE-2017-9798
Oracle:CVE-2018-0732
Oracle:CVE-2018-0739
Oracle:CVE-2018-1000120
Oracle:CVE-2018-1000300
Oracle:CVE-2018-11039
Oracle:CVE-2018-1171
Oracle:CVE-2018-11776
Oracle:CVE-2018-1258
Oracle:CVE-2018-1275
Oracle:CVE-2018-1305
Oracle:CVE-2018-13785
Oracle:CVE-2018-1656
Oracle:CVE-2018-2563
Oracle:CVE-2018-2572
Oracle:CVE-2018-2587
Oracle:CVE-2018-2598
Oracle:CVE-2018-2628
Oracle:CVE-2018-2718
Oracle:CVE-2018-2737
Oracle:CVE-2018-2738
Oracle:CVE-2018-2739
Oracle:CVE-2018-2742
Oracle:CVE-2018-2746
Oracle:CVE-2018-2747
Oracle:CVE-2018-2748
Oracle:CVE-2018-2749
Oracle:CVE-2018-2750
Oracle:CVE-2018-2752
Oracle:CVE-2018-2753
Oracle:CVE-2018-2754
Oracle:CVE-2018-2755
Oracle:CVE-2018-2756
Oracle:CVE-2018-2758
Oracle:CVE-2018-2759
Oracle:CVE-2018-2760
Oracle:CVE-2018-2761
Oracle:CVE-2018-2762
Oracle:CVE-2018-2763
Oracle:CVE-2018-2764
Oracle:CVE-2018-2765
Oracle:CVE-2018-2766
Oracle:CVE-2018-2767
Oracle:CVE-2018-2768
Oracle:CVE-2018-2769
Oracle:CVE-2018-2770
Oracle:CVE-2018-2771
Oracle:CVE-2018-2772
Oracle:CVE-2018-2773
Oracle:CVE-2018-2774
Oracle:CVE-2018-2775
Oracle:CVE-2018-2776
Oracle:CVE-2018-2777
Oracle:CVE-2018-2778
Oracle:CVE-2018-2779
Oracle:CVE-2018-2780
Oracle:CVE-2018-2781
Oracle:CVE-2018-2782
Oracle:CVE-2018-2783
Oracle:CVE-2018-2784
Oracle:CVE-2018-2785
Oracle:CVE-2018-2786
Oracle:CVE-2018-2787
Oracle:CVE-2018-2788
Oracle:CVE-2018-2789
Oracle:CVE-2018-2790
Oracle:CVE-2018-2791
Oracle:CVE-2018-2792
Oracle:CVE-2018-2793
Oracle:CVE-2018-2794
Oracle:CVE-2018-2795
Oracle:CVE-2018-2796
Oracle:CVE-2018-2797
Oracle:CVE-2018-2798
Oracle:CVE-2018-2799
Oracle:CVE-2018-2800
Oracle:CVE-2018-2801
Oracle:CVE-2018-2804
Oracle:CVE-2018-2805
Oracle:CVE-2018-2806
Oracle:CVE-2018-2807
Oracle:CVE-2018-2808
Oracle:CVE-2018-2809
Oracle:CVE-2018-2810
Oracle:CVE-2018-2811
Oracle:CVE-2018-2812
Oracle:CVE-2018-2813
Oracle:CVE-2018-2814
Oracle:CVE-2018-2815
Oracle:CVE-2018-2816
Oracle:CVE-2018-2817
Oracle:CVE-2018-2818
Oracle:CVE-2018-2819
Oracle:CVE-2018-2820
Oracle:CVE-2018-2821
Oracle:CVE-2018-2822
Oracle:CVE-2018-2823
Oracle:CVE-2018-2825
Oracle:CVE-2018-2826
Oracle:CVE-2018-2827
Oracle:CVE-2018-2828
Oracle:CVE-2018-2830
Oracle:CVE-2018-2831
Oracle:CVE-2018-2832
Oracle:CVE-2018-2834
Oracle:CVE-2018-2835
Oracle:CVE-2018-2836
Oracle:CVE-2018-2837
Oracle:CVE-2018-2838
Oracle:CVE-2018-2839
Oracle:CVE-2018-2840
Oracle:CVE-2018-2841
Oracle:CVE-2018-2842
Oracle:CVE-2018-2843
Oracle:CVE-2018-2844
Oracle:CVE-2018-2845
Oracle:CVE-2018-2846
Oracle:CVE-2018-2849
Oracle:CVE-2018-2850
Oracle:CVE-2018-2852
Oracle:CVE-2018-2854
Oracle:CVE-2018-2855
Oracle:CVE-2018-2856
Oracle:CVE-2018-2857
Oracle:CVE-2018-2858
Oracle:CVE-2018-2859
Oracle:CVE-2018-2860
Oracle:CVE-2018-2861
Oracle:CVE-2018-2862
Oracle:CVE-2018-2863
Oracle:CVE-2018-2864
Oracle:CVE-2018-2865
Oracle:CVE-2018-2866
Oracle:CVE-2018-2867
Oracle:CVE-2018-2868
Oracle:CVE-2018-2869
Oracle:CVE-2018-2870
Oracle:CVE-2018-2871
Oracle:CVE-2018-2872
Oracle:CVE-2018-2873
Oracle:CVE-2018-2874
Oracle:CVE-2018-2876
Oracle:CVE-2018-2877
Oracle:CVE-2018-2878
Oracle:CVE-2018-2879
Oracle:CVE-2018-2881
Oracle:CVE-2018-2882
Oracle:CVE-2018-2887
Oracle:CVE-2018-2888
Oracle:CVE-2018-2889
Oracle:CVE-2018-2891
Oracle:CVE-2018-2892
Oracle:CVE-2018-2893
Oracle:CVE-2018-2894
Oracle:CVE-2018-2895
Oracle:CVE-2018-2896
Oracle:CVE-2018-2897
Oracle:CVE-2018-2898
Oracle:CVE-2018-2899
Oracle:CVE-2018-2900
Oracle:CVE-2018-2901
Oracle:CVE-2018-2902
Oracle:CVE-2018-2903
Oracle:CVE-2018-2904
Oracle:CVE-2018-2905
Oracle:CVE-2018-2906
Oracle:CVE-2018-2907
Oracle:CVE-2018-2908
Oracle:CVE-2018-2909
Oracle:CVE-2018-2911
Oracle:CVE-2018-2912
Oracle:CVE-2018-2913
Oracle:CVE-2018-2914
Oracle:CVE-2018-2915
Oracle:CVE-2018-2916
Oracle:CVE-2018-2917
Oracle:CVE-2018-2918
Oracle:CVE-2018-2919
Oracle:CVE-2018-2920
Oracle:CVE-2018-2921
Oracle:CVE-2018-2922
Oracle:CVE-2018-2923
Oracle:CVE-2018-2924
Oracle:CVE-2018-2925
Oracle:CVE-2018-2926
Oracle:CVE-2018-2927
Oracle:CVE-2018-2928
Oracle:CVE-2018-2929
Oracle:CVE-2018-2930
Oracle:CVE-2018-2932
Oracle:CVE-2018-2933
Oracle:CVE-2018-2934
Oracle:CVE-2018-2935
Oracle:CVE-2018-2936
Oracle:CVE-2018-2937
Oracle:CVE-2018-2938
Oracle:CVE-2018-2939
Oracle:CVE-2018-2940
Oracle:CVE-2018-2941
Oracle:CVE-2018-2942
Oracle:CVE-2018-2943
Oracle:CVE-2018-2944
Oracle:CVE-2018-2945
Oracle:CVE-2018-2946
Oracle:CVE-2018-2947
Oracle:CVE-2018-2948
Oracle:CVE-2018-2949
Oracle:CVE-2018-2950
Oracle:CVE-2018-2951
Oracle:CVE-2018-2952
Oracle:CVE-2018-2953
Oracle:CVE-2018-2954
Oracle:CVE-2018-2955
Oracle:CVE-2018-2956
Oracle:CVE-2018-2957
Oracle:CVE-2018-2958
Oracle:CVE-2018-2959
Oracle:CVE-2018-2960
Oracle:CVE-2018-2961
Oracle:CVE-2018-2962
Oracle:CVE-2018-2963
Oracle:CVE-2018-2964
Oracle:CVE-2018-2965
Oracle:CVE-2018-2966
Oracle:CVE-2018-2967
Oracle:CVE-2018-2968
Oracle:CVE-2018-2969
Oracle:CVE-2018-2970
Oracle:CVE-2018-2971
Oracle:CVE-2018-2972
Oracle:CVE-2018-2973
Oracle:CVE-2018-2974
Oracle:CVE-2018-2975
Oracle:CVE-2018-2976
Oracle:CVE-2018-2977
Oracle:CVE-2018-2979
Oracle:CVE-2018-2980
Oracle:CVE-2018-2981
Oracle:CVE-2018-2982
Oracle:CVE-2018-2984
Oracle:CVE-2018-2985
Oracle:CVE-2018-2986
Oracle:CVE-2018-2987
Oracle:CVE-2018-2988
Oracle:CVE-2018-2989
Oracle:CVE-2018-2990
Oracle:CVE-2018-2991
Oracle:CVE-2018-2992
Oracle:CVE-2018-2993
Oracle:CVE-2018-2994
Oracle:CVE-2018-2995
Oracle:CVE-2018-2996
Oracle:CVE-2018-2997
Oracle:CVE-2018-2998
Oracle:CVE-2018-2999
Oracle:CVE-2018-3000
Oracle:CVE-2018-3001
Oracle:CVE-2018-3002
Oracle:CVE-2018-3003
Oracle:CVE-2018-3004
Oracle:CVE-2018-3005
Oracle:CVE-2018-3006
Oracle:CVE-2018-3007
Oracle:CVE-2018-3008
Oracle:CVE-2018-3009
Oracle:CVE-2018-3010
Oracle:CVE-2018-3011
Oracle:CVE-2018-3012
Oracle:CVE-2018-3013
Oracle:CVE-2018-3014
Oracle:CVE-2018-3015
Oracle:CVE-2018-3016
Oracle:CVE-2018-3017
Oracle:CVE-2018-3018
Oracle:CVE-2018-3019
Oracle:CVE-2018-3020
Oracle:CVE-2018-3021
Oracle:CVE-2018-3022
Oracle:CVE-2018-3023
Oracle:CVE-2018-3024
Oracle:CVE-2018-3025
Oracle:CVE-2018-3026
Oracle:CVE-2018-3027
Oracle:CVE-2018-3028
Oracle:CVE-2018-3029
Oracle:CVE-2018-3030
Oracle:CVE-2018-3031
Oracle:CVE-2018-3032
Oracle:CVE-2018-3033
Oracle:CVE-2018-3034
Oracle:CVE-2018-3035
Oracle:CVE-2018-3036
Oracle:CVE-2018-3037
Oracle:CVE-2018-3038
Oracle:CVE-2018-3039
Oracle:CVE-2018-3040
Oracle:CVE-2018-3041
Oracle:CVE-2018-3042
Oracle:CVE-2018-3043
Oracle:CVE-2018-3044
Oracle:CVE-2018-3045
Oracle:CVE-2018-3046
Oracle:CVE-2018-3047
Oracle:CVE-2018-3048
Oracle:CVE-2018-3049
Oracle:CVE-2018-3050
Oracle:CVE-2018-3051
Oracle:CVE-2018-3052
Oracle:CVE-2018-3053
Oracle:CVE-2018-3054
Oracle:CVE-2018-3055
Oracle:CVE-2018-3056
Oracle:CVE-2018-3057
Oracle:CVE-2018-3058
Oracle:CVE-2018-3059
Oracle:CVE-2018-3060
Oracle:CVE-2018-3061
Oracle:CVE-2018-3062
Oracle:CVE-2018-3063
Oracle:CVE-2018-3064
Oracle:CVE-2018-3065
Oracle:CVE-2018-3066
Oracle:CVE-2018-3067
Oracle:CVE-2018-3068
Oracle:CVE-2018-3069
Oracle:CVE-2018-3070
Oracle:CVE-2018-3071
Oracle:CVE-2018-3072
Oracle:CVE-2018-3073
Oracle:CVE-2018-3074
Oracle:CVE-2018-3075
Oracle:CVE-2018-3076
Oracle:CVE-2018-3077
Oracle:CVE-2018-3078
Oracle:CVE-2018-3079
Oracle:CVE-2018-3080
Oracle:CVE-2018-3081
Oracle:CVE-2018-3082
Oracle:CVE-2018-3084
Oracle:CVE-2018-3085
Oracle:CVE-2018-3086
Oracle:CVE-2018-3087
Oracle:CVE-2018-3088
Oracle:CVE-2018-3089
Oracle:CVE-2018-3090
Oracle:CVE-2018-3091
Oracle:CVE-2018-3092
Oracle:CVE-2018-3093
Oracle:CVE-2018-3094
Oracle:CVE-2018-3095
Oracle:CVE-2018-3096
Oracle:CVE-2018-3097
Oracle:CVE-2018-3098
Oracle:CVE-2018-3099
Oracle:CVE-2018-3100
Oracle:CVE-2018-3101
Oracle:CVE-2018-3102
Oracle:CVE-2018-3103
Oracle:CVE-2018-3104
Oracle:CVE-2018-3105
Oracle:CVE-2018-3108
Oracle:CVE-2018-3109
Oracle:CVE-2018-3115
Oracle:CVE-2018-3122
Oracle:CVE-2018-3126
Oracle:CVE-2018-3127
Oracle:CVE-2018-3128
Oracle:CVE-2018-3129
Oracle:CVE-2018-3130
Oracle:CVE-2018-3131
Oracle:CVE-2018-3132
Oracle:CVE-2018-3133
Oracle:CVE-2018-3134
Oracle:CVE-2018-3135
Oracle:CVE-2018-3136
Oracle:CVE-2018-3137
Oracle:CVE-2018-3138
Oracle:CVE-2018-3139
Oracle:CVE-2018-3140
Oracle:CVE-2018-3141
Oracle:CVE-2018-3142
Oracle:CVE-2018-3143
Oracle:CVE-2018-3144
Oracle:CVE-2018-3145
Oracle:CVE-2018-3146
Oracle:CVE-2018-3147
Oracle:CVE-2018-3148
Oracle:CVE-2018-3149
Oracle:CVE-2018-3150
Oracle:CVE-2018-3151
Oracle:CVE-2018-3152
Oracle:CVE-2018-3153
Oracle:CVE-2018-3154
Oracle:CVE-2018-3155
Oracle:CVE-2018-3156
Oracle:CVE-2018-3157
Oracle:CVE-2018-3158
Oracle:CVE-2018-3159
Oracle:CVE-2018-3160
Oracle:CVE-2018-3161
Oracle:CVE-2018-3162
Oracle:CVE-2018-3163
Oracle:CVE-2018-3164
Oracle:CVE-2018-3165
Oracle:CVE-2018-3166
Oracle:CVE-2018-3167
Oracle:CVE-2018-3168
Oracle:CVE-2018-3169
Oracle:CVE-2018-3170
Oracle:CVE-2018-3171
Oracle:CVE-2018-3172
Oracle:CVE-2018-3173
Oracle:CVE-2018-3174
Oracle:CVE-2018-3175
Oracle:CVE-2018-3176
Oracle:CVE-2018-3177
Oracle:CVE-2018-3178
Oracle:CVE-2018-3179
Oracle:CVE-2018-3180
Oracle:CVE-2018-3181
Oracle:CVE-2018-3182
Oracle:CVE-2018-3183
Oracle:CVE-2018-3184
Oracle:CVE-2018-3185
Oracle:CVE-2018-3186
Oracle:CVE-2018-3187
Oracle:CVE-2018-3188
Oracle:CVE-2018-3189
Oracle:CVE-2018-3190
Oracle:CVE-2018-3191
Oracle:CVE-2018-3192
Oracle:CVE-2018-3193
Oracle:CVE-2018-3194
Oracle:CVE-2018-3195
Oracle:CVE-2018-3196
Oracle:CVE-2018-3197
Oracle:CVE-2018-3198
Oracle:CVE-2018-3200
Oracle:CVE-2018-3201
Oracle:CVE-2018-3202
Oracle:CVE-2018-3203
Oracle:CVE-2018-3204
Oracle:CVE-2018-3205
Oracle:CVE-2018-3206
Oracle:CVE-2018-3207
Oracle:CVE-2018-3208
Oracle:CVE-2018-3209
Oracle:CVE-2018-3210
Oracle:CVE-2018-3211
Oracle:CVE-2018-3212
Oracle:CVE-2018-3213
Oracle:CVE-2018-3214
Oracle:CVE-2018-3215
Oracle:CVE-2018-3217
Oracle:CVE-2018-3218
Oracle:CVE-2018-3219
Oracle:CVE-2018-3220
Oracle:CVE-2018-3221
Oracle:CVE-2018-3222
Oracle:CVE-2018-3223
Oracle:CVE-2018-3224
Oracle:CVE-2018-3225
Oracle:CVE-2018-3226
Oracle:CVE-2018-3227
Oracle:CVE-2018-3228
Oracle:CVE-2018-3229
Oracle:CVE-2018-3230
Oracle:CVE-2018-3231
Oracle:CVE-2018-3232
Oracle:CVE-2018-3233
Oracle:CVE-2018-3234
Oracle:CVE-2018-3235
Oracle:CVE-2018-3236
Oracle:CVE-2018-3237
Oracle:CVE-2018-3238
Oracle:CVE-2018-3239
Oracle:CVE-2018-3241
Oracle:CVE-2018-3242
Oracle:CVE-2018-3243
Oracle:CVE-2018-3244
Oracle:CVE-2018-3245
Oracle:CVE-2018-3246
Oracle:CVE-2018-3247
Oracle:CVE-2018-3248
Oracle:CVE-2018-3249
Oracle:CVE-2018-3250
Oracle:CVE-2018-3251
Oracle:CVE-2018-3252
Oracle:CVE-2018-3253
Oracle:CVE-2018-3254
Oracle:CVE-2018-3255
Oracle:CVE-2018-3256
Oracle:CVE-2018-3257
Oracle:CVE-2018-3258
Oracle:CVE-2018-3259
Oracle:CVE-2018-3261
Oracle:CVE-2018-3262
Oracle:CVE-2018-3263
Oracle:CVE-2018-3264
Oracle:CVE-2018-3265
Oracle:CVE-2018-3266
Oracle:CVE-2018-3267
Oracle:CVE-2018-3268
Oracle:CVE-2018-3269
Oracle:CVE-2018-3270
Oracle:CVE-2018-3271
Oracle:CVE-2018-3272
Oracle:CVE-2018-3273
Oracle:CVE-2018-3274
Oracle:CVE-2018-3275
Oracle:CVE-2018-3276
Oracle:CVE-2018-3277
Oracle:CVE-2018-3278
Oracle:CVE-2018-3279
Oracle:CVE-2018-3280
Oracle:CVE-2018-3281
Oracle:CVE-2018-3282
Oracle:CVE-2018-3283
Oracle:CVE-2018-3284
Oracle:CVE-2018-3285
Oracle:CVE-2018-3286
Oracle:CVE-2018-3287
Oracle:CVE-2018-3288
Oracle:CVE-2018-3289
Oracle:CVE-2018-3290
Oracle:CVE-2018-3291
Oracle:CVE-2018-3292
Oracle:CVE-2018-3293
Oracle:CVE-2018-3294
Oracle:CVE-2018-3295
Oracle:CVE-2018-3296
Oracle:CVE-2018-3297
Oracle:CVE-2018-3298
Oracle:CVE-2018-3299
Oracle:CVE-2018-3301
Oracle:CVE-2018-3302
Oracle:CVE-2018-7489
Oracle:CVE-2018-8013
Oracle:CVE-2018-8014
Oracle:CVE-2018-8037
RH:CVE-2017-13077
RH:CVE-2017-13078
RH:CVE-2017-13079
RH:CVE-2017-13080
RH:CVE-2017-13081
RH:CVE-2017-13082
RH:CVE-2017-13084
RH:CVE-2017-13086
RH:CVE-2017-13087
RH:CVE-2017-13088
RHSA-2017:2907
RHSA-2017:2911
SECTRACK:1039570
SECTRACK:1039571
SECTRACK:1039572
SECTRACK:1039573
SECTRACK:1039576
SECTRACK:1039577
SECTRACK:1039578
SECTRACK:1039581
SECTRACK:1039585
SECTRACK:1039703
SECTRACK:1041432
SMASH Issue 191142
SMASH Issue 193422
SUSE:SUSE-SU-2017:2745
SUSE:SUSE-SU-2017:2752
SUSE:openSUSE-SU-2017:2755
UBUNTU:CVE-2017-13077
UBUNTU:CVE-2017-13078
UBUNTU:CVE-2017-13079
UBUNTU:CVE-2017-13080
UBUNTU:CVE-2017-13081
UBUNTU:CVE-2017-13082
UBUNTU:CVE-2017-13084
UBUNTU:CVE-2017-13086
UBUNTU:CVE-2017-13087
UBUNTU:CVE-2017-13088
UBUNTU:USN-3455-1
bdo#1033297
bnc#1056061
bnc#1063667
bnc#1063671
linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:5f501d555653f8968011a1e65ebb121c8b43c144
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
rh#1167537
rh#1183461
rh#1202366
rh#1202380
rh#1202384
rh#1202395
rh#1202418
rh#1293972
rh#1369383
rh#1384344
rh#1393454
rh#1397485
rh#1399546
rh#1462147
rh#1462158
rh#1481178
rh#1491692
rh#1491693
rh#1491694
rh#1491696
rh#1491697
rh#1491698
rh#1500301
rh#1500302
rh#1500303
rh#1500304
rh#1519780
rh#1553413
rh#1591854
rh#1607582
rh#1608073
rh#1731271
rh#2044599
rh#2044602
rh#2061700
rh#2116175
rh#2119127
rh#2161287
rh#2270497
CVE-2017-13081kernel-source-rt:Releasedimportant8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)BID:101274
CERT-VN:VU#228519
CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
CONFIRM:access.redhat.com:CVE-2017-13088
CONFIRM:cert-portal.siemens.com:CVE-2017-13088
CONFIRM:cert.vde.com:CVE-2017-13080
CONFIRM:cert.vde.com:CVE-2017-13088
CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080
CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082
CONFIRM:source.android.com:CVE-2017-5754
CONFIRM:source.android.com:CVE-2017-6264
CONFIRM:source.android.com:CVE-2017-6294
CONFIRM:support.apple.com:CVE-2017-13852
CONFIRM:support.apple.com:CVE-2017-13904
CONFIRM:support.apple.com:CVE-2017-3169
CONFIRM:support.hpe.com:CVE-2017-13081
CONFIRM:support.lenovo.com:CVE-2017-13088
CONFIRM:www.arubanetworks.com:CVE-2017-13088
CONFIRM:www.intel.com:CVE-2017-13080
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
CVE-2017-13084
CVE-2017-13086
CVE-2017-13087
CVE-2017-13088
CVE-2024-2466
D:CVE-2022-2590
DSA-3999
DSA-5378
FREEBSD:FreeBSD-SA-17:07
GENTOO:GLSA-201711-03
MISC:github.com:CVE-2017-13082
MISC:github.com:OSS:2024/Q1/256
MISC:ics-cert.us-cert.gov:CVE-2017-13082
MISC:w1.fi
MISC:w1.fi:CVE-2017-13088
MISC:www.krackattacks.com:CVE-2017-13088
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update
OSS:2017/Q4/83
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/11/10/2
OSS:2022/Q3/99
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2024/03/27/4
OSS:2024/Q1/256
Oracle:CVE-2011-4461
Oracle:CVE-2013-1768
Oracle:CVE-2014-0114
Oracle:CVE-2014-3490
Oracle:CVE-2014-3577
Oracle:CVE-2015-0204
Oracle:CVE-2015-0235
Oracle:CVE-2015-5600
Oracle:CVE-2015-6937
Oracle:CVE-2015-7501
Oracle:CVE-2015-7940
Oracle:CVE-2015-9251
Oracle:CVE-2016-0635
Oracle:CVE-2016-0714
Oracle:CVE-2016-0729
Oracle:CVE-2016-1000031
Oracle:CVE-2016-1181
Oracle:CVE-2016-1182
Oracle:CVE-2016-2099
Oracle:CVE-2016-2107
Oracle:CVE-2016-2176
Oracle:CVE-2016-2179
Oracle:CVE-2016-2183
Oracle:CVE-2016-3092
Oracle:CVE-2016-3506
Oracle:CVE-2016-4000
Oracle:CVE-2016-4055
Oracle:CVE-2016-5007
Oracle:CVE-2016-5019
Oracle:CVE-2016-5080
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2016-6304
Oracle:CVE-2016-6814
Oracle:CVE-2016-7103
Oracle:CVE-2016-7167
Oracle:CVE-2016-9843
Oracle:CVE-2016-9878
Oracle:CVE-2017-0379
Oracle:CVE-2017-10068
Oracle:CVE-2017-12617
Oracle:CVE-2017-13077
Oracle:CVE-2017-13082
Oracle:CVE-2017-14735
Oracle:CVE-2017-15095
Oracle:CVE-2017-17562
Oracle:CVE-2017-3633
Oracle:CVE-2017-3736
Oracle:CVE-2017-3737
Oracle:CVE-2017-5533
Oracle:CVE-2017-5645
Oracle:CVE-2017-5662
Oracle:CVE-2017-5664
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-6074
Oracle:CVE-2017-7525
Oracle:CVE-2017-7805
Oracle:CVE-2017-9798
Oracle:CVE-2018-0732
Oracle:CVE-2018-0739
Oracle:CVE-2018-1000120
Oracle:CVE-2018-1000300
Oracle:CVE-2018-11039
Oracle:CVE-2018-1171
Oracle:CVE-2018-11776
Oracle:CVE-2018-1258
Oracle:CVE-2018-1275
Oracle:CVE-2018-1305
Oracle:CVE-2018-13785
Oracle:CVE-2018-1656
Oracle:CVE-2018-2563
Oracle:CVE-2018-2572
Oracle:CVE-2018-2587
Oracle:CVE-2018-2598
Oracle:CVE-2018-2628
Oracle:CVE-2018-2718
Oracle:CVE-2018-2737
Oracle:CVE-2018-2738
Oracle:CVE-2018-2739
Oracle:CVE-2018-2742
Oracle:CVE-2018-2746
Oracle:CVE-2018-2747
Oracle:CVE-2018-2748
Oracle:CVE-2018-2749
Oracle:CVE-2018-2750
Oracle:CVE-2018-2752
Oracle:CVE-2018-2753
Oracle:CVE-2018-2754
Oracle:CVE-2018-2755
Oracle:CVE-2018-2756
Oracle:CVE-2018-2758
Oracle:CVE-2018-2759
Oracle:CVE-2018-2760
Oracle:CVE-2018-2761
Oracle:CVE-2018-2762
Oracle:CVE-2018-2763
Oracle:CVE-2018-2764
Oracle:CVE-2018-2765
Oracle:CVE-2018-2766
Oracle:CVE-2018-2767
Oracle:CVE-2018-2768
Oracle:CVE-2018-2769
Oracle:CVE-2018-2770
Oracle:CVE-2018-2771
Oracle:CVE-2018-2772
Oracle:CVE-2018-2773
Oracle:CVE-2018-2774
Oracle:CVE-2018-2775
Oracle:CVE-2018-2776
Oracle:CVE-2018-2777
Oracle:CVE-2018-2778
Oracle:CVE-2018-2779
Oracle:CVE-2018-2780
Oracle:CVE-2018-2781
Oracle:CVE-2018-2782
Oracle:CVE-2018-2783
Oracle:CVE-2018-2784
Oracle:CVE-2018-2785
Oracle:CVE-2018-2786
Oracle:CVE-2018-2787
Oracle:CVE-2018-2788
Oracle:CVE-2018-2789
Oracle:CVE-2018-2790
Oracle:CVE-2018-2791
Oracle:CVE-2018-2792
Oracle:CVE-2018-2793
Oracle:CVE-2018-2794
Oracle:CVE-2018-2795
Oracle:CVE-2018-2796
Oracle:CVE-2018-2797
Oracle:CVE-2018-2798
Oracle:CVE-2018-2799
Oracle:CVE-2018-2800
Oracle:CVE-2018-2801
Oracle:CVE-2018-2804
Oracle:CVE-2018-2805
Oracle:CVE-2018-2806
Oracle:CVE-2018-2807
Oracle:CVE-2018-2808
Oracle:CVE-2018-2809
Oracle:CVE-2018-2810
Oracle:CVE-2018-2811
Oracle:CVE-2018-2812
Oracle:CVE-2018-2813
Oracle:CVE-2018-2814
Oracle:CVE-2018-2815
Oracle:CVE-2018-2816
Oracle:CVE-2018-2817
Oracle:CVE-2018-2818
Oracle:CVE-2018-2819
Oracle:CVE-2018-2820
Oracle:CVE-2018-2821
Oracle:CVE-2018-2822
Oracle:CVE-2018-2823
Oracle:CVE-2018-2825
Oracle:CVE-2018-2826
Oracle:CVE-2018-2827
Oracle:CVE-2018-2828
Oracle:CVE-2018-2830
Oracle:CVE-2018-2831
Oracle:CVE-2018-2832
Oracle:CVE-2018-2834
Oracle:CVE-2018-2835
Oracle:CVE-2018-2836
Oracle:CVE-2018-2837
Oracle:CVE-2018-2838
Oracle:CVE-2018-2839
Oracle:CVE-2018-2840
Oracle:CVE-2018-2841
Oracle:CVE-2018-2842
Oracle:CVE-2018-2843
Oracle:CVE-2018-2844
Oracle:CVE-2018-2845
Oracle:CVE-2018-2846
Oracle:CVE-2018-2849
Oracle:CVE-2018-2850
Oracle:CVE-2018-2852
Oracle:CVE-2018-2854
Oracle:CVE-2018-2855
Oracle:CVE-2018-2856
Oracle:CVE-2018-2857
Oracle:CVE-2018-2858
Oracle:CVE-2018-2859
Oracle:CVE-2018-2860
Oracle:CVE-2018-2861
Oracle:CVE-2018-2862
Oracle:CVE-2018-2863
Oracle:CVE-2018-2864
Oracle:CVE-2018-2865
Oracle:CVE-2018-2866
Oracle:CVE-2018-2867
Oracle:CVE-2018-2868
Oracle:CVE-2018-2869
Oracle:CVE-2018-2870
Oracle:CVE-2018-2871
Oracle:CVE-2018-2872
Oracle:CVE-2018-2873
Oracle:CVE-2018-2874
Oracle:CVE-2018-2876
Oracle:CVE-2018-2877
Oracle:CVE-2018-2878
Oracle:CVE-2018-2879
Oracle:CVE-2018-2881
Oracle:CVE-2018-2882
Oracle:CVE-2018-2887
Oracle:CVE-2018-2888
Oracle:CVE-2018-2889
Oracle:CVE-2018-2891
Oracle:CVE-2018-2892
Oracle:CVE-2018-2893
Oracle:CVE-2018-2894
Oracle:CVE-2018-2895
Oracle:CVE-2018-2896
Oracle:CVE-2018-2897
Oracle:CVE-2018-2898
Oracle:CVE-2018-2899
Oracle:CVE-2018-2900
Oracle:CVE-2018-2901
Oracle:CVE-2018-2902
Oracle:CVE-2018-2903
Oracle:CVE-2018-2904
Oracle:CVE-2018-2905
Oracle:CVE-2018-2906
Oracle:CVE-2018-2907
Oracle:CVE-2018-2908
Oracle:CVE-2018-2909
Oracle:CVE-2018-2911
Oracle:CVE-2018-2912
Oracle:CVE-2018-2913
Oracle:CVE-2018-2914
Oracle:CVE-2018-2915
Oracle:CVE-2018-2916
Oracle:CVE-2018-2917
Oracle:CVE-2018-2918
Oracle:CVE-2018-2919
Oracle:CVE-2018-2920
Oracle:CVE-2018-2921
Oracle:CVE-2018-2922
Oracle:CVE-2018-2923
Oracle:CVE-2018-2924
Oracle:CVE-2018-2925
Oracle:CVE-2018-2926
Oracle:CVE-2018-2927
Oracle:CVE-2018-2928
Oracle:CVE-2018-2929
Oracle:CVE-2018-2930
Oracle:CVE-2018-2932
Oracle:CVE-2018-2933
Oracle:CVE-2018-2934
Oracle:CVE-2018-2935
Oracle:CVE-2018-2936
Oracle:CVE-2018-2937
Oracle:CVE-2018-2938
Oracle:CVE-2018-2939
Oracle:CVE-2018-2940
Oracle:CVE-2018-2941
Oracle:CVE-2018-2942
Oracle:CVE-2018-2943
Oracle:CVE-2018-2944
Oracle:CVE-2018-2945
Oracle:CVE-2018-2946
Oracle:CVE-2018-2947
Oracle:CVE-2018-2948
Oracle:CVE-2018-2949
Oracle:CVE-2018-2950
Oracle:CVE-2018-2951
Oracle:CVE-2018-2952
Oracle:CVE-2018-2953
Oracle:CVE-2018-2954
Oracle:CVE-2018-2955
Oracle:CVE-2018-2956
Oracle:CVE-2018-2957
Oracle:CVE-2018-2958
Oracle:CVE-2018-2959
Oracle:CVE-2018-2960
Oracle:CVE-2018-2961
Oracle:CVE-2018-2962
Oracle:CVE-2018-2963
Oracle:CVE-2018-2964
Oracle:CVE-2018-2965
Oracle:CVE-2018-2966
Oracle:CVE-2018-2967
Oracle:CVE-2018-2968
Oracle:CVE-2018-2969
Oracle:CVE-2018-2970
Oracle:CVE-2018-2971
Oracle:CVE-2018-2972
Oracle:CVE-2018-2973
Oracle:CVE-2018-2974
Oracle:CVE-2018-2975
Oracle:CVE-2018-2976
Oracle:CVE-2018-2977
Oracle:CVE-2018-2979
Oracle:CVE-2018-2980
Oracle:CVE-2018-2981
Oracle:CVE-2018-2982
Oracle:CVE-2018-2984
Oracle:CVE-2018-2985
Oracle:CVE-2018-2986
Oracle:CVE-2018-2987
Oracle:CVE-2018-2988
Oracle:CVE-2018-2989
Oracle:CVE-2018-2990
Oracle:CVE-2018-2991
Oracle:CVE-2018-2992
Oracle:CVE-2018-2993
Oracle:CVE-2018-2994
Oracle:CVE-2018-2995
Oracle:CVE-2018-2996
Oracle:CVE-2018-2997
Oracle:CVE-2018-2998
Oracle:CVE-2018-2999
Oracle:CVE-2018-3000
Oracle:CVE-2018-3001
Oracle:CVE-2018-3002
Oracle:CVE-2018-3003
Oracle:CVE-2018-3004
Oracle:CVE-2018-3005
Oracle:CVE-2018-3006
Oracle:CVE-2018-3007
Oracle:CVE-2018-3008
Oracle:CVE-2018-3009
Oracle:CVE-2018-3010
Oracle:CVE-2018-3011
Oracle:CVE-2018-3012
Oracle:CVE-2018-3013
Oracle:CVE-2018-3014
Oracle:CVE-2018-3015
Oracle:CVE-2018-3016
Oracle:CVE-2018-3017
Oracle:CVE-2018-3018
Oracle:CVE-2018-3019
Oracle:CVE-2018-3020
Oracle:CVE-2018-3021
Oracle:CVE-2018-3022
Oracle:CVE-2018-3023
Oracle:CVE-2018-3024
Oracle:CVE-2018-3025
Oracle:CVE-2018-3026
Oracle:CVE-2018-3027
Oracle:CVE-2018-3028
Oracle:CVE-2018-3029
Oracle:CVE-2018-3030
Oracle:CVE-2018-3031
Oracle:CVE-2018-3032
Oracle:CVE-2018-3033
Oracle:CVE-2018-3034
Oracle:CVE-2018-3035
Oracle:CVE-2018-3036
Oracle:CVE-2018-3037
Oracle:CVE-2018-3038
Oracle:CVE-2018-3039
Oracle:CVE-2018-3040
Oracle:CVE-2018-3041
Oracle:CVE-2018-3042
Oracle:CVE-2018-3043
Oracle:CVE-2018-3044
Oracle:CVE-2018-3045
Oracle:CVE-2018-3046
Oracle:CVE-2018-3047
Oracle:CVE-2018-3048
Oracle:CVE-2018-3049
Oracle:CVE-2018-3050
Oracle:CVE-2018-3051
Oracle:CVE-2018-3052
Oracle:CVE-2018-3053
Oracle:CVE-2018-3054
Oracle:CVE-2018-3055
Oracle:CVE-2018-3056
Oracle:CVE-2018-3057
Oracle:CVE-2018-3058
Oracle:CVE-2018-3059
Oracle:CVE-2018-3060
Oracle:CVE-2018-3061
Oracle:CVE-2018-3062
Oracle:CVE-2018-3063
Oracle:CVE-2018-3064
Oracle:CVE-2018-3065
Oracle:CVE-2018-3066
Oracle:CVE-2018-3067
Oracle:CVE-2018-3068
Oracle:CVE-2018-3069
Oracle:CVE-2018-3070
Oracle:CVE-2018-3071
Oracle:CVE-2018-3072
Oracle:CVE-2018-3073
Oracle:CVE-2018-3074
Oracle:CVE-2018-3075
Oracle:CVE-2018-3076
Oracle:CVE-2018-3077
Oracle:CVE-2018-3078
Oracle:CVE-2018-3079
Oracle:CVE-2018-3080
Oracle:CVE-2018-3081
Oracle:CVE-2018-3082
Oracle:CVE-2018-3084
Oracle:CVE-2018-3085
Oracle:CVE-2018-3086
Oracle:CVE-2018-3087
Oracle:CVE-2018-3088
Oracle:CVE-2018-3089
Oracle:CVE-2018-3090
Oracle:CVE-2018-3091
Oracle:CVE-2018-3092
Oracle:CVE-2018-3093
Oracle:CVE-2018-3094
Oracle:CVE-2018-3095
Oracle:CVE-2018-3096
Oracle:CVE-2018-3097
Oracle:CVE-2018-3098
Oracle:CVE-2018-3099
Oracle:CVE-2018-3100
Oracle:CVE-2018-3101
Oracle:CVE-2018-3102
Oracle:CVE-2018-3103
Oracle:CVE-2018-3104
Oracle:CVE-2018-3105
Oracle:CVE-2018-3108
Oracle:CVE-2018-3109
Oracle:CVE-2018-3115
Oracle:CVE-2018-3122
Oracle:CVE-2018-3126
Oracle:CVE-2018-3127
Oracle:CVE-2018-3128
Oracle:CVE-2018-3129
Oracle:CVE-2018-3130
Oracle:CVE-2018-3131
Oracle:CVE-2018-3132
Oracle:CVE-2018-3133
Oracle:CVE-2018-3134
Oracle:CVE-2018-3135
Oracle:CVE-2018-3136
Oracle:CVE-2018-3137
Oracle:CVE-2018-3138
Oracle:CVE-2018-3139
Oracle:CVE-2018-3140
Oracle:CVE-2018-3141
Oracle:CVE-2018-3142
Oracle:CVE-2018-3143
Oracle:CVE-2018-3144
Oracle:CVE-2018-3145
Oracle:CVE-2018-3146
Oracle:CVE-2018-3147
Oracle:CVE-2018-3148
Oracle:CVE-2018-3149
Oracle:CVE-2018-3150
Oracle:CVE-2018-3151
Oracle:CVE-2018-3152
Oracle:CVE-2018-3153
Oracle:CVE-2018-3154
Oracle:CVE-2018-3155
Oracle:CVE-2018-3156
Oracle:CVE-2018-3157
Oracle:CVE-2018-3158
Oracle:CVE-2018-3159
Oracle:CVE-2018-3160
Oracle:CVE-2018-3161
Oracle:CVE-2018-3162
Oracle:CVE-2018-3163
Oracle:CVE-2018-3164
Oracle:CVE-2018-3165
Oracle:CVE-2018-3166
Oracle:CVE-2018-3167
Oracle:CVE-2018-3168
Oracle:CVE-2018-3169
Oracle:CVE-2018-3170
Oracle:CVE-2018-3171
Oracle:CVE-2018-3172
Oracle:CVE-2018-3173
Oracle:CVE-2018-3174
Oracle:CVE-2018-3175
Oracle:CVE-2018-3176
Oracle:CVE-2018-3177
Oracle:CVE-2018-3178
Oracle:CVE-2018-3179
Oracle:CVE-2018-3180
Oracle:CVE-2018-3181
Oracle:CVE-2018-3182
Oracle:CVE-2018-3183
Oracle:CVE-2018-3184
Oracle:CVE-2018-3185
Oracle:CVE-2018-3186
Oracle:CVE-2018-3187
Oracle:CVE-2018-3188
Oracle:CVE-2018-3189
Oracle:CVE-2018-3190
Oracle:CVE-2018-3191
Oracle:CVE-2018-3192
Oracle:CVE-2018-3193
Oracle:CVE-2018-3194
Oracle:CVE-2018-3195
Oracle:CVE-2018-3196
Oracle:CVE-2018-3197
Oracle:CVE-2018-3198
Oracle:CVE-2018-3200
Oracle:CVE-2018-3201
Oracle:CVE-2018-3202
Oracle:CVE-2018-3203
Oracle:CVE-2018-3204
Oracle:CVE-2018-3205
Oracle:CVE-2018-3206
Oracle:CVE-2018-3207
Oracle:CVE-2018-3208
Oracle:CVE-2018-3209
Oracle:CVE-2018-3210
Oracle:CVE-2018-3211
Oracle:CVE-2018-3212
Oracle:CVE-2018-3213
Oracle:CVE-2018-3214
Oracle:CVE-2018-3215
Oracle:CVE-2018-3217
Oracle:CVE-2018-3218
Oracle:CVE-2018-3219
Oracle:CVE-2018-3220
Oracle:CVE-2018-3221
Oracle:CVE-2018-3222
Oracle:CVE-2018-3223
Oracle:CVE-2018-3224
Oracle:CVE-2018-3225
Oracle:CVE-2018-3226
Oracle:CVE-2018-3227
Oracle:CVE-2018-3228
Oracle:CVE-2018-3229
Oracle:CVE-2018-3230
Oracle:CVE-2018-3231
Oracle:CVE-2018-3232
Oracle:CVE-2018-3233
Oracle:CVE-2018-3234
Oracle:CVE-2018-3235
Oracle:CVE-2018-3236
Oracle:CVE-2018-3237
Oracle:CVE-2018-3238
Oracle:CVE-2018-3239
Oracle:CVE-2018-3241
Oracle:CVE-2018-3242
Oracle:CVE-2018-3243
Oracle:CVE-2018-3244
Oracle:CVE-2018-3245
Oracle:CVE-2018-3246
Oracle:CVE-2018-3247
Oracle:CVE-2018-3248
Oracle:CVE-2018-3249
Oracle:CVE-2018-3250
Oracle:CVE-2018-3251
Oracle:CVE-2018-3252
Oracle:CVE-2018-3253
Oracle:CVE-2018-3254
Oracle:CVE-2018-3255
Oracle:CVE-2018-3256
Oracle:CVE-2018-3257
Oracle:CVE-2018-3258
Oracle:CVE-2018-3259
Oracle:CVE-2018-3261
Oracle:CVE-2018-3262
Oracle:CVE-2018-3263
Oracle:CVE-2018-3264
Oracle:CVE-2018-3265
Oracle:CVE-2018-3266
Oracle:CVE-2018-3267
Oracle:CVE-2018-3268
Oracle:CVE-2018-3269
Oracle:CVE-2018-3270
Oracle:CVE-2018-3271
Oracle:CVE-2018-3272
Oracle:CVE-2018-3273
Oracle:CVE-2018-3274
Oracle:CVE-2018-3275
Oracle:CVE-2018-3276
Oracle:CVE-2018-3277
Oracle:CVE-2018-3278
Oracle:CVE-2018-3279
Oracle:CVE-2018-3280
Oracle:CVE-2018-3281
Oracle:CVE-2018-3282
Oracle:CVE-2018-3283
Oracle:CVE-2018-3284
Oracle:CVE-2018-3285
Oracle:CVE-2018-3286
Oracle:CVE-2018-3287
Oracle:CVE-2018-3288
Oracle:CVE-2018-3289
Oracle:CVE-2018-3290
Oracle:CVE-2018-3291
Oracle:CVE-2018-3292
Oracle:CVE-2018-3293
Oracle:CVE-2018-3294
Oracle:CVE-2018-3295
Oracle:CVE-2018-3296
Oracle:CVE-2018-3297
Oracle:CVE-2018-3298
Oracle:CVE-2018-3299
Oracle:CVE-2018-3301
Oracle:CVE-2018-3302
Oracle:CVE-2018-7489
Oracle:CVE-2018-8013
Oracle:CVE-2018-8014
Oracle:CVE-2018-8037
RH:CVE-2017-13077
RH:CVE-2017-13078
RH:CVE-2017-13079
RH:CVE-2017-13080
RH:CVE-2017-13081
RH:CVE-2017-13082
RH:CVE-2017-13084
RH:CVE-2017-13086
RH:CVE-2017-13087
RH:CVE-2017-13088
RHSA-2017:2907
RHSA-2017:2911
SECTRACK:1039570
SECTRACK:1039571
SECTRACK:1039572
SECTRACK:1039573
SECTRACK:1039576
SECTRACK:1039577
SECTRACK:1039578
SECTRACK:1039581
SECTRACK:1039585
SECTRACK:1039703
SECTRACK:1041432
SMASH Issue 191142
SUSE:SUSE-SU-2017:2745
SUSE:SUSE-SU-2017:2752
SUSE:openSUSE-SU-2017:2755
UBUNTU:CVE-2017-13077
UBUNTU:CVE-2017-13078
UBUNTU:CVE-2017-13079
UBUNTU:CVE-2017-13080
UBUNTU:CVE-2017-13081
UBUNTU:CVE-2017-13082
UBUNTU:CVE-2017-13084
UBUNTU:CVE-2017-13086
UBUNTU:CVE-2017-13087
UBUNTU:CVE-2017-13088
UBUNTU:USN-3455-1
bdo#1033297
bnc#1056061
linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
rh#1167537
rh#1183461
rh#1202366
rh#1202380
rh#1202384
rh#1202395
rh#1202418
rh#1293972
rh#1369383
rh#1384344
rh#1393454
rh#1397485
rh#1399546
rh#1491692
rh#1491693
rh#1491694
rh#1491696
rh#1491697
rh#1491698
rh#1500301
rh#1500302
rh#1500303
rh#1500304
rh#1519780
rh#1553413
rh#1591854
rh#1607582
rh#1608073
rh#1731271
rh#2044599
rh#2044602
rh#2061700
rh#2116175
rh#2119127
rh#2161287
rh#2270497
CVE-2017-13082kernel-source-rt:Releasedimportant8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)BID:101274
CERT-VN:VU#228519
CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
CONFIRM:access.redhat.com:CVE-2017-13088
CONFIRM:cert-portal.siemens.com:CVE-2017-13088
CONFIRM:cert.vde.com:CVE-2017-13080
CONFIRM:cert.vde.com:CVE-2017-13088
CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080
CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082
CONFIRM:source.android.com:CVE-2017-5754
CONFIRM:source.android.com:CVE-2017-6264
CONFIRM:source.android.com:CVE-2017-6294
CONFIRM:support.apple.com:CVE-2017-13852
CONFIRM:support.apple.com:CVE-2017-13904
CONFIRM:support.apple.com:CVE-2017-3169
CONFIRM:support.hpe.com:CVE-2017-13081
CONFIRM:support.lenovo.com:CVE-2017-13088
CONFIRM:www.arubanetworks.com:CVE-2017-13088
CONFIRM:www.intel.com:CVE-2017-13080
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
CVE-2017-13084
CVE-2017-13086
CVE-2017-13087
CVE-2017-13088
CVE-2024-2466
D:CVE-2022-2590
DSA-3999
DSA-5378
FREEBSD:FreeBSD-SA-17:07
GENTOO:GLSA-201711-03
MISC:github.com:CVE-2017-13082
MISC:github.com:OSS:2024/Q1/256
MISC:ics-cert.us-cert.gov:CVE-2017-13082
MISC:w1.fi
MISC:w1.fi:CVE-2017-13088
MISC:www.krackattacks.com:CVE-2017-13088
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update
OSS:2017/Q4/83
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/11/10/2
OSS:2022/Q3/99
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2024/03/27/4
OSS:2024/Q1/256
Oracle:CVE-2011-4461
Oracle:CVE-2013-1768
Oracle:CVE-2014-0114
Oracle:CVE-2014-3490
Oracle:CVE-2014-3577
Oracle:CVE-2015-0204
Oracle:CVE-2015-0235
Oracle:CVE-2015-5600
Oracle:CVE-2015-6937
Oracle:CVE-2015-7501
Oracle:CVE-2015-7940
Oracle:CVE-2015-9251
Oracle:CVE-2016-0635
Oracle:CVE-2016-0714
Oracle:CVE-2016-0729
Oracle:CVE-2016-1000031
Oracle:CVE-2016-1181
Oracle:CVE-2016-1182
Oracle:CVE-2016-2099
Oracle:CVE-2016-2107
Oracle:CVE-2016-2176
Oracle:CVE-2016-2179
Oracle:CVE-2016-2183
Oracle:CVE-2016-3092
Oracle:CVE-2016-3506
Oracle:CVE-2016-4000
Oracle:CVE-2016-4055
Oracle:CVE-2016-5007
Oracle:CVE-2016-5019
Oracle:CVE-2016-5080
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2016-6304
Oracle:CVE-2016-6814
Oracle:CVE-2016-7103
Oracle:CVE-2016-7167
Oracle:CVE-2016-9843
Oracle:CVE-2016-9878
Oracle:CVE-2017-0379
Oracle:CVE-2017-10068
Oracle:CVE-2017-12617
Oracle:CVE-2017-13077
Oracle:CVE-2017-13082
Oracle:CVE-2017-14735
Oracle:CVE-2017-15095
Oracle:CVE-2017-17562
Oracle:CVE-2017-3633
Oracle:CVE-2017-3736
Oracle:CVE-2017-3737
Oracle:CVE-2017-5533
Oracle:CVE-2017-5645
Oracle:CVE-2017-5662
Oracle:CVE-2017-5664
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-6074
Oracle:CVE-2017-7525
Oracle:CVE-2017-7805
Oracle:CVE-2017-9798
Oracle:CVE-2018-0732
Oracle:CVE-2018-0739
Oracle:CVE-2018-1000120
Oracle:CVE-2018-1000300
Oracle:CVE-2018-11039
Oracle:CVE-2018-1171
Oracle:CVE-2018-11776
Oracle:CVE-2018-1258
Oracle:CVE-2018-1275
Oracle:CVE-2018-1305
Oracle:CVE-2018-13785
Oracle:CVE-2018-1656
Oracle:CVE-2018-2563
Oracle:CVE-2018-2572
Oracle:CVE-2018-2587
Oracle:CVE-2018-2598
Oracle:CVE-2018-2628
Oracle:CVE-2018-2718
Oracle:CVE-2018-2737
Oracle:CVE-2018-2738
Oracle:CVE-2018-2739
Oracle:CVE-2018-2742
Oracle:CVE-2018-2746
Oracle:CVE-2018-2747
Oracle:CVE-2018-2748
Oracle:CVE-2018-2749
Oracle:CVE-2018-2750
Oracle:CVE-2018-2752
Oracle:CVE-2018-2753
Oracle:CVE-2018-2754
Oracle:CVE-2018-2755
Oracle:CVE-2018-2756
Oracle:CVE-2018-2758
Oracle:CVE-2018-2759
Oracle:CVE-2018-2760
Oracle:CVE-2018-2761
Oracle:CVE-2018-2762
Oracle:CVE-2018-2763
Oracle:CVE-2018-2764
Oracle:CVE-2018-2765
Oracle:CVE-2018-2766
Oracle:CVE-2018-2767
Oracle:CVE-2018-2768
Oracle:CVE-2018-2769
Oracle:CVE-2018-2770
Oracle:CVE-2018-2771
Oracle:CVE-2018-2772
Oracle:CVE-2018-2773
Oracle:CVE-2018-2774
Oracle:CVE-2018-2775
Oracle:CVE-2018-2776
Oracle:CVE-2018-2777
Oracle:CVE-2018-2778
Oracle:CVE-2018-2779
Oracle:CVE-2018-2780
Oracle:CVE-2018-2781
Oracle:CVE-2018-2782
Oracle:CVE-2018-2783
Oracle:CVE-2018-2784
Oracle:CVE-2018-2785
Oracle:CVE-2018-2786
Oracle:CVE-2018-2787
Oracle:CVE-2018-2788
Oracle:CVE-2018-2789
Oracle:CVE-2018-2790
Oracle:CVE-2018-2791
Oracle:CVE-2018-2792
Oracle:CVE-2018-2793
Oracle:CVE-2018-2794
Oracle:CVE-2018-2795
Oracle:CVE-2018-2796
Oracle:CVE-2018-2797
Oracle:CVE-2018-2798
Oracle:CVE-2018-2799
Oracle:CVE-2018-2800
Oracle:CVE-2018-2801
Oracle:CVE-2018-2804
Oracle:CVE-2018-2805
Oracle:CVE-2018-2806
Oracle:CVE-2018-2807
Oracle:CVE-2018-2808
Oracle:CVE-2018-2809
Oracle:CVE-2018-2810
Oracle:CVE-2018-2811
Oracle:CVE-2018-2812
Oracle:CVE-2018-2813
Oracle:CVE-2018-2814
Oracle:CVE-2018-2815
Oracle:CVE-2018-2816
Oracle:CVE-2018-2817
Oracle:CVE-2018-2818
Oracle:CVE-2018-2819
Oracle:CVE-2018-2820
Oracle:CVE-2018-2821
Oracle:CVE-2018-2822
Oracle:CVE-2018-2823
Oracle:CVE-2018-2825
Oracle:CVE-2018-2826
Oracle:CVE-2018-2827
Oracle:CVE-2018-2828
Oracle:CVE-2018-2830
Oracle:CVE-2018-2831
Oracle:CVE-2018-2832
Oracle:CVE-2018-2834
Oracle:CVE-2018-2835
Oracle:CVE-2018-2836
Oracle:CVE-2018-2837
Oracle:CVE-2018-2838
Oracle:CVE-2018-2839
Oracle:CVE-2018-2840
Oracle:CVE-2018-2841
Oracle:CVE-2018-2842
Oracle:CVE-2018-2843
Oracle:CVE-2018-2844
Oracle:CVE-2018-2845
Oracle:CVE-2018-2846
Oracle:CVE-2018-2849
Oracle:CVE-2018-2850
Oracle:CVE-2018-2852
Oracle:CVE-2018-2854
Oracle:CVE-2018-2855
Oracle:CVE-2018-2856
Oracle:CVE-2018-2857
Oracle:CVE-2018-2858
Oracle:CVE-2018-2859
Oracle:CVE-2018-2860
Oracle:CVE-2018-2861
Oracle:CVE-2018-2862
Oracle:CVE-2018-2863
Oracle:CVE-2018-2864
Oracle:CVE-2018-2865
Oracle:CVE-2018-2866
Oracle:CVE-2018-2867
Oracle:CVE-2018-2868
Oracle:CVE-2018-2869
Oracle:CVE-2018-2870
Oracle:CVE-2018-2871
Oracle:CVE-2018-2872
Oracle:CVE-2018-2873
Oracle:CVE-2018-2874
Oracle:CVE-2018-2876
Oracle:CVE-2018-2877
Oracle:CVE-2018-2878
Oracle:CVE-2018-2879
Oracle:CVE-2018-2881
Oracle:CVE-2018-2882
Oracle:CVE-2018-2887
Oracle:CVE-2018-2888
Oracle:CVE-2018-2889
Oracle:CVE-2018-2891
Oracle:CVE-2018-2892
Oracle:CVE-2018-2893
Oracle:CVE-2018-2894
Oracle:CVE-2018-2895
Oracle:CVE-2018-2896
Oracle:CVE-2018-2897
Oracle:CVE-2018-2898
Oracle:CVE-2018-2899
Oracle:CVE-2018-2900
Oracle:CVE-2018-2901
Oracle:CVE-2018-2902
Oracle:CVE-2018-2903
Oracle:CVE-2018-2904
Oracle:CVE-2018-2905
Oracle:CVE-2018-2906
Oracle:CVE-2018-2907
Oracle:CVE-2018-2908
Oracle:CVE-2018-2909
Oracle:CVE-2018-2911
Oracle:CVE-2018-2912
Oracle:CVE-2018-2913
Oracle:CVE-2018-2914
Oracle:CVE-2018-2915
Oracle:CVE-2018-2916
Oracle:CVE-2018-2917
Oracle:CVE-2018-2918
Oracle:CVE-2018-2919
Oracle:CVE-2018-2920
Oracle:CVE-2018-2921
Oracle:CVE-2018-2922
Oracle:CVE-2018-2923
Oracle:CVE-2018-2924
Oracle:CVE-2018-2925
Oracle:CVE-2018-2926
Oracle:CVE-2018-2927
Oracle:CVE-2018-2928
Oracle:CVE-2018-2929
Oracle:CVE-2018-2930
Oracle:CVE-2018-2932
Oracle:CVE-2018-2933
Oracle:CVE-2018-2934
Oracle:CVE-2018-2935
Oracle:CVE-2018-2936
Oracle:CVE-2018-2937
Oracle:CVE-2018-2938
Oracle:CVE-2018-2939
Oracle:CVE-2018-2940
Oracle:CVE-2018-2941
Oracle:CVE-2018-2942
Oracle:CVE-2018-2943
Oracle:CVE-2018-2944
Oracle:CVE-2018-2945
Oracle:CVE-2018-2946
Oracle:CVE-2018-2947
Oracle:CVE-2018-2948
Oracle:CVE-2018-2949
Oracle:CVE-2018-2950
Oracle:CVE-2018-2951
Oracle:CVE-2018-2952
Oracle:CVE-2018-2953
Oracle:CVE-2018-2954
Oracle:CVE-2018-2955
Oracle:CVE-2018-2956
Oracle:CVE-2018-2957
Oracle:CVE-2018-2958
Oracle:CVE-2018-2959
Oracle:CVE-2018-2960
Oracle:CVE-2018-2961
Oracle:CVE-2018-2962
Oracle:CVE-2018-2963
Oracle:CVE-2018-2964
Oracle:CVE-2018-2965
Oracle:CVE-2018-2966
Oracle:CVE-2018-2967
Oracle:CVE-2018-2968
Oracle:CVE-2018-2969
Oracle:CVE-2018-2970
Oracle:CVE-2018-2971
Oracle:CVE-2018-2972
Oracle:CVE-2018-2973
Oracle:CVE-2018-2974
Oracle:CVE-2018-2975
Oracle:CVE-2018-2976
Oracle:CVE-2018-2977
Oracle:CVE-2018-2979
Oracle:CVE-2018-2980
Oracle:CVE-2018-2981
Oracle:CVE-2018-2982
Oracle:CVE-2018-2984
Oracle:CVE-2018-2985
Oracle:CVE-2018-2986
Oracle:CVE-2018-2987
Oracle:CVE-2018-2988
Oracle:CVE-2018-2989
Oracle:CVE-2018-2990
Oracle:CVE-2018-2991
Oracle:CVE-2018-2992
Oracle:CVE-2018-2993
Oracle:CVE-2018-2994
Oracle:CVE-2018-2995
Oracle:CVE-2018-2996
Oracle:CVE-2018-2997
Oracle:CVE-2018-2998
Oracle:CVE-2018-2999
Oracle:CVE-2018-3000
Oracle:CVE-2018-3001
Oracle:CVE-2018-3002
Oracle:CVE-2018-3003
Oracle:CVE-2018-3004
Oracle:CVE-2018-3005
Oracle:CVE-2018-3006
Oracle:CVE-2018-3007
Oracle:CVE-2018-3008
Oracle:CVE-2018-3009
Oracle:CVE-2018-3010
Oracle:CVE-2018-3011
Oracle:CVE-2018-3012
Oracle:CVE-2018-3013
Oracle:CVE-2018-3014
Oracle:CVE-2018-3015
Oracle:CVE-2018-3016
Oracle:CVE-2018-3017
Oracle:CVE-2018-3018
Oracle:CVE-2018-3019
Oracle:CVE-2018-3020
Oracle:CVE-2018-3021
Oracle:CVE-2018-3022
Oracle:CVE-2018-3023
Oracle:CVE-2018-3024
Oracle:CVE-2018-3025
Oracle:CVE-2018-3026
Oracle:CVE-2018-3027
Oracle:CVE-2018-3028
Oracle:CVE-2018-3029
Oracle:CVE-2018-3030
Oracle:CVE-2018-3031
Oracle:CVE-2018-3032
Oracle:CVE-2018-3033
Oracle:CVE-2018-3034
Oracle:CVE-2018-3035
Oracle:CVE-2018-3036
Oracle:CVE-2018-3037
Oracle:CVE-2018-3038
Oracle:CVE-2018-3039
Oracle:CVE-2018-3040
Oracle:CVE-2018-3041
Oracle:CVE-2018-3042
Oracle:CVE-2018-3043
Oracle:CVE-2018-3044
Oracle:CVE-2018-3045
Oracle:CVE-2018-3046
Oracle:CVE-2018-3047
Oracle:CVE-2018-3048
Oracle:CVE-2018-3049
Oracle:CVE-2018-3050
Oracle:CVE-2018-3051
Oracle:CVE-2018-3052
Oracle:CVE-2018-3053
Oracle:CVE-2018-3054
Oracle:CVE-2018-3055
Oracle:CVE-2018-3056
Oracle:CVE-2018-3057
Oracle:CVE-2018-3058
Oracle:CVE-2018-3059
Oracle:CVE-2018-3060
Oracle:CVE-2018-3061
Oracle:CVE-2018-3062
Oracle:CVE-2018-3063
Oracle:CVE-2018-3064
Oracle:CVE-2018-3065
Oracle:CVE-2018-3066
Oracle:CVE-2018-3067
Oracle:CVE-2018-3068
Oracle:CVE-2018-3069
Oracle:CVE-2018-3070
Oracle:CVE-2018-3071
Oracle:CVE-2018-3072
Oracle:CVE-2018-3073
Oracle:CVE-2018-3074
Oracle:CVE-2018-3075
Oracle:CVE-2018-3076
Oracle:CVE-2018-3077
Oracle:CVE-2018-3078
Oracle:CVE-2018-3079
Oracle:CVE-2018-3080
Oracle:CVE-2018-3081
Oracle:CVE-2018-3082
Oracle:CVE-2018-3084
Oracle:CVE-2018-3085
Oracle:CVE-2018-3086
Oracle:CVE-2018-3087
Oracle:CVE-2018-3088
Oracle:CVE-2018-3089
Oracle:CVE-2018-3090
Oracle:CVE-2018-3091
Oracle:CVE-2018-3092
Oracle:CVE-2018-3093
Oracle:CVE-2018-3094
Oracle:CVE-2018-3095
Oracle:CVE-2018-3096
Oracle:CVE-2018-3097
Oracle:CVE-2018-3098
Oracle:CVE-2018-3099
Oracle:CVE-2018-3100
Oracle:CVE-2018-3101
Oracle:CVE-2018-3102
Oracle:CVE-2018-3103
Oracle:CVE-2018-3104
Oracle:CVE-2018-3105
Oracle:CVE-2018-3108
Oracle:CVE-2018-3109
Oracle:CVE-2018-3115
Oracle:CVE-2018-3122
Oracle:CVE-2018-3126
Oracle:CVE-2018-3127
Oracle:CVE-2018-3128
Oracle:CVE-2018-3129
Oracle:CVE-2018-3130
Oracle:CVE-2018-3131
Oracle:CVE-2018-3132
Oracle:CVE-2018-3133
Oracle:CVE-2018-3134
Oracle:CVE-2018-3135
Oracle:CVE-2018-3136
Oracle:CVE-2018-3137
Oracle:CVE-2018-3138
Oracle:CVE-2018-3139
Oracle:CVE-2018-3140
Oracle:CVE-2018-3141
Oracle:CVE-2018-3142
Oracle:CVE-2018-3143
Oracle:CVE-2018-3144
Oracle:CVE-2018-3145
Oracle:CVE-2018-3146
Oracle:CVE-2018-3147
Oracle:CVE-2018-3148
Oracle:CVE-2018-3149
Oracle:CVE-2018-3150
Oracle:CVE-2018-3151
Oracle:CVE-2018-3152
Oracle:CVE-2018-3153
Oracle:CVE-2018-3154
Oracle:CVE-2018-3155
Oracle:CVE-2018-3156
Oracle:CVE-2018-3157
Oracle:CVE-2018-3158
Oracle:CVE-2018-3159
Oracle:CVE-2018-3160
Oracle:CVE-2018-3161
Oracle:CVE-2018-3162
Oracle:CVE-2018-3163
Oracle:CVE-2018-3164
Oracle:CVE-2018-3165
Oracle:CVE-2018-3166
Oracle:CVE-2018-3167
Oracle:CVE-2018-3168
Oracle:CVE-2018-3169
Oracle:CVE-2018-3170
Oracle:CVE-2018-3171
Oracle:CVE-2018-3172
Oracle:CVE-2018-3173
Oracle:CVE-2018-3174
Oracle:CVE-2018-3175
Oracle:CVE-2018-3176
Oracle:CVE-2018-3177
Oracle:CVE-2018-3178
Oracle:CVE-2018-3179
Oracle:CVE-2018-3180
Oracle:CVE-2018-3181
Oracle:CVE-2018-3182
Oracle:CVE-2018-3183
Oracle:CVE-2018-3184
Oracle:CVE-2018-3185
Oracle:CVE-2018-3186
Oracle:CVE-2018-3187
Oracle:CVE-2018-3188
Oracle:CVE-2018-3189
Oracle:CVE-2018-3190
Oracle:CVE-2018-3191
Oracle:CVE-2018-3192
Oracle:CVE-2018-3193
Oracle:CVE-2018-3194
Oracle:CVE-2018-3195
Oracle:CVE-2018-3196
Oracle:CVE-2018-3197
Oracle:CVE-2018-3198
Oracle:CVE-2018-3200
Oracle:CVE-2018-3201
Oracle:CVE-2018-3202
Oracle:CVE-2018-3203
Oracle:CVE-2018-3204
Oracle:CVE-2018-3205
Oracle:CVE-2018-3206
Oracle:CVE-2018-3207
Oracle:CVE-2018-3208
Oracle:CVE-2018-3209
Oracle:CVE-2018-3210
Oracle:CVE-2018-3211
Oracle:CVE-2018-3212
Oracle:CVE-2018-3213
Oracle:CVE-2018-3214
Oracle:CVE-2018-3215
Oracle:CVE-2018-3217
Oracle:CVE-2018-3218
Oracle:CVE-2018-3219
Oracle:CVE-2018-3220
Oracle:CVE-2018-3221
Oracle:CVE-2018-3222
Oracle:CVE-2018-3223
Oracle:CVE-2018-3224
Oracle:CVE-2018-3225
Oracle:CVE-2018-3226
Oracle:CVE-2018-3227
Oracle:CVE-2018-3228
Oracle:CVE-2018-3229
Oracle:CVE-2018-3230
Oracle:CVE-2018-3231
Oracle:CVE-2018-3232
Oracle:CVE-2018-3233
Oracle:CVE-2018-3234
Oracle:CVE-2018-3235
Oracle:CVE-2018-3236
Oracle:CVE-2018-3237
Oracle:CVE-2018-3238
Oracle:CVE-2018-3239
Oracle:CVE-2018-3241
Oracle:CVE-2018-3242
Oracle:CVE-2018-3243
Oracle:CVE-2018-3244
Oracle:CVE-2018-3245
Oracle:CVE-2018-3246
Oracle:CVE-2018-3247
Oracle:CVE-2018-3248
Oracle:CVE-2018-3249
Oracle:CVE-2018-3250
Oracle:CVE-2018-3251
Oracle:CVE-2018-3252
Oracle:CVE-2018-3253
Oracle:CVE-2018-3254
Oracle:CVE-2018-3255
Oracle:CVE-2018-3256
Oracle:CVE-2018-3257
Oracle:CVE-2018-3258
Oracle:CVE-2018-3259
Oracle:CVE-2018-3261
Oracle:CVE-2018-3262
Oracle:CVE-2018-3263
Oracle:CVE-2018-3264
Oracle:CVE-2018-3265
Oracle:CVE-2018-3266
Oracle:CVE-2018-3267
Oracle:CVE-2018-3268
Oracle:CVE-2018-3269
Oracle:CVE-2018-3270
Oracle:CVE-2018-3271
Oracle:CVE-2018-3272
Oracle:CVE-2018-3273
Oracle:CVE-2018-3274
Oracle:CVE-2018-3275
Oracle:CVE-2018-3276
Oracle:CVE-2018-3277
Oracle:CVE-2018-3278
Oracle:CVE-2018-3279
Oracle:CVE-2018-3280
Oracle:CVE-2018-3281
Oracle:CVE-2018-3282
Oracle:CVE-2018-3283
Oracle:CVE-2018-3284
Oracle:CVE-2018-3285
Oracle:CVE-2018-3286
Oracle:CVE-2018-3287
Oracle:CVE-2018-3288
Oracle:CVE-2018-3289
Oracle:CVE-2018-3290
Oracle:CVE-2018-3291
Oracle:CVE-2018-3292
Oracle:CVE-2018-3293
Oracle:CVE-2018-3294
Oracle:CVE-2018-3295
Oracle:CVE-2018-3296
Oracle:CVE-2018-3297
Oracle:CVE-2018-3298
Oracle:CVE-2018-3299
Oracle:CVE-2018-3301
Oracle:CVE-2018-3302
Oracle:CVE-2018-7489
Oracle:CVE-2018-8013
Oracle:CVE-2018-8014
Oracle:CVE-2018-8037
RH:CVE-2017-13077
RH:CVE-2017-13078
RH:CVE-2017-13079
RH:CVE-2017-13080
RH:CVE-2017-13081
RH:CVE-2017-13082
RH:CVE-2017-13084
RH:CVE-2017-13086
RH:CVE-2017-13087
RH:CVE-2017-13088
RHSA-2017:2907
RHSA-2017:2911
SECTRACK:1039570
SECTRACK:1039571
SECTRACK:1039572
SECTRACK:1039573
SECTRACK:1039576
SECTRACK:1039577
SECTRACK:1039578
SECTRACK:1039581
SECTRACK:1039585
SECTRACK:1039703
SECTRACK:1041432
SMASH Issue 191142
SUSE:SUSE-SU-2017:2745
SUSE:SUSE-SU-2017:2752
SUSE:openSUSE-SU-2017:2755
UBUNTU:CVE-2017-13077
UBUNTU:CVE-2017-13078
UBUNTU:CVE-2017-13079
UBUNTU:CVE-2017-13080
UBUNTU:CVE-2017-13081
UBUNTU:CVE-2017-13082
UBUNTU:CVE-2017-13084
UBUNTU:CVE-2017-13086
UBUNTU:CVE-2017-13087
UBUNTU:CVE-2017-13088
UBUNTU:USN-3455-1
bdo#1033297
bnc#1056061
linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
rh#1167537
rh#1183461
rh#1202366
rh#1202380
rh#1202384
rh#1202395
rh#1202418
rh#1293972
rh#1369383
rh#1384344
rh#1393454
rh#1397485
rh#1399546
rh#1491692
rh#1491693
rh#1491694
rh#1491696
rh#1491697
rh#1491698
rh#1500301
rh#1500302
rh#1500303
rh#1500304
rh#1519780
rh#1553413
rh#1591854
rh#1607582
rh#1608073
rh#1731271
rh#2044599
rh#2044602
rh#2061700
rh#2116175
rh#2119127
rh#2161287
rh#2270497
CVE-2017-13084kernel-source-rt:Releasedimportant8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)BID:101274
CERT-VN:VU#228519
CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
CONFIRM:access.redhat.com:CVE-2017-13088
CONFIRM:cert-portal.siemens.com:CVE-2017-13088
CONFIRM:cert.vde.com:CVE-2017-13080
CONFIRM:cert.vde.com:CVE-2017-13088
CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080
CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082
CONFIRM:source.android.com:CVE-2017-5754
CONFIRM:source.android.com:CVE-2017-6264
CONFIRM:source.android.com:CVE-2017-6294
CONFIRM:support.apple.com:CVE-2017-13852
CONFIRM:support.apple.com:CVE-2017-13904
CONFIRM:support.apple.com:CVE-2017-3169
CONFIRM:support.hpe.com:CVE-2017-13081
CONFIRM:support.lenovo.com:CVE-2017-13088
CONFIRM:www.arubanetworks.com:CVE-2017-13088
CONFIRM:www.intel.com:CVE-2017-13080
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
CVE-2017-13084
CVE-2017-13086
CVE-2017-13087
CVE-2017-13088
CVE-2024-2466
D:CVE-2022-2590
DSA-3999
DSA-5378
FREEBSD:FreeBSD-SA-17:07
GENTOO:GLSA-201711-03
MISC:github.com:CVE-2017-13082
MISC:github.com:OSS:2024/Q1/256
MISC:ics-cert.us-cert.gov:CVE-2017-13082
MISC:w1.fi
MISC:w1.fi:CVE-2017-13088
MISC:www.krackattacks.com:CVE-2017-13088
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update
OSS:2017/Q4/83
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/11/10/2
OSS:2022/Q3/99
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2024/03/27/4
OSS:2024/Q1/256
Oracle:CVE-2011-4461
Oracle:CVE-2013-1768
Oracle:CVE-2014-0114
Oracle:CVE-2014-3490
Oracle:CVE-2014-3577
Oracle:CVE-2015-0204
Oracle:CVE-2015-0235
Oracle:CVE-2015-5600
Oracle:CVE-2015-6937
Oracle:CVE-2015-7501
Oracle:CVE-2015-7940
Oracle:CVE-2015-9251
Oracle:CVE-2016-0635
Oracle:CVE-2016-0714
Oracle:CVE-2016-0729
Oracle:CVE-2016-1000031
Oracle:CVE-2016-1181
Oracle:CVE-2016-1182
Oracle:CVE-2016-2099
Oracle:CVE-2016-2107
Oracle:CVE-2016-2176
Oracle:CVE-2016-2179
Oracle:CVE-2016-2183
Oracle:CVE-2016-3092
Oracle:CVE-2016-3506
Oracle:CVE-2016-4000
Oracle:CVE-2016-4055
Oracle:CVE-2016-5007
Oracle:CVE-2016-5019
Oracle:CVE-2016-5080
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2016-6304
Oracle:CVE-2016-6814
Oracle:CVE-2016-7103
Oracle:CVE-2016-7167
Oracle:CVE-2016-9843
Oracle:CVE-2016-9878
Oracle:CVE-2017-0379
Oracle:CVE-2017-10068
Oracle:CVE-2017-12617
Oracle:CVE-2017-13077
Oracle:CVE-2017-13082
Oracle:CVE-2017-14735
Oracle:CVE-2017-15095
Oracle:CVE-2017-17562
Oracle:CVE-2017-3633
Oracle:CVE-2017-3736
Oracle:CVE-2017-3737
Oracle:CVE-2017-5533
Oracle:CVE-2017-5645
Oracle:CVE-2017-5662
Oracle:CVE-2017-5664
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-6074
Oracle:CVE-2017-7525
Oracle:CVE-2017-7805
Oracle:CVE-2017-9798
Oracle:CVE-2018-0732
Oracle:CVE-2018-0739
Oracle:CVE-2018-1000120
Oracle:CVE-2018-1000300
Oracle:CVE-2018-11039
Oracle:CVE-2018-1171
Oracle:CVE-2018-11776
Oracle:CVE-2018-1258
Oracle:CVE-2018-1275
Oracle:CVE-2018-1305
Oracle:CVE-2018-13785
Oracle:CVE-2018-1656
Oracle:CVE-2018-2563
Oracle:CVE-2018-2572
Oracle:CVE-2018-2587
Oracle:CVE-2018-2598
Oracle:CVE-2018-2628
Oracle:CVE-2018-2718
Oracle:CVE-2018-2737
Oracle:CVE-2018-2738
Oracle:CVE-2018-2739
Oracle:CVE-2018-2742
Oracle:CVE-2018-2746
Oracle:CVE-2018-2747
Oracle:CVE-2018-2748
Oracle:CVE-2018-2749
Oracle:CVE-2018-2750
Oracle:CVE-2018-2752
Oracle:CVE-2018-2753
Oracle:CVE-2018-2754
Oracle:CVE-2018-2755
Oracle:CVE-2018-2756
Oracle:CVE-2018-2758
Oracle:CVE-2018-2759
Oracle:CVE-2018-2760
Oracle:CVE-2018-2761
Oracle:CVE-2018-2762
Oracle:CVE-2018-2763
Oracle:CVE-2018-2764
Oracle:CVE-2018-2765
Oracle:CVE-2018-2766
Oracle:CVE-2018-2767
Oracle:CVE-2018-2768
Oracle:CVE-2018-2769
Oracle:CVE-2018-2770
Oracle:CVE-2018-2771
Oracle:CVE-2018-2772
Oracle:CVE-2018-2773
Oracle:CVE-2018-2774
Oracle:CVE-2018-2775
Oracle:CVE-2018-2776
Oracle:CVE-2018-2777
Oracle:CVE-2018-2778
Oracle:CVE-2018-2779
Oracle:CVE-2018-2780
Oracle:CVE-2018-2781
Oracle:CVE-2018-2782
Oracle:CVE-2018-2783
Oracle:CVE-2018-2784
Oracle:CVE-2018-2785
Oracle:CVE-2018-2786
Oracle:CVE-2018-2787
Oracle:CVE-2018-2788
Oracle:CVE-2018-2789
Oracle:CVE-2018-2790
Oracle:CVE-2018-2791
Oracle:CVE-2018-2792
Oracle:CVE-2018-2793
Oracle:CVE-2018-2794
Oracle:CVE-2018-2795
Oracle:CVE-2018-2796
Oracle:CVE-2018-2797
Oracle:CVE-2018-2798
Oracle:CVE-2018-2799
Oracle:CVE-2018-2800
Oracle:CVE-2018-2801
Oracle:CVE-2018-2804
Oracle:CVE-2018-2805
Oracle:CVE-2018-2806
Oracle:CVE-2018-2807
Oracle:CVE-2018-2808
Oracle:CVE-2018-2809
Oracle:CVE-2018-2810
Oracle:CVE-2018-2811
Oracle:CVE-2018-2812
Oracle:CVE-2018-2813
Oracle:CVE-2018-2814
Oracle:CVE-2018-2815
Oracle:CVE-2018-2816
Oracle:CVE-2018-2817
Oracle:CVE-2018-2818
Oracle:CVE-2018-2819
Oracle:CVE-2018-2820
Oracle:CVE-2018-2821
Oracle:CVE-2018-2822
Oracle:CVE-2018-2823
Oracle:CVE-2018-2825
Oracle:CVE-2018-2826
Oracle:CVE-2018-2827
Oracle:CVE-2018-2828
Oracle:CVE-2018-2830
Oracle:CVE-2018-2831
Oracle:CVE-2018-2832
Oracle:CVE-2018-2834
Oracle:CVE-2018-2835
Oracle:CVE-2018-2836
Oracle:CVE-2018-2837
Oracle:CVE-2018-2838
Oracle:CVE-2018-2839
Oracle:CVE-2018-2840
Oracle:CVE-2018-2841
Oracle:CVE-2018-2842
Oracle:CVE-2018-2843
Oracle:CVE-2018-2844
Oracle:CVE-2018-2845
Oracle:CVE-2018-2846
Oracle:CVE-2018-2849
Oracle:CVE-2018-2850
Oracle:CVE-2018-2852
Oracle:CVE-2018-2854
Oracle:CVE-2018-2855
Oracle:CVE-2018-2856
Oracle:CVE-2018-2857
Oracle:CVE-2018-2858
Oracle:CVE-2018-2859
Oracle:CVE-2018-2860
Oracle:CVE-2018-2861
Oracle:CVE-2018-2862
Oracle:CVE-2018-2863
Oracle:CVE-2018-2864
Oracle:CVE-2018-2865
Oracle:CVE-2018-2866
Oracle:CVE-2018-2867
Oracle:CVE-2018-2868
Oracle:CVE-2018-2869
Oracle:CVE-2018-2870
Oracle:CVE-2018-2871
Oracle:CVE-2018-2872
Oracle:CVE-2018-2873
Oracle:CVE-2018-2874
Oracle:CVE-2018-2876
Oracle:CVE-2018-2877
Oracle:CVE-2018-2878
Oracle:CVE-2018-2879
Oracle:CVE-2018-2881
Oracle:CVE-2018-2882
Oracle:CVE-2018-2887
Oracle:CVE-2018-2888
Oracle:CVE-2018-2889
Oracle:CVE-2018-2891
Oracle:CVE-2018-2892
Oracle:CVE-2018-2893
Oracle:CVE-2018-2894
Oracle:CVE-2018-2895
Oracle:CVE-2018-2896
Oracle:CVE-2018-2897
Oracle:CVE-2018-2898
Oracle:CVE-2018-2899
Oracle:CVE-2018-2900
Oracle:CVE-2018-2901
Oracle:CVE-2018-2902
Oracle:CVE-2018-2903
Oracle:CVE-2018-2904
Oracle:CVE-2018-2905
Oracle:CVE-2018-2906
Oracle:CVE-2018-2907
Oracle:CVE-2018-2908
Oracle:CVE-2018-2909
Oracle:CVE-2018-2911
Oracle:CVE-2018-2912
Oracle:CVE-2018-2913
Oracle:CVE-2018-2914
Oracle:CVE-2018-2915
Oracle:CVE-2018-2916
Oracle:CVE-2018-2917
Oracle:CVE-2018-2918
Oracle:CVE-2018-2919
Oracle:CVE-2018-2920
Oracle:CVE-2018-2921
Oracle:CVE-2018-2922
Oracle:CVE-2018-2923
Oracle:CVE-2018-2924
Oracle:CVE-2018-2925
Oracle:CVE-2018-2926
Oracle:CVE-2018-2927
Oracle:CVE-2018-2928
Oracle:CVE-2018-2929
Oracle:CVE-2018-2930
Oracle:CVE-2018-2932
Oracle:CVE-2018-2933
Oracle:CVE-2018-2934
Oracle:CVE-2018-2935
Oracle:CVE-2018-2936
Oracle:CVE-2018-2937
Oracle:CVE-2018-2938
Oracle:CVE-2018-2939
Oracle:CVE-2018-2940
Oracle:CVE-2018-2941
Oracle:CVE-2018-2942
Oracle:CVE-2018-2943
Oracle:CVE-2018-2944
Oracle:CVE-2018-2945
Oracle:CVE-2018-2946
Oracle:CVE-2018-2947
Oracle:CVE-2018-2948
Oracle:CVE-2018-2949
Oracle:CVE-2018-2950
Oracle:CVE-2018-2951
Oracle:CVE-2018-2952
Oracle:CVE-2018-2953
Oracle:CVE-2018-2954
Oracle:CVE-2018-2955
Oracle:CVE-2018-2956
Oracle:CVE-2018-2957
Oracle:CVE-2018-2958
Oracle:CVE-2018-2959
Oracle:CVE-2018-2960
Oracle:CVE-2018-2961
Oracle:CVE-2018-2962
Oracle:CVE-2018-2963
Oracle:CVE-2018-2964
Oracle:CVE-2018-2965
Oracle:CVE-2018-2966
Oracle:CVE-2018-2967
Oracle:CVE-2018-2968
Oracle:CVE-2018-2969
Oracle:CVE-2018-2970
Oracle:CVE-2018-2971
Oracle:CVE-2018-2972
Oracle:CVE-2018-2973
Oracle:CVE-2018-2974
Oracle:CVE-2018-2975
Oracle:CVE-2018-2976
Oracle:CVE-2018-2977
Oracle:CVE-2018-2979
Oracle:CVE-2018-2980
Oracle:CVE-2018-2981
Oracle:CVE-2018-2982
Oracle:CVE-2018-2984
Oracle:CVE-2018-2985
Oracle:CVE-2018-2986
Oracle:CVE-2018-2987
Oracle:CVE-2018-2988
Oracle:CVE-2018-2989
Oracle:CVE-2018-2990
Oracle:CVE-2018-2991
Oracle:CVE-2018-2992
Oracle:CVE-2018-2993
Oracle:CVE-2018-2994
Oracle:CVE-2018-2995
Oracle:CVE-2018-2996
Oracle:CVE-2018-2997
Oracle:CVE-2018-2998
Oracle:CVE-2018-2999
Oracle:CVE-2018-3000
Oracle:CVE-2018-3001
Oracle:CVE-2018-3002
Oracle:CVE-2018-3003
Oracle:CVE-2018-3004
Oracle:CVE-2018-3005
Oracle:CVE-2018-3006
Oracle:CVE-2018-3007
Oracle:CVE-2018-3008
Oracle:CVE-2018-3009
Oracle:CVE-2018-3010
Oracle:CVE-2018-3011
Oracle:CVE-2018-3012
Oracle:CVE-2018-3013
Oracle:CVE-2018-3014
Oracle:CVE-2018-3015
Oracle:CVE-2018-3016
Oracle:CVE-2018-3017
Oracle:CVE-2018-3018
Oracle:CVE-2018-3019
Oracle:CVE-2018-3020
Oracle:CVE-2018-3021
Oracle:CVE-2018-3022
Oracle:CVE-2018-3023
Oracle:CVE-2018-3024
Oracle:CVE-2018-3025
Oracle:CVE-2018-3026
Oracle:CVE-2018-3027
Oracle:CVE-2018-3028
Oracle:CVE-2018-3029
Oracle:CVE-2018-3030
Oracle:CVE-2018-3031
Oracle:CVE-2018-3032
Oracle:CVE-2018-3033
Oracle:CVE-2018-3034
Oracle:CVE-2018-3035
Oracle:CVE-2018-3036
Oracle:CVE-2018-3037
Oracle:CVE-2018-3038
Oracle:CVE-2018-3039
Oracle:CVE-2018-3040
Oracle:CVE-2018-3041
Oracle:CVE-2018-3042
Oracle:CVE-2018-3043
Oracle:CVE-2018-3044
Oracle:CVE-2018-3045
Oracle:CVE-2018-3046
Oracle:CVE-2018-3047
Oracle:CVE-2018-3048
Oracle:CVE-2018-3049
Oracle:CVE-2018-3050
Oracle:CVE-2018-3051
Oracle:CVE-2018-3052
Oracle:CVE-2018-3053
Oracle:CVE-2018-3054
Oracle:CVE-2018-3055
Oracle:CVE-2018-3056
Oracle:CVE-2018-3057
Oracle:CVE-2018-3058
Oracle:CVE-2018-3059
Oracle:CVE-2018-3060
Oracle:CVE-2018-3061
Oracle:CVE-2018-3062
Oracle:CVE-2018-3063
Oracle:CVE-2018-3064
Oracle:CVE-2018-3065
Oracle:CVE-2018-3066
Oracle:CVE-2018-3067
Oracle:CVE-2018-3068
Oracle:CVE-2018-3069
Oracle:CVE-2018-3070
Oracle:CVE-2018-3071
Oracle:CVE-2018-3072
Oracle:CVE-2018-3073
Oracle:CVE-2018-3074
Oracle:CVE-2018-3075
Oracle:CVE-2018-3076
Oracle:CVE-2018-3077
Oracle:CVE-2018-3078
Oracle:CVE-2018-3079
Oracle:CVE-2018-3080
Oracle:CVE-2018-3081
Oracle:CVE-2018-3082
Oracle:CVE-2018-3084
Oracle:CVE-2018-3085
Oracle:CVE-2018-3086
Oracle:CVE-2018-3087
Oracle:CVE-2018-3088
Oracle:CVE-2018-3089
Oracle:CVE-2018-3090
Oracle:CVE-2018-3091
Oracle:CVE-2018-3092
Oracle:CVE-2018-3093
Oracle:CVE-2018-3094
Oracle:CVE-2018-3095
Oracle:CVE-2018-3096
Oracle:CVE-2018-3097
Oracle:CVE-2018-3098
Oracle:CVE-2018-3099
Oracle:CVE-2018-3100
Oracle:CVE-2018-3101
Oracle:CVE-2018-3102
Oracle:CVE-2018-3103
Oracle:CVE-2018-3104
Oracle:CVE-2018-3105
Oracle:CVE-2018-3108
Oracle:CVE-2018-3109
Oracle:CVE-2018-3115
Oracle:CVE-2018-3122
Oracle:CVE-2018-3126
Oracle:CVE-2018-3127
Oracle:CVE-2018-3128
Oracle:CVE-2018-3129
Oracle:CVE-2018-3130
Oracle:CVE-2018-3131
Oracle:CVE-2018-3132
Oracle:CVE-2018-3133
Oracle:CVE-2018-3134
Oracle:CVE-2018-3135
Oracle:CVE-2018-3136
Oracle:CVE-2018-3137
Oracle:CVE-2018-3138
Oracle:CVE-2018-3139
Oracle:CVE-2018-3140
Oracle:CVE-2018-3141
Oracle:CVE-2018-3142
Oracle:CVE-2018-3143
Oracle:CVE-2018-3144
Oracle:CVE-2018-3145
Oracle:CVE-2018-3146
Oracle:CVE-2018-3147
Oracle:CVE-2018-3148
Oracle:CVE-2018-3149
Oracle:CVE-2018-3150
Oracle:CVE-2018-3151
Oracle:CVE-2018-3152
Oracle:CVE-2018-3153
Oracle:CVE-2018-3154
Oracle:CVE-2018-3155
Oracle:CVE-2018-3156
Oracle:CVE-2018-3157
Oracle:CVE-2018-3158
Oracle:CVE-2018-3159
Oracle:CVE-2018-3160
Oracle:CVE-2018-3161
Oracle:CVE-2018-3162
Oracle:CVE-2018-3163
Oracle:CVE-2018-3164
Oracle:CVE-2018-3165
Oracle:CVE-2018-3166
Oracle:CVE-2018-3167
Oracle:CVE-2018-3168
Oracle:CVE-2018-3169
Oracle:CVE-2018-3170
Oracle:CVE-2018-3171
Oracle:CVE-2018-3172
Oracle:CVE-2018-3173
Oracle:CVE-2018-3174
Oracle:CVE-2018-3175
Oracle:CVE-2018-3176
Oracle:CVE-2018-3177
Oracle:CVE-2018-3178
Oracle:CVE-2018-3179
Oracle:CVE-2018-3180
Oracle:CVE-2018-3181
Oracle:CVE-2018-3182
Oracle:CVE-2018-3183
Oracle:CVE-2018-3184
Oracle:CVE-2018-3185
Oracle:CVE-2018-3186
Oracle:CVE-2018-3187
Oracle:CVE-2018-3188
Oracle:CVE-2018-3189
Oracle:CVE-2018-3190
Oracle:CVE-2018-3191
Oracle:CVE-2018-3192
Oracle:CVE-2018-3193
Oracle:CVE-2018-3194
Oracle:CVE-2018-3195
Oracle:CVE-2018-3196
Oracle:CVE-2018-3197
Oracle:CVE-2018-3198
Oracle:CVE-2018-3200
Oracle:CVE-2018-3201
Oracle:CVE-2018-3202
Oracle:CVE-2018-3203
Oracle:CVE-2018-3204
Oracle:CVE-2018-3205
Oracle:CVE-2018-3206
Oracle:CVE-2018-3207
Oracle:CVE-2018-3208
Oracle:CVE-2018-3209
Oracle:CVE-2018-3210
Oracle:CVE-2018-3211
Oracle:CVE-2018-3212
Oracle:CVE-2018-3213
Oracle:CVE-2018-3214
Oracle:CVE-2018-3215
Oracle:CVE-2018-3217
Oracle:CVE-2018-3218
Oracle:CVE-2018-3219
Oracle:CVE-2018-3220
Oracle:CVE-2018-3221
Oracle:CVE-2018-3222
Oracle:CVE-2018-3223
Oracle:CVE-2018-3224
Oracle:CVE-2018-3225
Oracle:CVE-2018-3226
Oracle:CVE-2018-3227
Oracle:CVE-2018-3228
Oracle:CVE-2018-3229
Oracle:CVE-2018-3230
Oracle:CVE-2018-3231
Oracle:CVE-2018-3232
Oracle:CVE-2018-3233
Oracle:CVE-2018-3234
Oracle:CVE-2018-3235
Oracle:CVE-2018-3236
Oracle:CVE-2018-3237
Oracle:CVE-2018-3238
Oracle:CVE-2018-3239
Oracle:CVE-2018-3241
Oracle:CVE-2018-3242
Oracle:CVE-2018-3243
Oracle:CVE-2018-3244
Oracle:CVE-2018-3245
Oracle:CVE-2018-3246
Oracle:CVE-2018-3247
Oracle:CVE-2018-3248
Oracle:CVE-2018-3249
Oracle:CVE-2018-3250
Oracle:CVE-2018-3251
Oracle:CVE-2018-3252
Oracle:CVE-2018-3253
Oracle:CVE-2018-3254
Oracle:CVE-2018-3255
Oracle:CVE-2018-3256
Oracle:CVE-2018-3257
Oracle:CVE-2018-3258
Oracle:CVE-2018-3259
Oracle:CVE-2018-3261
Oracle:CVE-2018-3262
Oracle:CVE-2018-3263
Oracle:CVE-2018-3264
Oracle:CVE-2018-3265
Oracle:CVE-2018-3266
Oracle:CVE-2018-3267
Oracle:CVE-2018-3268
Oracle:CVE-2018-3269
Oracle:CVE-2018-3270
Oracle:CVE-2018-3271
Oracle:CVE-2018-3272
Oracle:CVE-2018-3273
Oracle:CVE-2018-3274
Oracle:CVE-2018-3275
Oracle:CVE-2018-3276
Oracle:CVE-2018-3277
Oracle:CVE-2018-3278
Oracle:CVE-2018-3279
Oracle:CVE-2018-3280
Oracle:CVE-2018-3281
Oracle:CVE-2018-3282
Oracle:CVE-2018-3283
Oracle:CVE-2018-3284
Oracle:CVE-2018-3285
Oracle:CVE-2018-3286
Oracle:CVE-2018-3287
Oracle:CVE-2018-3288
Oracle:CVE-2018-3289
Oracle:CVE-2018-3290
Oracle:CVE-2018-3291
Oracle:CVE-2018-3292
Oracle:CVE-2018-3293
Oracle:CVE-2018-3294
Oracle:CVE-2018-3295
Oracle:CVE-2018-3296
Oracle:CVE-2018-3297
Oracle:CVE-2018-3298
Oracle:CVE-2018-3299
Oracle:CVE-2018-3301
Oracle:CVE-2018-3302
Oracle:CVE-2018-7489
Oracle:CVE-2018-8013
Oracle:CVE-2018-8014
Oracle:CVE-2018-8037
RH:CVE-2017-13077
RH:CVE-2017-13078
RH:CVE-2017-13079
RH:CVE-2017-13080
RH:CVE-2017-13081
RH:CVE-2017-13082
RH:CVE-2017-13084
RH:CVE-2017-13086
RH:CVE-2017-13087
RH:CVE-2017-13088
RHSA-2017:2907
RHSA-2017:2911
SECTRACK:1039570
SECTRACK:1039571
SECTRACK:1039572
SECTRACK:1039573
SECTRACK:1039576
SECTRACK:1039577
SECTRACK:1039578
SECTRACK:1039581
SECTRACK:1039585
SECTRACK:1039703
SECTRACK:1041432
SMASH Issue 191142
SUSE:SUSE-SU-2017:2745
SUSE:SUSE-SU-2017:2752
SUSE:openSUSE-SU-2017:2755
UBUNTU:CVE-2017-13077
UBUNTU:CVE-2017-13078
UBUNTU:CVE-2017-13079
UBUNTU:CVE-2017-13080
UBUNTU:CVE-2017-13081
UBUNTU:CVE-2017-13082
UBUNTU:CVE-2017-13084
UBUNTU:CVE-2017-13086
UBUNTU:CVE-2017-13087
UBUNTU:CVE-2017-13088
UBUNTU:USN-3455-1
bdo#1033297
bnc#1056061
linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
rh#1167537
rh#1183461
rh#1202366
rh#1202380
rh#1202384
rh#1202395
rh#1202418
rh#1293972
rh#1369383
rh#1384344
rh#1393454
rh#1397485
rh#1399546
rh#1491692
rh#1491693
rh#1491694
rh#1491696
rh#1491697
rh#1491698
rh#1500301
rh#1500302
rh#1500303
rh#1500304
rh#1519780
rh#1553413
rh#1591854
rh#1607582
rh#1608073
rh#1731271
rh#2044599
rh#2044602
rh#2061700
rh#2116175
rh#2119127
rh#2161287
rh#2270497
CVE-2017-13086kernel-source-rt:Releasedimportant8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)BID:101274
CERT-VN:VU#228519
CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
CONFIRM:access.redhat.com:CVE-2017-13088
CONFIRM:cert-portal.siemens.com:CVE-2017-13088
CONFIRM:cert.vde.com:CVE-2017-13080
CONFIRM:cert.vde.com:CVE-2017-13088
CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080
CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082
CONFIRM:source.android.com:CVE-2017-5754
CONFIRM:source.android.com:CVE-2017-6264
CONFIRM:source.android.com:CVE-2017-6294
CONFIRM:support.apple.com:CVE-2017-13852
CONFIRM:support.apple.com:CVE-2017-13904
CONFIRM:support.apple.com:CVE-2017-3169
CONFIRM:support.hpe.com:CVE-2017-13081
CONFIRM:support.lenovo.com:CVE-2017-13088
CONFIRM:www.arubanetworks.com:CVE-2017-13088
CONFIRM:www.intel.com:CVE-2017-13080
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
CVE-2017-13084
CVE-2017-13086
CVE-2017-13087
CVE-2017-13088
CVE-2024-2466
D:CVE-2022-2590
DSA-3999
DSA-5378
FREEBSD:FreeBSD-SA-17:07
GENTOO:GLSA-201711-03
MISC:github.com:CVE-2017-13082
MISC:github.com:OSS:2024/Q1/256
MISC:ics-cert.us-cert.gov:CVE-2017-13082
MISC:w1.fi
MISC:w1.fi:CVE-2017-13088
MISC:www.krackattacks.com:CVE-2017-13088
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update
OSS:2017/Q4/83
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/11/10/2
OSS:2022/Q3/99
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2024/03/27/4
OSS:2024/Q1/256
Oracle:CVE-2011-4461
Oracle:CVE-2013-1768
Oracle:CVE-2014-0114
Oracle:CVE-2014-3490
Oracle:CVE-2014-3577
Oracle:CVE-2015-0204
Oracle:CVE-2015-0235
Oracle:CVE-2015-5600
Oracle:CVE-2015-6937
Oracle:CVE-2015-7501
Oracle:CVE-2015-7940
Oracle:CVE-2015-9251
Oracle:CVE-2016-0635
Oracle:CVE-2016-0714
Oracle:CVE-2016-0729
Oracle:CVE-2016-1000031
Oracle:CVE-2016-1181
Oracle:CVE-2016-1182
Oracle:CVE-2016-2099
Oracle:CVE-2016-2107
Oracle:CVE-2016-2176
Oracle:CVE-2016-2179
Oracle:CVE-2016-2183
Oracle:CVE-2016-3092
Oracle:CVE-2016-3506
Oracle:CVE-2016-4000
Oracle:CVE-2016-4055
Oracle:CVE-2016-5007
Oracle:CVE-2016-5019
Oracle:CVE-2016-5080
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2016-6304
Oracle:CVE-2016-6814
Oracle:CVE-2016-7103
Oracle:CVE-2016-7167
Oracle:CVE-2016-9843
Oracle:CVE-2016-9878
Oracle:CVE-2017-0379
Oracle:CVE-2017-10068
Oracle:CVE-2017-12617
Oracle:CVE-2017-13077
Oracle:CVE-2017-13082
Oracle:CVE-2017-14735
Oracle:CVE-2017-15095
Oracle:CVE-2017-17562
Oracle:CVE-2017-3633
Oracle:CVE-2017-3736
Oracle:CVE-2017-3737
Oracle:CVE-2017-5533
Oracle:CVE-2017-5645
Oracle:CVE-2017-5662
Oracle:CVE-2017-5664
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-6074
Oracle:CVE-2017-7525
Oracle:CVE-2017-7805
Oracle:CVE-2017-9798
Oracle:CVE-2018-0732
Oracle:CVE-2018-0739
Oracle:CVE-2018-1000120
Oracle:CVE-2018-1000300
Oracle:CVE-2018-11039
Oracle:CVE-2018-1171
Oracle:CVE-2018-11776
Oracle:CVE-2018-1258
Oracle:CVE-2018-1275
Oracle:CVE-2018-1305
Oracle:CVE-2018-13785
Oracle:CVE-2018-1656
Oracle:CVE-2018-2563
Oracle:CVE-2018-2572
Oracle:CVE-2018-2587
Oracle:CVE-2018-2598
Oracle:CVE-2018-2628
Oracle:CVE-2018-2718
Oracle:CVE-2018-2737
Oracle:CVE-2018-2738
Oracle:CVE-2018-2739
Oracle:CVE-2018-2742
Oracle:CVE-2018-2746
Oracle:CVE-2018-2747
Oracle:CVE-2018-2748
Oracle:CVE-2018-2749
Oracle:CVE-2018-2750
Oracle:CVE-2018-2752
Oracle:CVE-2018-2753
Oracle:CVE-2018-2754
Oracle:CVE-2018-2755
Oracle:CVE-2018-2756
Oracle:CVE-2018-2758
Oracle:CVE-2018-2759
Oracle:CVE-2018-2760
Oracle:CVE-2018-2761
Oracle:CVE-2018-2762
Oracle:CVE-2018-2763
Oracle:CVE-2018-2764
Oracle:CVE-2018-2765
Oracle:CVE-2018-2766
Oracle:CVE-2018-2767
Oracle:CVE-2018-2768
Oracle:CVE-2018-2769
Oracle:CVE-2018-2770
Oracle:CVE-2018-2771
Oracle:CVE-2018-2772
Oracle:CVE-2018-2773
Oracle:CVE-2018-2774
Oracle:CVE-2018-2775
Oracle:CVE-2018-2776
Oracle:CVE-2018-2777
Oracle:CVE-2018-2778
Oracle:CVE-2018-2779
Oracle:CVE-2018-2780
Oracle:CVE-2018-2781
Oracle:CVE-2018-2782
Oracle:CVE-2018-2783
Oracle:CVE-2018-2784
Oracle:CVE-2018-2785
Oracle:CVE-2018-2786
Oracle:CVE-2018-2787
Oracle:CVE-2018-2788
Oracle:CVE-2018-2789
Oracle:CVE-2018-2790
Oracle:CVE-2018-2791
Oracle:CVE-2018-2792
Oracle:CVE-2018-2793
Oracle:CVE-2018-2794
Oracle:CVE-2018-2795
Oracle:CVE-2018-2796
Oracle:CVE-2018-2797
Oracle:CVE-2018-2798
Oracle:CVE-2018-2799
Oracle:CVE-2018-2800
Oracle:CVE-2018-2801
Oracle:CVE-2018-2804
Oracle:CVE-2018-2805
Oracle:CVE-2018-2806
Oracle:CVE-2018-2807
Oracle:CVE-2018-2808
Oracle:CVE-2018-2809
Oracle:CVE-2018-2810
Oracle:CVE-2018-2811
Oracle:CVE-2018-2812
Oracle:CVE-2018-2813
Oracle:CVE-2018-2814
Oracle:CVE-2018-2815
Oracle:CVE-2018-2816
Oracle:CVE-2018-2817
Oracle:CVE-2018-2818
Oracle:CVE-2018-2819
Oracle:CVE-2018-2820
Oracle:CVE-2018-2821
Oracle:CVE-2018-2822
Oracle:CVE-2018-2823
Oracle:CVE-2018-2825
Oracle:CVE-2018-2826
Oracle:CVE-2018-2827
Oracle:CVE-2018-2828
Oracle:CVE-2018-2830
Oracle:CVE-2018-2831
Oracle:CVE-2018-2832
Oracle:CVE-2018-2834
Oracle:CVE-2018-2835
Oracle:CVE-2018-2836
Oracle:CVE-2018-2837
Oracle:CVE-2018-2838
Oracle:CVE-2018-2839
Oracle:CVE-2018-2840
Oracle:CVE-2018-2841
Oracle:CVE-2018-2842
Oracle:CVE-2018-2843
Oracle:CVE-2018-2844
Oracle:CVE-2018-2845
Oracle:CVE-2018-2846
Oracle:CVE-2018-2849
Oracle:CVE-2018-2850
Oracle:CVE-2018-2852
Oracle:CVE-2018-2854
Oracle:CVE-2018-2855
Oracle:CVE-2018-2856
Oracle:CVE-2018-2857
Oracle:CVE-2018-2858
Oracle:CVE-2018-2859
Oracle:CVE-2018-2860
Oracle:CVE-2018-2861
Oracle:CVE-2018-2862
Oracle:CVE-2018-2863
Oracle:CVE-2018-2864
Oracle:CVE-2018-2865
Oracle:CVE-2018-2866
Oracle:CVE-2018-2867
Oracle:CVE-2018-2868
Oracle:CVE-2018-2869
Oracle:CVE-2018-2870
Oracle:CVE-2018-2871
Oracle:CVE-2018-2872
Oracle:CVE-2018-2873
Oracle:CVE-2018-2874
Oracle:CVE-2018-2876
Oracle:CVE-2018-2877
Oracle:CVE-2018-2878
Oracle:CVE-2018-2879
Oracle:CVE-2018-2881
Oracle:CVE-2018-2882
Oracle:CVE-2018-2887
Oracle:CVE-2018-2888
Oracle:CVE-2018-2889
Oracle:CVE-2018-2891
Oracle:CVE-2018-2892
Oracle:CVE-2018-2893
Oracle:CVE-2018-2894
Oracle:CVE-2018-2895
Oracle:CVE-2018-2896
Oracle:CVE-2018-2897
Oracle:CVE-2018-2898
Oracle:CVE-2018-2899
Oracle:CVE-2018-2900
Oracle:CVE-2018-2901
Oracle:CVE-2018-2902
Oracle:CVE-2018-2903
Oracle:CVE-2018-2904
Oracle:CVE-2018-2905
Oracle:CVE-2018-2906
Oracle:CVE-2018-2907
Oracle:CVE-2018-2908
Oracle:CVE-2018-2909
Oracle:CVE-2018-2911
Oracle:CVE-2018-2912
Oracle:CVE-2018-2913
Oracle:CVE-2018-2914
Oracle:CVE-2018-2915
Oracle:CVE-2018-2916
Oracle:CVE-2018-2917
Oracle:CVE-2018-2918
Oracle:CVE-2018-2919
Oracle:CVE-2018-2920
Oracle:CVE-2018-2921
Oracle:CVE-2018-2922
Oracle:CVE-2018-2923
Oracle:CVE-2018-2924
Oracle:CVE-2018-2925
Oracle:CVE-2018-2926
Oracle:CVE-2018-2927
Oracle:CVE-2018-2928
Oracle:CVE-2018-2929
Oracle:CVE-2018-2930
Oracle:CVE-2018-2932
Oracle:CVE-2018-2933
Oracle:CVE-2018-2934
Oracle:CVE-2018-2935
Oracle:CVE-2018-2936
Oracle:CVE-2018-2937
Oracle:CVE-2018-2938
Oracle:CVE-2018-2939
Oracle:CVE-2018-2940
Oracle:CVE-2018-2941
Oracle:CVE-2018-2942
Oracle:CVE-2018-2943
Oracle:CVE-2018-2944
Oracle:CVE-2018-2945
Oracle:CVE-2018-2946
Oracle:CVE-2018-2947
Oracle:CVE-2018-2948
Oracle:CVE-2018-2949
Oracle:CVE-2018-2950
Oracle:CVE-2018-2951
Oracle:CVE-2018-2952
Oracle:CVE-2018-2953
Oracle:CVE-2018-2954
Oracle:CVE-2018-2955
Oracle:CVE-2018-2956
Oracle:CVE-2018-2957
Oracle:CVE-2018-2958
Oracle:CVE-2018-2959
Oracle:CVE-2018-2960
Oracle:CVE-2018-2961
Oracle:CVE-2018-2962
Oracle:CVE-2018-2963
Oracle:CVE-2018-2964
Oracle:CVE-2018-2965
Oracle:CVE-2018-2966
Oracle:CVE-2018-2967
Oracle:CVE-2018-2968
Oracle:CVE-2018-2969
Oracle:CVE-2018-2970
Oracle:CVE-2018-2971
Oracle:CVE-2018-2972
Oracle:CVE-2018-2973
Oracle:CVE-2018-2974
Oracle:CVE-2018-2975
Oracle:CVE-2018-2976
Oracle:CVE-2018-2977
Oracle:CVE-2018-2979
Oracle:CVE-2018-2980
Oracle:CVE-2018-2981
Oracle:CVE-2018-2982
Oracle:CVE-2018-2984
Oracle:CVE-2018-2985
Oracle:CVE-2018-2986
Oracle:CVE-2018-2987
Oracle:CVE-2018-2988
Oracle:CVE-2018-2989
Oracle:CVE-2018-2990
Oracle:CVE-2018-2991
Oracle:CVE-2018-2992
Oracle:CVE-2018-2993
Oracle:CVE-2018-2994
Oracle:CVE-2018-2995
Oracle:CVE-2018-2996
Oracle:CVE-2018-2997
Oracle:CVE-2018-2998
Oracle:CVE-2018-2999
Oracle:CVE-2018-3000
Oracle:CVE-2018-3001
Oracle:CVE-2018-3002
Oracle:CVE-2018-3003
Oracle:CVE-2018-3004
Oracle:CVE-2018-3005
Oracle:CVE-2018-3006
Oracle:CVE-2018-3007
Oracle:CVE-2018-3008
Oracle:CVE-2018-3009
Oracle:CVE-2018-3010
Oracle:CVE-2018-3011
Oracle:CVE-2018-3012
Oracle:CVE-2018-3013
Oracle:CVE-2018-3014
Oracle:CVE-2018-3015
Oracle:CVE-2018-3016
Oracle:CVE-2018-3017
Oracle:CVE-2018-3018
Oracle:CVE-2018-3019
Oracle:CVE-2018-3020
Oracle:CVE-2018-3021
Oracle:CVE-2018-3022
Oracle:CVE-2018-3023
Oracle:CVE-2018-3024
Oracle:CVE-2018-3025
Oracle:CVE-2018-3026
Oracle:CVE-2018-3027
Oracle:CVE-2018-3028
Oracle:CVE-2018-3029
Oracle:CVE-2018-3030
Oracle:CVE-2018-3031
Oracle:CVE-2018-3032
Oracle:CVE-2018-3033
Oracle:CVE-2018-3034
Oracle:CVE-2018-3035
Oracle:CVE-2018-3036
Oracle:CVE-2018-3037
Oracle:CVE-2018-3038
Oracle:CVE-2018-3039
Oracle:CVE-2018-3040
Oracle:CVE-2018-3041
Oracle:CVE-2018-3042
Oracle:CVE-2018-3043
Oracle:CVE-2018-3044
Oracle:CVE-2018-3045
Oracle:CVE-2018-3046
Oracle:CVE-2018-3047
Oracle:CVE-2018-3048
Oracle:CVE-2018-3049
Oracle:CVE-2018-3050
Oracle:CVE-2018-3051
Oracle:CVE-2018-3052
Oracle:CVE-2018-3053
Oracle:CVE-2018-3054
Oracle:CVE-2018-3055
Oracle:CVE-2018-3056
Oracle:CVE-2018-3057
Oracle:CVE-2018-3058
Oracle:CVE-2018-3059
Oracle:CVE-2018-3060
Oracle:CVE-2018-3061
Oracle:CVE-2018-3062
Oracle:CVE-2018-3063
Oracle:CVE-2018-3064
Oracle:CVE-2018-3065
Oracle:CVE-2018-3066
Oracle:CVE-2018-3067
Oracle:CVE-2018-3068
Oracle:CVE-2018-3069
Oracle:CVE-2018-3070
Oracle:CVE-2018-3071
Oracle:CVE-2018-3072
Oracle:CVE-2018-3073
Oracle:CVE-2018-3074
Oracle:CVE-2018-3075
Oracle:CVE-2018-3076
Oracle:CVE-2018-3077
Oracle:CVE-2018-3078
Oracle:CVE-2018-3079
Oracle:CVE-2018-3080
Oracle:CVE-2018-3081
Oracle:CVE-2018-3082
Oracle:CVE-2018-3084
Oracle:CVE-2018-3085
Oracle:CVE-2018-3086
Oracle:CVE-2018-3087
Oracle:CVE-2018-3088
Oracle:CVE-2018-3089
Oracle:CVE-2018-3090
Oracle:CVE-2018-3091
Oracle:CVE-2018-3092
Oracle:CVE-2018-3093
Oracle:CVE-2018-3094
Oracle:CVE-2018-3095
Oracle:CVE-2018-3096
Oracle:CVE-2018-3097
Oracle:CVE-2018-3098
Oracle:CVE-2018-3099
Oracle:CVE-2018-3100
Oracle:CVE-2018-3101
Oracle:CVE-2018-3102
Oracle:CVE-2018-3103
Oracle:CVE-2018-3104
Oracle:CVE-2018-3105
Oracle:CVE-2018-3108
Oracle:CVE-2018-3109
Oracle:CVE-2018-3115
Oracle:CVE-2018-3122
Oracle:CVE-2018-3126
Oracle:CVE-2018-3127
Oracle:CVE-2018-3128
Oracle:CVE-2018-3129
Oracle:CVE-2018-3130
Oracle:CVE-2018-3131
Oracle:CVE-2018-3132
Oracle:CVE-2018-3133
Oracle:CVE-2018-3134
Oracle:CVE-2018-3135
Oracle:CVE-2018-3136
Oracle:CVE-2018-3137
Oracle:CVE-2018-3138
Oracle:CVE-2018-3139
Oracle:CVE-2018-3140
Oracle:CVE-2018-3141
Oracle:CVE-2018-3142
Oracle:CVE-2018-3143
Oracle:CVE-2018-3144
Oracle:CVE-2018-3145
Oracle:CVE-2018-3146
Oracle:CVE-2018-3147
Oracle:CVE-2018-3148
Oracle:CVE-2018-3149
Oracle:CVE-2018-3150
Oracle:CVE-2018-3151
Oracle:CVE-2018-3152
Oracle:CVE-2018-3153
Oracle:CVE-2018-3154
Oracle:CVE-2018-3155
Oracle:CVE-2018-3156
Oracle:CVE-2018-3157
Oracle:CVE-2018-3158
Oracle:CVE-2018-3159
Oracle:CVE-2018-3160
Oracle:CVE-2018-3161
Oracle:CVE-2018-3162
Oracle:CVE-2018-3163
Oracle:CVE-2018-3164
Oracle:CVE-2018-3165
Oracle:CVE-2018-3166
Oracle:CVE-2018-3167
Oracle:CVE-2018-3168
Oracle:CVE-2018-3169
Oracle:CVE-2018-3170
Oracle:CVE-2018-3171
Oracle:CVE-2018-3172
Oracle:CVE-2018-3173
Oracle:CVE-2018-3174
Oracle:CVE-2018-3175
Oracle:CVE-2018-3176
Oracle:CVE-2018-3177
Oracle:CVE-2018-3178
Oracle:CVE-2018-3179
Oracle:CVE-2018-3180
Oracle:CVE-2018-3181
Oracle:CVE-2018-3182
Oracle:CVE-2018-3183
Oracle:CVE-2018-3184
Oracle:CVE-2018-3185
Oracle:CVE-2018-3186
Oracle:CVE-2018-3187
Oracle:CVE-2018-3188
Oracle:CVE-2018-3189
Oracle:CVE-2018-3190
Oracle:CVE-2018-3191
Oracle:CVE-2018-3192
Oracle:CVE-2018-3193
Oracle:CVE-2018-3194
Oracle:CVE-2018-3195
Oracle:CVE-2018-3196
Oracle:CVE-2018-3197
Oracle:CVE-2018-3198
Oracle:CVE-2018-3200
Oracle:CVE-2018-3201
Oracle:CVE-2018-3202
Oracle:CVE-2018-3203
Oracle:CVE-2018-3204
Oracle:CVE-2018-3205
Oracle:CVE-2018-3206
Oracle:CVE-2018-3207
Oracle:CVE-2018-3208
Oracle:CVE-2018-3209
Oracle:CVE-2018-3210
Oracle:CVE-2018-3211
Oracle:CVE-2018-3212
Oracle:CVE-2018-3213
Oracle:CVE-2018-3214
Oracle:CVE-2018-3215
Oracle:CVE-2018-3217
Oracle:CVE-2018-3218
Oracle:CVE-2018-3219
Oracle:CVE-2018-3220
Oracle:CVE-2018-3221
Oracle:CVE-2018-3222
Oracle:CVE-2018-3223
Oracle:CVE-2018-3224
Oracle:CVE-2018-3225
Oracle:CVE-2018-3226
Oracle:CVE-2018-3227
Oracle:CVE-2018-3228
Oracle:CVE-2018-3229
Oracle:CVE-2018-3230
Oracle:CVE-2018-3231
Oracle:CVE-2018-3232
Oracle:CVE-2018-3233
Oracle:CVE-2018-3234
Oracle:CVE-2018-3235
Oracle:CVE-2018-3236
Oracle:CVE-2018-3237
Oracle:CVE-2018-3238
Oracle:CVE-2018-3239
Oracle:CVE-2018-3241
Oracle:CVE-2018-3242
Oracle:CVE-2018-3243
Oracle:CVE-2018-3244
Oracle:CVE-2018-3245
Oracle:CVE-2018-3246
Oracle:CVE-2018-3247
Oracle:CVE-2018-3248
Oracle:CVE-2018-3249
Oracle:CVE-2018-3250
Oracle:CVE-2018-3251
Oracle:CVE-2018-3252
Oracle:CVE-2018-3253
Oracle:CVE-2018-3254
Oracle:CVE-2018-3255
Oracle:CVE-2018-3256
Oracle:CVE-2018-3257
Oracle:CVE-2018-3258
Oracle:CVE-2018-3259
Oracle:CVE-2018-3261
Oracle:CVE-2018-3262
Oracle:CVE-2018-3263
Oracle:CVE-2018-3264
Oracle:CVE-2018-3265
Oracle:CVE-2018-3266
Oracle:CVE-2018-3267
Oracle:CVE-2018-3268
Oracle:CVE-2018-3269
Oracle:CVE-2018-3270
Oracle:CVE-2018-3271
Oracle:CVE-2018-3272
Oracle:CVE-2018-3273
Oracle:CVE-2018-3274
Oracle:CVE-2018-3275
Oracle:CVE-2018-3276
Oracle:CVE-2018-3277
Oracle:CVE-2018-3278
Oracle:CVE-2018-3279
Oracle:CVE-2018-3280
Oracle:CVE-2018-3281
Oracle:CVE-2018-3282
Oracle:CVE-2018-3283
Oracle:CVE-2018-3284
Oracle:CVE-2018-3285
Oracle:CVE-2018-3286
Oracle:CVE-2018-3287
Oracle:CVE-2018-3288
Oracle:CVE-2018-3289
Oracle:CVE-2018-3290
Oracle:CVE-2018-3291
Oracle:CVE-2018-3292
Oracle:CVE-2018-3293
Oracle:CVE-2018-3294
Oracle:CVE-2018-3295
Oracle:CVE-2018-3296
Oracle:CVE-2018-3297
Oracle:CVE-2018-3298
Oracle:CVE-2018-3299
Oracle:CVE-2018-3301
Oracle:CVE-2018-3302
Oracle:CVE-2018-7489
Oracle:CVE-2018-8013
Oracle:CVE-2018-8014
Oracle:CVE-2018-8037
RH:CVE-2017-13077
RH:CVE-2017-13078
RH:CVE-2017-13079
RH:CVE-2017-13080
RH:CVE-2017-13081
RH:CVE-2017-13082
RH:CVE-2017-13084
RH:CVE-2017-13086
RH:CVE-2017-13087
RH:CVE-2017-13088
RHSA-2017:2907
RHSA-2017:2911
SECTRACK:1039570
SECTRACK:1039571
SECTRACK:1039572
SECTRACK:1039573
SECTRACK:1039576
SECTRACK:1039577
SECTRACK:1039578
SECTRACK:1039581
SECTRACK:1039585
SECTRACK:1039703
SECTRACK:1041432
SMASH Issue 191142
SUSE:SUSE-SU-2017:2745
SUSE:SUSE-SU-2017:2752
SUSE:openSUSE-SU-2017:2755
UBUNTU:CVE-2017-13077
UBUNTU:CVE-2017-13078
UBUNTU:CVE-2017-13079
UBUNTU:CVE-2017-13080
UBUNTU:CVE-2017-13081
UBUNTU:CVE-2017-13082
UBUNTU:CVE-2017-13084
UBUNTU:CVE-2017-13086
UBUNTU:CVE-2017-13087
UBUNTU:CVE-2017-13088
UBUNTU:USN-3455-1
bdo#1033297
bnc#1056061
linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
rh#1167537
rh#1183461
rh#1202366
rh#1202380
rh#1202384
rh#1202395
rh#1202418
rh#1293972
rh#1369383
rh#1384344
rh#1393454
rh#1397485
rh#1399546
rh#1491692
rh#1491693
rh#1491694
rh#1491696
rh#1491697
rh#1491698
rh#1500301
rh#1500302
rh#1500303
rh#1500304
rh#1519780
rh#1553413
rh#1591854
rh#1607582
rh#1608073
rh#1731271
rh#2044599
rh#2044602
rh#2061700
rh#2116175
rh#2119127
rh#2161287
rh#2270497
CVE-2017-13087kernel-source-rt:Releasedimportant8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)BID:101274
CERT-VN:VU#228519
CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
CONFIRM:access.redhat.com:CVE-2017-13088
CONFIRM:cert-portal.siemens.com:CVE-2017-13088
CONFIRM:cert.vde.com:CVE-2017-13080
CONFIRM:cert.vde.com:CVE-2017-13088
CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080
CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082
CONFIRM:source.android.com:CVE-2017-5754
CONFIRM:source.android.com:CVE-2017-6264
CONFIRM:source.android.com:CVE-2017-6294
CONFIRM:support.apple.com:CVE-2017-13852
CONFIRM:support.apple.com:CVE-2017-13904
CONFIRM:support.apple.com:CVE-2017-3169
CONFIRM:support.hpe.com:CVE-2017-13081
CONFIRM:support.lenovo.com:CVE-2017-13088
CONFIRM:www.arubanetworks.com:CVE-2017-13088
CONFIRM:www.intel.com:CVE-2017-13080
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
CVE-2017-13084
CVE-2017-13086
CVE-2017-13087
CVE-2017-13088
CVE-2024-2466
D:CVE-2022-2590
DSA-3999
DSA-5378
FREEBSD:FreeBSD-SA-17:07
GENTOO:GLSA-201711-03
MISC:github.com:CVE-2017-13082
MISC:github.com:OSS:2024/Q1/256
MISC:ics-cert.us-cert.gov:CVE-2017-13082
MISC:w1.fi
MISC:w1.fi:CVE-2017-13088
MISC:www.krackattacks.com:CVE-2017-13088
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update
OSS:2017/Q4/83
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/11/10/2
OSS:2022/Q3/99
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2024/03/27/4
OSS:2024/Q1/256
Oracle:CVE-2011-4461
Oracle:CVE-2013-1768
Oracle:CVE-2014-0114
Oracle:CVE-2014-3490
Oracle:CVE-2014-3577
Oracle:CVE-2015-0204
Oracle:CVE-2015-0235
Oracle:CVE-2015-5600
Oracle:CVE-2015-6937
Oracle:CVE-2015-7501
Oracle:CVE-2015-7940
Oracle:CVE-2015-9251
Oracle:CVE-2016-0635
Oracle:CVE-2016-0714
Oracle:CVE-2016-0729
Oracle:CVE-2016-1000031
Oracle:CVE-2016-1181
Oracle:CVE-2016-1182
Oracle:CVE-2016-2099
Oracle:CVE-2016-2107
Oracle:CVE-2016-2176
Oracle:CVE-2016-2179
Oracle:CVE-2016-2183
Oracle:CVE-2016-3092
Oracle:CVE-2016-3506
Oracle:CVE-2016-4000
Oracle:CVE-2016-4055
Oracle:CVE-2016-5007
Oracle:CVE-2016-5019
Oracle:CVE-2016-5080
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2016-6304
Oracle:CVE-2016-6814
Oracle:CVE-2016-7103
Oracle:CVE-2016-7167
Oracle:CVE-2016-9843
Oracle:CVE-2016-9878
Oracle:CVE-2017-0379
Oracle:CVE-2017-10068
Oracle:CVE-2017-12617
Oracle:CVE-2017-13077
Oracle:CVE-2017-13082
Oracle:CVE-2017-14735
Oracle:CVE-2017-15095
Oracle:CVE-2017-17562
Oracle:CVE-2017-3633
Oracle:CVE-2017-3736
Oracle:CVE-2017-3737
Oracle:CVE-2017-5533
Oracle:CVE-2017-5645
Oracle:CVE-2017-5662
Oracle:CVE-2017-5664
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-6074
Oracle:CVE-2017-7525
Oracle:CVE-2017-7805
Oracle:CVE-2017-9798
Oracle:CVE-2018-0732
Oracle:CVE-2018-0739
Oracle:CVE-2018-1000120
Oracle:CVE-2018-1000300
Oracle:CVE-2018-11039
Oracle:CVE-2018-1171
Oracle:CVE-2018-11776
Oracle:CVE-2018-1258
Oracle:CVE-2018-1275
Oracle:CVE-2018-1305
Oracle:CVE-2018-13785
Oracle:CVE-2018-1656
Oracle:CVE-2018-2563
Oracle:CVE-2018-2572
Oracle:CVE-2018-2587
Oracle:CVE-2018-2598
Oracle:CVE-2018-2628
Oracle:CVE-2018-2718
Oracle:CVE-2018-2737
Oracle:CVE-2018-2738
Oracle:CVE-2018-2739
Oracle:CVE-2018-2742
Oracle:CVE-2018-2746
Oracle:CVE-2018-2747
Oracle:CVE-2018-2748
Oracle:CVE-2018-2749
Oracle:CVE-2018-2750
Oracle:CVE-2018-2752
Oracle:CVE-2018-2753
Oracle:CVE-2018-2754
Oracle:CVE-2018-2755
Oracle:CVE-2018-2756
Oracle:CVE-2018-2758
Oracle:CVE-2018-2759
Oracle:CVE-2018-2760
Oracle:CVE-2018-2761
Oracle:CVE-2018-2762
Oracle:CVE-2018-2763
Oracle:CVE-2018-2764
Oracle:CVE-2018-2765
Oracle:CVE-2018-2766
Oracle:CVE-2018-2767
Oracle:CVE-2018-2768
Oracle:CVE-2018-2769
Oracle:CVE-2018-2770
Oracle:CVE-2018-2771
Oracle:CVE-2018-2772
Oracle:CVE-2018-2773
Oracle:CVE-2018-2774
Oracle:CVE-2018-2775
Oracle:CVE-2018-2776
Oracle:CVE-2018-2777
Oracle:CVE-2018-2778
Oracle:CVE-2018-2779
Oracle:CVE-2018-2780
Oracle:CVE-2018-2781
Oracle:CVE-2018-2782
Oracle:CVE-2018-2783
Oracle:CVE-2018-2784
Oracle:CVE-2018-2785
Oracle:CVE-2018-2786
Oracle:CVE-2018-2787
Oracle:CVE-2018-2788
Oracle:CVE-2018-2789
Oracle:CVE-2018-2790
Oracle:CVE-2018-2791
Oracle:CVE-2018-2792
Oracle:CVE-2018-2793
Oracle:CVE-2018-2794
Oracle:CVE-2018-2795
Oracle:CVE-2018-2796
Oracle:CVE-2018-2797
Oracle:CVE-2018-2798
Oracle:CVE-2018-2799
Oracle:CVE-2018-2800
Oracle:CVE-2018-2801
Oracle:CVE-2018-2804
Oracle:CVE-2018-2805
Oracle:CVE-2018-2806
Oracle:CVE-2018-2807
Oracle:CVE-2018-2808
Oracle:CVE-2018-2809
Oracle:CVE-2018-2810
Oracle:CVE-2018-2811
Oracle:CVE-2018-2812
Oracle:CVE-2018-2813
Oracle:CVE-2018-2814
Oracle:CVE-2018-2815
Oracle:CVE-2018-2816
Oracle:CVE-2018-2817
Oracle:CVE-2018-2818
Oracle:CVE-2018-2819
Oracle:CVE-2018-2820
Oracle:CVE-2018-2821
Oracle:CVE-2018-2822
Oracle:CVE-2018-2823
Oracle:CVE-2018-2825
Oracle:CVE-2018-2826
Oracle:CVE-2018-2827
Oracle:CVE-2018-2828
Oracle:CVE-2018-2830
Oracle:CVE-2018-2831
Oracle:CVE-2018-2832
Oracle:CVE-2018-2834
Oracle:CVE-2018-2835
Oracle:CVE-2018-2836
Oracle:CVE-2018-2837
Oracle:CVE-2018-2838
Oracle:CVE-2018-2839
Oracle:CVE-2018-2840
Oracle:CVE-2018-2841
Oracle:CVE-2018-2842
Oracle:CVE-2018-2843
Oracle:CVE-2018-2844
Oracle:CVE-2018-2845
Oracle:CVE-2018-2846
Oracle:CVE-2018-2849
Oracle:CVE-2018-2850
Oracle:CVE-2018-2852
Oracle:CVE-2018-2854
Oracle:CVE-2018-2855
Oracle:CVE-2018-2856
Oracle:CVE-2018-2857
Oracle:CVE-2018-2858
Oracle:CVE-2018-2859
Oracle:CVE-2018-2860
Oracle:CVE-2018-2861
Oracle:CVE-2018-2862
Oracle:CVE-2018-2863
Oracle:CVE-2018-2864
Oracle:CVE-2018-2865
Oracle:CVE-2018-2866
Oracle:CVE-2018-2867
Oracle:CVE-2018-2868
Oracle:CVE-2018-2869
Oracle:CVE-2018-2870
Oracle:CVE-2018-2871
Oracle:CVE-2018-2872
Oracle:CVE-2018-2873
Oracle:CVE-2018-2874
Oracle:CVE-2018-2876
Oracle:CVE-2018-2877
Oracle:CVE-2018-2878
Oracle:CVE-2018-2879
Oracle:CVE-2018-2881
Oracle:CVE-2018-2882
Oracle:CVE-2018-2887
Oracle:CVE-2018-2888
Oracle:CVE-2018-2889
Oracle:CVE-2018-2891
Oracle:CVE-2018-2892
Oracle:CVE-2018-2893
Oracle:CVE-2018-2894
Oracle:CVE-2018-2895
Oracle:CVE-2018-2896
Oracle:CVE-2018-2897
Oracle:CVE-2018-2898
Oracle:CVE-2018-2899
Oracle:CVE-2018-2900
Oracle:CVE-2018-2901
Oracle:CVE-2018-2902
Oracle:CVE-2018-2903
Oracle:CVE-2018-2904
Oracle:CVE-2018-2905
Oracle:CVE-2018-2906
Oracle:CVE-2018-2907
Oracle:CVE-2018-2908
Oracle:CVE-2018-2909
Oracle:CVE-2018-2911
Oracle:CVE-2018-2912
Oracle:CVE-2018-2913
Oracle:CVE-2018-2914
Oracle:CVE-2018-2915
Oracle:CVE-2018-2916
Oracle:CVE-2018-2917
Oracle:CVE-2018-2918
Oracle:CVE-2018-2919
Oracle:CVE-2018-2920
Oracle:CVE-2018-2921
Oracle:CVE-2018-2922
Oracle:CVE-2018-2923
Oracle:CVE-2018-2924
Oracle:CVE-2018-2925
Oracle:CVE-2018-2926
Oracle:CVE-2018-2927
Oracle:CVE-2018-2928
Oracle:CVE-2018-2929
Oracle:CVE-2018-2930
Oracle:CVE-2018-2932
Oracle:CVE-2018-2933
Oracle:CVE-2018-2934
Oracle:CVE-2018-2935
Oracle:CVE-2018-2936
Oracle:CVE-2018-2937
Oracle:CVE-2018-2938
Oracle:CVE-2018-2939
Oracle:CVE-2018-2940
Oracle:CVE-2018-2941
Oracle:CVE-2018-2942
Oracle:CVE-2018-2943
Oracle:CVE-2018-2944
Oracle:CVE-2018-2945
Oracle:CVE-2018-2946
Oracle:CVE-2018-2947
Oracle:CVE-2018-2948
Oracle:CVE-2018-2949
Oracle:CVE-2018-2950
Oracle:CVE-2018-2951
Oracle:CVE-2018-2952
Oracle:CVE-2018-2953
Oracle:CVE-2018-2954
Oracle:CVE-2018-2955
Oracle:CVE-2018-2956
Oracle:CVE-2018-2957
Oracle:CVE-2018-2958
Oracle:CVE-2018-2959
Oracle:CVE-2018-2960
Oracle:CVE-2018-2961
Oracle:CVE-2018-2962
Oracle:CVE-2018-2963
Oracle:CVE-2018-2964
Oracle:CVE-2018-2965
Oracle:CVE-2018-2966
Oracle:CVE-2018-2967
Oracle:CVE-2018-2968
Oracle:CVE-2018-2969
Oracle:CVE-2018-2970
Oracle:CVE-2018-2971
Oracle:CVE-2018-2972
Oracle:CVE-2018-2973
Oracle:CVE-2018-2974
Oracle:CVE-2018-2975
Oracle:CVE-2018-2976
Oracle:CVE-2018-2977
Oracle:CVE-2018-2979
Oracle:CVE-2018-2980
Oracle:CVE-2018-2981
Oracle:CVE-2018-2982
Oracle:CVE-2018-2984
Oracle:CVE-2018-2985
Oracle:CVE-2018-2986
Oracle:CVE-2018-2987
Oracle:CVE-2018-2988
Oracle:CVE-2018-2989
Oracle:CVE-2018-2990
Oracle:CVE-2018-2991
Oracle:CVE-2018-2992
Oracle:CVE-2018-2993
Oracle:CVE-2018-2994
Oracle:CVE-2018-2995
Oracle:CVE-2018-2996
Oracle:CVE-2018-2997
Oracle:CVE-2018-2998
Oracle:CVE-2018-2999
Oracle:CVE-2018-3000
Oracle:CVE-2018-3001
Oracle:CVE-2018-3002
Oracle:CVE-2018-3003
Oracle:CVE-2018-3004
Oracle:CVE-2018-3005
Oracle:CVE-2018-3006
Oracle:CVE-2018-3007
Oracle:CVE-2018-3008
Oracle:CVE-2018-3009
Oracle:CVE-2018-3010
Oracle:CVE-2018-3011
Oracle:CVE-2018-3012
Oracle:CVE-2018-3013
Oracle:CVE-2018-3014
Oracle:CVE-2018-3015
Oracle:CVE-2018-3016
Oracle:CVE-2018-3017
Oracle:CVE-2018-3018
Oracle:CVE-2018-3019
Oracle:CVE-2018-3020
Oracle:CVE-2018-3021
Oracle:CVE-2018-3022
Oracle:CVE-2018-3023
Oracle:CVE-2018-3024
Oracle:CVE-2018-3025
Oracle:CVE-2018-3026
Oracle:CVE-2018-3027
Oracle:CVE-2018-3028
Oracle:CVE-2018-3029
Oracle:CVE-2018-3030
Oracle:CVE-2018-3031
Oracle:CVE-2018-3032
Oracle:CVE-2018-3033
Oracle:CVE-2018-3034
Oracle:CVE-2018-3035
Oracle:CVE-2018-3036
Oracle:CVE-2018-3037
Oracle:CVE-2018-3038
Oracle:CVE-2018-3039
Oracle:CVE-2018-3040
Oracle:CVE-2018-3041
Oracle:CVE-2018-3042
Oracle:CVE-2018-3043
Oracle:CVE-2018-3044
Oracle:CVE-2018-3045
Oracle:CVE-2018-3046
Oracle:CVE-2018-3047
Oracle:CVE-2018-3048
Oracle:CVE-2018-3049
Oracle:CVE-2018-3050
Oracle:CVE-2018-3051
Oracle:CVE-2018-3052
Oracle:CVE-2018-3053
Oracle:CVE-2018-3054
Oracle:CVE-2018-3055
Oracle:CVE-2018-3056
Oracle:CVE-2018-3057
Oracle:CVE-2018-3058
Oracle:CVE-2018-3059
Oracle:CVE-2018-3060
Oracle:CVE-2018-3061
Oracle:CVE-2018-3062
Oracle:CVE-2018-3063
Oracle:CVE-2018-3064
Oracle:CVE-2018-3065
Oracle:CVE-2018-3066
Oracle:CVE-2018-3067
Oracle:CVE-2018-3068
Oracle:CVE-2018-3069
Oracle:CVE-2018-3070
Oracle:CVE-2018-3071
Oracle:CVE-2018-3072
Oracle:CVE-2018-3073
Oracle:CVE-2018-3074
Oracle:CVE-2018-3075
Oracle:CVE-2018-3076
Oracle:CVE-2018-3077
Oracle:CVE-2018-3078
Oracle:CVE-2018-3079
Oracle:CVE-2018-3080
Oracle:CVE-2018-3081
Oracle:CVE-2018-3082
Oracle:CVE-2018-3084
Oracle:CVE-2018-3085
Oracle:CVE-2018-3086
Oracle:CVE-2018-3087
Oracle:CVE-2018-3088
Oracle:CVE-2018-3089
Oracle:CVE-2018-3090
Oracle:CVE-2018-3091
Oracle:CVE-2018-3092
Oracle:CVE-2018-3093
Oracle:CVE-2018-3094
Oracle:CVE-2018-3095
Oracle:CVE-2018-3096
Oracle:CVE-2018-3097
Oracle:CVE-2018-3098
Oracle:CVE-2018-3099
Oracle:CVE-2018-3100
Oracle:CVE-2018-3101
Oracle:CVE-2018-3102
Oracle:CVE-2018-3103
Oracle:CVE-2018-3104
Oracle:CVE-2018-3105
Oracle:CVE-2018-3108
Oracle:CVE-2018-3109
Oracle:CVE-2018-3115
Oracle:CVE-2018-3122
Oracle:CVE-2018-3126
Oracle:CVE-2018-3127
Oracle:CVE-2018-3128
Oracle:CVE-2018-3129
Oracle:CVE-2018-3130
Oracle:CVE-2018-3131
Oracle:CVE-2018-3132
Oracle:CVE-2018-3133
Oracle:CVE-2018-3134
Oracle:CVE-2018-3135
Oracle:CVE-2018-3136
Oracle:CVE-2018-3137
Oracle:CVE-2018-3138
Oracle:CVE-2018-3139
Oracle:CVE-2018-3140
Oracle:CVE-2018-3141
Oracle:CVE-2018-3142
Oracle:CVE-2018-3143
Oracle:CVE-2018-3144
Oracle:CVE-2018-3145
Oracle:CVE-2018-3146
Oracle:CVE-2018-3147
Oracle:CVE-2018-3148
Oracle:CVE-2018-3149
Oracle:CVE-2018-3150
Oracle:CVE-2018-3151
Oracle:CVE-2018-3152
Oracle:CVE-2018-3153
Oracle:CVE-2018-3154
Oracle:CVE-2018-3155
Oracle:CVE-2018-3156
Oracle:CVE-2018-3157
Oracle:CVE-2018-3158
Oracle:CVE-2018-3159
Oracle:CVE-2018-3160
Oracle:CVE-2018-3161
Oracle:CVE-2018-3162
Oracle:CVE-2018-3163
Oracle:CVE-2018-3164
Oracle:CVE-2018-3165
Oracle:CVE-2018-3166
Oracle:CVE-2018-3167
Oracle:CVE-2018-3168
Oracle:CVE-2018-3169
Oracle:CVE-2018-3170
Oracle:CVE-2018-3171
Oracle:CVE-2018-3172
Oracle:CVE-2018-3173
Oracle:CVE-2018-3174
Oracle:CVE-2018-3175
Oracle:CVE-2018-3176
Oracle:CVE-2018-3177
Oracle:CVE-2018-3178
Oracle:CVE-2018-3179
Oracle:CVE-2018-3180
Oracle:CVE-2018-3181
Oracle:CVE-2018-3182
Oracle:CVE-2018-3183
Oracle:CVE-2018-3184
Oracle:CVE-2018-3185
Oracle:CVE-2018-3186
Oracle:CVE-2018-3187
Oracle:CVE-2018-3188
Oracle:CVE-2018-3189
Oracle:CVE-2018-3190
Oracle:CVE-2018-3191
Oracle:CVE-2018-3192
Oracle:CVE-2018-3193
Oracle:CVE-2018-3194
Oracle:CVE-2018-3195
Oracle:CVE-2018-3196
Oracle:CVE-2018-3197
Oracle:CVE-2018-3198
Oracle:CVE-2018-3200
Oracle:CVE-2018-3201
Oracle:CVE-2018-3202
Oracle:CVE-2018-3203
Oracle:CVE-2018-3204
Oracle:CVE-2018-3205
Oracle:CVE-2018-3206
Oracle:CVE-2018-3207
Oracle:CVE-2018-3208
Oracle:CVE-2018-3209
Oracle:CVE-2018-3210
Oracle:CVE-2018-3211
Oracle:CVE-2018-3212
Oracle:CVE-2018-3213
Oracle:CVE-2018-3214
Oracle:CVE-2018-3215
Oracle:CVE-2018-3217
Oracle:CVE-2018-3218
Oracle:CVE-2018-3219
Oracle:CVE-2018-3220
Oracle:CVE-2018-3221
Oracle:CVE-2018-3222
Oracle:CVE-2018-3223
Oracle:CVE-2018-3224
Oracle:CVE-2018-3225
Oracle:CVE-2018-3226
Oracle:CVE-2018-3227
Oracle:CVE-2018-3228
Oracle:CVE-2018-3229
Oracle:CVE-2018-3230
Oracle:CVE-2018-3231
Oracle:CVE-2018-3232
Oracle:CVE-2018-3233
Oracle:CVE-2018-3234
Oracle:CVE-2018-3235
Oracle:CVE-2018-3236
Oracle:CVE-2018-3237
Oracle:CVE-2018-3238
Oracle:CVE-2018-3239
Oracle:CVE-2018-3241
Oracle:CVE-2018-3242
Oracle:CVE-2018-3243
Oracle:CVE-2018-3244
Oracle:CVE-2018-3245
Oracle:CVE-2018-3246
Oracle:CVE-2018-3247
Oracle:CVE-2018-3248
Oracle:CVE-2018-3249
Oracle:CVE-2018-3250
Oracle:CVE-2018-3251
Oracle:CVE-2018-3252
Oracle:CVE-2018-3253
Oracle:CVE-2018-3254
Oracle:CVE-2018-3255
Oracle:CVE-2018-3256
Oracle:CVE-2018-3257
Oracle:CVE-2018-3258
Oracle:CVE-2018-3259
Oracle:CVE-2018-3261
Oracle:CVE-2018-3262
Oracle:CVE-2018-3263
Oracle:CVE-2018-3264
Oracle:CVE-2018-3265
Oracle:CVE-2018-3266
Oracle:CVE-2018-3267
Oracle:CVE-2018-3268
Oracle:CVE-2018-3269
Oracle:CVE-2018-3270
Oracle:CVE-2018-3271
Oracle:CVE-2018-3272
Oracle:CVE-2018-3273
Oracle:CVE-2018-3274
Oracle:CVE-2018-3275
Oracle:CVE-2018-3276
Oracle:CVE-2018-3277
Oracle:CVE-2018-3278
Oracle:CVE-2018-3279
Oracle:CVE-2018-3280
Oracle:CVE-2018-3281
Oracle:CVE-2018-3282
Oracle:CVE-2018-3283
Oracle:CVE-2018-3284
Oracle:CVE-2018-3285
Oracle:CVE-2018-3286
Oracle:CVE-2018-3287
Oracle:CVE-2018-3288
Oracle:CVE-2018-3289
Oracle:CVE-2018-3290
Oracle:CVE-2018-3291
Oracle:CVE-2018-3292
Oracle:CVE-2018-3293
Oracle:CVE-2018-3294
Oracle:CVE-2018-3295
Oracle:CVE-2018-3296
Oracle:CVE-2018-3297
Oracle:CVE-2018-3298
Oracle:CVE-2018-3299
Oracle:CVE-2018-3301
Oracle:CVE-2018-3302
Oracle:CVE-2018-7489
Oracle:CVE-2018-8013
Oracle:CVE-2018-8014
Oracle:CVE-2018-8037
RH:CVE-2017-13077
RH:CVE-2017-13078
RH:CVE-2017-13079
RH:CVE-2017-13080
RH:CVE-2017-13081
RH:CVE-2017-13082
RH:CVE-2017-13084
RH:CVE-2017-13086
RH:CVE-2017-13087
RH:CVE-2017-13088
RHSA-2017:2907
RHSA-2017:2911
SECTRACK:1039570
SECTRACK:1039571
SECTRACK:1039572
SECTRACK:1039573
SECTRACK:1039576
SECTRACK:1039577
SECTRACK:1039578
SECTRACK:1039581
SECTRACK:1039585
SECTRACK:1039703
SECTRACK:1041432
SMASH Issue 191142
SUSE:SUSE-SU-2017:2745
SUSE:SUSE-SU-2017:2752
SUSE:openSUSE-SU-2017:2755
UBUNTU:CVE-2017-13077
UBUNTU:CVE-2017-13078
UBUNTU:CVE-2017-13079
UBUNTU:CVE-2017-13080
UBUNTU:CVE-2017-13081
UBUNTU:CVE-2017-13082
UBUNTU:CVE-2017-13084
UBUNTU:CVE-2017-13086
UBUNTU:CVE-2017-13087
UBUNTU:CVE-2017-13088
UBUNTU:USN-3455-1
bdo#1033297
bnc#1056061
linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
rh#1167537
rh#1183461
rh#1202366
rh#1202380
rh#1202384
rh#1202395
rh#1202418
rh#1293972
rh#1369383
rh#1384344
rh#1393454
rh#1397485
rh#1399546
rh#1491692
rh#1491693
rh#1491694
rh#1491696
rh#1491697
rh#1491698
rh#1500301
rh#1500302
rh#1500303
rh#1500304
rh#1519780
rh#1553413
rh#1591854
rh#1607582
rh#1608073
rh#1731271
rh#2044599
rh#2044602
rh#2061700
rh#2116175
rh#2119127
rh#2161287
rh#2270497
CVE-2017-13088kernel-source-rt:Releasedimportant8.1 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)BID:101274
CERT-VN:VU#228519
CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
CONFIRM:access.redhat.com:CVE-2017-13088
CONFIRM:cert-portal.siemens.com:CVE-2017-13088
CONFIRM:cert.vde.com:CVE-2017-13080
CONFIRM:cert.vde.com:CVE-2017-13088
CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080
CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082
CONFIRM:source.android.com:CVE-2017-5754
CONFIRM:source.android.com:CVE-2017-6264
CONFIRM:source.android.com:CVE-2017-6294
CONFIRM:support.apple.com:CVE-2017-13852
CONFIRM:support.apple.com:CVE-2017-13904
CONFIRM:support.apple.com:CVE-2017-3169
CONFIRM:support.hpe.com:CVE-2017-13081
CONFIRM:support.lenovo.com:CVE-2017-13088
CONFIRM:www.arubanetworks.com:CVE-2017-13088
CONFIRM:www.intel.com:CVE-2017-13080
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
CVE-2017-13084
CVE-2017-13086
CVE-2017-13087
CVE-2017-13088
CVE-2024-2466
D:CVE-2022-2590
DSA-3999
DSA-5378
FREEBSD:FreeBSD-SA-17:07
GENTOO:GLSA-201711-03
MISC:github.com:CVE-2017-13082
MISC:github.com:OSS:2024/Q1/256
MISC:ics-cert.us-cert.gov:CVE-2017-13082
MISC:w1.fi
MISC:w1.fi:CVE-2017-13088
MISC:www.krackattacks.com:CVE-2017-13088
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update
OSS:2017/Q4/83
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/11/10/2
OSS:2022/Q3/99
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2024/03/27/4
OSS:2024/Q1/256
Oracle:CVE-2011-4461
Oracle:CVE-2013-1768
Oracle:CVE-2014-0114
Oracle:CVE-2014-3490
Oracle:CVE-2014-3577
Oracle:CVE-2015-0204
Oracle:CVE-2015-0235
Oracle:CVE-2015-5600
Oracle:CVE-2015-6937
Oracle:CVE-2015-7501
Oracle:CVE-2015-7940
Oracle:CVE-2015-9251
Oracle:CVE-2016-0635
Oracle:CVE-2016-0714
Oracle:CVE-2016-0729
Oracle:CVE-2016-1000031
Oracle:CVE-2016-1181
Oracle:CVE-2016-1182
Oracle:CVE-2016-2099
Oracle:CVE-2016-2107
Oracle:CVE-2016-2176
Oracle:CVE-2016-2179
Oracle:CVE-2016-2183
Oracle:CVE-2016-3092
Oracle:CVE-2016-3506
Oracle:CVE-2016-4000
Oracle:CVE-2016-4055
Oracle:CVE-2016-5007
Oracle:CVE-2016-5019
Oracle:CVE-2016-5080
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2016-6304
Oracle:CVE-2016-6814
Oracle:CVE-2016-7103
Oracle:CVE-2016-7167
Oracle:CVE-2016-9843
Oracle:CVE-2016-9878
Oracle:CVE-2017-0379
Oracle:CVE-2017-10068
Oracle:CVE-2017-12617
Oracle:CVE-2017-13077
Oracle:CVE-2017-13082
Oracle:CVE-2017-14735
Oracle:CVE-2017-15095
Oracle:CVE-2017-17562
Oracle:CVE-2017-3633
Oracle:CVE-2017-3736
Oracle:CVE-2017-3737
Oracle:CVE-2017-5533
Oracle:CVE-2017-5645
Oracle:CVE-2017-5662
Oracle:CVE-2017-5664
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-6074
Oracle:CVE-2017-7525
Oracle:CVE-2017-7805
Oracle:CVE-2017-9798
Oracle:CVE-2018-0732
Oracle:CVE-2018-0739
Oracle:CVE-2018-1000120
Oracle:CVE-2018-1000300
Oracle:CVE-2018-11039
Oracle:CVE-2018-1171
Oracle:CVE-2018-11776
Oracle:CVE-2018-1258
Oracle:CVE-2018-1275
Oracle:CVE-2018-1305
Oracle:CVE-2018-13785
Oracle:CVE-2018-1656
Oracle:CVE-2018-2563
Oracle:CVE-2018-2572
Oracle:CVE-2018-2587
Oracle:CVE-2018-2598
Oracle:CVE-2018-2628
Oracle:CVE-2018-2718
Oracle:CVE-2018-2737
Oracle:CVE-2018-2738
Oracle:CVE-2018-2739
Oracle:CVE-2018-2742
Oracle:CVE-2018-2746
Oracle:CVE-2018-2747
Oracle:CVE-2018-2748
Oracle:CVE-2018-2749
Oracle:CVE-2018-2750
Oracle:CVE-2018-2752
Oracle:CVE-2018-2753
Oracle:CVE-2018-2754
Oracle:CVE-2018-2755
Oracle:CVE-2018-2756
Oracle:CVE-2018-2758
Oracle:CVE-2018-2759
Oracle:CVE-2018-2760
Oracle:CVE-2018-2761
Oracle:CVE-2018-2762
Oracle:CVE-2018-2763
Oracle:CVE-2018-2764
Oracle:CVE-2018-2765
Oracle:CVE-2018-2766
Oracle:CVE-2018-2767
Oracle:CVE-2018-2768
Oracle:CVE-2018-2769
Oracle:CVE-2018-2770
Oracle:CVE-2018-2771
Oracle:CVE-2018-2772
Oracle:CVE-2018-2773
Oracle:CVE-2018-2774
Oracle:CVE-2018-2775
Oracle:CVE-2018-2776
Oracle:CVE-2018-2777
Oracle:CVE-2018-2778
Oracle:CVE-2018-2779
Oracle:CVE-2018-2780
Oracle:CVE-2018-2781
Oracle:CVE-2018-2782
Oracle:CVE-2018-2783
Oracle:CVE-2018-2784
Oracle:CVE-2018-2785
Oracle:CVE-2018-2786
Oracle:CVE-2018-2787
Oracle:CVE-2018-2788
Oracle:CVE-2018-2789
Oracle:CVE-2018-2790
Oracle:CVE-2018-2791
Oracle:CVE-2018-2792
Oracle:CVE-2018-2793
Oracle:CVE-2018-2794
Oracle:CVE-2018-2795
Oracle:CVE-2018-2796
Oracle:CVE-2018-2797
Oracle:CVE-2018-2798
Oracle:CVE-2018-2799
Oracle:CVE-2018-2800
Oracle:CVE-2018-2801
Oracle:CVE-2018-2804
Oracle:CVE-2018-2805
Oracle:CVE-2018-2806
Oracle:CVE-2018-2807
Oracle:CVE-2018-2808
Oracle:CVE-2018-2809
Oracle:CVE-2018-2810
Oracle:CVE-2018-2811
Oracle:CVE-2018-2812
Oracle:CVE-2018-2813
Oracle:CVE-2018-2814
Oracle:CVE-2018-2815
Oracle:CVE-2018-2816
Oracle:CVE-2018-2817
Oracle:CVE-2018-2818
Oracle:CVE-2018-2819
Oracle:CVE-2018-2820
Oracle:CVE-2018-2821
Oracle:CVE-2018-2822
Oracle:CVE-2018-2823
Oracle:CVE-2018-2825
Oracle:CVE-2018-2826
Oracle:CVE-2018-2827
Oracle:CVE-2018-2828
Oracle:CVE-2018-2830
Oracle:CVE-2018-2831
Oracle:CVE-2018-2832
Oracle:CVE-2018-2834
Oracle:CVE-2018-2835
Oracle:CVE-2018-2836
Oracle:CVE-2018-2837
Oracle:CVE-2018-2838
Oracle:CVE-2018-2839
Oracle:CVE-2018-2840
Oracle:CVE-2018-2841
Oracle:CVE-2018-2842
Oracle:CVE-2018-2843
Oracle:CVE-2018-2844
Oracle:CVE-2018-2845
Oracle:CVE-2018-2846
Oracle:CVE-2018-2849
Oracle:CVE-2018-2850
Oracle:CVE-2018-2852
Oracle:CVE-2018-2854
Oracle:CVE-2018-2855
Oracle:CVE-2018-2856
Oracle:CVE-2018-2857
Oracle:CVE-2018-2858
Oracle:CVE-2018-2859
Oracle:CVE-2018-2860
Oracle:CVE-2018-2861
Oracle:CVE-2018-2862
Oracle:CVE-2018-2863
Oracle:CVE-2018-2864
Oracle:CVE-2018-2865
Oracle:CVE-2018-2866
Oracle:CVE-2018-2867
Oracle:CVE-2018-2868
Oracle:CVE-2018-2869
Oracle:CVE-2018-2870
Oracle:CVE-2018-2871
Oracle:CVE-2018-2872
Oracle:CVE-2018-2873
Oracle:CVE-2018-2874
Oracle:CVE-2018-2876
Oracle:CVE-2018-2877
Oracle:CVE-2018-2878
Oracle:CVE-2018-2879
Oracle:CVE-2018-2881
Oracle:CVE-2018-2882
Oracle:CVE-2018-2887
Oracle:CVE-2018-2888
Oracle:CVE-2018-2889
Oracle:CVE-2018-2891
Oracle:CVE-2018-2892
Oracle:CVE-2018-2893
Oracle:CVE-2018-2894
Oracle:CVE-2018-2895
Oracle:CVE-2018-2896
Oracle:CVE-2018-2897
Oracle:CVE-2018-2898
Oracle:CVE-2018-2899
Oracle:CVE-2018-2900
Oracle:CVE-2018-2901
Oracle:CVE-2018-2902
Oracle:CVE-2018-2903
Oracle:CVE-2018-2904
Oracle:CVE-2018-2905
Oracle:CVE-2018-2906
Oracle:CVE-2018-2907
Oracle:CVE-2018-2908
Oracle:CVE-2018-2909
Oracle:CVE-2018-2911
Oracle:CVE-2018-2912
Oracle:CVE-2018-2913
Oracle:CVE-2018-2914
Oracle:CVE-2018-2915
Oracle:CVE-2018-2916
Oracle:CVE-2018-2917
Oracle:CVE-2018-2918
Oracle:CVE-2018-2919
Oracle:CVE-2018-2920
Oracle:CVE-2018-2921
Oracle:CVE-2018-2922
Oracle:CVE-2018-2923
Oracle:CVE-2018-2924
Oracle:CVE-2018-2925
Oracle:CVE-2018-2926
Oracle:CVE-2018-2927
Oracle:CVE-2018-2928
Oracle:CVE-2018-2929
Oracle:CVE-2018-2930
Oracle:CVE-2018-2932
Oracle:CVE-2018-2933
Oracle:CVE-2018-2934
Oracle:CVE-2018-2935
Oracle:CVE-2018-2936
Oracle:CVE-2018-2937
Oracle:CVE-2018-2938
Oracle:CVE-2018-2939
Oracle:CVE-2018-2940
Oracle:CVE-2018-2941
Oracle:CVE-2018-2942
Oracle:CVE-2018-2943
Oracle:CVE-2018-2944
Oracle:CVE-2018-2945
Oracle:CVE-2018-2946
Oracle:CVE-2018-2947
Oracle:CVE-2018-2948
Oracle:CVE-2018-2949
Oracle:CVE-2018-2950
Oracle:CVE-2018-2951
Oracle:CVE-2018-2952
Oracle:CVE-2018-2953
Oracle:CVE-2018-2954
Oracle:CVE-2018-2955
Oracle:CVE-2018-2956
Oracle:CVE-2018-2957
Oracle:CVE-2018-2958
Oracle:CVE-2018-2959
Oracle:CVE-2018-2960
Oracle:CVE-2018-2961
Oracle:CVE-2018-2962
Oracle:CVE-2018-2963
Oracle:CVE-2018-2964
Oracle:CVE-2018-2965
Oracle:CVE-2018-2966
Oracle:CVE-2018-2967
Oracle:CVE-2018-2968
Oracle:CVE-2018-2969
Oracle:CVE-2018-2970
Oracle:CVE-2018-2971
Oracle:CVE-2018-2972
Oracle:CVE-2018-2973
Oracle:CVE-2018-2974
Oracle:CVE-2018-2975
Oracle:CVE-2018-2976
Oracle:CVE-2018-2977
Oracle:CVE-2018-2979
Oracle:CVE-2018-2980
Oracle:CVE-2018-2981
Oracle:CVE-2018-2982
Oracle:CVE-2018-2984
Oracle:CVE-2018-2985
Oracle:CVE-2018-2986
Oracle:CVE-2018-2987
Oracle:CVE-2018-2988
Oracle:CVE-2018-2989
Oracle:CVE-2018-2990
Oracle:CVE-2018-2991
Oracle:CVE-2018-2992
Oracle:CVE-2018-2993
Oracle:CVE-2018-2994
Oracle:CVE-2018-2995
Oracle:CVE-2018-2996
Oracle:CVE-2018-2997
Oracle:CVE-2018-2998
Oracle:CVE-2018-2999
Oracle:CVE-2018-3000
Oracle:CVE-2018-3001
Oracle:CVE-2018-3002
Oracle:CVE-2018-3003
Oracle:CVE-2018-3004
Oracle:CVE-2018-3005
Oracle:CVE-2018-3006
Oracle:CVE-2018-3007
Oracle:CVE-2018-3008
Oracle:CVE-2018-3009
Oracle:CVE-2018-3010
Oracle:CVE-2018-3011
Oracle:CVE-2018-3012
Oracle:CVE-2018-3013
Oracle:CVE-2018-3014
Oracle:CVE-2018-3015
Oracle:CVE-2018-3016
Oracle:CVE-2018-3017
Oracle:CVE-2018-3018
Oracle:CVE-2018-3019
Oracle:CVE-2018-3020
Oracle:CVE-2018-3021
Oracle:CVE-2018-3022
Oracle:CVE-2018-3023
Oracle:CVE-2018-3024
Oracle:CVE-2018-3025
Oracle:CVE-2018-3026
Oracle:CVE-2018-3027
Oracle:CVE-2018-3028
Oracle:CVE-2018-3029
Oracle:CVE-2018-3030
Oracle:CVE-2018-3031
Oracle:CVE-2018-3032
Oracle:CVE-2018-3033
Oracle:CVE-2018-3034
Oracle:CVE-2018-3035
Oracle:CVE-2018-3036
Oracle:CVE-2018-3037
Oracle:CVE-2018-3038
Oracle:CVE-2018-3039
Oracle:CVE-2018-3040
Oracle:CVE-2018-3041
Oracle:CVE-2018-3042
Oracle:CVE-2018-3043
Oracle:CVE-2018-3044
Oracle:CVE-2018-3045
Oracle:CVE-2018-3046
Oracle:CVE-2018-3047
Oracle:CVE-2018-3048
Oracle:CVE-2018-3049
Oracle:CVE-2018-3050
Oracle:CVE-2018-3051
Oracle:CVE-2018-3052
Oracle:CVE-2018-3053
Oracle:CVE-2018-3054
Oracle:CVE-2018-3055
Oracle:CVE-2018-3056
Oracle:CVE-2018-3057
Oracle:CVE-2018-3058
Oracle:CVE-2018-3059
Oracle:CVE-2018-3060
Oracle:CVE-2018-3061
Oracle:CVE-2018-3062
Oracle:CVE-2018-3063
Oracle:CVE-2018-3064
Oracle:CVE-2018-3065
Oracle:CVE-2018-3066
Oracle:CVE-2018-3067
Oracle:CVE-2018-3068
Oracle:CVE-2018-3069
Oracle:CVE-2018-3070
Oracle:CVE-2018-3071
Oracle:CVE-2018-3072
Oracle:CVE-2018-3073
Oracle:CVE-2018-3074
Oracle:CVE-2018-3075
Oracle:CVE-2018-3076
Oracle:CVE-2018-3077
Oracle:CVE-2018-3078
Oracle:CVE-2018-3079
Oracle:CVE-2018-3080
Oracle:CVE-2018-3081
Oracle:CVE-2018-3082
Oracle:CVE-2018-3084
Oracle:CVE-2018-3085
Oracle:CVE-2018-3086
Oracle:CVE-2018-3087
Oracle:CVE-2018-3088
Oracle:CVE-2018-3089
Oracle:CVE-2018-3090
Oracle:CVE-2018-3091
Oracle:CVE-2018-3092
Oracle:CVE-2018-3093
Oracle:CVE-2018-3094
Oracle:CVE-2018-3095
Oracle:CVE-2018-3096
Oracle:CVE-2018-3097
Oracle:CVE-2018-3098
Oracle:CVE-2018-3099
Oracle:CVE-2018-3100
Oracle:CVE-2018-3101
Oracle:CVE-2018-3102
Oracle:CVE-2018-3103
Oracle:CVE-2018-3104
Oracle:CVE-2018-3105
Oracle:CVE-2018-3108
Oracle:CVE-2018-3109
Oracle:CVE-2018-3115
Oracle:CVE-2018-3122
Oracle:CVE-2018-3126
Oracle:CVE-2018-3127
Oracle:CVE-2018-3128
Oracle:CVE-2018-3129
Oracle:CVE-2018-3130
Oracle:CVE-2018-3131
Oracle:CVE-2018-3132
Oracle:CVE-2018-3133
Oracle:CVE-2018-3134
Oracle:CVE-2018-3135
Oracle:CVE-2018-3136
Oracle:CVE-2018-3137
Oracle:CVE-2018-3138
Oracle:CVE-2018-3139
Oracle:CVE-2018-3140
Oracle:CVE-2018-3141
Oracle:CVE-2018-3142
Oracle:CVE-2018-3143
Oracle:CVE-2018-3144
Oracle:CVE-2018-3145
Oracle:CVE-2018-3146
Oracle:CVE-2018-3147
Oracle:CVE-2018-3148
Oracle:CVE-2018-3149
Oracle:CVE-2018-3150
Oracle:CVE-2018-3151
Oracle:CVE-2018-3152
Oracle:CVE-2018-3153
Oracle:CVE-2018-3154
Oracle:CVE-2018-3155
Oracle:CVE-2018-3156
Oracle:CVE-2018-3157
Oracle:CVE-2018-3158
Oracle:CVE-2018-3159
Oracle:CVE-2018-3160
Oracle:CVE-2018-3161
Oracle:CVE-2018-3162
Oracle:CVE-2018-3163
Oracle:CVE-2018-3164
Oracle:CVE-2018-3165
Oracle:CVE-2018-3166
Oracle:CVE-2018-3167
Oracle:CVE-2018-3168
Oracle:CVE-2018-3169
Oracle:CVE-2018-3170
Oracle:CVE-2018-3171
Oracle:CVE-2018-3172
Oracle:CVE-2018-3173
Oracle:CVE-2018-3174
Oracle:CVE-2018-3175
Oracle:CVE-2018-3176
Oracle:CVE-2018-3177
Oracle:CVE-2018-3178
Oracle:CVE-2018-3179
Oracle:CVE-2018-3180
Oracle:CVE-2018-3181
Oracle:CVE-2018-3182
Oracle:CVE-2018-3183
Oracle:CVE-2018-3184
Oracle:CVE-2018-3185
Oracle:CVE-2018-3186
Oracle:CVE-2018-3187
Oracle:CVE-2018-3188
Oracle:CVE-2018-3189
Oracle:CVE-2018-3190
Oracle:CVE-2018-3191
Oracle:CVE-2018-3192
Oracle:CVE-2018-3193
Oracle:CVE-2018-3194
Oracle:CVE-2018-3195
Oracle:CVE-2018-3196
Oracle:CVE-2018-3197
Oracle:CVE-2018-3198
Oracle:CVE-2018-3200
Oracle:CVE-2018-3201
Oracle:CVE-2018-3202
Oracle:CVE-2018-3203
Oracle:CVE-2018-3204
Oracle:CVE-2018-3205
Oracle:CVE-2018-3206
Oracle:CVE-2018-3207
Oracle:CVE-2018-3208
Oracle:CVE-2018-3209
Oracle:CVE-2018-3210
Oracle:CVE-2018-3211
Oracle:CVE-2018-3212
Oracle:CVE-2018-3213
Oracle:CVE-2018-3214
Oracle:CVE-2018-3215
Oracle:CVE-2018-3217
Oracle:CVE-2018-3218
Oracle:CVE-2018-3219
Oracle:CVE-2018-3220
Oracle:CVE-2018-3221
Oracle:CVE-2018-3222
Oracle:CVE-2018-3223
Oracle:CVE-2018-3224
Oracle:CVE-2018-3225
Oracle:CVE-2018-3226
Oracle:CVE-2018-3227
Oracle:CVE-2018-3228
Oracle:CVE-2018-3229
Oracle:CVE-2018-3230
Oracle:CVE-2018-3231
Oracle:CVE-2018-3232
Oracle:CVE-2018-3233
Oracle:CVE-2018-3234
Oracle:CVE-2018-3235
Oracle:CVE-2018-3236
Oracle:CVE-2018-3237
Oracle:CVE-2018-3238
Oracle:CVE-2018-3239
Oracle:CVE-2018-3241
Oracle:CVE-2018-3242
Oracle:CVE-2018-3243
Oracle:CVE-2018-3244
Oracle:CVE-2018-3245
Oracle:CVE-2018-3246
Oracle:CVE-2018-3247
Oracle:CVE-2018-3248
Oracle:CVE-2018-3249
Oracle:CVE-2018-3250
Oracle:CVE-2018-3251
Oracle:CVE-2018-3252
Oracle:CVE-2018-3253
Oracle:CVE-2018-3254
Oracle:CVE-2018-3255
Oracle:CVE-2018-3256
Oracle:CVE-2018-3257
Oracle:CVE-2018-3258
Oracle:CVE-2018-3259
Oracle:CVE-2018-3261
Oracle:CVE-2018-3262
Oracle:CVE-2018-3263
Oracle:CVE-2018-3264
Oracle:CVE-2018-3265
Oracle:CVE-2018-3266
Oracle:CVE-2018-3267
Oracle:CVE-2018-3268
Oracle:CVE-2018-3269
Oracle:CVE-2018-3270
Oracle:CVE-2018-3271
Oracle:CVE-2018-3272
Oracle:CVE-2018-3273
Oracle:CVE-2018-3274
Oracle:CVE-2018-3275
Oracle:CVE-2018-3276
Oracle:CVE-2018-3277
Oracle:CVE-2018-3278
Oracle:CVE-2018-3279
Oracle:CVE-2018-3280
Oracle:CVE-2018-3281
Oracle:CVE-2018-3282
Oracle:CVE-2018-3283
Oracle:CVE-2018-3284
Oracle:CVE-2018-3285
Oracle:CVE-2018-3286
Oracle:CVE-2018-3287
Oracle:CVE-2018-3288
Oracle:CVE-2018-3289
Oracle:CVE-2018-3290
Oracle:CVE-2018-3291
Oracle:CVE-2018-3292
Oracle:CVE-2018-3293
Oracle:CVE-2018-3294
Oracle:CVE-2018-3295
Oracle:CVE-2018-3296
Oracle:CVE-2018-3297
Oracle:CVE-2018-3298
Oracle:CVE-2018-3299
Oracle:CVE-2018-3301
Oracle:CVE-2018-3302
Oracle:CVE-2018-7489
Oracle:CVE-2018-8013
Oracle:CVE-2018-8014
Oracle:CVE-2018-8037
RH:CVE-2017-13077
RH:CVE-2017-13078
RH:CVE-2017-13079
RH:CVE-2017-13080
RH:CVE-2017-13081
RH:CVE-2017-13082
RH:CVE-2017-13084
RH:CVE-2017-13086
RH:CVE-2017-13087
RH:CVE-2017-13088
RHSA-2017:2907
RHSA-2017:2911
SECTRACK:1039570
SECTRACK:1039571
SECTRACK:1039572
SECTRACK:1039573
SECTRACK:1039576
SECTRACK:1039577
SECTRACK:1039578
SECTRACK:1039581
SECTRACK:1039585
SECTRACK:1039703
SECTRACK:1041432
SMASH Issue 191142
SUSE:SUSE-SU-2017:2745
SUSE:SUSE-SU-2017:2752
SUSE:openSUSE-SU-2017:2755
UBUNTU:CVE-2017-13077
UBUNTU:CVE-2017-13078
UBUNTU:CVE-2017-13079
UBUNTU:CVE-2017-13080
UBUNTU:CVE-2017-13081
UBUNTU:CVE-2017-13082
UBUNTU:CVE-2017-13084
UBUNTU:CVE-2017-13086
UBUNTU:CVE-2017-13087
UBUNTU:CVE-2017-13088
UBUNTU:USN-3455-1
bdo#1033297
bnc#1056061
linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
rh#1167537
rh#1183461
rh#1202366
rh#1202380
rh#1202384
rh#1202395
rh#1202418
rh#1293972
rh#1369383
rh#1384344
rh#1393454
rh#1397485
rh#1399546
rh#1491692
rh#1491693
rh#1491694
rh#1491696
rh#1491697
rh#1491698
rh#1500301
rh#1500302
rh#1500303
rh#1500304
rh#1519780
rh#1553413
rh#1591854
rh#1607582
rh#1608073
rh#1731271
rh#2044599
rh#2044602
rh#2061700
rh#2116175
rh#2119127
rh#2161287
rh#2270497
CVE-2017-13166kernel-source-rt:Not affectedimportant7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:102367
CONFIRM:bugzilla.redhat.com:CVE-2018-10877
CONFIRM:bugzilla.redhat.com:CVE-2018-10880
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CONFIRM:help.ecostruxureit.com:CVE-2017-5754
CONFIRM:source.android.com:CVE-2017-6280
CONFIRM:support.f5.com:CVE-2017-18017
CVE-2017-13166
CVE-2017-18017
CVE-2018-10877
CVE-2018-10880
CVE-2018-10882
CVE-2018-13405
DEBIAN:DSA-4120
DEBIAN:DSA-4187
DSA-4120
DSA-4187
DSA-5378
MISC:bugs.launchpad.net:CVE-2017-18017
MISC:git.kernel.org:CVE-2017-18017
MISC:git.kernel.org:OSS:2014/03/05/6
MISC:github.com:CVE-2017-18017
MISC:lkml.org:CVE-2017-18017
MISC:patchwork.ozlabs.org:CVE-2017-18017
MISC:www.arista.com:CVE-2017-18017
MISC:www.kernel.org:CVE-2017-18017
MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
OSS:2014/03/05/6
OSS:2022/11/10/2
OSS:2022/12/27/3
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2022/Q4/244
Oracle:CVE-2017-0861
Oracle:CVE-2017-5715
RH:CVE-2017-13166
RH:CVE-2017-18017
RHSA-2018:0676
RHSA-2018:1062
RHSA-2018:1130
RHSA-2018:1170
RHSA-2018:1319
RHSA-2018:1737
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
SMASH Issue 196268
SMASH Issue 197538
SMASH Issue 202009
SUSE:SUSE-SU-2018:0383
SUSE:SUSE-SU-2018:0416
SUSE:SUSE-SU-2018:0482
SUSE:SUSE-SU-2018:0555
SUSE:SUSE-SU-2018:0660
SUSE:SUSE-SU-2018:0834
SUSE:SUSE-SU-2018:0841
SUSE:SUSE-SU-2018:0848
SUSE:SUSE-SU-2018:0986
SUSE:openSUSE-SU-2018:0408
UBUNTU:CVE-2017-13166
UBUNTU:CVE-2017-18017
UBUNTU:USN-3583-1
UBUNTU:USN-3583-2
USN-3583-1
USN-3583-2
bdo#1033297
bnc#1067118
bnc#1072865
bnc#1074488
bnc#1085447
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901
linux.git:commit:d36260050e1881dce09625a9352d8729c911a6e3
rh#1243852
rh#1495089
rh#1498016
rh#1519780
rh#1531135
rh#1539599
rh#1548412
rh#1596795
rh#1596812
rh#1596842
rh#1599161
rh#2027239
rh#2044863
rh#2061700
rh#2119127
CVE-2017-14051kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)BID:100571
CVE-2017-14051
MISC:bugzilla.kernel.org:CVE-2017-14051
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:patchwork.kernel.org:CVE-2017-14051
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-14051
SMASH Issue 191306
UBUNTU:CVE-2017-14051
bnc#1056588
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1435719
rh#1462147
rh#1462158
rh#1481178
rh#1487126
CVE-2017-14140kernel-source-rt:Not affectedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)BID:100876
CONFIRM:git.kernel.org:CVE-2017-14140
CONFIRM:github.com:CVE-2017-14140
CONFIRM:www.kernel.org:CVE-2017-14140
CVE-2017-14140
DSA-3981
DSA-5378
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-14140
RHSA-2018:0676
RHSA-2018:1062
SMASH Issue 191437
UBUNTU:CVE-2017-14140
bdo#1033297
bdo#866511
bdo#875881
bnc#1057179
rh#1462147
rh#1462158
rh#1481178
rh#1488329
rh#1519780
rh#2061700
rh#2119127
CVE-2017-14497kernel-source-rt:Not affectedcritical9.8 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)BID:100871
CONFIRM:git.kernel.org:CVE-2017-14497
CONFIRM:github.com:CVE-2017-14497
CONFIRM:marc.info
CONFIRM:marc.info:CVE-2017-14497
CONFIRM:source.android.com:CVE-2017-15849
CVE-2017-14497
D:CVE-2017-14497
DSA-3981
OSS:2017/Q3/476
RH:CVE-2017-14497
SECTRACK:1039371
SECTRACK:1040106
SMASH Issue 192102
UBUNTU:CVE-2017-14497
bdo#866511
bdo#875881
bnc#1059058
rh#1492593
CVE-2017-14954kernel-source-rt:Unsupportedmoderate5.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2017-14954
MISC:git.kernel.org:CVE-2017-14954
MISC:github.com:CVE-2017-14954
MISC:grsecurity.net:CVE-2017-14954
MISC:twitter.com:CVE-2017-14954
RH:CVE-2017-14954
SMASH Issue 192708
UBUNTU:CVE-2017-14954
bnc#1061284
rh#1497745
CVE-2017-14991kernel-source-rt:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)BID:101185
BID:101187
CONFIRM:github.com:CVE-2017-14991
CONFIRM:github.com:CVE-2017-15010
CONFIRM:nodesecurity.io:CVE-2017-15010
CONFIRM:snyk.io:CVE-2017-15010
CVE-2017-14991
CVE-2017-15010
D:CVE-2017-15010
FEDORA:FEDORA-2019-76f1b57c1c
MISC:git.kernel.org
OSS:2017/Q4/43
RH:CVE-2017-14991
RH:CVE-2017-15010
RHSA-2017:2912
RHSA-2017:2913
RHSA-2018:1263
RHSA-2018:1264
SMASH Issue 192787
UBUNTU:CVE-2017-14991
UBUNTU:CVE-2017-15010
rh#1493989
rh#1500366
CVE-2017-15010kernel-source-rt:Analysismoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)BID:101185
BID:101187
CONFIRM:github.com:CVE-2017-14991
CONFIRM:github.com:CVE-2017-15010
CONFIRM:nodesecurity.io:CVE-2017-15010
CONFIRM:snyk.io:CVE-2017-15010
CVE-2017-14991
CVE-2017-15010
D:CVE-2017-15010
FEDORA:FEDORA-2019-76f1b57c1c
MISC:git.kernel.org
OSS:2017/Q4/43
RH:CVE-2017-14991
RH:CVE-2017-15010
RHSA-2017:2912
RHSA-2017:2913
RHSA-2018:1263
RHSA-2018:1264
SMASH Issue 192787
UBUNTU:CVE-2017-14991
UBUNTU:CVE-2017-15010
rh#1493989
rh#1500366
CVE-2017-15087kernel-source-rt:Already fixedmoderate ()BID:100855
BID:101556
CONFIRM:bugzilla.novell.com:CVE-2017-12153
CONFIRM:bugzilla.redhat.com:CVE-2017-15087
CONFIRM:git.kernel.org:CVE-2017-12153
CONFIRM:marc.info
CONFIRM:marc.info:CVE-2017-12153
CVE-2017-12153
CVE-2017-15087
DSA-3981
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2017/Q3/437
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
RH:CVE-2017-12153
RH:CVE-2017-15087
RHSA-2017:3110
SMASH Issue 191845
UBUNTU:CVE-2017-12153
UBUNTU:CVE-2017-15087
UBUNTU:USN-3583-1
UBUNTU:USN-3583-2
bdo#866511
bdo#875881
bnc#1058410
linux.git:commit:e785fa0a164aa11001cba931367c7f94ffaff888
rh#1462147
rh#1462158
rh#1481178
rh#1491046
rh#1505788
CVE-2017-15102kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:101790
CONFIRM:git.kernel.org:CVE-2017-15102
CONFIRM:github.com:CVE-2017-15102
CVE-2017-15102
DSA-5378
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2017/Q4/238
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-15102
SMASH Issue 194536
UBUNTU:CVE-2017-15102
bdo#1033297
bnc#1066705
rh#1481178
rh#1505905
rh#1519780
rh#2061700
rh#2119127
CVE-2017-15116kernel-source-rt:Unsupportedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2017-15116
D:CVE-2017-15116
MISC:bugzilla.redhat.com:CVE-2017-15116
MISC:git.kernel.org:CVE-2017-15116
MISC:github.com:CVE-2017-15116
RH:CVE-2017-15116
RHSA-2018:0676
RHSA-2018:1062
SMASH Issue 195979
UBUNTU:CVE-2017-15116
bnc#1070613
rh#1514609
CVE-2017-15127kernel-source-rt:Unsupportedmoderate ()BID:102517
CVE-2017-15127
D:CVE-2017-15127
MISC:git.kernel.org:CVE-2017-15127
MISC:github.com:CVE-2017-15127
RH:CVE-2017-15127
RHSA-2018:0676
RHSA-2018:1062
SMASH Issue 196735
UBUNTU:CVE-2017-15127
bnc#1073113
rh#1525218
CVE-2017-15299kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2017-15299
D:CVE-2017-15299
DSA-5378
MISC:git.kernel.org:OSS:2014/03/05/6
MISC:marc.info
MISC:marc.info:CVE-2017-15299
MISC:www.mail-archive.com:CVE-2017-15299
OSS:2014/03/05/6
OSS:2017/Q4/82
OSS:2022/11/10/2
OSS:2022/12/27/3
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2022/Q4/244
Oracle:CVE-2017-0861
Oracle:CVE-2017-5715
Oracle:CVE-2018-5390
RH:CVE-2017-15299
RHSA-2018:0654
SMASH Issue 193363
UBUNTU:CVE-2017-15299
bdo#1033297
bnc#1063416
rh#1243852
rh#1495089
rh#1498016
rh#1519780
rh#1539599
rh#1601704
rh#1707796
rh#1718176
rh#2061700
rh#2119127
CVE-2017-15649kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:101573
CVE-2017-15649
D:CVE-2017-15649
MISC:blogs.securiteam.com:CVE-2017-15649
MISC:git.kernel.org:CVE-2017-15649
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:github.com:CVE-2017-15649
MISC:patchwork.ozlabs.org:CVE-2017-15649
MISC:www.kernel.org:CVE-2017-15649
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
RH:CVE-2017-15649
RHSA-2018:0151
RHSA-2018:0152
RHSA-2018:0181
SMASH Issue 193844
SMASH Issue 193849
UBUNTU:CVE-2017-15649
bnc#1064388
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1462147
rh#1462158
rh#1481178
rh#1504574
rh#1667782
rh#1701224
rh#1701842
CVE-2017-15670glibc:Already fixedimportant7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:101517
BID:101521
CONFIRM:sourceware.org:CVE-2017-15670
CONFIRM:sourceware.org:CVE-2017-15671
CVE-2017-15670
CVE-2017-15671
D:CVE-2017-15670
D:CVE-2017-15671
MISC:git.savannah.gnu.org:OSS:2017/Q4/119
OSS:2017/Q4/119
Oracle:CVE-2015-5180
Oracle:CVE-2018-11236
RH:CVE-2017-15670
RH:CVE-2017-15671
RHSA-2018:0805
RHSA-2018:1879
SMASH Issue 193878
SMASH Issue 193879
UBUNTU:CVE-2017-15670
UBUNTU:CVE-2017-15671
bnc#1064569
bnc#1064583
rh#1504804
rh#1504806
rh#1526865
rh#1581269
CVE-2017-15671glibc:Already fixedimportant4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)BID:101517
BID:101521
CONFIRM:sourceware.org:CVE-2017-15670
CONFIRM:sourceware.org:CVE-2017-15671
CVE-2017-15670
CVE-2017-15671
D:CVE-2017-15670
D:CVE-2017-15671
MISC:git.savannah.gnu.org:OSS:2017/Q4/119
OSS:2017/Q4/119
Oracle:CVE-2015-5180
Oracle:CVE-2018-11236
RH:CVE-2017-15670
RH:CVE-2017-15671
RHSA-2018:0805
RHSA-2018:1879
SMASH Issue 193878
SMASH Issue 193879
UBUNTU:CVE-2017-15670
UBUNTU:CVE-2017-15671
bnc#1064569
bnc#1064583
rh#1504804
rh#1504806
rh#1526865
rh#1581269
CVE-2017-15868kernel-source-rt:Not affectedimportant8.4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)BID:102084
CONFIRM:git.kernel.org:CVE-2017-15868
CONFIRM:github.com:CVE-2017-15868
CONFIRM:patchwork.kernel.org:CVE-2017-15868
CONFIRM:source.android.com:CVE-2017-6280
CVE-2017-15868
DEBIAN:DSA-4082
DSA-4082
DSA-5378
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-15868
SMASH Issue 196216
SMASH Issue 196231
SUSE:SUSE-SU-2018:0011
UBUNTU:CVE-2017-15868
UBUNTU:USN-3583-1
UBUNTU:USN-3583-2
bdo#1033297
bnc#1071470
bnc#1071471
rh#1519780
rh#1522893
rh#2061700
rh#2119127
CVE-2017-15873busybox:Releasedmoderate7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2017-15873
D:CVE-2017-15873
MISC:bugs.busybox.net:CVE-2017-15873
MISC:git.busybox.net:CVE-2017-15873
MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update
MLIST:[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update
RH:CVE-2017-15873
SMASH Issue 194051
UBUNTU:CVE-2017-15873
USN-3935-1
bnc#1064976
rh#1515249
CVE-2017-15874busybox:Releasedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2017-15874
D:CVE-2017-15874
MISC:bugs.busybox.net:CVE-2017-15874
RH:CVE-2017-15874
SMASH Issue 194052
UBUNTU:CVE-2017-15874
bnc#1064978
rh#1515286
CVE-2017-15951kernel-source-rt:Already fixedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)BID:101621
CONFIRM:git.kernel.org:CVE-2017-15951
CONFIRM:github.com:CVE-2017-15951
CONFIRM:www.kernel.org:CVE-2017-15951
CVE-2017-15951
D:CVE-2017-15951
DSA-5378
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
RH:CVE-2017-15951
SMASH Issue 194239
UBUNTU:CVE-2017-15951
bdo#1033297
bnc#1065615
rh#1507539
rh#1519780
rh#2061700
rh#2119127
CVE-2017-16526kernel-source-rt:Unsupportedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2017-16526
DEBIAN:DSA-4187
DSA-4187
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:github.com:CVE-2017-16526
MISC:groups.google.com:CVE-2017-16526
MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
OSS:2017/Q4/223
RH:CVE-2017-16526
SMASH Issue 194502
SMASH Issue 241885
UBUNTU:CVE-2017-16526
UBUNTU:USN-3754-1
bnc#1066624
rh#1510827
CVE-2017-16527kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2017-16527
DSA-5378
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:github.com:CVE-2017-16527
MISC:groups.google.com:CVE-2017-16527
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
OSS:2017/Q4/223
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-16527
SMASH Issue 194503
UBUNTU:CVE-2017-16527
UBUNTU:USN-3754-1
bdo#1033297
bnc#1066625
rh#1481178
rh#1510828
rh#1519780
rh#2061700
rh#2119127
CVE-2017-16528kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2017-16528
DSA-5378
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:github.com:CVE-2017-16528
MISC:groups.google.com:CVE-2017-16528
OSS:2017/Q4/223
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-16528
SMASH Issue 194504
UBUNTU:CVE-2017-16528
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
bdo#1033297
bnc#1066629
rh#1510830
rh#1519780
rh#2061700
rh#2119127
CVE-2017-16529kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:103284
CVE-2017-16529
DSA-5378
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:github.com:CVE-2017-16529
MISC:groups.google.com:CVE-2017-16529
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
OSS:2017/Q4/223
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-16529
SMASH Issue 194505
UBUNTU:CVE-2017-16529
UBUNTU:USN-3754-1
bdo#1033297
bnc#1066650
rh#1481178
rh#1510831
rh#1519780
rh#2061700
rh#2119127
CVE-2017-16530kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2017-16530
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:github.com:CVE-2017-16530
MISC:groups.google.com:CVE-2017-16530
OSS:2017/Q4/223
RH:CVE-2017-16530
SMASH Issue 194506
UBUNTU:CVE-2017-16530
bnc#1066668
rh#1510832
CVE-2017-16531kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:102025
CVE-2017-16531
DSA-5378
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:github.com:CVE-2017-16531
MISC:groups.google.com:CVE-2017-16531
OSS:2017/Q4/223
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-16531
SMASH Issue 194507
UBUNTU:CVE-2017-16531
bdo#1033297
bnc#1066671
rh#1481178
rh#1510833
rh#1519780
rh#2061700
rh#2119127
CVE-2017-16532kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2017-16532
D:CVE-2017-16532
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:github.com:CVE-2017-16532
MISC:groups.google.com:CVE-2017-16532
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
OSS:2017/Q4/223
RH:CVE-2017-16532
SMASH Issue 194508
UBUNTU:CVE-2017-16532
UBUNTU:USN-3617-1
UBUNTU:USN-3617-2
UBUNTU:USN-3617-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3754-1
bnc#1066673
rh#1510835
CVE-2017-16533kernel-source-rt:Already fixedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:102026
CVE-2017-16533
D:CVE-2017-16533
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:github.com:CVE-2017-16533
MISC:groups.google.com:CVE-2017-16533
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
OSS:2017/Q4/223
OSS:2018/09/18/4
RH:CVE-2017-16533
SMASH Issue 194509
UBUNTU:CVE-2017-16533
UBUNTU:USN-3754-1
bnc#1066674
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1510836
rh#1575866
rh#1609664
rh#1660375
rh#1660385
rh#1667782
rh#1686136
rh#1701224
rh#1701842
rh#1890354
CVE-2017-16537kernel-source-rt:Already fixedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2017-16537
D:CVE-2017-16537
DSA-5378
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:groups.google.com:CVE-2017-16537
MISC:patchwork.kernel.org:CVE-2017-16537
OSS:2017/Q4/223
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-16537
SMASH Issue 194513
UBUNTU:CVE-2017-16537
bdo#1033297
bnc#1066573
rh#1481178
rh#1510825
rh#1519780
rh#2061700
rh#2119127
CVE-2017-16538kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2017-16538
D:CVE-2017-16538
DSA-4073
DSA-4082
DSA-5378
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:groups.google.com:CVE-2017-16538
MISC:patchwork.linuxtv.org:CVE-2017-16538
OSS:2017/Q4/223
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-16538
SMASH Issue 194514
UBUNTU:CVE-2017-16538
bdo#1033297
bnc#1066569
rh#1510826
rh#1519780
rh#2061700
rh#2119127
CVE-2017-16544busybox:Releasedimportant7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)BUGTRAQ:20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
BUGTRAQ:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
CONFIRM:www.vmware.com:CVE-2019-5531
CVE-2017-16544
FULLDISC:20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
FULLDISC:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
FULLDISC:20200313 SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router & TC Cloud Client
FULLDISC:20200827 SEC Consult SA-20200827-0 :: Multiple Vulnerabilities in ZTE mobile Hotspot MS910S
FULLDISC:20200902 SEC Consult SA-20200902-0 :: Multiple Vulnerabilities in Red Lion N-Tron 702-W, Red Lion N-Tron 702M12-W
FULLDISC:20210113 SEC Consult SA-20210113-0 :: Multiple vulnerabilities in Pepperl+Fuchs IO-Link Master Series
FULLDISC:20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series
MISC:git.busybox.net:CVE-2017-16544
MISC:packetstormsecurity.com:CVE-2015-9261
MISC:packetstormsecurity.com:CVE-2019-5532
MISC:seclists.org:CVE-2021-39243
MISC:us-cert.cisa.gov:CVE-2017-16544
MISC:www.twistlock.com:CVE-2017-16544
MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update
MLIST:[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update
RH:CVE-2017-16544
SMASH Issue 195359
UBUNTU:CVE-2017-16544
USN-3935-1
bnc#1069412
rh#1515713
CVE-2017-16646kernel-source-rt:Already fixedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:101846
CVE-2017-16646
DSA-5378
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:groups.google.com:CVE-2017-16646
MISC:patchwork.linuxtv.org:CVE-2017-16646
OSS:2017/Q4/244
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-16646
SMASH Issue 194644
UBUNTU:CVE-2017-16646
bdo#1033297
bnc#1067105
rh#1516272
rh#1519780
rh#2061700
rh#2119127
CVE-2017-16647kernel-source-rt:Unsupportedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:101767
CVE-2017-16647
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:groups.google.com:CVE-2017-16647
MISC:patchwork.ozlabs.org:CVE-2017-16647
OSS:2017/Q4/244
RH:CVE-2017-16647
SMASH Issue 194645
UBUNTU:CVE-2017-16647
bnc#1067102
rh#1516270
CVE-2017-16648kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:101758
CONFIRM:bugzilla.redhat.com:CVE-2018-10880
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CVE-2017-16648
CVE-2018-10880
CVE-2018-10882
CVE-2018-13405
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:groups.google.com:CVE-2017-16648
MISC:patchwork.kernel.org:CVE-2017-16648
OSS:2017/Q4/244
RH:CVE-2017-16648
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
SMASH Issue 194646
UBUNTU:CVE-2017-16648
bnc#1067087
rh#1516257
rh#1596812
rh#1596842
rh#1599161
rh#2027239
rh#2044863
CVE-2017-16649kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:101761
CVE-2017-16649
DSA-5378
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:groups.google.com:CVE-2017-16650
MISC:patchwork.ozlabs.org:CVE-2017-16649
OSS:2017/Q4/244
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-16649
SMASH Issue 194647
UBUNTU:CVE-2017-16649
bdo#1033297
bnc#1067085
rh#1481178
rh#1516267
rh#1519780
rh#2061700
rh#2119127
CVE-2017-16650kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:101791
CVE-2017-16650
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:patchwork.ozlabs.org:CVE-2017-16650
OSS:2017/Q4/244
RH:CVE-2017-16650
SMASH Issue 194648
UBUNTU:CVE-2017-16650
bnc#1067086
rh#1516265
CVE-2017-16912kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:102150
CVE-2017-16912
DSA-4187
DSA-5378
MISC:cdn.kernel.org:CVE-2017-16914
MISC:git.kernel.org:CVE-2017-16912
MISC:git.kernel.org:OSS:2014/03/05/6
MISC:secuniaresearch.flexerasoftware.com:CVE-2017-16912
MISC:secuniaresearch.flexerasoftware.com:CVE-2017-16914
MISC:secuniaresearch.flexerasoftware.com:OSS:2018/Q2/165
OSS:2014/03/05/6
OSS:2018/Q1/124
OSS:2022/11/10/2
OSS:2022/12/27/3
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2022/Q4/244
Oracle:CVE-2017-0861
Oracle:CVE-2017-5715
RH:CVE-2017-16912
SMASH Issue 199293
UBUNTU:CVE-2017-16912
bdo#1033297
bnc#1078673
rh#1243852
rh#1495089
rh#1498016
rh#1519780
rh#1539599
rh#1541883
rh#2061700
rh#2119127
CVE-2017-16939kernel-source-rt:Not affectedimportant7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:101954
CVE-2017-16939
D:CVE-2017-16939
DEBIAN:DSA-4082
DSA-4082
DSA-5378
MISC:blogs.securiteam.com:CVE-2017-16939
MISC:git.kernel.org:CVE-2017-16939
MISC:github.com:CVE-2017-16939
MISC:seclists.org:CVE-2017-16939
MISC:www.kernel.org:CVE-2017-16939
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
OSS:2017/Q4/323
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
Oracle:CVE-2018-3639
RH:CVE-2017-16939
RHSA-2018:0654
RHSA-2018:1318
RHSA-2018:1355
RHSA-2019:1170
RHSA-2019:1190
SMASH Issue 195627
SUSE:SUSE-SU-2018:0011
UBUNTU:CVE-2017-16939
bdo#1033297
bnc#1069702
bnc#1069708
rh#1517220
rh#1519780
rh#1575472
rh#1660375
rh#1660385
rh#2061700
rh#2119127
CVE-2017-16995kernel-source-rt:Already fixedmoderate ()BID:102267
BID:102288
BID:102320
BID:102321
BID:102325
CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/
CVE-2017-16995
CVE-2017-16996
CVE-2017-17852
CVE-2017-17853
CVE-2017-17854
CVE-2017-17855
CVE-2017-17856
CVE-2017-17857
CVE-2017-17862
CVE-2017-17863
CVE-2017-17864
DEBIAN:DSA-4073
DSA-4073
DSA-5378
EXPLOIT-DB:44298
EXPLOIT-DB:45010
EXPLOIT-DB:45058
MISC:anonscm.debian.org:CVE-2017-17862
MISC:anonscm.debian.org:CVE-2017-17863
MISC:anonscm.debian.org:CVE-2017-17864
MISC:bugs.chromium.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-16995
MISC:git.kernel.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-17852
MISC:git.kernel.org:CVE-2017-17853
MISC:git.kernel.org:CVE-2017-17854
MISC:git.kernel.org:CVE-2017-17855
MISC:git.kernel.org:CVE-2017-17856
MISC:git.kernel.org:CVE-2017-17857
MISC:git.kernel.org:CVE-2017-17862
MISC:github.com:CVE-2017-17852
MISC:github.com:CVE-2017-17853
MISC:github.com:CVE-2017-17854
MISC:github.com:CVE-2017-17855
MISC:github.com:CVE-2017-17856
MISC:github.com:CVE-2017-17857
MISC:github.com:CVE-2017-17862
MISC:lists.debian.org:OSS:2017/Q4/433
MISC:openwall.com:CVE-2017-16996
MISC:www.openwall.com:CVE-2017-17852
MISC:www.spinics.net:CVE-2017-17862
MISC:www.spinics.net:CVE-2017-17863
OSS:2017/Q4/429
OSS:2017/Q4/432
OSS:2017/Q4/433
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
RH:CVE-2017-16995
RH:CVE-2017-16996
RH:CVE-2017-17852
RH:CVE-2017-17853
RH:CVE-2017-17854
RH:CVE-2017-17855
RH:CVE-2017-17856
RH:CVE-2017-17857
RH:CVE-2017-17862
RH:CVE-2017-17863
RH:CVE-2017-17864
SECTRACK:1040057
SECTRACK:1040058
SECTRACK:1040059
SMASH Issue 197144
UBUNTU:CVE-2017-16995
UBUNTU:CVE-2017-16996
UBUNTU:CVE-2017-17852
UBUNTU:CVE-2017-17853
UBUNTU:CVE-2017-17854
UBUNTU:CVE-2017-17855
UBUNTU:CVE-2017-17856
UBUNTU:CVE-2017-17857
UBUNTU:CVE-2017-17862
UBUNTU:CVE-2017-17863
UBUNTU:CVE-2017-17864
UBUNTU:USN-3523-2
UBUNTU:USN-3523-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3633-1
bdo#1033297
bnc#1073928
linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958
linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f
rh#1519780
rh#1528516
rh#1528518
rh#1529120
rh#1529123
rh#1529124
rh#1530269
rh#1530270
rh#1530271
rh#1530272
rh#1530273
rh#1530274
rh#2061700
rh#2119127
CVE-2017-16996kernel-source-rt:Already fixedmoderate ()BID:102267
BID:102288
BID:102320
BID:102321
BID:102325
CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/
CVE-2017-16995
CVE-2017-16996
CVE-2017-17852
CVE-2017-17853
CVE-2017-17854
CVE-2017-17855
CVE-2017-17856
CVE-2017-17857
CVE-2017-17862
CVE-2017-17863
CVE-2017-17864
DEBIAN:DSA-4073
DSA-4073
DSA-5378
EXPLOIT-DB:44298
EXPLOIT-DB:45010
EXPLOIT-DB:45058
MISC:anonscm.debian.org:CVE-2017-17862
MISC:anonscm.debian.org:CVE-2017-17863
MISC:anonscm.debian.org:CVE-2017-17864
MISC:bugs.chromium.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-16995
MISC:git.kernel.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-17852
MISC:git.kernel.org:CVE-2017-17853
MISC:git.kernel.org:CVE-2017-17854
MISC:git.kernel.org:CVE-2017-17855
MISC:git.kernel.org:CVE-2017-17856
MISC:git.kernel.org:CVE-2017-17857
MISC:git.kernel.org:CVE-2017-17862
MISC:github.com:CVE-2017-17852
MISC:github.com:CVE-2017-17853
MISC:github.com:CVE-2017-17854
MISC:github.com:CVE-2017-17855
MISC:github.com:CVE-2017-17856
MISC:github.com:CVE-2017-17857
MISC:github.com:CVE-2017-17862
MISC:lists.debian.org:OSS:2017/Q4/433
MISC:openwall.com:CVE-2017-16996
MISC:www.openwall.com:CVE-2017-17852
MISC:www.spinics.net:CVE-2017-17862
MISC:www.spinics.net:CVE-2017-17863
OSS:2017/Q4/429
OSS:2017/Q4/432
OSS:2017/Q4/433
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
RH:CVE-2017-16995
RH:CVE-2017-16996
RH:CVE-2017-17852
RH:CVE-2017-17853
RH:CVE-2017-17854
RH:CVE-2017-17855
RH:CVE-2017-17856
RH:CVE-2017-17857
RH:CVE-2017-17862
RH:CVE-2017-17863
RH:CVE-2017-17864
SECTRACK:1040057
SECTRACK:1040058
SECTRACK:1040059
SMASH Issue 197144
UBUNTU:CVE-2017-16995
UBUNTU:CVE-2017-16996
UBUNTU:CVE-2017-17852
UBUNTU:CVE-2017-17853
UBUNTU:CVE-2017-17854
UBUNTU:CVE-2017-17855
UBUNTU:CVE-2017-17856
UBUNTU:CVE-2017-17857
UBUNTU:CVE-2017-17862
UBUNTU:CVE-2017-17863
UBUNTU:CVE-2017-17864
UBUNTU:USN-3523-2
UBUNTU:USN-3523-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3633-1
bdo#1033297
bnc#1073928
linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958
linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f
rh#1519780
rh#1528516
rh#1528518
rh#1529120
rh#1529123
rh#1529124
rh#1530269
rh#1530270
rh#1530271
rh#1530272
rh#1530273
rh#1530274
rh#2061700
rh#2119127
CVE-2017-17052kernel-source-rt:Unsupportedimportant ()BID:102009
CONFIRM:git.kernel.org:CVE-2017-17052
CONFIRM:github.com:CVE-2017-17052
CONFIRM:www.kernel.org:CVE-2017-17053
CVE-2017-17052
RH:CVE-2017-17052
SMASH Issue 195760
UBUNTU:CVE-2017-17052
bnc#1070266
rh#1518632
CVE-2017-17087vim:Releasedlow4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2017-17087
D:CVE-2017-17087
MISC:github.com:CVE-2017-17087
MISC:groups.google.com:CVE-2017-17087
MISC:openwall.com:CVE-2017-17087
MISC:security.cucumberlinux.com:CVE-2017-17087
MLIST:[debian-lts-announce] 20190803 [SECURITY] [DLA 1871-1] vim security update
MLIST:[debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
OSS:2017/Q4/345
RH:CVE-2017-17087
SMASH Issue 196024
UBUNTU:CVE-2017-17087
USN-4582-1
bnc#1070955
rh#1524485
CVE-2017-17448kernel-source-rt:Already fixedmoderate5.7 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L)BID:102117
CVE-2017-17448
D:CVE-2017-17448
DEBIAN:DSA-4073
DEBIAN:DSA-4082
DSA-4073
DSA-4082
DSA-5378
MISC:patchwork.kernel.org:CVE-2017-17448
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-17448
RHSA-2018:0654
RHSA-2018:0676
RHSA-2018:1062
SMASH Issue 196291
UBUNTU:CVE-2017-17448
UBUNTU:USN-3617-1
UBUNTU:USN-3617-2
UBUNTU:USN-3617-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3620-1
UBUNTU:USN-3620-2
UBUNTU:USN-3632-1
bdo#1033297
bnc#1071693
rh#1519780
rh#1525768
rh#2061700
rh#2119127
CVE-2017-17450kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)BID:102110
CVE-2017-17450
D:CVE-2017-17450
DEBIAN:DSA-4073
DEBIAN:DSA-4082
DSA-4073
DSA-4082
DSA-5378
MISC:lkml.org:CVE-2017-17450
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-17450
SMASH Issue 196289
SUSE:SUSE-SU-2018:0011
UBUNTU:CVE-2017-17450
UBUNTU:USN-3583-1
UBUNTU:USN-3583-2
UBUNTU:USN-3617-1
UBUNTU:USN-3617-2
UBUNTU:USN-3617-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3632-1
bdo#1033297
bnc#1071695
rh#1519780
rh#1525761
rh#2061700
rh#2119127
CVE-2017-17558kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2017-17558
D:CVE-2017-17558
DEBIAN:DSA-4073
DEBIAN:DSA-4082
DSA-4073
DSA-4082
DSA-5378
MISC:openwall.com:CVE-2017-17558
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.spinics.net:CVE-2017-17558
MLIST:[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
OSS:2017/Q4/392
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-17558
RHSA-2018:0676
RHSA-2018:1062
RHSA-2019:1170
RHSA-2019:1190
SMASH Issue 196498
SUSE:SUSE-SU-2018:0011
UBUNTU:CVE-2017-17558
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
bdo#1033297
bnc#1072561
rh#1519780
rh#1525474
rh#2061700
rh#2119127
CVE-2017-17741kernel-source-rt:Not affectedimportant7.1 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)BID:102227
CVE-2017-17741
D:CVE-2017-17741
DSA-4073
DSA-4082
DSA-5378
MISC:www.spinics.net:CVE-2017-17741
OSS:2017/Q4/422
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
Oracle:CVE-2018-3639
RH:CVE-2017-17741
SMASH Issue 196829
UBUNTU:CVE-2017-17741
bdo#1033297
bnc#1073311
linux.git:commit:e39d200fa5bf5b94a0948db0dae44c1b73b84a56
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1519780
rh#1527112
rh#1527393
rh#1575472
rh#1575866
rh#1667782
rh#1701224
rh#1701842
rh#1890354
rh#2061700
rh#2119127
CVE-2017-17805kernel-source-rt:Not affectedimportant7.1 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)BID:102291
CONFIRM:bugzilla.redhat.com:CVE-2018-10880
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CONFIRM:git.kernel.org:CVE-2017-17805
CONFIRM:github.com:CVE-2017-17805
CONFIRM:www.kernel.org:CVE-2017-17806
CVE-2017-17805
CVE-2018-10880
CVE-2018-10882
CVE-2018-13405
DEBIAN:DSA-4073
DEBIAN:DSA-4082
DSA-4073
DSA-4082
DSA-5378
MLIST:[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-17805
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
RHSA-2019:2473
SMASH Issue 197016
SUSE:SUSE-SU-2018:0010
SUSE:SUSE-SU-2018:0011
SUSE:SUSE-SU-2018:0012
SUSE:openSUSE-SU-2018:0022
SUSE:openSUSE-SU-2018:0023
UBUNTU:CVE-2017-17805
UBUNTU:USN-3617-1
UBUNTU:USN-3617-2
UBUNTU:USN-3617-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3620-1
UBUNTU:USN-3620-2
UBUNTU:USN-3632-1
bdo#1033297
bnc#1073792
rh#1519780
rh#1528312
rh#1596812
rh#1596842
rh#1599161
rh#2027239
rh#2044863
rh#2061700
rh#2119127
CVE-2017-17806kernel-source-rt:Not affectedlow3.6 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L)BID:102293
CONFIRM:bugzilla.redhat.com:CVE-2018-10880
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CONFIRM:git.kernel.org:CVE-2017-17806
CONFIRM:github.com:CVE-2017-17806
CONFIRM:www.kernel.org:CVE-2017-17806
CVE-2017-17806
CVE-2018-10880
CVE-2018-10882
CVE-2018-13405
DEBIAN:DSA-4073
DEBIAN:DSA-4082
DSA-4073
DSA-4082
DSA-5378
MLIST:[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-17806
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
SMASH Issue 197017
SUSE:SUSE-SU-2018:0010
SUSE:SUSE-SU-2018:0011
SUSE:SUSE-SU-2018:0012
SUSE:openSUSE-SU-2018:0022
SUSE:openSUSE-SU-2018:0023
UBUNTU:CVE-2017-17806
UBUNTU:USN-3583-1
UBUNTU:USN-3583-2
UBUNTU:USN-3617-1
UBUNTU:USN-3617-2
UBUNTU:USN-3617-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3632-1
bdo#1033297
bnc#1073874
rh#1519780
rh#1528323
rh#1596812
rh#1596842
rh#1599161
rh#2027239
rh#2044863
rh#2061700
rh#2119127
CVE-2017-17807kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)BID:102301
CONFIRM:git.kernel.org:CVE-2017-17807
CONFIRM:github.com:CVE-2017-17807
CONFIRM:www.kernel.org:CVE-2017-17807
CVE-2017-17807
DEBIAN:DSA-4073
DEBIAN:DSA-4082
DSA-4073
DSA-4082
MLIST:[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
RH:CVE-2017-17807
RHSA-2020:1016
RHSA-2020:1070
SMASH Issue 197018
UBUNTU:CVE-2017-17807
UBUNTU:USN-3617-1
UBUNTU:USN-3617-2
UBUNTU:USN-3617-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3620-1
UBUNTU:USN-3620-2
UBUNTU:USN-3632-1
bnc#1073860
rh#1528335
CVE-2017-17852kernel-source-rt:Already fixedmoderate ()BID:102267
BID:102288
BID:102320
BID:102321
BID:102325
CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/
CVE-2017-16995
CVE-2017-16996
CVE-2017-17852
CVE-2017-17853
CVE-2017-17854
CVE-2017-17855
CVE-2017-17856
CVE-2017-17857
CVE-2017-17862
CVE-2017-17863
CVE-2017-17864
DEBIAN:DSA-4073
DSA-4073
DSA-5378
EXPLOIT-DB:44298
EXPLOIT-DB:45010
EXPLOIT-DB:45058
MISC:anonscm.debian.org:CVE-2017-17862
MISC:anonscm.debian.org:CVE-2017-17863
MISC:anonscm.debian.org:CVE-2017-17864
MISC:bugs.chromium.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-16995
MISC:git.kernel.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-17852
MISC:git.kernel.org:CVE-2017-17853
MISC:git.kernel.org:CVE-2017-17854
MISC:git.kernel.org:CVE-2017-17855
MISC:git.kernel.org:CVE-2017-17856
MISC:git.kernel.org:CVE-2017-17857
MISC:git.kernel.org:CVE-2017-17862
MISC:github.com:CVE-2017-17852
MISC:github.com:CVE-2017-17853
MISC:github.com:CVE-2017-17854
MISC:github.com:CVE-2017-17855
MISC:github.com:CVE-2017-17856
MISC:github.com:CVE-2017-17857
MISC:github.com:CVE-2017-17862
MISC:lists.debian.org:OSS:2017/Q4/433
MISC:openwall.com:CVE-2017-16996
MISC:www.openwall.com:CVE-2017-17852
MISC:www.spinics.net:CVE-2017-17862
MISC:www.spinics.net:CVE-2017-17863
OSS:2017/Q4/429
OSS:2017/Q4/432
OSS:2017/Q4/433
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
RH:CVE-2017-16995
RH:CVE-2017-16996
RH:CVE-2017-17852
RH:CVE-2017-17853
RH:CVE-2017-17854
RH:CVE-2017-17855
RH:CVE-2017-17856
RH:CVE-2017-17857
RH:CVE-2017-17862
RH:CVE-2017-17863
RH:CVE-2017-17864
SECTRACK:1040057
SECTRACK:1040058
SECTRACK:1040059
SMASH Issue 197144
SMASH Issue 197228
UBUNTU:CVE-2017-16995
UBUNTU:CVE-2017-16996
UBUNTU:CVE-2017-17852
UBUNTU:CVE-2017-17853
UBUNTU:CVE-2017-17854
UBUNTU:CVE-2017-17855
UBUNTU:CVE-2017-17856
UBUNTU:CVE-2017-17857
UBUNTU:CVE-2017-17862
UBUNTU:CVE-2017-17863
UBUNTU:CVE-2017-17864
UBUNTU:USN-3523-2
UBUNTU:USN-3523-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3633-1
bdo#1033297
bnc#1073928
linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958
linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f
rh#1519780
rh#1528516
rh#1528518
rh#1529120
rh#1529123
rh#1529124
rh#1530269
rh#1530270
rh#1530271
rh#1530272
rh#1530273
rh#1530274
rh#2061700
rh#2119127
CVE-2017-17853kernel-source-rt:Already fixedmoderate ()BID:102267
BID:102288
BID:102320
BID:102321
BID:102325
CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/
CVE-2017-16995
CVE-2017-16996
CVE-2017-17852
CVE-2017-17853
CVE-2017-17854
CVE-2017-17855
CVE-2017-17856
CVE-2017-17857
CVE-2017-17862
CVE-2017-17863
CVE-2017-17864
DEBIAN:DSA-4073
DSA-4073
DSA-5378
EXPLOIT-DB:44298
EXPLOIT-DB:45010
EXPLOIT-DB:45058
MISC:anonscm.debian.org:CVE-2017-17862
MISC:anonscm.debian.org:CVE-2017-17863
MISC:anonscm.debian.org:CVE-2017-17864
MISC:bugs.chromium.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-16995
MISC:git.kernel.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-17852
MISC:git.kernel.org:CVE-2017-17853
MISC:git.kernel.org:CVE-2017-17854
MISC:git.kernel.org:CVE-2017-17855
MISC:git.kernel.org:CVE-2017-17856
MISC:git.kernel.org:CVE-2017-17857
MISC:git.kernel.org:CVE-2017-17862
MISC:github.com:CVE-2017-17852
MISC:github.com:CVE-2017-17853
MISC:github.com:CVE-2017-17854
MISC:github.com:CVE-2017-17855
MISC:github.com:CVE-2017-17856
MISC:github.com:CVE-2017-17857
MISC:github.com:CVE-2017-17862
MISC:lists.debian.org:OSS:2017/Q4/433
MISC:openwall.com:CVE-2017-16996
MISC:www.openwall.com:CVE-2017-17852
MISC:www.spinics.net:CVE-2017-17862
MISC:www.spinics.net:CVE-2017-17863
OSS:2017/Q4/429
OSS:2017/Q4/432
OSS:2017/Q4/433
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
RH:CVE-2017-16995
RH:CVE-2017-16996
RH:CVE-2017-17852
RH:CVE-2017-17853
RH:CVE-2017-17854
RH:CVE-2017-17855
RH:CVE-2017-17856
RH:CVE-2017-17857
RH:CVE-2017-17862
RH:CVE-2017-17863
RH:CVE-2017-17864
SECTRACK:1040057
SECTRACK:1040058
SECTRACK:1040059
SMASH Issue 197144
SMASH Issue 197229
UBUNTU:CVE-2017-16995
UBUNTU:CVE-2017-16996
UBUNTU:CVE-2017-17852
UBUNTU:CVE-2017-17853
UBUNTU:CVE-2017-17854
UBUNTU:CVE-2017-17855
UBUNTU:CVE-2017-17856
UBUNTU:CVE-2017-17857
UBUNTU:CVE-2017-17862
UBUNTU:CVE-2017-17863
UBUNTU:CVE-2017-17864
UBUNTU:USN-3523-2
UBUNTU:USN-3523-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3633-1
bdo#1033297
bnc#1073928
linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958
linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f
rh#1519780
rh#1528516
rh#1528518
rh#1529120
rh#1529123
rh#1529124
rh#1530269
rh#1530270
rh#1530271
rh#1530272
rh#1530273
rh#1530274
rh#2061700
rh#2119127
CVE-2017-17854kernel-source-rt:Already fixedmoderate6.2 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H)BID:102267
BID:102288
BID:102320
BID:102321
BID:102325
CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/
CVE-2017-16995
CVE-2017-16996
CVE-2017-17852
CVE-2017-17853
CVE-2017-17854
CVE-2017-17855
CVE-2017-17856
CVE-2017-17857
CVE-2017-17862
CVE-2017-17863
CVE-2017-17864
DEBIAN:DSA-4073
DSA-4073
DSA-5378
EXPLOIT-DB:44298
EXPLOIT-DB:45010
EXPLOIT-DB:45058
MISC:anonscm.debian.org:CVE-2017-17862
MISC:anonscm.debian.org:CVE-2017-17863
MISC:anonscm.debian.org:CVE-2017-17864
MISC:bugs.chromium.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-16995
MISC:git.kernel.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-17852
MISC:git.kernel.org:CVE-2017-17853
MISC:git.kernel.org:CVE-2017-17854
MISC:git.kernel.org:CVE-2017-17855
MISC:git.kernel.org:CVE-2017-17856
MISC:git.kernel.org:CVE-2017-17857
MISC:git.kernel.org:CVE-2017-17862
MISC:github.com:CVE-2017-17852
MISC:github.com:CVE-2017-17853
MISC:github.com:CVE-2017-17854
MISC:github.com:CVE-2017-17855
MISC:github.com:CVE-2017-17856
MISC:github.com:CVE-2017-17857
MISC:github.com:CVE-2017-17862
MISC:lists.debian.org:OSS:2017/Q4/433
MISC:openwall.com:CVE-2017-16996
MISC:www.openwall.com:CVE-2017-17852
MISC:www.spinics.net:CVE-2017-17862
MISC:www.spinics.net:CVE-2017-17863
OSS:2017/Q4/429
OSS:2017/Q4/432
OSS:2017/Q4/433
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
RH:CVE-2017-16995
RH:CVE-2017-16996
RH:CVE-2017-17852
RH:CVE-2017-17853
RH:CVE-2017-17854
RH:CVE-2017-17855
RH:CVE-2017-17856
RH:CVE-2017-17857
RH:CVE-2017-17862
RH:CVE-2017-17863
RH:CVE-2017-17864
SECTRACK:1040057
SECTRACK:1040058
SECTRACK:1040059
SMASH Issue 197144
SMASH Issue 197230
UBUNTU:CVE-2017-16995
UBUNTU:CVE-2017-16996
UBUNTU:CVE-2017-17852
UBUNTU:CVE-2017-17853
UBUNTU:CVE-2017-17854
UBUNTU:CVE-2017-17855
UBUNTU:CVE-2017-17856
UBUNTU:CVE-2017-17857
UBUNTU:CVE-2017-17862
UBUNTU:CVE-2017-17863
UBUNTU:CVE-2017-17864
UBUNTU:USN-3523-2
UBUNTU:USN-3523-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3633-1
bdo#1033297
bnc#1073928
linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958
linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f
rh#1519780
rh#1528516
rh#1528518
rh#1529120
rh#1529123
rh#1529124
rh#1530269
rh#1530270
rh#1530271
rh#1530272
rh#1530273
rh#1530274
rh#2061700
rh#2119127
CVE-2017-17855kernel-source-rt:Already fixedmoderate ()BID:102267
BID:102288
BID:102320
BID:102321
BID:102325
CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/
CVE-2017-16995
CVE-2017-16996
CVE-2017-17852
CVE-2017-17853
CVE-2017-17854
CVE-2017-17855
CVE-2017-17856
CVE-2017-17857
CVE-2017-17862
CVE-2017-17863
CVE-2017-17864
DEBIAN:DSA-4073
DSA-4073
DSA-5378
EXPLOIT-DB:44298
EXPLOIT-DB:45010
EXPLOIT-DB:45058
MISC:anonscm.debian.org:CVE-2017-17862
MISC:anonscm.debian.org:CVE-2017-17863
MISC:anonscm.debian.org:CVE-2017-17864
MISC:bugs.chromium.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-16995
MISC:git.kernel.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-17852
MISC:git.kernel.org:CVE-2017-17853
MISC:git.kernel.org:CVE-2017-17854
MISC:git.kernel.org:CVE-2017-17855
MISC:git.kernel.org:CVE-2017-17856
MISC:git.kernel.org:CVE-2017-17857
MISC:git.kernel.org:CVE-2017-17862
MISC:github.com:CVE-2017-17852
MISC:github.com:CVE-2017-17853
MISC:github.com:CVE-2017-17854
MISC:github.com:CVE-2017-17855
MISC:github.com:CVE-2017-17856
MISC:github.com:CVE-2017-17857
MISC:github.com:CVE-2017-17862
MISC:lists.debian.org:OSS:2017/Q4/433
MISC:openwall.com:CVE-2017-16996
MISC:www.openwall.com:CVE-2017-17852
MISC:www.spinics.net:CVE-2017-17862
MISC:www.spinics.net:CVE-2017-17863
OSS:2017/Q4/429
OSS:2017/Q4/432
OSS:2017/Q4/433
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
RH:CVE-2017-16995
RH:CVE-2017-16996
RH:CVE-2017-17852
RH:CVE-2017-17853
RH:CVE-2017-17854
RH:CVE-2017-17855
RH:CVE-2017-17856
RH:CVE-2017-17857
RH:CVE-2017-17862
RH:CVE-2017-17863
RH:CVE-2017-17864
SECTRACK:1040057
SECTRACK:1040058
SECTRACK:1040059
SMASH Issue 197144
SMASH Issue 197231
UBUNTU:CVE-2017-16995
UBUNTU:CVE-2017-16996
UBUNTU:CVE-2017-17852
UBUNTU:CVE-2017-17853
UBUNTU:CVE-2017-17854
UBUNTU:CVE-2017-17855
UBUNTU:CVE-2017-17856
UBUNTU:CVE-2017-17857
UBUNTU:CVE-2017-17862
UBUNTU:CVE-2017-17863
UBUNTU:CVE-2017-17864
UBUNTU:USN-3523-2
UBUNTU:USN-3523-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3633-1
bdo#1033297
bnc#1073928
linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958
linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f
rh#1519780
rh#1528516
rh#1528518
rh#1529120
rh#1529123
rh#1529124
rh#1530269
rh#1530270
rh#1530271
rh#1530272
rh#1530273
rh#1530274
rh#2061700
rh#2119127
CVE-2017-17856kernel-source-rt:Already fixedmoderate ()BID:102267
BID:102288
BID:102320
BID:102321
BID:102325
CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/
CVE-2017-16995
CVE-2017-16996
CVE-2017-17852
CVE-2017-17853
CVE-2017-17854
CVE-2017-17855
CVE-2017-17856
CVE-2017-17857
CVE-2017-17862
CVE-2017-17863
CVE-2017-17864
DEBIAN:DSA-4073
DSA-4073
DSA-5378
EXPLOIT-DB:44298
EXPLOIT-DB:45010
EXPLOIT-DB:45058
MISC:anonscm.debian.org:CVE-2017-17862
MISC:anonscm.debian.org:CVE-2017-17863
MISC:anonscm.debian.org:CVE-2017-17864
MISC:bugs.chromium.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-16995
MISC:git.kernel.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-17852
MISC:git.kernel.org:CVE-2017-17853
MISC:git.kernel.org:CVE-2017-17854
MISC:git.kernel.org:CVE-2017-17855
MISC:git.kernel.org:CVE-2017-17856
MISC:git.kernel.org:CVE-2017-17857
MISC:git.kernel.org:CVE-2017-17862
MISC:github.com:CVE-2017-17852
MISC:github.com:CVE-2017-17853
MISC:github.com:CVE-2017-17854
MISC:github.com:CVE-2017-17855
MISC:github.com:CVE-2017-17856
MISC:github.com:CVE-2017-17857
MISC:github.com:CVE-2017-17862
MISC:lists.debian.org:OSS:2017/Q4/433
MISC:openwall.com:CVE-2017-16996
MISC:www.openwall.com:CVE-2017-17852
MISC:www.spinics.net:CVE-2017-17862
MISC:www.spinics.net:CVE-2017-17863
OSS:2017/Q4/429
OSS:2017/Q4/432
OSS:2017/Q4/433
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
RH:CVE-2017-16995
RH:CVE-2017-16996
RH:CVE-2017-17852
RH:CVE-2017-17853
RH:CVE-2017-17854
RH:CVE-2017-17855
RH:CVE-2017-17856
RH:CVE-2017-17857
RH:CVE-2017-17862
RH:CVE-2017-17863
RH:CVE-2017-17864
SECTRACK:1040057
SECTRACK:1040058
SECTRACK:1040059
SMASH Issue 197144
SMASH Issue 197232
UBUNTU:CVE-2017-16995
UBUNTU:CVE-2017-16996
UBUNTU:CVE-2017-17852
UBUNTU:CVE-2017-17853
UBUNTU:CVE-2017-17854
UBUNTU:CVE-2017-17855
UBUNTU:CVE-2017-17856
UBUNTU:CVE-2017-17857
UBUNTU:CVE-2017-17862
UBUNTU:CVE-2017-17863
UBUNTU:CVE-2017-17864
UBUNTU:USN-3523-2
UBUNTU:USN-3523-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3633-1
bdo#1033297
bnc#1073928
linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958
linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f
rh#1519780
rh#1528516
rh#1528518
rh#1529120
rh#1529123
rh#1529124
rh#1530269
rh#1530270
rh#1530271
rh#1530272
rh#1530273
rh#1530274
rh#2061700
rh#2119127
CVE-2017-17857kernel-source-rt:Already fixedmoderate ()BID:102267
BID:102288
BID:102320
BID:102321
BID:102325
CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/
CVE-2017-16995
CVE-2017-16996
CVE-2017-17852
CVE-2017-17853
CVE-2017-17854
CVE-2017-17855
CVE-2017-17856
CVE-2017-17857
CVE-2017-17862
CVE-2017-17863
CVE-2017-17864
DEBIAN:DSA-4073
DSA-4073
DSA-5378
EXPLOIT-DB:44298
EXPLOIT-DB:45010
EXPLOIT-DB:45058
MISC:anonscm.debian.org:CVE-2017-17862
MISC:anonscm.debian.org:CVE-2017-17863
MISC:anonscm.debian.org:CVE-2017-17864
MISC:bugs.chromium.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-16995
MISC:git.kernel.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-17852
MISC:git.kernel.org:CVE-2017-17853
MISC:git.kernel.org:CVE-2017-17854
MISC:git.kernel.org:CVE-2017-17855
MISC:git.kernel.org:CVE-2017-17856
MISC:git.kernel.org:CVE-2017-17857
MISC:git.kernel.org:CVE-2017-17862
MISC:github.com:CVE-2017-17852
MISC:github.com:CVE-2017-17853
MISC:github.com:CVE-2017-17854
MISC:github.com:CVE-2017-17855
MISC:github.com:CVE-2017-17856
MISC:github.com:CVE-2017-17857
MISC:github.com:CVE-2017-17862
MISC:lists.debian.org:OSS:2017/Q4/433
MISC:openwall.com:CVE-2017-16996
MISC:www.openwall.com:CVE-2017-17852
MISC:www.spinics.net:CVE-2017-17862
MISC:www.spinics.net:CVE-2017-17863
OSS:2017/Q4/429
OSS:2017/Q4/432
OSS:2017/Q4/433
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
RH:CVE-2017-16995
RH:CVE-2017-16996
RH:CVE-2017-17852
RH:CVE-2017-17853
RH:CVE-2017-17854
RH:CVE-2017-17855
RH:CVE-2017-17856
RH:CVE-2017-17857
RH:CVE-2017-17862
RH:CVE-2017-17863
RH:CVE-2017-17864
SECTRACK:1040057
SECTRACK:1040058
SECTRACK:1040059
SMASH Issue 197144
SMASH Issue 197233
UBUNTU:CVE-2017-16995
UBUNTU:CVE-2017-16996
UBUNTU:CVE-2017-17852
UBUNTU:CVE-2017-17853
UBUNTU:CVE-2017-17854
UBUNTU:CVE-2017-17855
UBUNTU:CVE-2017-17856
UBUNTU:CVE-2017-17857
UBUNTU:CVE-2017-17862
UBUNTU:CVE-2017-17863
UBUNTU:CVE-2017-17864
UBUNTU:USN-3523-2
UBUNTU:USN-3523-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3633-1
bdo#1033297
bnc#1073928
linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958
linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f
rh#1519780
rh#1528516
rh#1528518
rh#1529120
rh#1529123
rh#1529124
rh#1530269
rh#1530270
rh#1530271
rh#1530272
rh#1530273
rh#1530274
rh#2061700
rh#2119127
CVE-2017-17862kernel-source-rt:Already fixedmoderate ()BID:102267
BID:102288
BID:102320
BID:102321
BID:102325
CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/
CVE-2017-16995
CVE-2017-16996
CVE-2017-17852
CVE-2017-17853
CVE-2017-17854
CVE-2017-17855
CVE-2017-17856
CVE-2017-17857
CVE-2017-17862
CVE-2017-17863
CVE-2017-17864
DEBIAN:DSA-4073
DSA-4073
DSA-5378
EXPLOIT-DB:44298
EXPLOIT-DB:45010
EXPLOIT-DB:45058
MISC:anonscm.debian.org:CVE-2017-17862
MISC:anonscm.debian.org:CVE-2017-17863
MISC:anonscm.debian.org:CVE-2017-17864
MISC:bugs.chromium.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-16995
MISC:git.kernel.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-17852
MISC:git.kernel.org:CVE-2017-17853
MISC:git.kernel.org:CVE-2017-17854
MISC:git.kernel.org:CVE-2017-17855
MISC:git.kernel.org:CVE-2017-17856
MISC:git.kernel.org:CVE-2017-17857
MISC:git.kernel.org:CVE-2017-17862
MISC:github.com:CVE-2017-17852
MISC:github.com:CVE-2017-17853
MISC:github.com:CVE-2017-17854
MISC:github.com:CVE-2017-17855
MISC:github.com:CVE-2017-17856
MISC:github.com:CVE-2017-17857
MISC:github.com:CVE-2017-17862
MISC:lists.debian.org:OSS:2017/Q4/433
MISC:openwall.com:CVE-2017-16996
MISC:www.openwall.com:CVE-2017-17852
MISC:www.spinics.net:CVE-2017-17862
MISC:www.spinics.net:CVE-2017-17863
OSS:2017/Q4/429
OSS:2017/Q4/432
OSS:2017/Q4/433
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
RH:CVE-2017-16995
RH:CVE-2017-16996
RH:CVE-2017-17852
RH:CVE-2017-17853
RH:CVE-2017-17854
RH:CVE-2017-17855
RH:CVE-2017-17856
RH:CVE-2017-17857
RH:CVE-2017-17862
RH:CVE-2017-17863
RH:CVE-2017-17864
SECTRACK:1040057
SECTRACK:1040058
SECTRACK:1040059
SMASH Issue 197144
SMASH Issue 197244
UBUNTU:CVE-2017-16995
UBUNTU:CVE-2017-16996
UBUNTU:CVE-2017-17852
UBUNTU:CVE-2017-17853
UBUNTU:CVE-2017-17854
UBUNTU:CVE-2017-17855
UBUNTU:CVE-2017-17856
UBUNTU:CVE-2017-17857
UBUNTU:CVE-2017-17862
UBUNTU:CVE-2017-17863
UBUNTU:CVE-2017-17864
UBUNTU:USN-3523-2
UBUNTU:USN-3523-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3633-1
bdo#1033297
bnc#1073928
linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958
linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f
rh#1519780
rh#1528516
rh#1528518
rh#1529120
rh#1529123
rh#1529124
rh#1530269
rh#1530270
rh#1530271
rh#1530272
rh#1530273
rh#1530274
rh#2061700
rh#2119127
CVE-2017-17863kernel-source-rt:Already fixedmoderate ()BID:102267
BID:102288
BID:102320
BID:102321
BID:102325
CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/
CVE-2017-16995
CVE-2017-16996
CVE-2017-17852
CVE-2017-17853
CVE-2017-17854
CVE-2017-17855
CVE-2017-17856
CVE-2017-17857
CVE-2017-17862
CVE-2017-17863
CVE-2017-17864
DEBIAN:DSA-4073
DSA-4073
DSA-5378
EXPLOIT-DB:44298
EXPLOIT-DB:45010
EXPLOIT-DB:45058
MISC:anonscm.debian.org:CVE-2017-17862
MISC:anonscm.debian.org:CVE-2017-17863
MISC:anonscm.debian.org:CVE-2017-17864
MISC:bugs.chromium.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-16995
MISC:git.kernel.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-17852
MISC:git.kernel.org:CVE-2017-17853
MISC:git.kernel.org:CVE-2017-17854
MISC:git.kernel.org:CVE-2017-17855
MISC:git.kernel.org:CVE-2017-17856
MISC:git.kernel.org:CVE-2017-17857
MISC:git.kernel.org:CVE-2017-17862
MISC:github.com:CVE-2017-17852
MISC:github.com:CVE-2017-17853
MISC:github.com:CVE-2017-17854
MISC:github.com:CVE-2017-17855
MISC:github.com:CVE-2017-17856
MISC:github.com:CVE-2017-17857
MISC:github.com:CVE-2017-17862
MISC:lists.debian.org:OSS:2017/Q4/433
MISC:openwall.com:CVE-2017-16996
MISC:www.openwall.com:CVE-2017-17852
MISC:www.spinics.net:CVE-2017-17862
MISC:www.spinics.net:CVE-2017-17863
OSS:2017/Q4/429
OSS:2017/Q4/432
OSS:2017/Q4/433
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
RH:CVE-2017-16995
RH:CVE-2017-16996
RH:CVE-2017-17852
RH:CVE-2017-17853
RH:CVE-2017-17854
RH:CVE-2017-17855
RH:CVE-2017-17856
RH:CVE-2017-17857
RH:CVE-2017-17862
RH:CVE-2017-17863
RH:CVE-2017-17864
SECTRACK:1040057
SECTRACK:1040058
SECTRACK:1040059
SMASH Issue 197144
SMASH Issue 197245
UBUNTU:CVE-2017-16995
UBUNTU:CVE-2017-16996
UBUNTU:CVE-2017-17852
UBUNTU:CVE-2017-17853
UBUNTU:CVE-2017-17854
UBUNTU:CVE-2017-17855
UBUNTU:CVE-2017-17856
UBUNTU:CVE-2017-17857
UBUNTU:CVE-2017-17862
UBUNTU:CVE-2017-17863
UBUNTU:CVE-2017-17864
UBUNTU:USN-3523-2
UBUNTU:USN-3523-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3633-1
bdo#1033297
bnc#1073928
linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958
linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f
rh#1519780
rh#1528516
rh#1528518
rh#1529120
rh#1529123
rh#1529124
rh#1530269
rh#1530270
rh#1530271
rh#1530272
rh#1530273
rh#1530274
rh#2061700
rh#2119127
CVE-2017-17864kernel-source-rt:Already fixedmoderate ()BID:102267
BID:102288
BID:102320
BID:102321
BID:102325
CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/tip/tip.git/commit/
CVE-2017-16995
CVE-2017-16996
CVE-2017-17852
CVE-2017-17853
CVE-2017-17854
CVE-2017-17855
CVE-2017-17856
CVE-2017-17857
CVE-2017-17862
CVE-2017-17863
CVE-2017-17864
DEBIAN:DSA-4073
DSA-4073
DSA-5378
EXPLOIT-DB:44298
EXPLOIT-DB:45010
EXPLOIT-DB:45058
MISC:anonscm.debian.org:CVE-2017-17862
MISC:anonscm.debian.org:CVE-2017-17863
MISC:anonscm.debian.org:CVE-2017-17864
MISC:bugs.chromium.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-16995
MISC:git.kernel.org:CVE-2017-16996
MISC:git.kernel.org:CVE-2017-17852
MISC:git.kernel.org:CVE-2017-17853
MISC:git.kernel.org:CVE-2017-17854
MISC:git.kernel.org:CVE-2017-17855
MISC:git.kernel.org:CVE-2017-17856
MISC:git.kernel.org:CVE-2017-17857
MISC:git.kernel.org:CVE-2017-17862
MISC:github.com:CVE-2017-17852
MISC:github.com:CVE-2017-17853
MISC:github.com:CVE-2017-17854
MISC:github.com:CVE-2017-17855
MISC:github.com:CVE-2017-17856
MISC:github.com:CVE-2017-17857
MISC:github.com:CVE-2017-17862
MISC:lists.debian.org:OSS:2017/Q4/433
MISC:openwall.com:CVE-2017-16996
MISC:www.openwall.com:CVE-2017-17852
MISC:www.spinics.net:CVE-2017-17862
MISC:www.spinics.net:CVE-2017-17863
OSS:2017/Q4/429
OSS:2017/Q4/432
OSS:2017/Q4/433
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
RH:CVE-2017-16995
RH:CVE-2017-16996
RH:CVE-2017-17852
RH:CVE-2017-17853
RH:CVE-2017-17854
RH:CVE-2017-17855
RH:CVE-2017-17856
RH:CVE-2017-17857
RH:CVE-2017-17862
RH:CVE-2017-17863
RH:CVE-2017-17864
SECTRACK:1040057
SECTRACK:1040058
SECTRACK:1040059
SMASH Issue 197144
SMASH Issue 197246
UBUNTU:CVE-2017-16995
UBUNTU:CVE-2017-16996
UBUNTU:CVE-2017-17852
UBUNTU:CVE-2017-17853
UBUNTU:CVE-2017-17854
UBUNTU:CVE-2017-17855
UBUNTU:CVE-2017-17856
UBUNTU:CVE-2017-17857
UBUNTU:CVE-2017-17862
UBUNTU:CVE-2017-17863
UBUNTU:CVE-2017-17864
UBUNTU:USN-3523-2
UBUNTU:USN-3523-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3633-1
bdo#1033297
bnc#1073928
linux.git:commit:0c17d1d2c61936401f4702e1846e2c19b200f958
linux.git:commit:95a762e2c8c942780948091f8f2a4f32fce1ac6f
rh#1519780
rh#1528516
rh#1528518
rh#1529120
rh#1529123
rh#1529124
rh#1530269
rh#1530270
rh#1530271
rh#1530272
rh#1530273
rh#1530274
rh#2061700
rh#2119127
CVE-2017-18017kernel-source-rt:Not affectedimportant5.4 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)BID:102367
CONFIRM:bugzilla.redhat.com:CVE-2018-10880
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CONFIRM:help.ecostruxureit.com:CVE-2017-5754
CONFIRM:source.android.com:CVE-2017-6280
CONFIRM:support.f5.com:CVE-2017-18017
CVE-2017-13166
CVE-2017-18017
CVE-2018-10880
CVE-2018-10882
CVE-2018-13405
DEBIAN:DSA-4120
DEBIAN:DSA-4187
DSA-4120
DSA-4187
DSA-5378
MISC:bugs.launchpad.net:CVE-2017-18017
MISC:git.kernel.org:CVE-2017-18017
MISC:git.kernel.org:OSS:2014/03/05/6
MISC:github.com:CVE-2017-18017
MISC:lkml.org:CVE-2017-18017
MISC:patchwork.ozlabs.org:CVE-2017-18017
MISC:www.arista.com:CVE-2017-18017
MISC:www.kernel.org:CVE-2017-18017
MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
OSS:2014/03/05/6
OSS:2022/11/10/2
OSS:2022/12/27/3
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2022/Q4/244
Oracle:CVE-2017-0861
Oracle:CVE-2017-5715
RH:CVE-2017-13166
RH:CVE-2017-18017
RHSA-2018:0676
RHSA-2018:1062
RHSA-2018:1130
RHSA-2018:1170
RHSA-2018:1319
RHSA-2018:1737
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
SMASH Issue 197538
SUSE:SUSE-SU-2018:0383
SUSE:SUSE-SU-2018:0416
SUSE:SUSE-SU-2018:0482
SUSE:SUSE-SU-2018:0555
SUSE:SUSE-SU-2018:0660
SUSE:SUSE-SU-2018:0834
SUSE:SUSE-SU-2018:0841
SUSE:SUSE-SU-2018:0848
SUSE:SUSE-SU-2018:0986
SUSE:openSUSE-SU-2018:0408
UBUNTU:CVE-2017-13166
UBUNTU:CVE-2017-18017
UBUNTU:USN-3583-1
UBUNTU:USN-3583-2
USN-3583-1
USN-3583-2
bdo#1033297
bnc#1067118
bnc#1072865
bnc#1074488
bnc#1085447
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901
linux.git:commit:d36260050e1881dce09625a9352d8729c911a6e3
rh#1243852
rh#1495089
rh#1498016
rh#1519780
rh#1531135
rh#1539599
rh#1548412
rh#1596812
rh#1596842
rh#1599161
rh#2027239
rh#2044863
rh#2061700
rh#2119127
CVE-2017-18075kernel-source-rt:Not affectedimportant7.4 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)BID:102813
CONFIRM:bugzilla.redhat.com:CVE-2018-10877
CONFIRM:bugzilla.redhat.com:CVE-2018-10880
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CONFIRM:git.kernel.org:CVE-2017-18075
CONFIRM:github.com:CVE-2017-18075
CONFIRM:www.kernel.org:CVE-2017-18075
CVE-2017-18075
CVE-2018-10877
CVE-2018-10880
CVE-2018-10882
CVE-2018-13405
RH:CVE-2017-18075
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
SMASH Issue 198879
SMASH Issue 198893
UBUNTU:CVE-2017-18075
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
bnc#1077402
bnc#1077404
rh#1539508
rh#1596795
rh#1596812
rh#1596842
rh#1599161
rh#2027239
rh#2044863
CVE-2017-18174kernel-source-rt:Already fixedmoderate5.3 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L)CVE-2017-18174
DSA-5378
MISC:git.kernel.org:CVE-2017-18174
MISC:github.com:CVE-2017-18174
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
RH:CVE-2017-18174
SMASH Issue 199838
UBUNTU:CVE-2017-18174
bdo#1033297
bnc#1080533
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1519780
rh#1544482
rh#1575472
rh#1575866
rh#1667782
rh#1701224
rh#1701842
rh#1890354
rh#2061700
rh#2119127
CVE-2017-18193kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:103147
CVE-2017-18193
DSA-4188
DSA-5378
MISC:git.kernel.org:CVE-2017-18193
MISC:github.com:CVE-2017-18193
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
RH:CVE-2017-18193
SMASH Issue 200689
UBUNTU:CVE-2017-18193
bdo#1033297
bnc#1082478
rh#1519780
rh#1549421
rh#2061700
rh#2119127
CVE-2017-18202kernel-source-rt:Unsupportedmoderate ()BID:103161
CVE-2017-18202
MISC:git.kernel.org:CVE-2017-18202
MISC:github.com:CVE-2017-18202
MISC:www.kernel.org:CVE-2017-18208
RH:CVE-2017-18202
RHSA-2018:2772
SMASH Issue 200879
UBUNTU:CVE-2017-18202
bnc#1083088
rh#1549621
CVE-2017-18204kernel-source-rt:Not affectedmoderate3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)BID:103183
CVE-2017-18204
MISC:git.kernel.org:CVE-2017-18204
MISC:github.com:CVE-2017-18204
MISC:www.kernel.org:CVE-2017-18204
RH:CVE-2017-18204
SMASH Issue 200959
UBUNTU:CVE-2017-18204
UBUNTU:USN-3617-1
UBUNTU:USN-3617-2
UBUNTU:USN-3617-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3655-1
UBUNTU:USN-3655-2
bnc#1083244
rh#1495089
rh#1498016
rh#1539599
rh#1550818
CVE-2017-18208kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:bugzilla.redhat.com:CVE-2018-10880
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CVE-2017-18208
CVE-2018-10880
CVE-2018-10882
DSA-5378
MISC:git.kernel.org:CVE-2017-18208
MISC:git.kernel.org:OSS:2014/03/05/6
MISC:github.com:CVE-2017-18208
MISC:www.kernel.org:CVE-2017-18208
OSS:2014/03/05/6
OSS:2022/11/10/2
OSS:2022/12/27/3
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2022/Q4/244
Oracle:CVE-2017-0861
Oracle:CVE-2017-5715
RH:CVE-2017-18208
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
RHSA-2019:3967
RHSA-2019:4057
RHSA-2019:4058
SMASH Issue 201049
UBUNTU:CVE-2017-18208
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3653-1
UBUNTU:USN-3653-2
UBUNTU:USN-3655-1
UBUNTU:USN-3655-2
UBUNTU:USN-3657-1
bdo#1033297
bnc#1083494
rh#1243852
rh#1495089
rh#1498016
rh#1519780
rh#1539599
rh#1551565
rh#1596812
rh#1596842
rh#2061700
rh#2119127
CVE-2017-18216kernel-source-rt:Unsupportedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:103278
CVE-2017-18216
DSA-4187
DSA-4188
MISC:git.kernel.org:CVE-2017-18216
MISC:github.com:CVE-2017-18216
RH:CVE-2017-18216
SMASH Issue 201214
UBUNTU:CVE-2017-18216
UBUNTU:USN-3776-1
UBUNTU:USN-3776-2
bnc#1084058
rh#1551992
CVE-2017-18218kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)BID:103277
CVE-2017-18218
DEBIAN:DSA-4188
DSA-4188
MISC:git.kernel.org:CVE-2017-18218
MISC:github.com:CVE-2017-18218
RH:CVE-2017-18218
SMASH Issue 201235
UBUNTU:CVE-2017-18218
bnc#1084055
rh#1551985
CVE-2017-18221kernel-source-rt:Already fixedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:103321
CVE-2017-18221
MISC:git.kernel.org:CVE-2017-18221
MISC:github.com:CVE-2017-18221
MISC:www.kernel.org:CVE-2017-18221
RH:CVE-2017-18221
SMASH Issue 201395
UBUNTU:CVE-2017-18221
bnc#1084323
rh#1498016
rh#1539599
rh#1552849
CVE-2017-18222kernel-source-rt:Not affectedimportant8.4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)BID:103349
CVE-2017-18222
DSA-4188
MISC:git.kernel.org:CVE-2017-18222
MISC:github.com:CVE-2017-18222
RH:CVE-2017-18222
SMASH Issue 201458
UBUNTU:CVE-2017-18222
bnc#1084529
rh#1553371
CVE-2017-18232kernel-source-rt:Not affectedlow3.1 (CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L)BID:103423
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CVE-2017-18232
CVE-2018-10882
CVE-2018-13405
DEBIAN:DSA-4187
DSA-4187
MISC:git.kernel.org:CVE-2017-18232
MISC:github.com:CVE-2017-18232
RH:CVE-2017-18232
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
SMASH Issue 201990
UBUNTU:CVE-2017-18232
bnc#1085413
rh#1558066
rh#1596842
rh#1599161
rh#2027239
rh#2044863
CVE-2017-18248dbus-1:Releasedmoderate6.5 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:github.com:CVE-2017-18248
CVE-2017-18248
MISC:security.cucumberlinux.com:CVE-2017-18248
MLIST:[debian-lts-announce] 20180526 [SECURITY] [DLA 1387-1] cups security update
RH:CVE-2017-18248
SMASH Issue 202702
UBUNTU:CVE-2017-18248
UBUNTU:USN-3713-1
bnc#1087018
bnc#1087072
rh#1561296
CVE-2017-18257kernel-source-rt:Already fixedmoderate ()CVE-2017-18257
DSA-4188
MISC:git.kernel.org:CVE-2017-18257
MISC:git.kernel.org:OSS:2014/03/05/6
MISC:github.com:CVE-2017-18257
OSS:2014/03/05/6
OSS:2022/12/27/3
OSS:2022/Q4/244
RH:CVE-2017-18257
SMASH Issue 203136
UBUNTU:CVE-2017-18257
bnc#1088241
rh#1565455
CVE-2017-18270kernel-source-rt:Unsupportedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)BID:104254
CONFIRM:git.kernel.org:CVE-2017-18270
CONFIRM:github.com:CVE-2017-18270
CONFIRM:support.f5.com:CVE-2017-18270
CONFIRM:www.kernel.org:CVE-2017-18270
CVE-2017-18270
MISC:bugzilla.redhat.com:CVE-2017-18270
RH:CVE-2017-18270
RHSA-2018:0412
RHSA-2018:1062
SMASH Issue 206151
UBUNTU:CVE-2017-18270
UBUNTU:USN-3754-1
bnc#1094186
rh#1580979
rh#1660385
rh#1856774
CVE-2017-18344kernel-source-rt:Not affectedimportant7.1 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)BID:104909
CONFIRM:bugzilla.redhat.com:CVE-2018-10877
CONFIRM:bugzilla.redhat.com:CVE-2018-10880
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CVE-2017-18344
CVE-2018-10877
CVE-2018-10880
CVE-2018-10882
CVE-2018-13405
EXPLOIT-DB:45175
L3:66852
MISC:bugs.launchpad.net:OSS:2018/Q3/76
MISC:cdn.kernel.org:CVE-2017-18344
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2017-18344
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:OSS:2018/Q3/76
OSS:2018/Q3/76
OSS:2019/09/17/1
Oracle:CVE-2017-5753
Oracle:CVE-2018-3646
Oracle:CVE-2018-5390
Oracle:CVE-2019-11477
RH:CVE-2017-18344
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
RHSA-2018:3459
RHSA-2018:3540
RHSA-2018:3586
RHSA-2018:3590
RHSA-2018:3591
SECTRACK:1041414
SMASH Issue 211759
SMASH Issue 211888
UBUNTU:CVE-2017-18344
UBUNTU:USN-3742-1
UBUNTU:USN-3742-2
bnc#1102851
bnc#1103203
bnc#1103580
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1573699
rh#1596795
rh#1596812
rh#1596842
rh#1599161
rh#1601704
rh#1609664
rh#1610958
rh#1703063
rh#2027239
rh#2044863
CVE-2017-18551kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N)CONFIRM:support.f5.com:CVE-2017-18551
CVE-2017-18551
MISC:cdn.kernel.org:CVE-2017-18551
MISC:git.kernel.org:CVE-2017-18551
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
OSS:2019/09/17/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2017-18551
RHSA-2020:2104
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:5206
RHSA-2020:5430
RHSA-2020:5656
SMASH Issue 240425
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2017-18551
bnc#1146163
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1731000
rh#1734243
rh#1734246
rh#1743547
rh#1746628
rh#1746732
rh#1757368
rh#1781514
CVE-2017-18552kernel-source-rt:Unsupportedimportant ()CVE-2017-18552
MISC:git.kernel.org:CVE-2017-18552
RH:CVE-2017-18552
SMASH Issue 240426
UBUNTU:CVE-2017-18552
bnc#1146295
rh#1757358
CVE-2017-18595kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2017-18595
MISC:cdn.kernel.org:CVE-2018-18386
MISC:git.kernel.org:CVE-2017-18595
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2017-18595
RHSA-2020:2082
RHSA-2020:2085
RHSA-2020:2104
RHSA-2020:2214
RHSA-2020:2242
RHSA-2020:2277
RHSA-2020:2285
RHSA-2020:2289
RHSA-2020:2522
SMASH Issue 241746
SUSE:openSUSE-SU-2019:2307
SUSE:openSUSE-SU-2019:2308
UBUNTU:CVE-2017-18595
bnc#1149555
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1746732
rh#1757368
rh#1758671
rh#1773519
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1851480
rh#1997467
CVE-2017-2584kernel-source-rt:Not affectedmoderate ()BID:95430
CONFIRM:git.kernel.org:CVE-2017-2584
CVE-2017-2584
D:CVE-2017-2584
DSA-3791
MLIST:[oss-security] 20170113 CVE-2017-2584 Kernel: kvm: use after free in complete_emulated_mmio
OSS:2017/Q1/82
Oracle:CVE-2017-6074
RH:CVE-2017-2584
RHSA-2017:1842
RHSA-2017:2077
SECTRACK:1037603
SMASH Issue 178657
UBUNTU:CVE-2017-2584
bnc#1019851
linux.git:commit:129a72a0d3c8e139a04512325384fe5ac119e74d
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1413001
rh#1435719
rh#1462147
rh#1462158
CVE-2017-2596kernel-source-rt:Already fixedlow ()BID:95878
CVE-2017-2596
DSA-3791
MLIST:[oss-security] 20170131 CVE-2017-2596 Kernel: kvm: page reference leakage in handle_vmon
OSS:2017/Q1/237
Oracle:CVE-2017-6074
RH:CVE-2017-2596
RHSA-2017:1842
RHSA-2017:2077
SMASH Issue 179618
UBUNTU:CVE-2017-2596
bnc#1022785
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1417812
rh#1435719
rh#1462147
rh#1462158
CVE-2017-2671kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:97407
CONFIRM:git.kernel.org:CVE-2017-2671
CONFIRM:github.com:CVE-2017-2671
CVE-2017-2671
EXPLOIT-DB:42135
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:github.com:CVE-2017-2671
MISC:twitter.com:CVE-2017-2671
MLIST:[oss-security] 20170404 Re: Linux kernel ping socket / AF_LLC connect() sin_family race
OSS:2017/Q2/17
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-2671
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
RHSA-2018:1854
SMASH Issue 182286
UBUNTU:CVE-2017-2671
UBUNTU:USN-3754-1
bnc#1031003
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1435719
rh#1436649
rh#1439087
rh#1462147
rh#1462158
rh#1481178
CVE-2017-5547kernel-source-rt:Unsupportedlow ()BID:95709
CONFIRM:git.kernel.org:CVE-2017-5547
CONFIRM:github.com:CVE-2017-5547
CONFIRM:www.kernel.org:CVE-2017-5551
CVE-2017-5547
MLIST:[oss-security] 20170120 Re: CVE REQUEST: linux kernel: process with pgid zero able to crash kernel
OSS:2017/Q1/161
RH:CVE-2017-5547
SMASH Issue 178974
UBUNTU:CVE-2017-5547
bnc#1021252
rh#1416096
CVE-2017-5576kernel-source-rt:Already fixedlow ()BID:95765
BID:95767
CONFIRM:git.kernel.org:CVE-2017-5576
CONFIRM:git.kernel.org:CVE-2017-5577
CONFIRM:github.com:CVE-2017-5576
CONFIRM:github.com:CVE-2017-5577
CONFIRM:www.kernel.org:CVE-2017-6001
CVE-2017-5576
CVE-2017-5577
D:CVE-2017-5576
D:CVE-2017-5577
MLIST:[linux-kernel] 20170118 [PATCH 1/2] drm/vc4: Fix an integer overflow in temporary allocation layout.
MLIST:[linux-kernel] 20170118 [PATCH 2/2] drm/vc4: Return -EINVAL on the overflow checks failing.
MLIST:[oss-security] 20170122 CVE request: Linux kernel: vc4: int overflow leading to heap-based buffer overflow
OSS:2017/Q1/174
Oracle:CVE-2017-6074
RH:CVE-2017-5576
RH:CVE-2017-5577
SMASH Issue 178984
UBUNTU:CVE-2017-5576
UBUNTU:CVE-2017-5577
bnc#1021294
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1416436
rh#1416437
rh#1435719
rh#1462147
rh#1462158
CVE-2017-5577kernel-source-rt:Already fixedlow ()BID:95765
BID:95767
CONFIRM:git.kernel.org:CVE-2017-5576
CONFIRM:git.kernel.org:CVE-2017-5577
CONFIRM:github.com:CVE-2017-5576
CONFIRM:github.com:CVE-2017-5577
CONFIRM:www.kernel.org:CVE-2017-6001
CVE-2017-5576
CVE-2017-5577
D:CVE-2017-5576
D:CVE-2017-5577
MLIST:[linux-kernel] 20170118 [PATCH 1/2] drm/vc4: Fix an integer overflow in temporary allocation layout.
MLIST:[linux-kernel] 20170118 [PATCH 2/2] drm/vc4: Return -EINVAL on the overflow checks failing.
MLIST:[oss-security] 20170122 CVE request: Linux kernel: vc4: int overflow leading to heap-based buffer overflow
OSS:2017/Q1/174
Oracle:CVE-2017-6074
RH:CVE-2017-5576
RH:CVE-2017-5577
SMASH Issue 178984
UBUNTU:CVE-2017-5576
UBUNTU:CVE-2017-5577
bnc#1021294
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1416436
rh#1416437
rh#1435719
rh#1462147
rh#1462158
CVE-2017-5601libarchive:Releasedmoderate4.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L)BID:95837
CVE-2017-5601
D:CVE-2017-5601
L3:61452
MISC:github.com:CVE-2017-5601
MISC:secunia.com
RH:CVE-2017-5601
SECTRACK:1037974
SMASH Issue 179494
UBUNTU:CVE-2017-5601
bnc#1022528
bnc#1189528
jsc#CAR-1656
rh#1417912
CVE-2017-5618screen:Not affectedimportant ()BID:95873
CONFIRM:git.savannah.gnu.org:CVE-2017-5618
CONFIRM:savannah.gnu.org:CVE-2017-5618
CVE-2017-5618
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[oss-security] 20170129 Re: CVE request: GNU screen escalation
MLIST:[screen-devel] 20170124 [bug #50142] root exploit 4.5.0
OSS:2017/Q1/224
RH:CVE-2017-5618
SMASH Issue 179086
SMASH Issue 179552
UBUNTU:CVE-2017-5618
bnc#1021743
oss-sec-2017-q1-181
rh#1416704
CVE-2017-5669kernel-source-rt:Not affectedmoderate ()BID:96754
CONFIRM:github.com:CVE-2017-5669
CVE-2017-5669
DSA-3804
MISC:bugzilla.kernel.org:CVE-2017-5669
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:github.com:CVE-2017-5669
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-5669
SECTRACK:1037918
SMASH Issue 180914
UBUNTU:CVE-2017-5669
UBUNTU:USN-3583-1
UBUNTU:USN-3583-2
bnc#1026914
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1427239
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1481178
CVE-2017-5897kernel-source-rt:Not affectedmoderate3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)BID:96037
CONFIRM:git.kernel.org:CVE-2017-5897
CONFIRM:source.android.com:CVE-2017-6983
CVE-2017-5897
DSA-3791
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:MLIST:[oss-security] 20170207 Re: CVE Request: Linux: ip6_gre: invalid reads in ip6gre_err()
MLIST:[oss-security] 20170207 Re: CVE Request: Linux: ip6_gre: invalid reads in ip6gre_err()
OSS:2017/Q1/327
Oracle:CVE-2017-6074
RH:CVE-2017-5897
SECTRACK:1037794
SMASH Issue 179985
UBUNTU:CVE-2017-5897
UBUNTU:USN-3754-1
bnc#1023762
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1419848
rh#1420236
rh#1435719
rh#1462147
rh#1462158
CVE-2017-5932bash:Not affectedmoderate ()BID:96136
CONFIRM:git.savannah.gnu.org:CVE-2017-5932
CVE-2017-5932
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MLIST:[bug-bash] 20170120 Bash-4.4 Official Patch 7
MLIST:[oss-security] 20170207 Re: CVE Request - Code execution vulnerability in GNU/bash v4.4 autocompletion
OSS:2017/Q1/338
RH:CVE-2017-5932
SMASH Issue 180048
UBUNTU:CVE-2017-5932
bnc#1024171
rh#1420674
CVE-2017-5967kernel-source-rt:Not affectedlow ()BID:96271
CONFIRM:git.kernel.org:CVE-2017-5967
CVE-2017-5967
D:CVE-2017-5967
MISC:bugzilla.kernel.org:CVE-2017-5967
RH:CVE-2017-5967
SMASH Issue 180515
UBUNTU:CVE-2017-5967
bnc#1025209
rh#1422138
CVE-2017-5970kernel-source-rt:Already fixedimportant ()BID:96233
CONFIRM:git.kernel.org:CVE-2017-5970
CONFIRM:github.com:CVE-2017-5970
CONFIRM:patchwork.ozlabs.org:CVE-2017-5970
CONFIRM:source.android.com:CVE-2017-6074
CVE-2017-5970
D:CVE-2017-5970
DSA-3791
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:git.kernel.org:OSS:2020/Q1/69
MLIST:[oss-security] 20170212 Fwd: [scr293903] Linux kernel - upstream
OSS:2017/Q1/414
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-5970
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
SMASH Issue 180357
UBUNTU:CVE-2017-5970
bnc#1024938
bnc#1025013
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1421638
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1481178
CVE-2017-5972kernel-source-rt:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:96231
CVE-2017-5972
D:CVE-2017-5972
EXPLOIT-DB:41350
MISC:access.redhat.com:CVE-2017-5972
MISC:cxsecurity.com:CVE-2017-5972
MISC:githubengineering.com:CVE-2017-5972
MISC:packetstormsecurity.com:CVE-2017-5972
MISC:security-tracker.debian.org:CVE-2017-5972
OSS:2017/Q1/573
RH:CVE-2017-5972
SMASH Issue 180516
UBUNTU:CVE-2017-5972
bnc#1026173
rh#1422081
rh#1428684
CVE-2017-6001kernel-source-rt:Not affectedmoderate ()BID:94679
BID:96264
CONFIRM:git.kernel.org:CVE-2016-6787
CONFIRM:git.kernel.org:CVE-2017-6001
CONFIRM:github.com:CVE-2016-6787
CONFIRM:github.com:CVE-2017-6001
CONFIRM:source.android.com:CVE-2016-9120
CONFIRM:source.android.com:CVE-2017-6001
CONFIRM:www.kernel.org:CVE-2017-6001
CVE-2016-6786
CVE-2016-6787
CVE-2017-6001
D:CVE-2016-6787
D:CVE-2017-6001
DSA-3791
MLIST:[oss-security] 20170216 Linux: CVE-2017-6001: Incomplete fix for CVE-2016-6786: perf/core: Fix concurrent sys_perf_event_open() vs. 'move_group' race
OSS:2017/Q1/446
RH:CVE-2016-6786
RH:CVE-2016-6787
RH:CVE-2017-6001
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
RHSA-2018:1854
SMASH Issue 177440
SMASH Issue 177441
SMASH Issue 180623
UBUNTU:CVE-2016-6786
UBUNTU:CVE-2016-6787
UBUNTU:CVE-2017-6001
bnc#1015160
bnc#1025626
rh#1403842
rh#1422825
CVE-2017-6004pcre:Already fixedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:96295
CONFIRM:bugs.exim.org:CVE-2017-6004
CONFIRM:vcs.pcre.org:CVE-2017-6004
CVE-2017-6004
D:CVE-2017-6004
GENTOO:GLSA-201706-11
L3:61083
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
RH:CVE-2017-6004
RHSA-2018:2486
SECTRACK:1037850
SMASH Issue 180627
UBUNTU:CVE-2017-6004
bnc#1025709
bnc#1187847
rh#1425365
CVE-2017-6074kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:96310
CONFIRM:github.com:CVE-2017-6074
CONFIRM:source.android.com:CVE-2017-6074
CONFIRM:www.oracle.com:CVE-2018-3081
CONFIRM:www.tenable.com:CVE-2017-6074
CVE-2017-6074
D:CVE-2017-6074
DSA-3791
EXPLOIT-DB:41457
EXPLOIT-DB:41458
L3:47918
MISC:git.kernel.org:MLIST:[oss-security] 20170222 Linux kernel: CVE-2017-6074: DCCP double-free vulnerability (local root)
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:www.cve.mitre.org:MLIST:[oss-security] 20170222 Linux kernel: CVE-2017-6074: DCCP double-free vulnerability (local root)
MLIST:[oss-security] 20170222 Linux kernel: CVE-2017-6074: DCCP double-free vulnerability (local root)
OSS:2017/Q1/471
OSS:2017/Q3/182
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-6074
RHSA-2017:0293
RHSA-2017:0294
RHSA-2017:0295
RHSA-2017:0316
RHSA-2017:0323
RHSA-2017:0324
RHSA-2017:0345
RHSA-2017:0346
RHSA-2017:0347
RHSA-2017:0365
RHSA-2017:0366
RHSA-2017:0403
RHSA-2017:0501
RHSA-2017:0932
RHSA-2017:1209
SECTRACK:1037876
SMASH Issue 180671
SMASH Issue 183334
UBUNTU:CVE-2017-6074
bnc#1026024
bnc#1033287
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1423071
rh#1425406
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1481178
CVE-2017-6214kernel-source-rt:Already fixedmoderate ()BID:96421
CONFIRM:git.kernel.org:CVE-2017-6214
CONFIRM:github.com:CVE-2017-6214
CONFIRM:source.android.com:CVE-2017-6983
CONFIRM:www.kernel.org:CVE-2017-6214
CVE-2017-6214
D:CVE-2017-6214
DSA-3804
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2017/Q1/491
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-6214
RHSA-2017:1372
RHSA-2017:1615
RHSA-2017:1616
RHSA-2017:1647
SECTRACK:1037897
SMASH Issue 180876
UBUNTU:CVE-2017-6214
bnc#1026722
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1426542
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1481178
CVE-2017-6345kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:96510
CONFIRM:git.kernel.org:CVE-2017-6345
CONFIRM:github.com:CVE-2017-6345
CONFIRM:www.kernel.org:CVE-2017-6348
CVE-2017-6345
D:CVE-2017-6345
DSA-3804
MLIST:[oss-security] 20170228 Linux: net/llc: avoid BUG_ON() in skb_orphan() (CVE-2017-6345)
OSS:2017/Q1/527
Oracle:CVE-2017-6074
RH:CVE-2017-6345
SMASH Issue 180980
UBUNTU:CVE-2017-6345
bnc#1027190
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1428485
rh#1435719
rh#1462147
rh#1462158
CVE-2017-6346kernel-source-rt:Already fixedlow ()BID:96508
CONFIRM:git.kernel.org:CVE-2017-6346
CONFIRM:github.com:CVE-2017-6346
CONFIRM:source.android.com:CVE-2017-6983
CONFIRM:www.kernel.org:CVE-2017-6348
CVE-2017-6346
D:CVE-2017-6346
DSA-3804
MLIST:[oss-security] 20170228 Linux: packet: fix races in fanout_add() (CVE-2017-6346)
OSS:2017/Q1/526
Oracle:CVE-2017-6074
RH:CVE-2017-6346
RHSA-2018:0151
RHSA-2018:0152
RHSA-2018:0181
SMASH Issue 180981
UBUNTU:CVE-2017-6346
bnc#1027189
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1428487
rh#1435719
rh#1462147
rh#1462158
rh#1504574
CVE-2017-6347kernel-source-rt:Already fixedlow ()BID:96487
CONFIRM:git.kernel.org:CVE-2017-6347
CONFIRM:github.com:CVE-2017-6347
CONFIRM:www.kernel.org:CVE-2017-6347
CVE-2017-6347
D:CVE-2017-6347
MISC:git.kernel.org:OSS:2020/Q1/69
MLIST:[oss-security] 20170228 Linux: ip: fix IP_CHECKSUM handling (CVE-2017-6347)
OSS:2017/Q1/525
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-6347
SMASH Issue 180982
UBUNTU:CVE-2017-6347
bnc#1027179
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1427984
rh#1435719
rh#1462147
rh#1462158
rh#1481178
CVE-2017-6348kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:96483
CONFIRM:git.kernel.org:CVE-2017-6348
CONFIRM:github.com:CVE-2017-6348
CONFIRM:www.kernel.org:CVE-2017-6348
CVE-2017-6348
D:CVE-2017-6348
DSA-3804
MISC:git.kernel.org:OSS:2020/Q1/69
MLIST:[oss-security] 20170228 Linux: irda: Fix lockdep annotations in hashbin_delete() (CVE-2017-6348)
OSS:2017/Q1/524
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-6348
SMASH Issue 180983
UBUNTU:CVE-2017-6348
UBUNTU:USN-3754-1
bnc#1027178
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1428491
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1481178
CVE-2017-6353kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)BID:96473
CONFIRM:git.kernel.org:CVE-2017-6353
CONFIRM:github.com:CVE-2017-6353
CVE-2017-6353
D:CVE-2017-6353
DSA-3804
MISC:git.kernel.org:OSS:2020/Q1/69
MLIST:[oss-security] 20170227 Linux: CVE-2017-6353: sctp: deny peeloff operation on asocs with threads sleeping on it
OSS:2017/Q1/518
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-6353
SMASH Issue 180960
UBUNTU:CVE-2017-6353
bnc#1027066
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1428907
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1481178
CVE-2017-6421kernel-source-rt:Analysismoderate ()CONFIRM:source.android.com:CVE-2017-6421
CVE-2017-6421
D:CVE-2017-6421
MISC:source.codeaurora.org:CVE-2017-6421
SECTRACK:1038623
SMASH Issue 190604
bnc#1054134
CVE-2017-7184kernel-source-rt:Already fixedmoderate ()BID:97018
CONFIRM:git.kernel.org:CVE-2017-7184
CONFIRM:openwall.com:CVE-2017-7184
CONFIRM:source.android.com:CVE-2017-0635
CVE-2017-7184
D:CVE-2017-7184
MISC:blog.trendmicro.com:CVE-2017-7184
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:twitter.com:CVE-2017-7184
MISC:www.eweek.com:CVE-2017-7184
OSS:2017/Q1/660
OSS:2017/Q1/689
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-7184
RHSA-2017:2918
RHSA-2017:2930
RHSA-2017:2931
RHSA-2019:4159
SECTRACK:1038166
SMASH Issue 182021
UBUNTU:CVE-2017-7184
ZDI-17-240
bnc#1030573
linux.git:commit:677e806da4d916052585301785d847c3b3e6186a
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:f843ee6dd019bcece3e74e76ad9df0155655d0df
rh#1435153
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1481178
CVE-2017-7186pcre:Not affectedmoderate ()BID:97030
CONFIRM:bugs.exim.org:CVE-2017-7186
CONFIRM:vcs.pcre.org:CVE-2017-7186
CVE-2017-7186
GENTOO:GLSA-201710-09
GENTOO:GLSA-201710-25
MISC:blogs.gentoo.org:CVE-2017-7186
OSS:2017/Q1/649
RH:CVE-2017-7186
RHSA-2018:2486
SMASH Issue 182023
UBUNTU:CVE-2017-7186
bnc#1030066
rh#1434504
CVE-2017-7187kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)BID:96989
CONFIRM:source.android.com:CVE-2017-11067
CVE-2017-7187
D:CVE-2017-7187
MISC:gist.github.com:CVE-2017-10962
MISC:gist.github.com:CVE-2017-7187
MISC:gist.github.com:CVE-2017-9615
MISC:git.kernel.org:CVE-2017-7187
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-7187
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
SECTRACK:1038086
SMASH Issue 182037
UBUNTU:CVE-2017-7187
bnc#1030213
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1434327
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1481178
CVE-2017-7261kernel-source-rt:Already fixedmoderate ()BID:97096
CVE-2017-7261
D:CVE-2017-7261
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:lists.freedesktop.org:CVE-2017-7261
MISC:marc.info:CVE-2017-7261
OSS:2017/Q1/684
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-7261
SMASH Issue 182284
UBUNTU:CVE-2017-7261
bnc#1031052
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1481178
CVE-2017-7273kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:97190
CONFIRM:git.kernel.org:CVE-2017-7273
CONFIRM:github.com:CVE-2017-7273
CONFIRM:www.kernel.org:CVE-2017-7273
CVE-2017-7273
D:CVE-2017-7273
OSS:2018/09/18/4
RH:CVE-2017-7273
SMASH Issue 182331
UBUNTU:CVE-2017-7273
bnc#1031240
bnc#1066674
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1437435
rh#1575866
rh#1609664
rh#1660375
rh#1660385
rh#1667782
rh#1686136
rh#1701224
rh#1701842
rh#1890354
CVE-2017-7308kernel-source-rt:Already fixedmoderate ()BID:97234
CONFIRM:patchwork.ozlabs.org:CVE-2017-7308
CONFIRM:source.android.com:CVE-2017-6074
CVE-2017-7308
D:CVE-2017-7308
EXPLOIT-DB:41994
EXPLOIT-DB:44654
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:googleprojectzero.blogspot.com:CVE-2017-7308
MISC:www.cve.mitre.org
OSS:2017/Q1/697
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-7308
RHSA-2017:1297
RHSA-2017:1298
RHSA-2017:1308
RHSA-2018:1854
SMASH Issue 182439
UBUNTU:CVE-2017-7308
bnc#1031579
linux.git:commit:873d50d58f67ef15d2777b5e7f7a5268bb1fbae2
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1435719
rh#1437404
rh#1439087
rh#1462147
rh#1462158
rh#1481178
CVE-2017-7346kernel-source-rt:Already fixedmoderate ()BID:97257
CONFIRM:lists.freedesktop.org:CVE-2017-7346
CONFIRM:marc.info:CVE-2017-7346
CVE-2017-7346
D:CVE-2017-7346
DSA-3927
DSA-3945
OSS:2017/Q1/696
Oracle:CVE-2017-6074
RH:CVE-2017-7346
SMASH Issue 182500
UBUNTU:CVE-2017-7346
bnc#1031796
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1435719
rh#1437431
rh#1462147
rh#1462158
CVE-2017-7374kernel-source-rt:Already fixedmoderate ()BID:97308
CONFIRM:git.kernel.org:CVE-2017-14991
CONFIRM:git.kernel.org:CVE-2017-7374
CONFIRM:github.com:CVE-2017-7374
CONFIRM:source.android.com:CVE-2017-14496
CONFIRM:www.kernel.org:CVE-2017-14991
CONFIRM:www.kernel.org:CVE-2017-7374
CVE-2017-7374
D:CVE-2017-7374
Oracle:CVE-2017-6074
RH:CVE-2017-7374
SMASH Issue 182571
UBUNTU:CVE-2017-7374
bnc#1032006
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1435719
rh#1438394
rh#1462147
rh#1462158
CVE-2017-7472kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)BID:98422
CONFIRM:bugzilla.novell.com:CVE-2017-7472
CONFIRM:git.kernel.org:CVE-2017-7472
CONFIRM:lkml.org:CVE-2017-7472
CONFIRM:openwall.com:CVE-2017-7472
CONFIRM:patchwork.ozlabs.org:CVE-2017-7487
CONFIRM:www.kernel.org:CVE-2017-7472
CVE-2017-7472
D:CVE-2017-7472
DSA-5378
EXPLOIT-DB:42136
MISC:git.kernel.org
OSS:2017/Q2/246
OSS:2017/Q2/251
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-7472
RHSA-2018:0151
RHSA-2018:0152
RHSA-2018:0181
SECTRACK:1038471
SMASH Issue 183784
SUSE:SUSE-SU-2018:0011
UBUNTU:CVE-2017-7472
bdo#1033297
bnc#1034862
linux.git:commit:c9f838d104fed6f2f61d68164712e3204bf5271b
linux.git:commit:f205b5dc1c9e62237ac6e21642724d8cbc85f7ee
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1442086
rh#1447734
rh#1519780
rh#1609664
rh#1660375
rh#1660385
rh#1667782
rh#1686136
rh#1701224
rh#1701842
rh#2061700
rh#2119127
CVE-2017-7482kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)BID:99299
CONFIRM:bugzilla.redhat.com:CVE-2017-7482
CONFIRM:git.kernel.org:CVE-2017-7482
CVE-2017-7482
DEBIAN:DSA-3927
DEBIAN:DSA-3945
DSA-3927
DSA-3945
DSA-5378
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2017/Q2/602
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
Oracle:CVE-2017-6074
RH:CVE-2017-7482
RHSA-2019:0641
SECTRACK:1038787
SMASH Issue 187296
UBUNTU:CVE-2017-7482
bdo#1033297
bnc#1046107
linux.git:commit:5f2f97656ada8d811d3c1bef503ced266fcd53a0
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1435719
rh#1439087
rh#1446288
rh#1462147
rh#1462158
rh#1481178
rh#1519780
rh#2061700
rh#2119127
CVE-2017-7495kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)BID:98491
CONFIRM:git.kernel.org:CVE-2017-7495
CONFIRM:github.com:CVE-2017-7495
CONFIRM:source.android.com:CVE-2017-6983
CONFIRM:www.kernel.org:CVE-2017-7495
CONFIRM:www.openwall.com
CVE-2017-7495
MISC:git.kernel.org:CONFIRM:www.openwall.com
OSS:2017/Q2/259
RH:CVE-2017-7495
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
SMASH Issue 185285
UBUNTU:CVE-2017-7495
bnc#1039010
rh#1450261
CVE-2017-7518kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)BID:99263
CONFIRM:access.redhat.com:CVE-2017-7518
CONFIRM:bugzilla.redhat.com:CVE-2017-7518
CVE-2017-7518
DEBIAN:DSA-3981
DSA-3981
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:xenbits.xen.org:MLIST:[oss-security] 20170623 CVE-2017-7518 Kernel: KVM: debug exception via syscall emulation
MLIST:[kvm] 20170622 [PATCH] KVM: x86: fix singlestepping over syscall
MLIST:[oss-security] 20170623 CVE-2017-7518 Kernel: KVM: debug exception via syscall emulation
OSS:2017/Q2/574
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
RH:CVE-2017-7518
RHSA-2018:0395
RHSA-2018:0412
SECTRACK:1038782
SMASH Issue 187258
UBUNTU:CVE-2017-7518
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3754-1
bdo#866511
bdo#875881
bnc#1045922
linux.git:commit:c8401dda2f0a00cd25c0af6a95ed50e478d25de4
rh#1462147
rh#1462158
rh#1464473
rh#1481178
CVE-2017-7533kernel-source-rt:Already fixedimportant7.4 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)BID:100123
CONFIRM:source.android.com:CVE-2017-6276
CVE-2017-7533
DSA-3927
DSA-3945
MISC:git.kernel.org:CVE-2017-7533
MISC:git.kernel.org:MISC:www.openwall.com:OSS:2019/Q2/230
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:github.com:CVE-2017-7533
MISC:openwall.com:CVE-2017-7533
MISC:patchwork.kernel.org:MISC:www.openwall.com:OSS:2019/Q2/230
MISC:www.mail-archive.com:/linux-kernel%40vger.kernel.org/msg1408967.html
MISC:www.mail-archive.com:CVE-2017-7533
MISC:www.openwall.com:MLIST:[oss-security] 20190627 Re: linux-distros membership application - Microsoft
MLIST:[oss-security] 20190627 Re: linux-distros membership application - Microsoft
MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft
OSS:2017/Q3/240
OSS:2017/Q4/269
OSS:2019/Q2/230
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-7533
RHSA-2017:2473
RHSA-2017:2585
RHSA-2017:2669
RHSA-2017:2770
RHSA-2017:2869
SECTRACK:1039075
SMASH Issue 189178
UBUNTU:CVE-2017-7533
bnc#1049483
bnc#1050677
bnc#1050751
bnc#1102721
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1468283
rh#1481178
CVE-2017-7541kernel-source-rt:Already fixedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:99955
CONFIRM:git.kernel.org:CVE-2017-7541
CONFIRM:github.com:CVE-2017-7541
CONFIRM:openwall.com:CVE-2017-7541
CONFIRM:source.android.com:CVE-2017-6264
CONFIRM:www.kernel.org:CVE-2017-7541
CONFIRM:www.spinics.net:CVE-2017-7541
CVE-2017-7541
D:CVE-2017-7541
DSA-3927
DSA-3945
MISC:git.kernel.org
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2017/Q3/208
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
RH:CVE-2017-7541
RHSA-2017:2863
RHSA-2017:2918
RHSA-2017:2930
RHSA-2017:2931
SECTRACK:1038981
SMASH Issue 188815
UBUNTU:CVE-2017-7541
bnc#1049645
rh#1462147
rh#1462158
rh#1473198
rh#1481178
CVE-2017-7542kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:99953
CONFIRM:git.kernel.org:CVE-2017-7542
CONFIRM:github.com:CVE-2017-7542
CONFIRM:help.ecostruxureit.com:CVE-2017-5754
CVE-2017-7542
D:CVE-2017-7542
DSA-3927
DSA-3945
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-7542
RHSA-2017:2918
RHSA-2017:2930
RHSA-2017:2931
RHSA-2018:0169
SMASH Issue 188934
UBUNTU:CVE-2017-7542
UBUNTU:USN-3583-1
UBUNTU:USN-3583-2
bnc#1049882
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1435719
rh#1439087
rh#1462147
rh#1462158
rh#1473649
rh#1481178
CVE-2017-7558kernel-source-rt:Unsupportedmoderate ()BID:100466
CONFIRM:bugzilla.redhat.com:CVE-2017-7558
CVE-2017-7558
DEBIAN:DSA-3981
DSA-3981
MLIST:[linux-netdev] 20170823 [PATCH net] sctp: Avoid out-of-bounds reads from address storage
OSS:2017/Q3/338
RH:CVE-2017-7558
RHSA-2017:2918
RHSA-2017:2930
RHSA-2017:2931
SECTRACK:1039221
SMASH Issue 190912
UBUNTU:CVE-2017-7558
bdo#866511
bdo#875881
bnc#1055300
linux.git:commit:ee6c88bb754e3d363e568da78086adfedb692447
rh#1480266
CVE-2017-7616ltp:Releasedlow4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)BID:97527
CONFIRM:git.kernel.org:CVE-2017-7616
CONFIRM:github.com:CVE-2017-7616
CVE-2017-7616
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-7616
RHSA-2017:1842
RHSA-2017:2077
RHSA-2018:1854
SECTRACK:1038503
SMASH Issue 183348
UBUNTU:CVE-2017-7616
bnc#1033336
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1435719
rh#1439087
rh#1441088
rh#1462147
rh#1462158
rh#1481178
CVE-2017-7889kernel-source-rt:Not affectedmoderate5.9 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)BID:97690
CVE-2017-7889
DSA-3945
MISC:git.kernel.org:CVE-2017-7889
MISC:git.kernel.org:MISC:www.openwall.com
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:github.com:CVE-2017-7889
MISC:www.openwall.com
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
RH:CVE-2017-7889
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
RHSA-2018:1854
SMASH Issue 183720
UBUNTU:CVE-2017-7889
UBUNTU:USN-3583-1
UBUNTU:USN-3583-2
bnc#1034405
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=b8f254aa17f720053054c4ecff3920973a83b9d6
rh#1444493
rh#1462147
rh#1462158
rh#1481178
CVE-2017-7895kernel-source-rt:Ignoremoderate ()BID:98085
CONFIRM:git.kernel.org:CVE-2017-7895
CONFIRM:github.com:CVE-2017-12852
CONFIRM:github.com:CVE-2017-7895
CVE-2017-7895
D:CVE-2017-7895
DSA-3886
OSS:2017/Q2/196
RH:CVE-2017-7895
RHSA-2017:1615
RHSA-2017:1616
RHSA-2017:1647
RHSA-2017:1715
RHSA-2017:1723
RHSA-2017:1766
RHSA-2017:1798
RHSA-2017:2412
RHSA-2017:2428
RHSA-2017:2429
RHSA-2017:2472
RHSA-2017:2732
SMASH Issue 184482
UBUNTU:CVE-2017-7895
bnc#1036741
rh#1446103
CVE-2017-7979kernel-source-rt:Unsupportedmoderate ()BID:97969
CVE-2017-7979
D:CVE-2017-7979
MISC:bugs.launchpad.net:CVE-2017-7979
MISC:bugzilla.proxmox.com:CVE-2017-7979
MISC:marc.info:CVE-2017-7979
MISC:www.cve.mitre.org
OSS:2017/Q2/98
RH:CVE-2017-7979
SMASH Issue 183859
UBUNTU:CVE-2017-7979
bnc#1035107
linux.git:commit:e0535ce58b92d7baf0b33284a6c4f8f0338f943e
rh#1444501
CVE-2017-8061kernel-source-rt:Unsupportedlow ()BID:97972
CONFIRM:git.kernel.org:CVE-2017-8061
CONFIRM:github.com:CVE-2017-8061
CONFIRM:www.kernel.org:CVE-2017-8061
CVE-2017-8061
RH:CVE-2017-8061
SMASH Issue 184092
UBUNTU:CVE-2017-8061
bnc#1035693
rh#1445333
CVE-2017-8062kernel-source-rt:Unsupportedlow ()BID:97973
CONFIRM:git.kernel.org:CVE-2017-8062
CONFIRM:github.com:CVE-2017-8062
CONFIRM:www.kernel.org:CVE-2017-8925
CVE-2017-8062
MISC:www.openwall.com
RH:CVE-2017-8062
SMASH Issue 184093
UBUNTU:CVE-2017-8062
bnc#1035691
rh#1445332
CVE-2017-8063kernel-source-rt:Unsupportedlow ()BID:97974
CONFIRM:git.kernel.org:CVE-2017-8063
CONFIRM:github.com:CVE-2017-8063
CONFIRM:www.kernel.org:CVE-2017-8067
CVE-2017-8063
MISC:www.openwall.com
RH:CVE-2017-8063
SMASH Issue 184094
UBUNTU:CVE-2017-8063
bnc#1035689
rh#1445334
CVE-2017-8064kernel-source-rt:Unsupportedlow ()BID:97975
CONFIRM:git.kernel.org:CVE-2017-8064
CONFIRM:github.com:CVE-2017-8064
CONFIRM:www.kernel.org:CVE-2017-8067
CVE-2017-8064
DSA-3886
MISC:www.openwall.com
RH:CVE-2017-8064
SMASH Issue 184095
UBUNTU:CVE-2017-8064
bnc#1035681
rh#1445336
CVE-2017-8066kernel-source-rt:Unsupportedlow ()BID:97992
CONFIRM:git.kernel.org:CVE-2017-8066
CONFIRM:github.com:CVE-2017-8066
CONFIRM:www.kernel.org:CVE-2017-8066
CVE-2017-8066
RH:CVE-2017-8066
SMASH Issue 184097
UBUNTU:CVE-2017-8066
bnc#1035672
rh#1445339
CVE-2017-8067kernel-source-rt:Unsupportedlow ()BID:97997
CONFIRM:git.kernel.org:CVE-2017-8067
CONFIRM:github.com:CVE-2017-8067
CONFIRM:www.kernel.org:CVE-2017-8067
CVE-2017-8067
MISC:www.openwall.com
RH:CVE-2017-8067
SMASH Issue 184098
UBUNTU:CVE-2017-8067
bnc#1035670
rh#1445340
CVE-2017-8068kernel-source-rt:Unsupportedlow ()BID:98000
BID:98008
CONFIRM:git.kernel.org:CVE-2017-8068
CONFIRM:github.com:CVE-2017-8068
CVE-2017-8068
RH:CVE-2017-8068
SMASH Issue 184099
UBUNTU:CVE-2017-8068
bnc#1035669
rh#1445341
CVE-2017-8069kernel-source-rt:Unsupportedlow ()BID:38656
BID:68031
BID:76504
BID:91802
BID:92969
BID:95453
BID:96221
BID:96423
BID:97707
BID:99599
CONFIRM:asuswrt.lostrealm.ca:CVE-2017-6549
CONFIRM:framework.zend.com:CVE-2014-4914
CONFIRM:framework.zend.com:CVE-2016-6233
CONFIRM:git.kernel.org:CVE-2017-8069
CONFIRM:github.com:CVE-2013-7450
CONFIRM:github.com:CVE-2015-6521
CONFIRM:github.com:CVE-2015-6748
CONFIRM:github.com:CVE-2016-1505
CONFIRM:github.com:CVE-2016-3095
CONFIRM:github.com:CVE-2016-7405
CONFIRM:github.com:CVE-2017-8069
CONFIRM:hibernate.atlassian.net:CVE-2015-6748
CONFIRM:issues.jboss.org:CVE-2015-6748
CONFIRM:mantisbt.org:CVE-2017-7615
CONFIRM:pulp.plan.io:CVE-2016-3106
CONFIRM:www.atutor.ca:CVE-2017-1000004
CVE-2010-0971
CVE-2010-4179
CVE-2011-2683
CVE-2011-2684
CVE-2013-7450
CVE-2014-4914
CVE-2014-8603
CVE-2014-8604
CVE-2014-8605
CVE-2014-8606
CVE-2014-8607
CVE-2015-5192
CVE-2015-6521
CVE-2015-6748
CVE-2015-9228
CVE-2015-9230
CVE-2016-1505
CVE-2016-3095
CVE-2016-3106
CVE-2016-6233
CVE-2016-7405
CVE-2016-7904
CVE-2016-9121
CVE-2017-1000002
CVE-2017-1000003
CVE-2017-1000004
CVE-2017-10671
CVE-2017-11344
CVE-2017-11345
CVE-2017-11420
CVE-2017-14120
CVE-2017-14121
CVE-2017-14122
CVE-2017-14650
CVE-2017-5940
CVE-2017-6298
CVE-2017-6548
CVE-2017-7615
CVE-2017-8069
D:CVE-2016-1505
D:CVE-2016-7405
D:CVE-2016-7904
D:CVE-2017-11420
D:CVE-2017-5940
D:CVE-2017-7615
D:CVE-2017-8069
DEBIAN:DSA-3265
DEBIAN:DSA-4276
DSA-3265
DSA-3846
DSA-4276
EXPLOIT-DB:11685
EXPLOIT-DB:41573
EXPLOIT-DB:41890
FEDORA:FEDORA-2016-c5ec2c17e6
FEDORA:FEDORA-2016-f75bd73891
FEDORA:FEDORA-2019-7d7083b8be
GENTOO:GLSA-201702-03
JVN:JVN#71730320
MISC:bierbaumer.net:CVE-2017-6548
MISC:bugs.launchpad.net:CVE-2011-2683
MISC:bugs.launchpad.net:CVE-2011-2684
MISC:bugs.launchpad.net:MISC:www.openwall.com
MISC:build.opensuse.org:MISC:www.openwall.com
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:cxsecurity.com:CVE-2015-9230
MISC:cybersecurityworks.com:CVE-2015-9228
MISC:cybersecurityworks.com:CVE-2015-9230
MISC:dev.cmsmadesimple.org:CVE-2016-7904
MISC:firejail.wordpress.com:CVE-2017-5940
MISC:forum.ait-pro.com:CVE-2015-9230
MISC:framework.zend.com:MISC:www.openwall.com
MISC:github.com:CVE-2015-9228
MISC:github.com:CVE-2015-9230
MISC:github.com:CVE-2016-9121
MISC:github.com:CVE-2017-10671
MISC:github.com:CVE-2017-5940
MISC:github.com:CVE-2017-6306
MISC:github.com:MISC:www.openwall.com
MISC:github.com:MLIST:[oss-security] 20140613 Re: CVE Request: Horde_Ldap: Stricter parameter check in bind() to detect empty passwords
MISC:github.com:MLIST:[oss-security] 20160907 ADOdb PDO driver: incorrect quoting may allow SQL injection
MISC:hackerone.com:CVE-2016-9121
MISC:hyp3rlinx.altervista.org:CVE-2017-7615
MISC:marc.info
MISC:marc.info:CVE-2017-14650
MISC:osvdb.org:MISC:www.openwall.com:CVE-2012-4519
MISC:packetstormsecurity.com:CVE-2015-9228
MISC:packetstormsecurity.com:CVE-2015-9230
MISC:packetstormsecurity.com:CVE-2017-7615
MISC:packetstormsecurity.org:CVE-2010-0971
MISC:raw.githubusercontent.com
MISC:secunia.com:MISC:www.openwall.com:CVE-2012-4519
MISC:security-tracker.debian.org:CVE-2011-2684
MISC:wordpress.org:CVE-2015-9228
MISC:wpvulndb.com:CVE-2015-9228
MISC:wpvulndb.com:CVE-2015-9230
MISC:www.htbridge.com:CVE-2016-10400
MISC:www.openwall.com
MISC:www.openwall.com:MISC:www.openwall.com:CVE-2012-4519
MISC:www.securelist.com:MISC:www.openwall.com:CVE-2012-4519
MISC:www.vapid.dhs.org:CVE-2014-8607
MISC:www.waraxe.us:MISC:www.openwall.com:CVE-2012-4519
MISC:www.x41-dsec.de:CVE-2017-6306
MLIST:[debian-lts-announce] 20200126 [SECURITY] [DLA 2075-1] jsoup security update
MLIST:[oss-security] 20140711 Re: Zend Framework CVEs
MLIST:[oss-security] 20150818 Re: CVE Request: ATutor LMS Version 2.2 with stored XSS and file upload issue
MLIST:[oss-security] 20150828 Re: CVE request: XSS vulnerability in jsoup related to incomplete tags at EOF
MLIST:[oss-security] 20160107 Re: CVE request for radicale
MLIST:[oss-security] 20160418 CVE-2013-7450: Pulp < 2.3.0 distributed the same CA key to all users
MLIST:[oss-security] 20160418 Re: CVE request - Pulp < 2.3.0 shipped the same authentication CA key/cert to all users
MLIST:[oss-security] 20160519 Pulp 2.8.3 Released to address multiple CVEs
MLIST:[oss-security] 20160907 ADOdb PDO driver: incorrect quoting may allow SQL injection
MLIST:[oss-security] 20160915 Re: ADOdb PDO driver: incorrect quoting may allow SQL injection
OSS:10592
OSS:2014/Q4/279
OSS:2015/Q3/391
OSS:2015/Q3/454
OSS:2016/Q1/41
OSS:2016/Q2/18
OSS:2016/Q2/379
OSS:2016/Q2/93
OSS:2016/Q2/99
OSS:2016/Q3/509
OSS:2016/Q3/520
OSS:2016/Q3/80
OSS:2017/Q1/100
OSS:2017/Q2/644
OSS:2017/Q2/74
OSS:2017/Q3/141
OSS:2017/Q3/142
OSS:2017/Q3/144
OSS:2017/Q3/145
OSS:2017/Q3/171
OSS:2017/Q3/176
OSS:2017/Q3/181
OSS:2017/Q3/492
OSVDB:62904
OSVDB:62905
OSVDB:62906
RH:CVE-2010-4179
RH:CVE-2013-7450
RH:CVE-2015-6748
RH:CVE-2016-3095
RH:CVE-2016-3106
RH:CVE-2017-8069
RHSA-2010:0921
RHSA-2010:0922
RHSA-2015:2559
RHSA-2015:2560
SECTRACK:1024806
SECUNIA:38906
SECUNIA:42406
SECUNIA:58847
SMASH Issue 103584
SMASH Issue 109061
SMASH Issue 117360
SMASH Issue 127616
SMASH Issue 127986
SMASH Issue 148627
SMASH Issue 160423
SMASH Issue 165409
SMASH Issue 168008
SMASH Issue 168020
SMASH Issue 171012
SMASH Issue 172651
SMASH Issue 178698
SMASH Issue 180301
SMASH Issue 180883
SMASH Issue 181456
SMASH Issue 182351
SMASH Issue 183717
SMASH Issue 184100
SMASH Issue 187572
SMASH Issue 188564
SMASH Issue 188671
SMASH Issue 191821
SMASH Issue 191869
SMASH Issue 192338
SMASH Issue 32225
SMASH Issue 66405
SMASH Issue 72309
SMASH Issue 72310
SMASH Issue 90310
SMASH Issue 90881
UBUNTU:CVE-2011-2683
UBUNTU:CVE-2011-2684
UBUNTU:CVE-2014-4914
UBUNTU:CVE-2015-6748
UBUNTU:CVE-2016-1505
UBUNTU:CVE-2016-6233
UBUNTU:CVE-2016-7405
UBUNTU:CVE-2016-9121
UBUNTU:CVE-2017-14650
UBUNTU:CVE-2017-5940
UBUNTU:CVE-2017-6298
UBUNTU:CVE-2017-7615
UBUNTU:CVE-2017-8069
VUPEN:ADV-2010-3091
XF:atutor-add-xss(56852)
bdo#633870
bdo#743175
bdo#754201
bdo#865504
bdo#865505
bdo#876400
bnc#1034333
bnc#1035668
rh#1003326
rh#1117545
rh#1258310
rh#1322706
rh#1324926
rh#1328345
rh#1357552
rh#1376365
rh#1422813
rh#1442996
rh#1445343
rh#654856
CVE-2017-8070kernel-source-rt:Unsupportedlow ()BID:98011
CONFIRM:git.kernel.org:CVE-2017-8070
CONFIRM:github.com:CVE-2017-8070
CVE-2017-8070
D:CVE-2017-8070
RH:CVE-2017-8070
SMASH Issue 184101
UBUNTU:CVE-2017-8070
bnc#1035658
rh#1445328
CVE-2017-8106kernel-source-rt:Not affectedlow ()CVE-2017-8106
D:CVE-2017-8106
MISC:bugzilla.kernel.org:CVE-2017-8106
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:launchpad.net:CVE-2017-8106
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-8106
SMASH Issue 184352
UBUNTU:CVE-2017-8106
bnc#1035877
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1435719
rh#1445828
rh#1462147
rh#1462158
rh#1481178
CVE-2017-8824kernel-source-rt:Not affectedimportant8.4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)BID:102056
CONFIRM:help.ecostruxureit.com:CVE-2017-5754
CVE-2017-8824
D:CVE-2017-8824
DEBIAN:DSA-4073
DEBIAN:DSA-4082
DSA-4073
DSA-4082
DSA-5378
EXPLOIT-DB:43234
MISC:lists.openwall.net:CVE-2017-8824
MISC:www.cve.mitre.org:MISC:www.openwall.com:CVE-2017-8824
MISC:www.openwall.com:CVE-2017-8824
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
OSS:2017/Q4/350
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
RH:CVE-2017-8824
RHSA-2018:0399
RHSA-2018:0676
RHSA-2018:1062
RHSA-2018:1130
RHSA-2018:1170
RHSA-2018:1216
RHSA-2018:1319
RHSA-2018:3822
SMASH Issue 196027
SMASH Issue 196137
SUSE:SUSE-SU-2018:0011
UBUNTU:CVE-2017-8824
UBUNTU:USN-3581-1
UBUNTU:USN-3581-2
UBUNTU:USN-3581-3
UBUNTU:USN-3582-1
UBUNTU:USN-3582-2
UBUNTU:USN-3583-1
UBUNTU:USN-3583-2
bdo#1033297
bnc#1070771
bnc#1076734
linux.git:commit:67f93df79aeefc3add4e4b31a752600f834236e2
linux.git:commit:69c64866ce072dea1d1e59a0d61e0f66c0dffb76
rh#1519591
rh#1519780
rh#2061700
rh#2119127
CVE-2017-8890kernel-source-rt:Not affectedimportant7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:98562
BID:98583
BID:98586
BID:98597
CONFIRM:git.kernel.org:CVE-2017-8890
CONFIRM:git.kernel.org:CVE-2017-9075
CONFIRM:git.kernel.org:CVE-2017-9077
CONFIRM:github.com:CVE-2017-8890
CONFIRM:github.com:CVE-2017-9075
CONFIRM:github.com:CVE-2017-9077
CONFIRM:patchwork.ozlabs.org:CVE-2017-9075
CONFIRM:patchwork.ozlabs.org:CVE-2017-9077
CONFIRM:source.android.com:CVE-2017-14496
CONFIRM:source.android.com:CVE-2017-6264
CONFIRM:source.android.com:CVE-2017-6983
CVE-2017-8890
CVE-2017-9075
CVE-2017-9076
CVE-2017-9077
D:CVE-2017-8890
D:CVE-2017-9077
DSA-3886
MISC:git.kernel.org
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2017/Q2/366
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-8890
RH:CVE-2017-9075
RH:CVE-2017-9076
RH:CVE-2017-9077
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
RHSA-2018:1854
SMASH Issue 185028
SMASH Issue 185510
SMASH Issue 185511
SMASH Issue 185538
UBUNTU:CVE-2017-8890
UBUNTU:CVE-2017-9075
UBUNTU:CVE-2017-9076
UBUNTU:CVE-2017-9077
bnc#1038544
bnc#1038564
bnc#1039883
bnc#1039885
bnc#1040069
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1435719
rh#1439087
rh#1450972
rh#1452688
rh#1452691
rh#1452744
rh#1462147
rh#1462158
rh#1481178
CVE-2017-9075kernel-source-rt:Not affectedimportant5.5 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)BID:98562
BID:98583
BID:98586
BID:98597
CONFIRM:git.kernel.org:CVE-2017-8890
CONFIRM:git.kernel.org:CVE-2017-9075
CONFIRM:git.kernel.org:CVE-2017-9077
CONFIRM:github.com:CVE-2017-8890
CONFIRM:github.com:CVE-2017-9075
CONFIRM:github.com:CVE-2017-9077
CONFIRM:patchwork.ozlabs.org:CVE-2017-9075
CONFIRM:patchwork.ozlabs.org:CVE-2017-9077
CONFIRM:source.android.com:CVE-2017-14496
CONFIRM:source.android.com:CVE-2017-6264
CONFIRM:source.android.com:CVE-2017-6983
CVE-2017-8890
CVE-2017-9075
CVE-2017-9076
CVE-2017-9077
D:CVE-2017-8890
D:CVE-2017-9077
DSA-3886
MISC:git.kernel.org
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2017/Q2/366
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-8890
RH:CVE-2017-9075
RH:CVE-2017-9076
RH:CVE-2017-9077
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
RHSA-2018:1854
SMASH Issue 185028
SMASH Issue 185510
SMASH Issue 185511
SMASH Issue 185538
UBUNTU:CVE-2017-8890
UBUNTU:CVE-2017-9075
UBUNTU:CVE-2017-9076
UBUNTU:CVE-2017-9077
bnc#1038544
bnc#1038564
bnc#1039883
bnc#1039885
bnc#1040069
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1435719
rh#1439087
rh#1450972
rh#1452688
rh#1452691
rh#1452744
rh#1462147
rh#1462158
rh#1481178
CVE-2017-9076kernel-source-rt:Not affectedimportant6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:98562
BID:98583
BID:98586
BID:98597
CONFIRM:git.kernel.org:CVE-2017-8890
CONFIRM:git.kernel.org:CVE-2017-9075
CONFIRM:git.kernel.org:CVE-2017-9077
CONFIRM:github.com:CVE-2017-8890
CONFIRM:github.com:CVE-2017-9075
CONFIRM:github.com:CVE-2017-9077
CONFIRM:patchwork.ozlabs.org:CVE-2017-9075
CONFIRM:patchwork.ozlabs.org:CVE-2017-9077
CONFIRM:source.android.com:CVE-2017-14496
CONFIRM:source.android.com:CVE-2017-6264
CONFIRM:source.android.com:CVE-2017-6983
CVE-2017-8890
CVE-2017-9075
CVE-2017-9076
CVE-2017-9077
D:CVE-2017-8890
D:CVE-2017-9077
DSA-3886
MISC:git.kernel.org
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2017/Q2/366
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-8890
RH:CVE-2017-9075
RH:CVE-2017-9076
RH:CVE-2017-9077
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
RHSA-2018:1854
SMASH Issue 185028
SMASH Issue 185510
SMASH Issue 185511
SMASH Issue 185538
UBUNTU:CVE-2017-8890
UBUNTU:CVE-2017-9075
UBUNTU:CVE-2017-9076
UBUNTU:CVE-2017-9077
bnc#1038544
bnc#1038564
bnc#1039883
bnc#1039885
bnc#1040069
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1435719
rh#1439087
rh#1450972
rh#1452688
rh#1452691
rh#1452744
rh#1462147
rh#1462158
rh#1481178
CVE-2017-9077kernel-source-rt:Not affectedimportant5.5 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)BID:98562
BID:98583
BID:98586
BID:98597
CONFIRM:git.kernel.org:CVE-2017-8890
CONFIRM:git.kernel.org:CVE-2017-9075
CONFIRM:git.kernel.org:CVE-2017-9077
CONFIRM:github.com:CVE-2017-8890
CONFIRM:github.com:CVE-2017-9075
CONFIRM:github.com:CVE-2017-9077
CONFIRM:patchwork.ozlabs.org:CVE-2017-9075
CONFIRM:patchwork.ozlabs.org:CVE-2017-9077
CONFIRM:source.android.com:CVE-2017-14496
CONFIRM:source.android.com:CVE-2017-6264
CONFIRM:source.android.com:CVE-2017-6983
CVE-2017-8890
CVE-2017-9075
CVE-2017-9076
CVE-2017-9077
D:CVE-2017-8890
D:CVE-2017-9077
DSA-3886
MISC:git.kernel.org
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2017/Q2/366
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-8890
RH:CVE-2017-9075
RH:CVE-2017-9076
RH:CVE-2017-9077
RHSA-2017:1842
RHSA-2017:2077
RHSA-2017:2669
RHSA-2018:1854
SMASH Issue 185028
SMASH Issue 185510
SMASH Issue 185511
SMASH Issue 185538
UBUNTU:CVE-2017-8890
UBUNTU:CVE-2017-9075
UBUNTU:CVE-2017-9076
UBUNTU:CVE-2017-9077
bnc#1038544
bnc#1038564
bnc#1039883
bnc#1039885
bnc#1040069
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1435719
rh#1439087
rh#1450972
rh#1452688
rh#1452691
rh#1452744
rh#1462147
rh#1462158
rh#1481178
CVE-2017-9242kernel-source-rt:Not affectedimportant7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:98731
CONFIRM:git.kernel.org:CVE-2017-9242
CONFIRM:github.com:CVE-2017-9242
CONFIRM:patchwork.ozlabs.org:CVE-2017-9242
CVE-2017-9242
D:CVE-2017-9242
DSA-3886
MISC:git.kernel.org
MISC:git.kernel.org:OSS:2020/Q1/69
OSS:2017/Q2/367
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
RH:CVE-2017-9242
RHSA-2017:1842
RHSA-2017:2077
SMASH Issue 185978
UBUNTU:CVE-2017-9242
bnc#1041431
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1435719
rh#1439087
rh#1456388
rh#1462147
rh#1462158
rh#1481178
CVE-2017-9271libzypp:Releasedmoderate4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CONFIRM:www.suse.com:CVE-2017-9271
CVE-2017-9271
SMASH Issue 189174
bnc#1050625
rh#1922189
CVE-2017-9614kernel-source-rt:Not affectedimportant ()BID:99928
CONFIRM:source.android.com:CVE-2017-6001
CVE-2017-11600
CVE-2017-9614
D:CVE-2017-9614
DSA-3981
DSA-5378
EXPLOIT-DB:42391
MISC:github.com:CVE-2017-9614
MISC:packetstormsecurity.com:CVE-2017-9614
MISC:seclists.org:CVE-2017-11600
MISC:seclists.org:CVE-2017-9614
OSS:2017/Q3/526
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
Oracle:CVE-2018-3646
RH:CVE-2017-11600
RH:CVE-2017-9614
RHSA-2018:1965
RHSA-2018:2003
RHSA-2019:1170
RHSA-2019:1190
SMASH Issue 189055
SMASH Issue 207615
SUSE:SUSE-SU-2018:0011
UBUNTU:CVE-2017-11600
UBUNTU:CVE-2017-9614
bdo#1033297
bdo#866511
bdo#875881
bnc#1050231
bnc#1096564
linux.git:commit:7bab09631c2a303f87a7eb7e3d69e888673b9b7e
rh#1474928
rh#1475742
rh#1519780
rh#2061700
rh#2119127
CVE-2017-9778gdb:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)BID:99244
CONFIRM:sourceware.org:CVE-2017-9778
CVE-2017-9778
D:CVE-2017-9778
RH:CVE-2017-9778
SMASH Issue 187147
UBUNTU:CVE-2017-9778
bnc#1188512
rh#1466255
CVE-2017-9986kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)BID:99336
CVE-2017-9986
D:CVE-2017-9986
MISC:bugzilla.kernel.org:CVE-2017-9986
RH:CVE-2017-9986
SMASH Issue 187398
UBUNTU:CVE-2017-9986
bnc#1046600
rh#1470211
CVE-2018-0495libgcrypt:Already fixedmoderate5.1 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2018-0495
CVE-2018-12433
CVE-2018-12434
CVE-2018-12436
CVE-2018-12437
CVE-2018-12438
CVE-2018-12439
CVE-2018-12440
CVE-2018-14679
CVE-2018-14680
CVE-2018-14681
CVE-2018-14682
D:CVE-2018-14679
D:CVE-2018-14680
D:CVE-2018-14681
D:CVE-2018-14682
DEBIAN:DSA-4231
DEBIAN:DSA-4260
DSA-4231
MISC:dev.gnupg.org:CVE-2018-0495
MISC:ftp.openbsd.org:CVE-2018-12434
MISC:git.gnupg.org:CVE-2018-0495
MISC:github.com:CVE-2018-12436
MISC:github.com:CVE-2018-14680
MISC:github.com:CVE-2018-14681
MISC:github.com:CVE-2018-14682
MISC:lists.gnupg.org:CVE-2018-0495
MISC:www.nccgroup.trust:CVE-2018-12440
MISC:www.openwall.com:CVE-2018-14679
MISC:www.oracle.com:CVE-2014-0107
MISC:www.wolfssl.com:CVE-2018-12436
MLIST:[debian-lts-announce] 20180629 [SECURITY] [DLA 1405-1] libgcrypt20 security update
MLIST:[debian-lts-announce] 20180806 [SECURITY] [DLA-1460-1] libmspack security update
OSS:2018/Q3/65
Oracle:CVE-2018-0495
Oracle:CVE-2018-12404
RH:CVE-2018-0495
RHBA-2020:0547
RHSA-2018:3221
RHSA-2018:3327
RHSA-2018:3505
RHSA-2019:1296
RHSA-2019:1297
RHSA-2019:1543
RHSA-2019:2237
RHSA-2020:1267
RHSA-2020:1345
RHSA-2020:1461
SECTRACK:1041144
SECTRACK:1041147
SECTRACK:1041410
SMASH Issue 208024
SMASH Issue 211812
SMASH Issue 211813
SMASH Issue 211814
SMASH Issue 211815
SMASH Issue 211816
SMASH Issue 218353
SMASH Issue 218444
SMASH Issue 218773
UBUNTU:CVE-2018-0495
UBUNTU:CVE-2018-14679
UBUNTU:CVE-2018-14680
UBUNTU:CVE-2018-14681
UBUNTU:CVE-2018-14682
UBUNTU:USN-3689-1
UBUNTU:USN-3689-2
UBUNTU:USN-3692-1
UBUNTU:USN-3692-2
UBUNTU:USN-3728-1
UBUNTU:USN-3728-2
UBUNTU:USN-3728-3
USN-3850-1
USN-3850-2
bdo#904799
bdo#904800
bdo#904801
bdo#904802
bnc#1097410
bnc#1102922
bnc#1103032
rh#1591163
rh#1610890
rh#1610896
rh#1610934
rh#1610941
CVE-2018-1000031unzip:Not affectedimportant ()CVE-2018-1000031
MISC:sec-consult.com:CVE-2018-1000035
OSS:2018/Q1/134
RH:CVE-2018-1000031
SMASH Issue 199642
UBUNTU:CVE-2018-1000031
bnc#1080075
rh#1537059
CVE-2018-1000500busybox:Releasedimportant7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)CONFIRM:git.busybox.net:CVE-2018-1000500
CVE-2018-1000500
MISC:git.busybox.net:CVE-2018-1000500
MISC:lists.busybox.net:CVE-2018-1000500
RH:CVE-2018-1000500
SMASH Issue 208921
UBUNTU:CVE-2018-1000500
USN-4531-1
bnc#1099263
rh#1595611
CVE-2018-1000517busybox:Releasedimportant5.6 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)CVE-2018-1000517
MISC:git.busybox.net:CVE-2018-1000517
MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1445-1] busybox security update
MLIST:[debian-lts-announce] 20210215 [SECURITY] [DLA 2559-1] busybox security update
RH:CVE-2018-1000517
SMASH Issue 208938
UBUNTU:CVE-2018-1000517
USN-3935-1
bnc#1099260
rh#1595595
CVE-2018-10021kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)BID:103356
BID:106503
BID:99619
CONFIRM:bugzilla.kernel.org:CVE-2018-10876
CONFIRM:bugzilla.kernel.org:CVE-2018-10880
CONFIRM:bugzilla.kernel.org:CVE-2018-10882
CONFIRM:bugzilla.redhat.com:CVE-2018-10853
CONFIRM:bugzilla.redhat.com:CVE-2018-10877
CONFIRM:bugzilla.redhat.com:CVE-2018-10880
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CONFIRM:git.kernel.org:CVE-2018-10853
CONFIRM:git.kernel.org:CVE-2018-10876
CONFIRM:git.kernel.org:CVE-2018-10880
CONFIRM:git.kernel.org:CVE-2018-10882
CONFIRM:github.com:CVE-2017-8831
CONFIRM:github.com:CVE-2018-1000204
CONFIRM:patchwork.ozlabs.org:CVE-2018-10876
CONFIRM:patchwork.ozlabs.org:CVE-2018-10880
CVE-2017-8813
CVE-2017-8831
CVE-2018-1000204
CVE-2018-10021
CVE-2018-10853
CVE-2018-10877
CVE-2018-10880
CVE-2018-10882
CVE-2018-13405
CVE-2018-7995
D:CVE-2017-8831
DEBIAN:DSA-4187
DEBIAN:DSA-4188
DEBIAN:DSA-4266
EXPLOIT-DB:45033
MISC:bugzilla.kernel.org:CVE-2017-8831
MISC:git.kernel.org:CVE-2018-10021
MISC:git.kernel.org:CVE-2018-13405
MISC:git.kernel.org:CVE-2018-7995
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:github.com:CVE-2018-10021
MISC:github.com:CVE-2018-13405
MISC:lkml.org:CVE-2018-7995
MISC:openwall.com:CVE-2018-13405
MISC:twitter.com:CVE-2018-13405
MISC:www.openwall.com:CVE-2018-10853
MISC:www.securityfocus.com:CVE-2017-8831
MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
MLIST:[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update
OSS:2018/09/18/4
OSS:2018/09/25/4
OSS:2018/Q3/208
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-5753
Oracle:CVE-2017-6074
Oracle:CVE-2018-3646
Oracle:CVE-2018-5390
RH:CVE-2017-8831
RH:CVE-2018-10021
RH:CVE-2018-10853
RH:CVE-2018-12232
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
RHSA-2019:2029
RHSA-2019:2043
RHSA-2020:0036
RHSA-2020:0103
RHSA-2020:0179
SMASH Issue 184883
SMASH Issue 200662
SMASH Issue 203774
SMASH Issue 207826
SMASH Issue 207855
SMASH Issue 207865
SUSE:openSUSE-SU-2019:1407
UBUNTU:CVE-2017-8831
UBUNTU:CVE-2018-10021
UBUNTU:CVE-2018-10853
UBUNTU:CVE-2018-12232
UBUNTU:CVE-2018-7995
UBUNTU:USN-3654-1
UBUNTU:USN-3654-2
UBUNTU:USN-3656-1
UBUNTU:USN-3678-1
UBUNTU:USN-3678-2
UBUNTU:USN-3678-3
UBUNTU:USN-3678-4
UBUNTU:USN-3696-1
UBUNTU:USN-3696-2
UBUNTU:USN-3752-1
UBUNTU:USN-3752-2
UBUNTU:USN-3752-3
UBUNTU:USN-3753-1
UBUNTU:USN-3753-2
UBUNTU:USN-3754-1
UBUNTU:USN-3777-1
UBUNTU:USN-3777-2
UBUNTU:USN-3821-1
UBUNTU:USN-3821-2
bnc#1037994
bnc#1084755
bnc#1089281
bnc#1097104
bnc#1097108
bnc#1097593
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=318aaf34f1179b39fa9c30fa0f3288b645beee39
linux.git:commit:3c9fa24ca7c9c47605672916491f79e8ccacb9e6
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1435719
rh#1449980
rh#1462147
rh#1462158
rh#1481178
rh#1553911
rh#1566407
rh#1589324
rh#1589890
rh#1590215
rh#1596812
rh#1596842
rh#1599161
rh#1601704
rh#1609664
rh#1619846
rh#1660375
rh#1660385
rh#1667782
rh#1701224
rh#1701842
rh#2027239
rh#2044863
CVE-2018-10124ltp:Releasedlow4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2018-10124
DSA-5378
MISC:git.kernel.org:CVE-2018-10124
MISC:git.kernel.org:OSS:2014/03/05/6
MISC:github.com:CVE-2018-10124
OSS:2014/03/05/6
OSS:2022/11/10/2
OSS:2022/12/27/3
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2022/Q4/244
Oracle:CVE-2017-0861
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2018-3639
RH:CVE-2018-10124
SECTRACK:1040684
SMASH Issue 204053
UBUNTU:CVE-2018-10124
bdo#1033297
bnc#1089752
rh#1243852
rh#1495089
rh#1519780
rh#1527393
rh#1568205
rh#1573699
rh#1575472
rh#1599161
rh#2027239
rh#2044863
rh#2061700
rh#2119127
CVE-2018-10322kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:103960
CVE-2018-10322
MISC:bugzilla.kernel.org:CVE-2018-10322
MISC:www.spinics.net:CVE-2018-10322
RH:CVE-2018-10322
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
SMASH Issue 204778
UBUNTU:CVE-2018-10322
USN-4578-1
USN-4579-1
bnc#1090749
rh#1571623
CVE-2018-1065kernel-source-rt:Not affectedmoderate5.9 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:bugzilla.redhat.com:CVE-2018-10880
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CVE-2018-1065
CVE-2018-10880
CVE-2018-10882
CVE-2018-13405
DEBIAN:DSA-4188
DSA-4188
MISC:git.kernel.org:CVE-2018-1065
MISC:git.kernel.org:OSS:2014/03/05/6
MISC:github.com:CVE-2018-1065
MISC:lists.openwall.net:CVE-2018-1065
MISC:patchwork.ozlabs.org:CVE-2018-1065
OSS:2014/03/05/6
OSS:2018/Q1/212
OSS:2022/12/27/3
OSS:2022/Q4/244
Oracle:CVE-2018-3639
RH:CVE-2018-1065
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
SECTRACK:1040446
SMASH Issue 201087
UBUNTU:CVE-2018-1065
UBUNTU:USN-3654-1
UBUNTU:USN-3654-2
UBUNTU:USN-3656-1
bnc#1083650
rh#1527393
rh#1547824
rh#1596812
rh#1596842
rh#1599161
rh#2027239
rh#2044863
CVE-2018-10853kernel-source-rt:Not affectedimportant8.4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)BID:103356
BID:106503
CONFIRM:bugzilla.kernel.org:CVE-2018-10876
CONFIRM:bugzilla.kernel.org:CVE-2018-10880
CONFIRM:bugzilla.kernel.org:CVE-2018-10882
CONFIRM:bugzilla.redhat.com:CVE-2018-10853
CONFIRM:bugzilla.redhat.com:CVE-2018-10877
CONFIRM:bugzilla.redhat.com:CVE-2018-10880
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CONFIRM:git.kernel.org:CVE-2018-10853
CONFIRM:git.kernel.org:CVE-2018-10876
CONFIRM:git.kernel.org:CVE-2018-10880
CONFIRM:git.kernel.org:CVE-2018-10882
CONFIRM:patchwork.ozlabs.org:CVE-2018-10876
CONFIRM:patchwork.ozlabs.org:CVE-2018-10880
CVE-2018-10021
CVE-2018-10853
CVE-2018-10877
CVE-2018-10880
CVE-2018-10882
CVE-2018-13405
CVE-2018-7995
DEBIAN:DSA-4187
DEBIAN:DSA-4188
DEBIAN:DSA-4266
EXPLOIT-DB:45033
MISC:git.kernel.org:CVE-2018-10021
MISC:git.kernel.org:CVE-2018-13405
MISC:git.kernel.org:CVE-2018-7995
MISC:github.com:CVE-2018-10021
MISC:github.com:CVE-2018-13405
MISC:lkml.org:CVE-2018-7995
MISC:openwall.com:CVE-2018-13405
MISC:twitter.com:CVE-2018-13405
MISC:www.openwall.com:CVE-2018-10853
MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
MLIST:[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update
OSS:2018/09/18/4
OSS:2018/09/25/4
OSS:2018/Q3/208
Oracle:CVE-2018-3646
Oracle:CVE-2018-5390
RH:CVE-2018-10021
RH:CVE-2018-10853
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
RHSA-2019:2029
RHSA-2019:2043
RHSA-2020:0036
RHSA-2020:0103
RHSA-2020:0179
SMASH Issue 207826
SMASH Issue 207855
SUSE:openSUSE-SU-2019:1407
UBUNTU:CVE-2018-10021
UBUNTU:CVE-2018-10853
UBUNTU:CVE-2018-7995
UBUNTU:USN-3654-1
UBUNTU:USN-3654-2
UBUNTU:USN-3656-1
UBUNTU:USN-3678-1
UBUNTU:USN-3678-2
UBUNTU:USN-3678-3
UBUNTU:USN-3678-4
UBUNTU:USN-3696-1
UBUNTU:USN-3696-2
UBUNTU:USN-3753-1
UBUNTU:USN-3753-2
UBUNTU:USN-3754-1
UBUNTU:USN-3777-1
UBUNTU:USN-3777-2
UBUNTU:USN-3821-1
UBUNTU:USN-3821-2
bnc#1084755
bnc#1089281
bnc#1097104
bnc#1097108
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=318aaf34f1179b39fa9c30fa0f3288b645beee39
linux.git:commit:3c9fa24ca7c9c47605672916491f79e8ccacb9e6
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1553911
rh#1566407
rh#1589324
rh#1589890
rh#1601704
rh#1609664
rh#1667782
rh#1701224
rh#1701842
CVE-2018-10878kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H)CONFIRM:bugzilla.kernel.org:CVE-2018-10878
CONFIRM:bugzilla.redhat.com:CVE-2018-10878
CONFIRM:git.kernel.org:CVE-2018-10878
CONFIRM:patchwork.ozlabs.org:CVE-2018-10878
CVE-2018-10878
D:CVE-2018-10878
MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
OSS:2018/09/18/4
OSS:2018/09/25/4
Oracle:CVE-2018-3646
Oracle:CVE-2018-5390
RH:CVE-2018-10878
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
SMASH Issue 209216
UBUNTU:CVE-2018-10878
UBUNTU:USN-3753-1
UBUNTU:USN-3753-2
USN-3871-1
USN-3871-3
USN-3871-4
USN-3871-5
bnc#1099813
rh#1575866
rh#1596802
rh#1601704
rh#1609664
rh#1890354
CVE-2018-10880kernel-source-rt:Not affectedmoderate5.6 (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:H)AIXAPAR:IT02314
AIXAPAR:IV61506
BID:100215
BID:100503
BID:100514
BID:100861
BID:101758
BID:102291
BID:102293
BID:102367
BID:102503
BID:102813
BID:103356
BID:103459
BID:103605
BID:104229
BID:104232
BID:104907
BID:104909
BID:105647
BID:105656
BID:105658
BID:106503
BID:67121
BID:79091
BID:91067
BID:91068
BID:91787
BID:91869
BID:93132
BID:93287
BID:93604
BID:94371
BID:94377
BID:94925
BID:95429
BID:99619
BUGTRAQ:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
BUGTRAQ:20190624 [SECURITY] [DSA 4469-1] libvirt security update
CERT-VN:VU#180049
CERT-VN:VU#978508
CERT:TA18-141A
CISCO:20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products
CISCO:20180522 CPU Side-Channel Information Disclosure Vulnerabilities: May 2018
CONFIRM:access.redhat.com:CVE-2014-0114
CONFIRM:access.redhat.com:CVE-2014-0224
CONFIRM:advisories.mageia.org:CVE-2014-0114
CONFIRM:aix.software.ibm.com:CVE-2014-3470
CONFIRM:blogs.oracle.com:CVE-2014-0224
CONFIRM:bugs.jython.org:CVE-2016-4000
CONFIRM:bugs.launchpad.net:CVE-2015-8866
CONFIRM:bugs.launchpad.net:CVE-2015-8867
CONFIRM:bugs.php.net:CVE-2015-8866
CONFIRM:bugs.php.net:CVE-2015-8867
CONFIRM:bugzilla.kernel.org:CVE-2018-10876
CONFIRM:bugzilla.kernel.org:CVE-2018-10880
CONFIRM:bugzilla.kernel.org:CVE-2018-10882
CONFIRM:bugzilla.redhat.com:CVE-2018-10853
CONFIRM:bugzilla.redhat.com:CVE-2018-10876
CONFIRM:bugzilla.redhat.com:CVE-2018-10877
CONFIRM:bugzilla.redhat.com:CVE-2018-10880
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CONFIRM:bugzilla.redhat.com:CVE-2018-1120
CONFIRM:bugzilla.redhat.com:CVE-2018-1122
CONFIRM:bugzilla.redhat.com:CVE-2018-1123
CONFIRM:bugzilla.redhat.com:CVE-2018-1124
CONFIRM:bugzilla.redhat.com:CVE-2018-1125
CONFIRM:bugzilla.redhat.com:CVE-2018-1126
CONFIRM:bugzilla.redhat.com:CVE-2018-1130
CONFIRM:cert-portal.siemens.com:CVE-2017-5715
CONFIRM:cert-portal.siemens.com:CVE-2017-5753
CONFIRM:cert-portal.siemens.com:CVE-2018-3640
CONFIRM:commons.apache.org:CVE-2014-0114
CONFIRM:dev.mysql.com:CVE-2014-0224
CONFIRM:developer.arm.com:CVE-2017-5754
CONFIRM:discussions.nessus.org:CVE-2014-0224
CONFIRM:esupport.trendmicro.com:CVE-2014-0224
CONFIRM:filezilla-project.org:CVE-2014-0224
CONFIRM:git.kernel.org:CVE-2017-10661
CONFIRM:git.kernel.org:CVE-2017-17805
CONFIRM:git.kernel.org:CVE-2017-17806
CONFIRM:git.kernel.org:CVE-2017-18075
CONFIRM:git.kernel.org:CVE-2018-1068
CONFIRM:git.kernel.org:CVE-2018-10853
CONFIRM:git.kernel.org:CVE-2018-10876
CONFIRM:git.kernel.org:CVE-2018-10880
CONFIRM:git.kernel.org:CVE-2018-10882
CONFIRM:git.kernel.org:CVE-2018-1120
CONFIRM:git.kernel.org:CVE-2018-1130
CONFIRM:git.kernel.org:CVE-2018-7566
CONFIRM:git.openssl.org:CVE-2014-0224
CONFIRM:git.php.net:CVE-2015-8866
CONFIRM:git.php.net:CVE-2015-8867
CONFIRM:github.com:CVE-2016-1182
CONFIRM:github.com:CVE-2016-9389
CONFIRM:github.com:CVE-2016-9394
CONFIRM:github.com:CVE-2016-9583
CONFIRM:github.com:CVE-2017-10661
CONFIRM:github.com:CVE-2017-14735
CONFIRM:github.com:CVE-2017-17805
CONFIRM:github.com:CVE-2017-17806
CONFIRM:github.com:CVE-2017-18075
CONFIRM:github.com:CVE-2017-8831
CONFIRM:github.com:CVE-2018-1000204
CONFIRM:github.com:CVE-2018-1068
CONFIRM:h20566.www2.hpe.com:CVE-2016-0705
CONFIRM:h20566.www2.hpe.com:CVE-2016-0763
CONFIRM:h20566.www2.hpe.com:CVE-2016-5388
CONFIRM:help.ecostruxureit.com:CVE-2017-5754
CONFIRM:hg.python.org:CVE-2016-4000
CONFIRM:issues.apache.org:CVE-2014-0114
CONFIRM:issues.apache.org:CVE-2015-1832
CONFIRM:issues.apache.org:CVE-2016-1000031
CONFIRM:kb.bluecoat.com:CVE-2014-3470
CONFIRM:kb.juniper.net:CVE-2014-0224
CONFIRM:kb.juniper.net:CVE-2014-3470
CONFIRM:kc.mcafee.com:CVE-2014-3470
CONFIRM:kc.mcafee.com:CVE-2017-12942
CONFIRM:linux.oracle.com:CVE-2014-3510
CONFIRM:nvidia.custhelp.com:CVE-2017-0330
CONFIRM:patchwork.kernel.org:CVE-2018-5750
CONFIRM:patchwork.ozlabs.org:CVE-2018-10876
CONFIRM:patchwork.ozlabs.org:CVE-2018-10880
CONFIRM:portal.msrc.microsoft.com:CVE-2018-3639
CONFIRM:psirt.global.sonicwall.com:CVE-2018-3639
CONFIRM:puppetlabs.com:CVE-2014-0224
CONFIRM:rwkbp.makekb.com:CVE-2015-8965
CONFIRM:security-tracker.debian.org:CVE-2016-1181
CONFIRM:security-tracker.debian.org:CVE-2016-1182
CONFIRM:security.netapp.com:CVE-2014-0114
CONFIRM:security.netapp.com:CVE-2016-1000031
CONFIRM:security.netapp.com:CVE-2016-1182
CONFIRM:security.netapp.com:CVE-2017-5645
CONFIRM:security.netapp.com:CVE-2018-3640
CONFIRM:source.android.com:CVE-2017-10663
CONFIRM:source.android.com:CVE-2017-6280
CONFIRM:support.apple.com:CVE-2014-4979
CONFIRM:support.citrix.com:CVE-2014-3470
CONFIRM:support.citrix.com:CVE-2018-3639
CONFIRM:support.f5.com:CVE-2014-0224
CONFIRM:support.f5.com:CVE-2017-18017
CONFIRM:support.f5.com:CVE-2018-13405
CONFIRM:support.hpe.com:CVE-2018-3640
CONFIRM:support.lenovo.com:CVE-2018-3640
CONFIRM:support.oracle.com:CVE-2018-3639
CONFIRM:svn.apache.org:CVE-2015-1832
CONFIRM:www-01.ibm.com:CVE-2014-0114
CONFIRM:www-01.ibm.com:CVE-2014-0224
CONFIRM:www-01.ibm.com:CVE-2014-3022
CONFIRM:www-01.ibm.com:CVE-2014-3470
CONFIRM:www-01.ibm.com:CVE-2015-1832
CONFIRM:www-947.ibm.com:CVE-2014-0224
CONFIRM:www-947.ibm.com:CVE-2014-3470
CONFIRM:www.blackberry.com:CVE-2014-3470
CONFIRM:www.f-secure.com:CVE-2014-3470
CONFIRM:www.fortiguard.com:CVE-2014-0224
CONFIRM:www.fujitsu.com:CVE-2018-3640
CONFIRM:www.huawei.com:CVE-2014-3470
CONFIRM:www.ibm.com:CVE-2014-0224
CONFIRM:www.ibm.com:CVE-2014-0963
CONFIRM:www.ibm.com:CVE-2014-3470
CONFIRM:www.innominate.com:CVE-2014-0224
CONFIRM:www.intel.com:CVE-2018-3640
CONFIRM:www.intersectalliance.com:CVE-2014-0224
CONFIRM:www.kerio.com:CVE-2014-3857
CONFIRM:www.kernel.org:CVE-2017-10661
CONFIRM:www.kernel.org:CVE-2017-17806
CONFIRM:www.kernel.org:CVE-2017-18075
CONFIRM:www.mitel.com:CVE-2018-3640
CONFIRM:www.novell.com:CVE-2014-3470
CONFIRM:www.openssl.org:CVE-2014-3470
CONFIRM:www.oracle.com:CVE-2014-0114
CONFIRM:www.oracle.com:CVE-2014-4271
CONFIRM:www.oracle.com:CVE-2014-6564
CONFIRM:www.oracle.com:CVE-2015-0437
CONFIRM:www.oracle.com:CVE-2016-5477
CONFIRM:www.oracle.com:CVE-2017-3626
CONFIRM:www.oracle.com:CVE-2017-5689
CONFIRM:www.oracle.com:CVE-2017-5709
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CONFIRM:www.splunk.com:CVE-2014-3470
CONFIRM:www.synology.com:CVE-2018-3640
CONFIRM:www.tenable.com:CVE-2014-0224
CONFIRM:www.vmware.com:CVE-2014-0114
CONFIRM:www.vmware.com:CVE-2014-3470
CONFIRM:www.vmware.com:CVE-2014-8371
CONFIRM:www.websense.com:CVE-2015-2773
CONFIRM:www14.software.ibm.com:CVE-2014-3470
CONFIRM:xenbits.xen.org:CVE-2018-3639
CVE-2014-0114
CVE-2014-0224
CVE-2014-4651
CVE-2015-0852
CVE-2015-1832
CVE-2015-2613
CVE-2015-2769
CVE-2015-2770
CVE-2015-7940
CVE-2015-8965
CVE-2015-9251
CVE-2016-0635
CVE-2016-1000031
CVE-2016-1181
CVE-2016-1182
CVE-2016-4000
CVE-2016-5684
CVE-2016-6814
CVE-2016-9389
CVE-2016-9392
CVE-2016-9583
CVE-2017-0379
CVE-2017-10661
CVE-2017-13166
CVE-2017-13168
CVE-2017-13745
CVE-2017-14229
CVE-2017-14735
CVE-2017-15095
CVE-2017-16648
CVE-2017-17805
CVE-2017-17806
CVE-2017-18017
CVE-2017-18075
CVE-2017-18208
CVE-2017-18344
CVE-2017-8813
CVE-2017-8831
CVE-2018-1000026
CVE-2018-1000204
CVE-2018-10021
CVE-2018-1065
CVE-2018-1068
CVE-2018-10853
CVE-2018-10876
CVE-2018-10877
CVE-2018-10880
CVE-2018-10882
CVE-2018-1120
CVE-2018-1122
CVE-2018-1123
CVE-2018-1124
CVE-2018-1125
CVE-2018-1126
CVE-2018-1130
CVE-2018-13405
CVE-2018-3639
CVE-2018-5344
CVE-2018-5750
CVE-2018-7566
CVE-2018-7995
D:CVE-2014-0224
D:CVE-2017-10661
D:CVE-2017-8831
D:CVE-2018-1068
D:CVE-2018-1126
D:CVE-2018-1130
D:CVE-2018-3639
D:CVE-2018-5750
DEBIAN:DSA-3959
DEBIAN:DSA-4073
DEBIAN:DSA-4082
DEBIAN:DSA-4120
DEBIAN:DSA-4187
DEBIAN:DSA-4188
DEBIAN:DSA-4208
DEBIAN:DSA-4210
DEBIAN:DSA-4266
DEBIAN:DSA-4273
DSA-2940
DSA-2950
DSA-3392
DSA-3417
DSA-3893
DSA-3981
DSA-4073
DSA-4082
DSA-4120
DSA-4187
DSA-4188
DSA-4208
DSA-4210
DSA-4266
DSA-4273
DSA-5378
EXPLOIT-DB:43345
EXPLOIT-DB:44695
EXPLOIT-DB:45033
EXPLOIT-DB:45175
FEDORA:FEDORA-2014-9301
FEDORA:FEDORA-2014-9308
FEDORA:FEDORA-2014-9380
FEDORA:FEDORA-2015-16104
FEDORA:FEDORA-2015-16105
FEDORA:FEDORA-2015-16106
FEDORA:FEDORA-2015-7d95466eda
FEDORA:FEDORA-2015-992342e82f
FEDORA:FEDORA-2015-decbab7c9f
FULLDISC:20140607 Re: More OpenSSL issues
FULLDISC:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
GENTOO:GLSA-201407-05
GENTOO:GLSA-201607-09
GENTOO:GLSA-201701-68
GENTOO:GLSA-201710-28
HP:HPSBGN03041
HP:HPSBGN03050
HP:HPSBGN03068
HP:HPSBHF03052
HP:HPSBHF03088
HP:HPSBHF03145
HP:HPSBMU03051
HP:HPSBMU03053
HP:HPSBMU03055
HP:HPSBMU03056
HP:HPSBMU03057
HP:HPSBMU03058
HP:HPSBMU03062
HP:HPSBMU03065
HP:HPSBMU03070
HP:HPSBMU03071
HP:HPSBMU03074
HP:HPSBMU03076
HP:HPSBMU03078
HP:HPSBMU03083
HP:HPSBMU03089
HP:HPSBMU03090
HP:HPSBMU03094
HP:HPSBMU03101
HP:HPSBOV03047
HP:HPSBPI03107
HP:HPSBST03097
HP:HPSBST03098
HP:HPSBST03103
HP:HPSBST03106
HP:HPSBST03160
HP:HPSBST03195
HP:HPSBST03265
HP:HPSBUX03046
HP:SSRT101818
JVN:JVN#03188560
JVN:JVN#65044642
JVNDB:JVNDB-2016-000096
JVNDB:JVNDB-2016-000097
L3:41161
L3:42389
MANDRIVA:MDVSA-2014:095
MANDRIVA:MDVSA-2014:105
MANDRIVA:MDVSA-2014:106
MANDRIVA:MDVSA-2015:062
MISC:blogs.gentoo.org:CVE-2016-9399
MISC:bugs.chromium.org:CVE-2018-3639
MISC:bugs.launchpad.net:CVE-2017-18017
MISC:bugs.launchpad.net:OSS:2018/Q3/76
MISC:bugzilla.kernel.org:CVE-2017-8831
MISC:bugzilla.redhat.com:MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
MISC:ccsinjection.lepidum.co.jp:CVE-2014-0224
MISC:cdn.kernel.org:CVE-2017-18344
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:eprint.iacr.org:CVE-2017-0379
MISC:git.gnupg.org:CVE-2017-0379
MISC:git.kernel.org:CVE-2017-18017
MISC:git.kernel.org:CVE-2017-18208
MISC:git.kernel.org:CVE-2018-10021
MISC:git.kernel.org:CVE-2018-1065
MISC:git.kernel.org:CVE-2018-13405
MISC:git.kernel.org:CVE-2018-5344
MISC:git.kernel.org:CVE-2018-7995
MISC:git.kernel.org:OSS:2014/03/05/6
MISC:git.kernel.org:OSS:2018/Q3/35
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:github.com:CVE-2015-9251
MISC:github.com:CVE-2017-14229
MISC:github.com:CVE-2017-18017
MISC:github.com:CVE-2017-18208
MISC:github.com:CVE-2017-18344
MISC:github.com:CVE-2018-10021
MISC:github.com:CVE-2018-1065
MISC:github.com:CVE-2018-13405
MISC:github.com:CVE-2018-5344
MISC:github.com:OSS:2018/Q3/76
MISC:gitlab.com:OSS:2018/Q2/136
MISC:groups.google.com:CVE-2017-16648
MISC:ics-cert.us-cert.gov:CVE-2015-9251
MISC:lists.debian.org:CVE-2017-0379
MISC:lists.openwall.net:CVE-2018-1065
MISC:lkml.org:CVE-2017-18017
MISC:lkml.org:CVE-2018-7995
MISC:mail-archives.apache.org:CVE-2016-6814
MISC:openwall.com:CVE-2018-13405
MISC:patchwork.kernel.org:CVE-2017-16648
MISC:patchwork.ozlabs.org:CVE-2017-18017
MISC:patchwork.ozlabs.org:CVE-2018-1000026
MISC:patchwork.ozlabs.org:CVE-2018-1065
MISC:security-tracker.debian.org:CVE-2016-4000
MISC:security-tracker.debian.org:CVE-2017-0379
MISC:snyk.io:CVE-2015-9251
MISC:snyk.io:CVE-2016-4000
MISC:sw.aveva.com:CVE-2015-9251
MISC:syzkaller.appspot.com:CVE-2018-1130
MISC:twitter.com:CVE-2018-13405
MISC:web-in-security.blogspot.ca:CVE-2015-7940
MISC:www.arista.com:CVE-2017-18017
MISC:www.imperialviolet.org:CVE-2014-0224
MISC:www.kernel.org:CVE-2017-18017
MISC:www.kernel.org:CVE-2017-18208
MISC:www.openwall.com:CVE-2018-1000204
MISC:www.openwall.com:CVE-2018-10853
MISC:www.oracle.com:CVE-2014-0107
MISC:www.oracle.com:CVE-2015-7501
MISC:www.qualys.com:OSS:2018/Q2/122
MISC:www.securityfocus.com:CVE-2017-8831
MISC:www.talosintelligence.com:CVE-2016-5684
MISC:www.tenable.com:CVE-2016-1000031
MISC:www.tenable.com:CVE-2016-6793
MLIST:[alsa-devel] 20180214 [PATCH] ALSA: seq: Fix racy pool initializations
MLIST:[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior
MLIST:[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
MLIST:[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update
MLIST:[debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update
MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1446-1] intel-microcode security update
MLIST:[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update
MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
MLIST:[linux-netdev] 20180305 BUG: unable to handle kernel paging request in compat_copy_entries
MLIST:[linux-netdev] 20180305 [PATCH net] netfilter: check for out-of-bounds while copying compat entries
MLIST:[linux-netdev] 20180306 [PATCH net] dccp: check sk for closed state in dccp_sendmsg()
MLIST:[netdev] 20180116 http://lists.openwall.net/netdev/2018/01/16/40
MLIST:[netdev] 20180118 http://lists.openwall.net/netdev/2018/01/18/96
MLIST:[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE
MLIST:[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE
MLIST:[oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp
MLIST:[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle
MLIST:[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle
MLIST:[oss-security] 20161117 Re: jasper: multiple assertion failures
MLIST:[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
OSS:2014/03/05/6
OSS:2017/Q3/526
OSS:2017/Q4/244
OSS:2018/09/18/4
OSS:2018/09/25/4
OSS:2018/Q1/212
OSS:2018/Q1/240
OSS:2018/Q2/100
OSS:2018/Q2/136
OSS:2018/Q3/208
OSS:2018/Q3/35
OSS:2018/Q3/76
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
OSS:2020/Q2/177
OSS:2022/11/10/2
OSS:2022/12/27/3
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2022/Q4/244
Oracle:CVE-2014-0224
Oracle:CVE-2017-0861
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
Oracle:CVE-2017-6074
Oracle:CVE-2018-3639
Oracle:CVE-2018-3646
Oracle:CVE-2018-5390
RH:CVE-2014-0224
RH:CVE-2017-10661
RH:CVE-2017-13166
RH:CVE-2017-13168
RH:CVE-2017-16648
RH:CVE-2017-17805
RH:CVE-2017-17806
RH:CVE-2017-18017
RH:CVE-2017-18075
RH:CVE-2017-18208
RH:CVE-2017-18344
RH:CVE-2017-8831
RH:CVE-2018-1000026
RH:CVE-2018-1000204
RH:CVE-2018-1065
RH:CVE-2018-1068
RH:CVE-2018-10880
RH:CVE-2018-1120
RH:CVE-2018-1122
RH:CVE-2018-1123
RH:CVE-2018-1124
RH:CVE-2018-1125
RH:CVE-2018-1126
RH:CVE-2018-1130
RH:CVE-2018-13405
RH:CVE-2018-3639
RH:CVE-2018-5344
RH:CVE-2018-5750
RH:CVE-2018-7566
RHBA-2020:0547
RHSA-2014:0624
RHSA-2014:0625
RHSA-2014:0626
RHSA-2014:0627
RHSA-2014:0628
RHSA-2014:0629
RHSA-2014:0630
RHSA-2014:0631
RHSA-2014:0632
RHSA-2014:0633
RHSA-2014:0679
RHSA-2014:0680
RHSA-2015:1176
RHSA-2016:2035
RHSA-2016:2036
RHSA-2016:2130
RHSA-2016:2131
RHSA-2016:2595
RHSA-2016:2749
RHSA-2016:2927
RHSA-2016:2928
RHSA-2017:0184
RHSA-2017:0272
RHSA-2017:0868
RHSA-2017:1208
RHSA-2017:2486
RHSA-2017:2596
RHSA-2017:3189
RHSA-2017:3190
RHSA-2018:0342
RHSA-2018:0478
RHSA-2018:0479
RHSA-2018:0480
RHSA-2018:0481
RHSA-2018:0576
RHSA-2018:0577
RHSA-2018:0676
RHSA-2018:1062
RHSA-2018:1130
RHSA-2018:1170
RHSA-2018:1318
RHSA-2018:1319
RHSA-2018:1355
RHSA-2018:1447
RHSA-2018:1448
RHSA-2018:1449
RHSA-2018:1450
RHSA-2018:1451
RHSA-2018:1629
RHSA-2018:1630
RHSA-2018:1632
RHSA-2018:1633
RHSA-2018:1635
RHSA-2018:1636
RHSA-2018:1637
RHSA-2018:1638
RHSA-2018:1639
RHSA-2018:1640
RHSA-2018:1641
RHSA-2018:1642
RHSA-2018:1643
RHSA-2018:1644
RHSA-2018:1645
RHSA-2018:1646
RHSA-2018:1647
RHSA-2018:1648
RHSA-2018:1649
RHSA-2018:1650
RHSA-2018:1651
RHSA-2018:1652
RHSA-2018:1653
RHSA-2018:1654
RHSA-2018:1655
RHSA-2018:1656
RHSA-2018:1657
RHSA-2018:1658
RHSA-2018:1659
RHSA-2018:1660
RHSA-2018:1661
RHSA-2018:1662
RHSA-2018:1663
RHSA-2018:1664
RHSA-2018:1665
RHSA-2018:1666
RHSA-2018:1667
RHSA-2018:1668
RHSA-2018:1669
RHSA-2018:1674
RHSA-2018:1675
RHSA-2018:1676
RHSA-2018:1686
RHSA-2018:1688
RHSA-2018:1689
RHSA-2018:1690
RHSA-2018:1696
RHSA-2018:1700
RHSA-2018:1710
RHSA-2018:1711
RHSA-2018:1737
RHSA-2018:1738
RHSA-2018:1777
RHSA-2018:1820
RHSA-2018:1826
RHSA-2018:1854
RHSA-2018:1965
RHSA-2018:1967
RHSA-2018:1997
RHSA-2018:2001
RHSA-2018:2003
RHSA-2018:2006
RHSA-2018:2060
RHSA-2018:2161
RHSA-2018:2162
RHSA-2018:2164
RHSA-2018:2171
RHSA-2018:2172
RHSA-2018:2216
RHSA-2018:2228
RHSA-2018:2246
RHSA-2018:2250
RHSA-2018:2258
RHSA-2018:2267
RHSA-2018:2268
RHSA-2018:2289
RHSA-2018:2309
RHSA-2018:2328
RHSA-2018:2363
RHSA-2018:2364
RHSA-2018:2384
RHSA-2018:2387
RHSA-2018:2390
RHSA-2018:2394
RHSA-2018:2395
RHSA-2018:2396
RHSA-2018:2669
RHSA-2018:2927
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
RHSA-2018:3396
RHSA-2018:3397
RHSA-2018:3398
RHSA-2018:3399
RHSA-2018:3400
RHSA-2018:3401
RHSA-2018:3402
RHSA-2018:3407
RHSA-2018:3423
RHSA-2018:3424
RHSA-2018:3425
RHSA-2018:3459
RHSA-2018:3540
RHSA-2018:3586
RHSA-2018:3590
RHSA-2018:3591
RHSA-2019:0148
RHSA-2019:0525
RHSA-2019:0717
RHSA-2019:1046
RHSA-2019:1170
RHSA-2019:1190
RHSA-2019:1483
RHSA-2019:1487
RHSA-2019:1944
RHSA-2019:2189
RHSA-2019:2401
RHSA-2019:2473
RHSA-2019:2476
RHSA-2019:2566
RHSA-2019:2696
RHSA-2019:2730
RHSA-2019:3967
RHSA-2019:4057
RHSA-2019:4058
RHSA-2019:4159
RHSA-2019:4164
RHSA-2020:0036
RHSA-2020:0595
RHSA-2020:1265
RHSA-2020:1464
RHSA-2020:3804
RHSA-2020:3810
SECTRACK:1031032
SECTRACK:1031594
SECTRACK:1034077
SECTRACK:1036056
SECTRACK:1036377
SECTRACK:1036378
SECTRACK:1036393
SECTRACK:1036397
SECTRACK:1037036
SECTRACK:1037046
SECTRACK:1037053
SECTRACK:1037640
SECTRACK:1039600
SECTRACK:1040319
SECTRACK:1040446
SECTRACK:1040949
SECTRACK:1041057
SECTRACK:1041294
SECTRACK:1041414
SECTRACK:1042004
SECUNIA:57477
SECUNIA:58128
SECUNIA:58337
SECUNIA:58385
SECUNIA:58433
SECUNIA:58492
SECUNIA:58579
SECUNIA:58615
SECUNIA:58639
SECUNIA:58660
SECUNIA:58667
SECUNIA:58710
SECUNIA:58713
SECUNIA:58714
SECUNIA:58716
SECUNIA:58719
SECUNIA:58742
SECUNIA:58745
SECUNIA:58759
SECUNIA:58851
SECUNIA:58930
SECUNIA:58945
SECUNIA:58947
SECUNIA:58977
SECUNIA:59004
SECUNIA:59012
SECUNIA:59014
SECUNIA:59040
SECUNIA:59043
SECUNIA:59055
SECUNIA:59063
SECUNIA:59093
SECUNIA:59101
SECUNIA:59118
SECUNIA:59132
SECUNIA:59135
SECUNIA:59142
SECUNIA:59163
SECUNIA:59167
SECUNIA:59175
SECUNIA:59186
SECUNIA:59188
SECUNIA:59189
SECUNIA:59190
SECUNIA:59191
SECUNIA:59192
SECUNIA:59202
SECUNIA:59211
SECUNIA:59214
SECUNIA:59215
SECUNIA:59223
SECUNIA:59228
SECUNIA:59231
SECUNIA:59245
SECUNIA:59246
SECUNIA:59264
SECUNIA:59282
SECUNIA:59284
SECUNIA:59287
SECUNIA:59305
SECUNIA:59306
SECUNIA:59310
SECUNIA:59325
SECUNIA:59338
SECUNIA:59347
SECUNIA:59354
SECUNIA:59362
SECUNIA:59364
SECUNIA:59365
SECUNIA:59368
SECUNIA:59370
SECUNIA:59374
SECUNIA:59375
SECUNIA:59380
SECUNIA:59383
SECUNIA:59389
SECUNIA:59429
SECUNIA:59430
SECUNIA:59435
SECUNIA:59437
SECUNIA:59440
SECUNIA:59441
SECUNIA:59442
SECUNIA:59444
SECUNIA:59445
SECUNIA:59446
SECUNIA:59447
SECUNIA:59448
SECUNIA:59449
SECUNIA:59454
SECUNIA:59459
SECUNIA:59460
SECUNIA:59464
SECUNIA:59479
SECUNIA:59480
SECUNIA:59483
SECUNIA:59502
SECUNIA:59506
SECUNIA:59518
SECUNIA:59525
SECUNIA:59529
SECUNIA:59589
SECUNIA:59602
SECUNIA:59661
SECUNIA:59677
SECUNIA:59704
SECUNIA:59718
SECUNIA:59824
SECUNIA:59827
SECUNIA:59878
SECUNIA:59885
SECUNIA:59894
SECUNIA:59916
SECUNIA:60176
SECUNIA:60177
SECUNIA:60522
SECUNIA:60567
SECUNIA:60577
SECUNIA:60703
SECUNIA:60819
SECUNIA:61254
SECUNIA:61815
SMASH Issue 184883
SMASH Issue 190204
SMASH Issue 194646
SMASH Issue 196268
SMASH Issue 196270
SMASH Issue 196659
SMASH Issue 197016
SMASH Issue 197017
SMASH Issue 197538
SMASH Issue 198115
SMASH Issue 198879
SMASH Issue 198893
SMASH Issue 199072
SMASH Issue 199429
SMASH Issue 201048
SMASH Issue 201049
SMASH Issue 201087
SMASH Issue 201727
SMASH Issue 202009
SMASH Issue 202788
SMASH Issue 204752
SMASH Issue 205325
SMASH Issue 205474
SMASH Issue 207826
SMASH Issue 209218
SMASH Issue 209676
SMASH Issue 211888
SMASH Issue 218336
SMASH Issue 218348
SMASH Issue 218349
SMASH Issue 218448
SMASH Issue 218452
SMASH Issue 218461
SMASH Issue 99325
SUSE:SUSE-SU-2015:0578
SUSE:SUSE-SU-2015:0743
SUSE:SUSE-SU-2018:0010
SUSE:SUSE-SU-2018:0011
SUSE:SUSE-SU-2018:0012
SUSE:SUSE-SU-2018:0383
SUSE:SUSE-SU-2018:0416
SUSE:SUSE-SU-2018:0482
SUSE:SUSE-SU-2018:0555
SUSE:SUSE-SU-2018:0660
SUSE:SUSE-SU-2018:0834
SUSE:SUSE-SU-2018:0841
SUSE:SUSE-SU-2018:0848
SUSE:SUSE-SU-2018:0986
SUSE:openSUSE-SU-2015:0229
SUSE:openSUSE-SU-2015:1911
SUSE:openSUSE-SU-2016:0640
SUSE:openSUSE-SU-2018:0022
SUSE:openSUSE-SU-2018:0023
SUSE:openSUSE-SU-2018:0408
SUSE:openSUSE-SU-2019:1407
SUSE:openSUSE-SU-2019:1438
SUSE:openSUSE-SU-2019:1439
SUSE:openSUSE-SU-2019:2376
SUSE:openSUSE-SU-2019:2379
SUSE:openSUSE-SU-2020:1325
UBUNTU:CVE-2014-0224
UBUNTU:CVE-2017-10661
UBUNTU:CVE-2017-13166
UBUNTU:CVE-2017-13168
UBUNTU:CVE-2017-16648
UBUNTU:CVE-2017-17805
UBUNTU:CVE-2017-17806
UBUNTU:CVE-2017-18017
UBUNTU:CVE-2017-18075
UBUNTU:CVE-2017-18208
UBUNTU:CVE-2017-18344
UBUNTU:CVE-2017-8831
UBUNTU:CVE-2018-1000026
UBUNTU:CVE-2018-1000204
UBUNTU:CVE-2018-10021
UBUNTU:CVE-2018-1065
UBUNTU:CVE-2018-1068
UBUNTU:CVE-2018-10853
UBUNTU:CVE-2018-10880
UBUNTU:CVE-2018-1120
UBUNTU:CVE-2018-1122
UBUNTU:CVE-2018-1123
UBUNTU:CVE-2018-1124
UBUNTU:CVE-2018-1125
UBUNTU:CVE-2018-1126
UBUNTU:CVE-2018-1130
UBUNTU:CVE-2018-13405
UBUNTU:CVE-2018-3639
UBUNTU:CVE-2018-5344
UBUNTU:CVE-2018-5750
UBUNTU:CVE-2018-7566
UBUNTU:CVE-2018-7995
UBUNTU:USN-3583-1
UBUNTU:USN-3583-2
UBUNTU:USN-3617-1
UBUNTU:USN-3617-2
UBUNTU:USN-3617-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3620-1
UBUNTU:USN-3620-2
UBUNTU:USN-3631-1
UBUNTU:USN-3631-2
UBUNTU:USN-3632-1
UBUNTU:USN-3651-1
UBUNTU:USN-3652-1
UBUNTU:USN-3653-1
UBUNTU:USN-3653-2
UBUNTU:USN-3654-1
UBUNTU:USN-3654-2
UBUNTU:USN-3655-1
UBUNTU:USN-3655-2
UBUNTU:USN-3656-1
UBUNTU:USN-3657-1
UBUNTU:USN-3658-1
UBUNTU:USN-3658-2
UBUNTU:USN-3658-3
UBUNTU:USN-3674-1
UBUNTU:USN-3674-2
UBUNTU:USN-3677-1
UBUNTU:USN-3677-2
UBUNTU:USN-3678-1
UBUNTU:USN-3678-2
UBUNTU:USN-3678-3
UBUNTU:USN-3678-4
UBUNTU:USN-3679-1
UBUNTU:USN-3680-1
UBUNTU:USN-3693-1
UBUNTU:USN-3696-1
UBUNTU:USN-3696-2
UBUNTU:USN-3697-1
UBUNTU:USN-3697-2
UBUNTU:USN-3698-1
UBUNTU:USN-3698-2
UBUNTU:USN-3727-1
UBUNTU:USN-3742-1
UBUNTU:USN-3742-2
UBUNTU:USN-3752-1
UBUNTU:USN-3752-2
UBUNTU:USN-3752-3
UBUNTU:USN-3753-1
UBUNTU:USN-3753-2
UBUNTU:USN-3754-1
UBUNTU:USN-3756-1
UBUNTU:USN-3777-1
UBUNTU:USN-3777-2
UBUNTU:USN-3777-3
UBUNTU:USN-3798-1
UBUNTU:USN-3798-2
UBUNTU:USN-3820-1
UBUNTU:USN-3820-2
UBUNTU:USN-3820-3
UBUNTU:USN-3821-1
UBUNTU:USN-3821-2
UBUNTU:USN-3822-1
UBUNTU:USN-3822-2
USN-3583-1
USN-3583-2
USN-3871-1
USN-3871-3
USN-3871-4
USN-3871-5
USN-3910-1
USN-3910-2
ZDI-16-570
bdo#1033297
bdo#797165
bdo#864859
bdo#866511
bdo#873383
bdo#875881
bdo#899170
bnc#1037994
bnc#1053152
bnc#1053153
bnc#1067087
bnc#1067118
bnc#1072831
bnc#1072865
bnc#1073792
bnc#1073874
bnc#1074488
bnc#1075825
bnc#1077402
bnc#1077404
bnc#1077892
bnc#1079384
bnc#1083483
bnc#1083494
bnc#1083650
bnc#1084755
bnc#1085107
bnc#1085447
bnc#1089281
bnc#1092904
bnc#1099845
bnc#1102851
bnc#1103203
bnc#1103580
bnc#882572
bnc#885777
bnc#901237
bnc#903703
bnc#905857
bnc#914447
bnc#916239
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=318aaf34f1179b39fa9c30fa0f3288b645beee39
linux.git:commit:7f7ccc2ccc2e70c6054685f5e3522efa81556830
linux.git:commit:8cdb5240ec5928b20490a2bb34cb87e9a5f40226
linux.git:commit:d36260050e1881dce09625a9352d8729c911a6e3
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1091938
rh#1103586
rh#1112877
rh#1243852
rh#1343538
rh#1343540
rh#1396963
rh#1396971
rh#1435719
rh#1449980
rh#1462147
rh#1462158
rh#1481136
rh#1481178
rh#1485274
rh#1495089
rh#1498016
rh#1516257
rh#1519780
rh#1527393
rh#1528312
rh#1528323
rh#1531135
rh#1533909
rh#1539508
rh#1539599
rh#1539706
rh#1541846
rh#1547824
rh#1548412
rh#1550142
rh#1551565
rh#1552048
rh#1553911
rh#1566407
rh#1566890
rh#1573699
rh#1575465
rh#1575466
rh#1575472
rh#1575474
rh#1575852
rh#1575853
rh#1575866
rh#1576419
rh#1589324
rh#1589890
rh#1596773
rh#1596795
rh#1596812
rh#1596842
rh#1599161
rh#1601704
rh#1609664
rh#1610958
rh#1658985
rh#1890354
rh#2027239
rh#2044863
rh#2061700
rh#2119127
CVE-2018-10882kernel-source-rt:Not affectedmoderate5 (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H)AIXAPAR:IT02314
AIXAPAR:IV61506
BID:100215
BID:100503
BID:100514
BID:100861
BID:101758
BID:102291
BID:102293
BID:102367
BID:102503
BID:102813
BID:103316
BID:103356
BID:103423
BID:103605
BID:104229
BID:104232
BID:104909
BID:105647
BID:105656
BID:105658
BID:106503
BID:67121
BID:79091
BID:91067
BID:91068
BID:91787
BID:91869
BID:93132
BID:93287
BID:93604
BID:94371
BID:94377
BID:94925
BID:95429
BID:99619
BUGTRAQ:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
BUGTRAQ:20190624 [SECURITY] [DSA 4469-1] libvirt security update
CERT-VN:VU#180049
CERT-VN:VU#978508
CERT:TA18-141A
CISCO:20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products
CISCO:20180522 CPU Side-Channel Information Disclosure Vulnerabilities: May 2018
CONFIRM:access.redhat.com:CVE-2014-0114
CONFIRM:access.redhat.com:CVE-2014-0224
CONFIRM:advisories.mageia.org:CVE-2014-0114
CONFIRM:aix.software.ibm.com:CVE-2014-3470
CONFIRM:blogs.oracle.com:CVE-2014-0224
CONFIRM:bugs.jython.org:CVE-2016-4000
CONFIRM:bugs.launchpad.net:CVE-2015-8866
CONFIRM:bugs.launchpad.net:CVE-2015-8867
CONFIRM:bugs.php.net:CVE-2015-8866
CONFIRM:bugs.php.net:CVE-2015-8867
CONFIRM:bugzilla.kernel.org:CVE-2018-10876
CONFIRM:bugzilla.kernel.org:CVE-2018-10880
CONFIRM:bugzilla.kernel.org:CVE-2018-10882
CONFIRM:bugzilla.kernel.org:CVE-2018-7740
CONFIRM:bugzilla.redhat.com:CVE-2018-10853
CONFIRM:bugzilla.redhat.com:CVE-2018-10876
CONFIRM:bugzilla.redhat.com:CVE-2018-10877
CONFIRM:bugzilla.redhat.com:CVE-2018-10880
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CONFIRM:bugzilla.redhat.com:CVE-2018-1120
CONFIRM:bugzilla.redhat.com:CVE-2018-1122
CONFIRM:bugzilla.redhat.com:CVE-2018-1123
CONFIRM:bugzilla.redhat.com:CVE-2018-1124
CONFIRM:bugzilla.redhat.com:CVE-2018-1125
CONFIRM:bugzilla.redhat.com:CVE-2018-1126
CONFIRM:cert-portal.siemens.com:CVE-2017-5715
CONFIRM:cert-portal.siemens.com:CVE-2017-5753
CONFIRM:cert-portal.siemens.com:CVE-2018-3640
CONFIRM:commons.apache.org:CVE-2014-0114
CONFIRM:dev.mysql.com:CVE-2014-0224
CONFIRM:developer.arm.com:CVE-2017-5754
CONFIRM:discussions.nessus.org:CVE-2014-0224
CONFIRM:esupport.trendmicro.com:CVE-2014-0224
CONFIRM:filezilla-project.org:CVE-2014-0224
CONFIRM:git.kernel.org:CVE-2017-10661
CONFIRM:git.kernel.org:CVE-2017-17805
CONFIRM:git.kernel.org:CVE-2017-17806
CONFIRM:git.kernel.org:CVE-2017-18075
CONFIRM:git.kernel.org:CVE-2018-10853
CONFIRM:git.kernel.org:CVE-2018-10876
CONFIRM:git.kernel.org:CVE-2018-10880
CONFIRM:git.kernel.org:CVE-2018-10882
CONFIRM:git.kernel.org:CVE-2018-1120
CONFIRM:git.kernel.org:CVE-2018-7566
CONFIRM:git.openssl.org:CVE-2014-0224
CONFIRM:git.php.net:CVE-2015-8866
CONFIRM:git.php.net:CVE-2015-8867
CONFIRM:github.com:CVE-2016-1182
CONFIRM:github.com:CVE-2016-9389
CONFIRM:github.com:CVE-2016-9394
CONFIRM:github.com:CVE-2016-9583
CONFIRM:github.com:CVE-2017-10661
CONFIRM:github.com:CVE-2017-14735
CONFIRM:github.com:CVE-2017-17805
CONFIRM:github.com:CVE-2017-17806
CONFIRM:github.com:CVE-2017-18075
CONFIRM:github.com:CVE-2017-8831
CONFIRM:github.com:CVE-2018-1000204
CONFIRM:h20566.www2.hpe.com:CVE-2016-0705
CONFIRM:h20566.www2.hpe.com:CVE-2016-0763
CONFIRM:h20566.www2.hpe.com:CVE-2016-5388
CONFIRM:help.ecostruxureit.com:CVE-2017-5754
CONFIRM:hg.python.org:CVE-2016-4000
CONFIRM:issues.apache.org:CVE-2014-0114
CONFIRM:issues.apache.org:CVE-2015-1832
CONFIRM:issues.apache.org:CVE-2016-1000031
CONFIRM:kb.bluecoat.com:CVE-2014-3470
CONFIRM:kb.juniper.net:CVE-2014-0224
CONFIRM:kb.juniper.net:CVE-2014-3470
CONFIRM:kc.mcafee.com:CVE-2014-3470
CONFIRM:kc.mcafee.com:CVE-2017-12942
CONFIRM:linux.oracle.com:CVE-2014-3510
CONFIRM:nvidia.custhelp.com:CVE-2017-0330
CONFIRM:patchwork.kernel.org:CVE-2018-5750
CONFIRM:patchwork.ozlabs.org:CVE-2018-10876
CONFIRM:patchwork.ozlabs.org:CVE-2018-10880
CONFIRM:portal.msrc.microsoft.com:CVE-2018-3639
CONFIRM:psirt.global.sonicwall.com:CVE-2018-3639
CONFIRM:puppetlabs.com:CVE-2014-0224
CONFIRM:rwkbp.makekb.com:CVE-2015-8965
CONFIRM:security-tracker.debian.org:CVE-2016-1181
CONFIRM:security-tracker.debian.org:CVE-2016-1182
CONFIRM:security.netapp.com:CVE-2014-0114
CONFIRM:security.netapp.com:CVE-2016-1000031
CONFIRM:security.netapp.com:CVE-2016-1182
CONFIRM:security.netapp.com:CVE-2017-5645
CONFIRM:security.netapp.com:CVE-2018-3640
CONFIRM:source.android.com:CVE-2017-10663
CONFIRM:source.android.com:CVE-2017-6280
CONFIRM:support.apple.com:CVE-2014-4979
CONFIRM:support.citrix.com:CVE-2014-3470
CONFIRM:support.citrix.com:CVE-2018-3639
CONFIRM:support.f5.com:CVE-2014-0224
CONFIRM:support.f5.com:CVE-2017-18017
CONFIRM:support.f5.com:CVE-2018-13405
CONFIRM:support.hpe.com:CVE-2018-3640
CONFIRM:support.lenovo.com:CVE-2018-3640
CONFIRM:support.oracle.com:CVE-2018-3639
CONFIRM:svn.apache.org:CVE-2015-1832
CONFIRM:www-01.ibm.com:CVE-2014-0114
CONFIRM:www-01.ibm.com:CVE-2014-0224
CONFIRM:www-01.ibm.com:CVE-2014-3022
CONFIRM:www-01.ibm.com:CVE-2014-3470
CONFIRM:www-01.ibm.com:CVE-2015-1832
CONFIRM:www-947.ibm.com:CVE-2014-0224
CONFIRM:www-947.ibm.com:CVE-2014-3470
CONFIRM:www.blackberry.com:CVE-2014-3470
CONFIRM:www.f-secure.com:CVE-2014-3470
CONFIRM:www.fortiguard.com:CVE-2014-0224
CONFIRM:www.fujitsu.com:CVE-2018-3640
CONFIRM:www.huawei.com:CVE-2014-3470
CONFIRM:www.ibm.com:CVE-2014-0224
CONFIRM:www.ibm.com:CVE-2014-0963
CONFIRM:www.ibm.com:CVE-2014-3470
CONFIRM:www.innominate.com:CVE-2014-0224
CONFIRM:www.intel.com:CVE-2018-3640
CONFIRM:www.intersectalliance.com:CVE-2014-0224
CONFIRM:www.kerio.com:CVE-2014-3857
CONFIRM:www.kernel.org:CVE-2017-10661
CONFIRM:www.kernel.org:CVE-2017-17806
CONFIRM:www.kernel.org:CVE-2017-18075
CONFIRM:www.mitel.com:CVE-2018-3640
CONFIRM:www.novell.com:CVE-2014-3470
CONFIRM:www.openssl.org:CVE-2014-3470
CONFIRM:www.oracle.com:CVE-2014-0114
CONFIRM:www.oracle.com:CVE-2014-4271
CONFIRM:www.oracle.com:CVE-2014-6564
CONFIRM:www.oracle.com:CVE-2015-0437
CONFIRM:www.oracle.com:CVE-2016-5477
CONFIRM:www.oracle.com:CVE-2017-3626
CONFIRM:www.oracle.com:CVE-2017-5689
CONFIRM:www.oracle.com:CVE-2017-5709
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CONFIRM:www.splunk.com:CVE-2014-3470
CONFIRM:www.synology.com:CVE-2018-3640
CONFIRM:www.tenable.com:CVE-2014-0224
CONFIRM:www.vmware.com:CVE-2014-0114
CONFIRM:www.vmware.com:CVE-2014-3470
CONFIRM:www.vmware.com:CVE-2014-8371
CONFIRM:www.websense.com:CVE-2015-2773
CONFIRM:www14.software.ibm.com:CVE-2014-3470
CONFIRM:xenbits.xen.org:CVE-2018-3639
CVE-2014-0114
CVE-2014-0224
CVE-2014-4651
CVE-2015-0852
CVE-2015-1832
CVE-2015-2613
CVE-2015-2769
CVE-2015-2770
CVE-2015-7940
CVE-2015-8965
CVE-2015-9251
CVE-2016-0635
CVE-2016-1000031
CVE-2016-1181
CVE-2016-1182
CVE-2016-4000
CVE-2016-5684
CVE-2016-6814
CVE-2016-9389
CVE-2016-9392
CVE-2016-9583
CVE-2017-0379
CVE-2017-10661
CVE-2017-13166
CVE-2017-13168
CVE-2017-13745
CVE-2017-14229
CVE-2017-14735
CVE-2017-15095
CVE-2017-16648
CVE-2017-17805
CVE-2017-17806
CVE-2017-18017
CVE-2017-18075
CVE-2017-18208
CVE-2017-18232
CVE-2017-18344
CVE-2017-8813
CVE-2017-8831
CVE-2018-1000026
CVE-2018-1000204
CVE-2018-10021
CVE-2018-1065
CVE-2018-10853
CVE-2018-10876
CVE-2018-10877
CVE-2018-10880
CVE-2018-10882
CVE-2018-1095
CVE-2018-1120
CVE-2018-1122
CVE-2018-1123
CVE-2018-1124
CVE-2018-1125
CVE-2018-1126
CVE-2018-13405
CVE-2018-3639
CVE-2018-5344
CVE-2018-5750
CVE-2018-7566
CVE-2018-7740
CVE-2018-7995
D:CVE-2014-0224
D:CVE-2017-10661
D:CVE-2017-8831
D:CVE-2018-10882
D:CVE-2018-1126
D:CVE-2018-3639
D:CVE-2018-5750
D:CVE-2018-7740
DEBIAN:DSA-3959
DEBIAN:DSA-4073
DEBIAN:DSA-4082
DEBIAN:DSA-4120
DEBIAN:DSA-4187
DEBIAN:DSA-4188
DEBIAN:DSA-4208
DEBIAN:DSA-4210
DEBIAN:DSA-4266
DEBIAN:DSA-4273
DSA-2940
DSA-2950
DSA-3392
DSA-3417
DSA-3893
DSA-3981
DSA-4073
DSA-4082
DSA-4120
DSA-4187
DSA-4188
DSA-4208
DSA-4210
DSA-4266
DSA-4273
DSA-5378
EXPLOIT-DB:43345
EXPLOIT-DB:44695
EXPLOIT-DB:45033
EXPLOIT-DB:45175
FEDORA:FEDORA-2014-9301
FEDORA:FEDORA-2014-9308
FEDORA:FEDORA-2014-9380
FEDORA:FEDORA-2015-16104
FEDORA:FEDORA-2015-16105
FEDORA:FEDORA-2015-16106
FEDORA:FEDORA-2015-7d95466eda
FEDORA:FEDORA-2015-992342e82f
FEDORA:FEDORA-2015-decbab7c9f
FULLDISC:20140607 Re: More OpenSSL issues
FULLDISC:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
GENTOO:GLSA-201407-05
GENTOO:GLSA-201607-09
GENTOO:GLSA-201701-68
GENTOO:GLSA-201710-28
HP:HPSBGN03041
HP:HPSBGN03050
HP:HPSBGN03068
HP:HPSBHF03052
HP:HPSBHF03088
HP:HPSBHF03145
HP:HPSBMU03051
HP:HPSBMU03053
HP:HPSBMU03055
HP:HPSBMU03056
HP:HPSBMU03057
HP:HPSBMU03058
HP:HPSBMU03062
HP:HPSBMU03065
HP:HPSBMU03070
HP:HPSBMU03071
HP:HPSBMU03074
HP:HPSBMU03076
HP:HPSBMU03078
HP:HPSBMU03083
HP:HPSBMU03089
HP:HPSBMU03090
HP:HPSBMU03094
HP:HPSBMU03101
HP:HPSBOV03047
HP:HPSBPI03107
HP:HPSBST03097
HP:HPSBST03098
HP:HPSBST03103
HP:HPSBST03106
HP:HPSBST03160
HP:HPSBST03195
HP:HPSBST03265
HP:HPSBUX03046
HP:SSRT101818
JVN:JVN#03188560
JVN:JVN#65044642
JVNDB:JVNDB-2016-000096
JVNDB:JVNDB-2016-000097
L3:41161
L3:42389
MANDRIVA:MDVSA-2014:095
MANDRIVA:MDVSA-2014:105
MANDRIVA:MDVSA-2014:106
MANDRIVA:MDVSA-2015:062
MISC:blogs.gentoo.org:CVE-2016-9399
MISC:bugs.chromium.org:CVE-2018-3639
MISC:bugs.launchpad.net:CVE-2017-18017
MISC:bugs.launchpad.net:OSS:2018/Q3/76
MISC:bugzilla.kernel.org:CVE-2017-8831
MISC:bugzilla.kernel.org:CVE-2018-1092
MISC:bugzilla.kernel.org:CVE-2018-1093
MISC:bugzilla.kernel.org:CVE-2018-1094
MISC:bugzilla.kernel.org:CVE-2018-1095
MISC:bugzilla.redhat.com:MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
MISC:ccsinjection.lepidum.co.jp:CVE-2014-0224
MISC:cdn.kernel.org:CVE-2017-18344
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:eprint.iacr.org:CVE-2017-0379
MISC:git.gnupg.org:CVE-2017-0379
MISC:git.kernel.org:CVE-2017-18017
MISC:git.kernel.org:CVE-2017-18208
MISC:git.kernel.org:CVE-2017-18232
MISC:git.kernel.org:CVE-2018-10021
MISC:git.kernel.org:CVE-2018-1065
MISC:git.kernel.org:CVE-2018-1095
MISC:git.kernel.org:CVE-2018-13405
MISC:git.kernel.org:CVE-2018-5344
MISC:git.kernel.org:CVE-2018-7995
MISC:git.kernel.org:OSS:2014/03/05/6
MISC:git.kernel.org:OSS:2018/Q3/35
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:github.com:CVE-2015-9251
MISC:github.com:CVE-2017-14229
MISC:github.com:CVE-2017-18017
MISC:github.com:CVE-2017-18208
MISC:github.com:CVE-2017-18232
MISC:github.com:CVE-2017-18344
MISC:github.com:CVE-2018-10021
MISC:github.com:CVE-2018-1065
MISC:github.com:CVE-2018-13405
MISC:github.com:CVE-2018-5344
MISC:github.com:OSS:2018/Q3/76
MISC:gitlab.com:OSS:2018/Q2/136
MISC:groups.google.com:CVE-2017-16648
MISC:ics-cert.us-cert.gov:CVE-2015-9251
MISC:lists.debian.org:CVE-2017-0379
MISC:lists.openwall.net:CVE-2018-1065
MISC:lkml.org:CVE-2017-18017
MISC:lkml.org:CVE-2018-7995
MISC:mail-archives.apache.org:CVE-2016-6814
MISC:openwall.com:CVE-2018-1095
MISC:openwall.com:CVE-2018-13405
MISC:patchwork.kernel.org:CVE-2017-16648
MISC:patchwork.ozlabs.org:CVE-2017-18017
MISC:patchwork.ozlabs.org:CVE-2018-1000026
MISC:patchwork.ozlabs.org:CVE-2018-1065
MISC:security-tracker.debian.org:CVE-2016-4000
MISC:security-tracker.debian.org:CVE-2017-0379
MISC:snyk.io:CVE-2015-9251
MISC:snyk.io:CVE-2016-4000
MISC:sw.aveva.com:CVE-2015-9251
MISC:twitter.com:CVE-2018-13405
MISC:web-in-security.blogspot.ca:CVE-2015-7940
MISC:www.arista.com:CVE-2017-18017
MISC:www.imperialviolet.org:CVE-2014-0224
MISC:www.kernel.org:CVE-2017-18017
MISC:www.kernel.org:CVE-2017-18208
MISC:www.openwall.com:CVE-2018-1000204
MISC:www.openwall.com:CVE-2018-10853
MISC:www.oracle.com:CVE-2014-0107
MISC:www.oracle.com:CVE-2015-7501
MISC:www.qualys.com:OSS:2018/Q2/122
MISC:www.securityfocus.com:CVE-2017-8831
MISC:www.talosintelligence.com:CVE-2016-5684
MISC:www.tenable.com:CVE-2016-1000031
MISC:www.tenable.com:CVE-2016-6793
MLIST:[alsa-devel] 20180214 [PATCH] ALSA: seq: Fix racy pool initializations
MLIST:[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior
MLIST:[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
MLIST:[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update
MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1446-1] intel-microcode security update
MLIST:[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update
MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
MLIST:[netdev] 20180116 http://lists.openwall.net/netdev/2018/01/16/40
MLIST:[netdev] 20180118 http://lists.openwall.net/netdev/2018/01/18/96
MLIST:[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE
MLIST:[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE
MLIST:[oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp
MLIST:[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle
MLIST:[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle
MLIST:[oss-security] 20161117 Re: jasper: multiple assertion failures
MLIST:[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
OSS:2014/03/05/6
OSS:2017/Q3/526
OSS:2017/Q4/244
OSS:2018/09/18/4
OSS:2018/09/25/4
OSS:2018/Q1/212
OSS:2018/Q1/284
OSS:2018/Q2/136
OSS:2018/Q3/208
OSS:2018/Q3/35
OSS:2018/Q3/76
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
OSS:2020/Q2/177
OSS:2022/11/10/2
OSS:2022/12/27/3
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2022/Q4/244
Oracle:CVE-2014-0224
Oracle:CVE-2017-0861
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
Oracle:CVE-2017-6074
Oracle:CVE-2018-3639
Oracle:CVE-2018-3646
Oracle:CVE-2018-5390
RH:CVE-2014-0224
RH:CVE-2017-10661
RH:CVE-2017-13166
RH:CVE-2017-13168
RH:CVE-2017-16648
RH:CVE-2017-17805
RH:CVE-2017-17806
RH:CVE-2017-18017
RH:CVE-2017-18075
RH:CVE-2017-18208
RH:CVE-2017-18232
RH:CVE-2017-18344
RH:CVE-2017-8831
RH:CVE-2018-1000026
RH:CVE-2018-1000204
RH:CVE-2018-1065
RH:CVE-2018-10882
RH:CVE-2018-1095
RH:CVE-2018-1120
RH:CVE-2018-1122
RH:CVE-2018-1123
RH:CVE-2018-1124
RH:CVE-2018-1125
RH:CVE-2018-1126
RH:CVE-2018-13405
RH:CVE-2018-3639
RH:CVE-2018-5344
RH:CVE-2018-5750
RH:CVE-2018-7566
RH:CVE-2018-7740
RHBA-2020:0547
RHSA-2014:0624
RHSA-2014:0625
RHSA-2014:0626
RHSA-2014:0627
RHSA-2014:0628
RHSA-2014:0629
RHSA-2014:0630
RHSA-2014:0631
RHSA-2014:0632
RHSA-2014:0633
RHSA-2014:0679
RHSA-2014:0680
RHSA-2015:1176
RHSA-2016:2035
RHSA-2016:2036
RHSA-2016:2130
RHSA-2016:2131
RHSA-2016:2595
RHSA-2016:2749
RHSA-2016:2927
RHSA-2016:2928
RHSA-2017:0184
RHSA-2017:0272
RHSA-2017:0868
RHSA-2017:1208
RHSA-2017:2486
RHSA-2017:2596
RHSA-2017:3189
RHSA-2017:3190
RHSA-2018:0342
RHSA-2018:0478
RHSA-2018:0479
RHSA-2018:0480
RHSA-2018:0481
RHSA-2018:0576
RHSA-2018:0577
RHSA-2018:0676
RHSA-2018:1062
RHSA-2018:1130
RHSA-2018:1170
RHSA-2018:1319
RHSA-2018:1447
RHSA-2018:1448
RHSA-2018:1449
RHSA-2018:1450
RHSA-2018:1451
RHSA-2018:1629
RHSA-2018:1630
RHSA-2018:1632
RHSA-2018:1633
RHSA-2018:1635
RHSA-2018:1636
RHSA-2018:1637
RHSA-2018:1638
RHSA-2018:1639
RHSA-2018:1640
RHSA-2018:1641
RHSA-2018:1642
RHSA-2018:1643
RHSA-2018:1644
RHSA-2018:1645
RHSA-2018:1646
RHSA-2018:1647
RHSA-2018:1648
RHSA-2018:1649
RHSA-2018:1650
RHSA-2018:1651
RHSA-2018:1652
RHSA-2018:1653
RHSA-2018:1654
RHSA-2018:1655
RHSA-2018:1656
RHSA-2018:1657
RHSA-2018:1658
RHSA-2018:1659
RHSA-2018:1660
RHSA-2018:1661
RHSA-2018:1662
RHSA-2018:1663
RHSA-2018:1664
RHSA-2018:1665
RHSA-2018:1666
RHSA-2018:1667
RHSA-2018:1668
RHSA-2018:1669
RHSA-2018:1674
RHSA-2018:1675
RHSA-2018:1676
RHSA-2018:1686
RHSA-2018:1688
RHSA-2018:1689
RHSA-2018:1690
RHSA-2018:1696
RHSA-2018:1700
RHSA-2018:1710
RHSA-2018:1711
RHSA-2018:1737
RHSA-2018:1738
RHSA-2018:1777
RHSA-2018:1820
RHSA-2018:1826
RHSA-2018:1854
RHSA-2018:1965
RHSA-2018:1967
RHSA-2018:1997
RHSA-2018:2001
RHSA-2018:2003
RHSA-2018:2006
RHSA-2018:2060
RHSA-2018:2161
RHSA-2018:2162
RHSA-2018:2164
RHSA-2018:2171
RHSA-2018:2172
RHSA-2018:2216
RHSA-2018:2228
RHSA-2018:2246
RHSA-2018:2250
RHSA-2018:2258
RHSA-2018:2267
RHSA-2018:2268
RHSA-2018:2289
RHSA-2018:2309
RHSA-2018:2328
RHSA-2018:2363
RHSA-2018:2364
RHSA-2018:2384
RHSA-2018:2387
RHSA-2018:2390
RHSA-2018:2394
RHSA-2018:2395
RHSA-2018:2396
RHSA-2018:2669
RHSA-2018:2927
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
RHSA-2018:3396
RHSA-2018:3397
RHSA-2018:3398
RHSA-2018:3399
RHSA-2018:3400
RHSA-2018:3401
RHSA-2018:3402
RHSA-2018:3407
RHSA-2018:3423
RHSA-2018:3424
RHSA-2018:3425
RHSA-2018:3459
RHSA-2018:3540
RHSA-2018:3586
RHSA-2018:3590
RHSA-2018:3591
RHSA-2019:0148
RHSA-2019:0525
RHSA-2019:0717
RHSA-2019:1046
RHSA-2019:1483
RHSA-2019:1487
RHSA-2019:1944
RHSA-2019:2189
RHSA-2019:2401
RHSA-2019:2473
RHSA-2019:2476
RHSA-2019:2566
RHSA-2019:2696
RHSA-2019:2730
RHSA-2019:3967
RHSA-2019:4057
RHSA-2019:4058
RHSA-2019:4159
RHSA-2019:4164
RHSA-2020:0036
RHSA-2020:0595
RHSA-2020:1265
RHSA-2020:1464
RHSA-2020:3804
RHSA-2020:3810
SECTRACK:1031032
SECTRACK:1031594
SECTRACK:1034077
SECTRACK:1036056
SECTRACK:1036377
SECTRACK:1036378
SECTRACK:1036393
SECTRACK:1036397
SECTRACK:1037036
SECTRACK:1037046
SECTRACK:1037053
SECTRACK:1037640
SECTRACK:1039600
SECTRACK:1040319
SECTRACK:1040446
SECTRACK:1040949
SECTRACK:1041057
SECTRACK:1041294
SECTRACK:1041414
SECTRACK:1042004
SECUNIA:57477
SECUNIA:58128
SECUNIA:58337
SECUNIA:58385
SECUNIA:58433
SECUNIA:58492
SECUNIA:58579
SECUNIA:58615
SECUNIA:58639
SECUNIA:58660
SECUNIA:58667
SECUNIA:58710
SECUNIA:58713
SECUNIA:58714
SECUNIA:58716
SECUNIA:58719
SECUNIA:58742
SECUNIA:58745
SECUNIA:58759
SECUNIA:58851
SECUNIA:58930
SECUNIA:58945
SECUNIA:58947
SECUNIA:58977
SECUNIA:59004
SECUNIA:59012
SECUNIA:59014
SECUNIA:59040
SECUNIA:59043
SECUNIA:59055
SECUNIA:59063
SECUNIA:59093
SECUNIA:59101
SECUNIA:59118
SECUNIA:59132
SECUNIA:59135
SECUNIA:59142
SECUNIA:59163
SECUNIA:59167
SECUNIA:59175
SECUNIA:59186
SECUNIA:59188
SECUNIA:59189
SECUNIA:59190
SECUNIA:59191
SECUNIA:59192
SECUNIA:59202
SECUNIA:59211
SECUNIA:59214
SECUNIA:59215
SECUNIA:59223
SECUNIA:59228
SECUNIA:59231
SECUNIA:59245
SECUNIA:59246
SECUNIA:59264
SECUNIA:59282
SECUNIA:59284
SECUNIA:59287
SECUNIA:59305
SECUNIA:59306
SECUNIA:59310
SECUNIA:59325
SECUNIA:59338
SECUNIA:59347
SECUNIA:59354
SECUNIA:59362
SECUNIA:59364
SECUNIA:59365
SECUNIA:59368
SECUNIA:59370
SECUNIA:59374
SECUNIA:59375
SECUNIA:59380
SECUNIA:59383
SECUNIA:59389
SECUNIA:59429
SECUNIA:59430
SECUNIA:59435
SECUNIA:59437
SECUNIA:59440
SECUNIA:59441
SECUNIA:59442
SECUNIA:59444
SECUNIA:59445
SECUNIA:59446
SECUNIA:59447
SECUNIA:59448
SECUNIA:59449
SECUNIA:59454
SECUNIA:59459
SECUNIA:59460
SECUNIA:59464
SECUNIA:59479
SECUNIA:59480
SECUNIA:59483
SECUNIA:59502
SECUNIA:59506
SECUNIA:59518
SECUNIA:59525
SECUNIA:59529
SECUNIA:59589
SECUNIA:59602
SECUNIA:59661
SECUNIA:59677
SECUNIA:59704
SECUNIA:59718
SECUNIA:59824
SECUNIA:59827
SECUNIA:59878
SECUNIA:59885
SECUNIA:59894
SECUNIA:59916
SECUNIA:60176
SECUNIA:60177
SECUNIA:60522
SECUNIA:60567
SECUNIA:60577
SECUNIA:60703
SECUNIA:60819
SECUNIA:61254
SECUNIA:61815
SMASH Issue 184883
SMASH Issue 190204
SMASH Issue 194646
SMASH Issue 196268
SMASH Issue 196270
SMASH Issue 196659
SMASH Issue 197016
SMASH Issue 197017
SMASH Issue 197538
SMASH Issue 198115
SMASH Issue 198879
SMASH Issue 198893
SMASH Issue 199072
SMASH Issue 199429
SMASH Issue 201048
SMASH Issue 201049
SMASH Issue 201087
SMASH Issue 201398
SMASH Issue 201990
SMASH Issue 202009
SMASH Issue 202739
SMASH Issue 202788
SMASH Issue 204752
SMASH Issue 205325
SMASH Issue 207690
SMASH Issue 207826
SMASH Issue 209220
SMASH Issue 209676
SMASH Issue 211888
SMASH Issue 218336
SMASH Issue 218348
SMASH Issue 218349
SMASH Issue 218448
SMASH Issue 218452
SMASH Issue 218461
SMASH Issue 99325
SUSE:SUSE-SU-2015:0578
SUSE:SUSE-SU-2015:0743
SUSE:SUSE-SU-2018:0010
SUSE:SUSE-SU-2018:0011
SUSE:SUSE-SU-2018:0012
SUSE:SUSE-SU-2018:0383
SUSE:SUSE-SU-2018:0416
SUSE:SUSE-SU-2018:0482
SUSE:SUSE-SU-2018:0555
SUSE:SUSE-SU-2018:0660
SUSE:SUSE-SU-2018:0834
SUSE:SUSE-SU-2018:0841
SUSE:SUSE-SU-2018:0848
SUSE:SUSE-SU-2018:0986
SUSE:openSUSE-SU-2015:0229
SUSE:openSUSE-SU-2015:1911
SUSE:openSUSE-SU-2016:0640
SUSE:openSUSE-SU-2018:0022
SUSE:openSUSE-SU-2018:0023
SUSE:openSUSE-SU-2018:0408
SUSE:openSUSE-SU-2019:1407
SUSE:openSUSE-SU-2019:1438
SUSE:openSUSE-SU-2019:1439
SUSE:openSUSE-SU-2019:2376
SUSE:openSUSE-SU-2019:2379
SUSE:openSUSE-SU-2020:1325
UBUNTU:CVE-2014-0224
UBUNTU:CVE-2017-10661
UBUNTU:CVE-2017-13166
UBUNTU:CVE-2017-13168
UBUNTU:CVE-2017-16648
UBUNTU:CVE-2017-17805
UBUNTU:CVE-2017-17806
UBUNTU:CVE-2017-18017
UBUNTU:CVE-2017-18075
UBUNTU:CVE-2017-18208
UBUNTU:CVE-2017-18232
UBUNTU:CVE-2017-18344
UBUNTU:CVE-2017-8831
UBUNTU:CVE-2018-1000026
UBUNTU:CVE-2018-1000204
UBUNTU:CVE-2018-10021
UBUNTU:CVE-2018-1065
UBUNTU:CVE-2018-10853
UBUNTU:CVE-2018-10882
UBUNTU:CVE-2018-1095
UBUNTU:CVE-2018-1120
UBUNTU:CVE-2018-1122
UBUNTU:CVE-2018-1123
UBUNTU:CVE-2018-1124
UBUNTU:CVE-2018-1125
UBUNTU:CVE-2018-1126
UBUNTU:CVE-2018-13405
UBUNTU:CVE-2018-3639
UBUNTU:CVE-2018-5344
UBUNTU:CVE-2018-5750
UBUNTU:CVE-2018-7566
UBUNTU:CVE-2018-7740
UBUNTU:CVE-2018-7995
UBUNTU:USN-3583-1
UBUNTU:USN-3583-2
UBUNTU:USN-3617-1
UBUNTU:USN-3617-2
UBUNTU:USN-3617-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3620-1
UBUNTU:USN-3620-2
UBUNTU:USN-3631-1
UBUNTU:USN-3631-2
UBUNTU:USN-3632-1
UBUNTU:USN-3651-1
UBUNTU:USN-3652-1
UBUNTU:USN-3653-1
UBUNTU:USN-3653-2
UBUNTU:USN-3654-1
UBUNTU:USN-3654-2
UBUNTU:USN-3655-1
UBUNTU:USN-3655-2
UBUNTU:USN-3656-1
UBUNTU:USN-3657-1
UBUNTU:USN-3658-1
UBUNTU:USN-3658-2
UBUNTU:USN-3658-3
UBUNTU:USN-3678-1
UBUNTU:USN-3678-2
UBUNTU:USN-3678-3
UBUNTU:USN-3678-4
UBUNTU:USN-3679-1
UBUNTU:USN-3680-1
UBUNTU:USN-3693-1
UBUNTU:USN-3695-1
UBUNTU:USN-3695-2
UBUNTU:USN-3696-1
UBUNTU:USN-3696-2
UBUNTU:USN-3727-1
UBUNTU:USN-3742-1
UBUNTU:USN-3742-2
UBUNTU:USN-3752-1
UBUNTU:USN-3752-2
UBUNTU:USN-3752-3
UBUNTU:USN-3753-1
UBUNTU:USN-3753-2
UBUNTU:USN-3754-1
UBUNTU:USN-3756-1
UBUNTU:USN-3777-1
UBUNTU:USN-3777-2
UBUNTU:USN-3777-3
UBUNTU:USN-3798-1
UBUNTU:USN-3798-2
UBUNTU:USN-3820-1
UBUNTU:USN-3820-2
UBUNTU:USN-3820-3
UBUNTU:USN-3821-1
UBUNTU:USN-3821-2
UBUNTU:USN-3822-1
UBUNTU:USN-3822-2
USN-3583-1
USN-3583-2
USN-3871-1
USN-3871-3
USN-3871-4
USN-3871-5
USN-3910-1
USN-3910-2
ZDI-16-570
bdo#1033297
bdo#797165
bdo#864859
bdo#866511
bdo#873383
bdo#875881
bdo#899170
bnc#1037994
bnc#1053152
bnc#1053153
bnc#1067087
bnc#1067118
bnc#1072831
bnc#1072865
bnc#1073792
bnc#1073874
bnc#1074488
bnc#1075825
bnc#1077402
bnc#1077404
bnc#1077892
bnc#1079384
bnc#1083483
bnc#1083494
bnc#1083650
bnc#1084353
bnc#1084755
bnc#1085413
bnc#1085447
bnc#1087004
bnc#1089281
bnc#1096723
bnc#1099849
bnc#1102851
bnc#1103203
bnc#1103580
bnc#882572
bnc#885777
bnc#901237
bnc#903703
bnc#905857
bnc#914447
bnc#916239
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=318aaf34f1179b39fa9c30fa0f3288b645beee39
linux.git:commit:7f7ccc2ccc2e70c6054685f5e3522efa81556830
linux.git:commit:c37e9e013469521d9adb932d17a1795c139b36db
linux.git:commit:ce3fd194fcc6fbdc00ce095a852f22df97baa401
linux.git:commit:d36260050e1881dce09625a9352d8729c911a6e3
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1091938
rh#1103586
rh#1112877
rh#1243852
rh#1343538
rh#1343540
rh#1396963
rh#1396971
rh#1435719
rh#1449980
rh#1462147
rh#1462158
rh#1481136
rh#1481178
rh#1485274
rh#1495089
rh#1498016
rh#1516257
rh#1519780
rh#1527393
rh#1528312
rh#1528323
rh#1531135
rh#1533909
rh#1539508
rh#1539599
rh#1539706
rh#1541846
rh#1547824
rh#1548412
rh#1550142
rh#1551565
rh#1552867
rh#1553911
rh#1558066
rh#1560777
rh#1560782
rh#1560788
rh#1560793
rh#1566407
rh#1566890
rh#1575465
rh#1575466
rh#1575472
rh#1575474
rh#1575852
rh#1575853
rh#1575866
rh#1589324
rh#1589890
rh#1596773
rh#1596795
rh#1596812
rh#1596842
rh#1599161
rh#1601704
rh#1609664
rh#1610958
rh#1658985
rh#1890354
rh#2027239
rh#2044863
rh#2061700
rh#2119127
CVE-2018-10903python-cryptography:Releasedimportant5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CONFIRM:bugzilla.redhat.com:CVE-2018-10903
CONFIRM:github.com:CVE-2018-10903
CVE-2018-10903
D:CVE-2018-10903
RH:CVE-2018-10903
RHSA-2018:3600
SMASH Issue 211072
UBUNTU:CVE-2018-10903
UBUNTU:USN-3720-1
bnc#1101820
rh#1602931
CVE-2018-1092kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2018-1092
DEBIAN:DSA-4187
DEBIAN:DSA-4188
DSA-4187
DSA-4188
MISC:bugzilla.kernel.org:CVE-2018-1092
MISC:bugzilla.kernel.org:CVE-2018-1093
MISC:bugzilla.kernel.org:CVE-2018-1094
MISC:bugzilla.kernel.org:CVE-2018-1095
MISC:git.kernel.org:CVE-2018-1092
MISC:openwall.com:CVE-2018-1095
MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
OSS:2018/Q1/284
OSS:2018/Q2/60
Oracle:CVE-2018-3639
RH:CVE-2018-1092
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
SMASH Issue 202736
UBUNTU:CVE-2018-1092
UBUNTU:USN-3676-1
UBUNTU:USN-3676-2
UBUNTU:USN-3677-1
UBUNTU:USN-3677-2
UBUNTU:USN-3678-1
UBUNTU:USN-3678-2
UBUNTU:USN-3678-3
UBUNTU:USN-3678-4
UBUNTU:USN-3754-1
bnc#1087012
linux.git:commit:8e4b5eae5decd9dfe5a4ee369c22028f90ab4c44
rh#1527393
rh#1560777
rh#1560782
rh#1560788
rh#1560793
CVE-2018-1093kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2018-1093
DSA-4188
MISC:bugzilla.kernel.org:CVE-2018-1092
MISC:bugzilla.kernel.org:CVE-2018-1093
MISC:bugzilla.kernel.org:CVE-2018-1094
MISC:bugzilla.kernel.org:CVE-2018-1095
MISC:git.kernel.org:CVE-2018-1093
MLIST:[debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update
OSS:2018/Q1/284
Oracle:CVE-2018-3639
RH:CVE-2018-1093
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
SMASH Issue 202737
UBUNTU:CVE-2018-1093
bnc#1087095
linux.git:commit:7dac4a1726a9c64a517d595c40e95e2d0d135f6f
rh#1527393
rh#1560777
rh#1560782
rh#1560788
rh#1560793
CVE-2018-1094kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2018-1094
MISC:bugzilla.kernel.org:CVE-2018-1092
MISC:bugzilla.kernel.org:CVE-2018-1093
MISC:bugzilla.kernel.org:CVE-2018-1094
MISC:bugzilla.kernel.org:CVE-2018-1095
MISC:git.kernel.org:CVE-2018-1094
MISC:openwall.com:CVE-2018-1095
OSS:2018/Q1/284
Oracle:CVE-2018-3639
RH:CVE-2018-1094
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
SMASH Issue 202738
UBUNTU:CVE-2018-1094
UBUNTU:USN-3695-1
UBUNTU:USN-3695-2
bnc#1087007
linux.git:commit:a45403b51582a87872927a3e0fc0a389c26867f1
rh#1527393
rh#1560777
rh#1560782
rh#1560788
rh#1560793
CVE-2018-10940kernel-source-rt:Already fixedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)BID:104154
CVE-2018-10940
MISC:git.kernel.org:CVE-2018-10940
MISC:github.com:CVE-2018-10940
MISC:www.kernel.org:CVE-2018-10940
OSS:2018/09/18/4
OSS:2018/09/25/4
Oracle:CVE-2018-3639
RH:CVE-2018-10940
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
SMASH Issue 205476
UBUNTU:CVE-2018-10940
bnc#1092903
linux.git:commit:e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
rh#1575866
rh#1577408
rh#1645140
rh#1890354
CVE-2018-1095kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CVE-2018-10882
CVE-2018-1095
MISC:bugzilla.kernel.org:CVE-2018-1092
MISC:bugzilla.kernel.org:CVE-2018-1093
MISC:bugzilla.kernel.org:CVE-2018-1094
MISC:bugzilla.kernel.org:CVE-2018-1095
MISC:git.kernel.org:CVE-2018-1095
MISC:openwall.com:CVE-2018-1095
OSS:2018/Q1/284
RH:CVE-2018-1095
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
SMASH Issue 202739
UBUNTU:CVE-2018-1095
UBUNTU:USN-3695-1
UBUNTU:USN-3695-2
bnc#1087004
linux.git:commit:ce3fd194fcc6fbdc00ce095a852f22df97baa401
rh#1560777
rh#1560782
rh#1560788
rh#1560793
rh#1596842
CVE-2018-11232kernel-source-rt:Unsupportedmoderate ()CVE-2018-11232
MISC:git.kernel.org:CVE-2018-11232
MISC:github.com:CVE-2018-11232
MISC:www.kernel.org:CVE-2018-11232
RH:CVE-2018-11232
SMASH Issue 206090
UBUNTU:CVE-2018-11232
bnc#1093846
rh#1580583
CVE-2018-11412kernel-source-rt:Not affectedmoderate6.8 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)BID:104291
CVE-2018-11412
EXPLOIT-DB:44832
MISC:bugs.chromium.org:CVE-2018-11412
MISC:bugzilla.kernel.org:CVE-2018-11412
RH:CVE-2018-11412
RHSA-2019:0525
SMASH Issue 206431
UBUNTU:CVE-2018-11412
bnc#1094678
linux.git:commit:117166efb1ee8f13c38f9e96b258f16d4923f888
linux.git:commit:eb9b5f01c33adebc31cbc236c02695f605b0e417
rh#1582358
CVE-2018-11506kernel-source-rt:Not affectedmoderate5.7 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H)CVE-2018-11506
D:CVE-2018-11506
L3:53760
MISC:git.kernel.org:CVE-2018-11506
MISC:github.com:CVE-2018-11506
MISC:twitter.com:CVE-2018-11506
MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
RH:CVE-2018-11506
RHSA-2018:2948
SMASH Issue 206566
UBUNTU:CVE-2018-11506
UBUNTU:USN-3752-1
UBUNTU:USN-3752-2
UBUNTU:USN-3752-3
bnc#1094835
rh#1583210
CVE-2018-12233kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)BID:104452
CVE-2018-12233
DSA-5378
MISC:lkml.org:CVE-2018-12233
MISC:marc.info:CVE-2018-12233
MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2018-3639
Oracle:CVE-2018-3646
RH:CVE-2018-12233
SMASH Issue 207866
UBUNTU:CVE-2018-12233
UBUNTU:USN-3752-1
UBUNTU:USN-3752-2
UBUNTU:USN-3752-3
UBUNTU:USN-3753-1
UBUNTU:USN-3753-2
UBUNTU:USN-3754-1
bdo#1033297
bnc#1097234
rh#1519780
rh#1527393
rh#1573699
rh#1575472
rh#1590205
rh#1599161
rh#2027239
rh#2044863
rh#2061700
rh#2119127
CVE-2018-12633kernel-source-rt:Unsupportedmoderate ()CVE-2018-12633
MISC:bugzilla.kernel.org:CVE-2018-12633
MISC:git.kernel.org:CVE-2018-12633
MISC:github.com:CVE-2018-12633
RH:CVE-2018-12633
SMASH Issue 208631
UBUNTU:CVE-2018-12633
bnc#1098726
rh#1594170
CVE-2018-12699binutils:Already fixedmoderate3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)BID:104540
CONFIRM:security.netapp.com:CVE-2021-45078
CVE-2018-12699
D:CVE-2018-12699
FEDORA:FEDORA-2021-3614c0b466
FEDORA:FEDORA-2021-f2c6802743
GLSA-201908-01
GLSA-202208-30
L3:62422
L3:62677
L3:64009
MISC:bugs.launchpad.net:CVE-2018-12700
MISC:gcc.gnu.org:CVE-2018-12700
MISC:sourceware.org:CVE-2018-12700
MISC:sourceware.org:CVE-2021-45078
RH:CVE-2018-12699
SMASH Issue 208719
UBUNTU:CVE-2018-12699
bnc#1098941
bnc#1194310
bnc#1195893
bnc#1202864
jsc#CAR-1348
rh#1595427
rh#2033715
CVE-2018-12714kernel-source-rt:Unsupportedimportant ()BID:104544
CVE-2018-12714
D:CVE-2018-12714
MISC:bugzilla.kernel.org:CVE-2018-12714
MISC:git.kernel.org:CVE-2018-12714
MISC:github.com:CVE-2018-12714
RH:CVE-2018-12714
SMASH Issue 208725
UBUNTU:CVE-2018-12714
bnc#1098933
rh#1595835
CVE-2018-12896kernel-source-rt:Not affectedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2018-12896
D:CVE-2018-12896
MISC:bugzilla.kernel.org:CVE-2018-12896
MISC:github.com:CVE-2018-12896
OSS:2018/09/18/4
OSS:2018/09/25/4
RH:CVE-2018-12896
SMASH Issue 209270
UBUNTU:CVE-2018-12896
bnc#1099922
rh#1575866
rh#1597759
rh#1890354
CVE-2018-12904kernel-source-rt:Not affectedimportant8.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)CVE-2018-12904
DSA-5378
EXPLOIT-DB:44944
MISC:bugs.chromium.org:CVE-2018-12904
MISC:cdn.kernel.org:CVE-2018-12904
MISC:git.kernel.org:CVE-2018-12904
MISC:github.com:CVE-2018-12904
OSS:2018/Q2/246
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2018-5390
RH:CVE-2018-12904
SMASH Issue 208874
UBUNTU:CVE-2018-12904
UBUNTU:USN-3752-1
UBUNTU:USN-3752-2
UBUNTU:USN-3752-3
bdo#1033297
bnc#1099183
rh#1519780
rh#1527393
rh#1573699
rh#1575472
rh#1595143
rh#1599161
rh#1601704
rh#2027239
rh#2044863
rh#2061700
rh#2119127
CVE-2018-12928kernel-source-rt:Not affectedmoderate3.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)BID:104593
CVE-2018-12928
MISC:bugs.launchpad.net:CVE-2018-12928
MISC:marc.info:CVE-2018-12928
RH:CVE-2018-12928
SMASH Issue 209133
UBUNTU:CVE-2018-12928
bnc#1099613
rh#1597826
CVE-2018-12929kernel-source-rt:Unsupportedmoderate5.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)BID:104588
CVE-2018-12929
MISC:bugs.launchpad.net:CVE-2018-12931
MISC:marc.info:CVE-2018-12931
RH:CVE-2018-12929
RHSA-2019:0641
SMASH Issue 209134
UBUNTU:CVE-2018-12929
bnc#1099614
rh#1597831
CVE-2018-12930kernel-source-rt:Not affectedimportant7.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2018-12930
RH:CVE-2018-12930
RHSA-2019:0641
SMASH Issue 209135
UBUNTU:CVE-2018-12930
bnc#1099619
rh#1597837
CVE-2018-12931kernel-source-rt:Unsupportedimportant ()CVE-2018-12931
RH:CVE-2018-12931
RHSA-2019:0641
SMASH Issue 209136
UBUNTU:CVE-2018-12931
bnc#1099612
rh#1597843
CVE-2018-13053kernel-source-rt:Already fixedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)BID:104671
CVE-2018-13053
D:CVE-2018-13053
DSA-5378
MISC:bugzilla.kernel.org:CVE-2018-13053
MISC:git.kernel.org:CVE-2018-13053
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2018-3646
Oracle:CVE-2018-5390
RH:CVE-2018-13053
RHSA-2019:0831
RHSA-2019:2029
RHSA-2019:2043
SMASH Issue 209250
UBUNTU:CVE-2018-13053
bdo#1033297
bnc#1099924
rh#1519780
rh#1527393
rh#1573699
rh#1575472
rh#1597747
rh#1599161
rh#1601704
rh#1609664
rh#2027239
rh#2044863
rh#2061700
rh#2119127
CVE-2018-13093kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H)CVE-2018-13093
MISC:bugzilla.kernel.org:CVE-2018-13093
MISC:git.kernel.org:CVE-2018-13093
MISC:github.com:CVE-2018-13093
OSS:2018/09/18/4
OSS:2018/09/25/4
RH:CVE-2018-13093
RHSA-2019:2029
RHSA-2019:2043
SMASH Issue 209317
UBUNTU:CVE-2018-13093
bnc#1100001
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1575866
rh#1597766
rh#1609664
rh#1660375
rh#1660385
rh#1667782
rh#1686136
rh#1701224
rh#1701842
rh#1890354
CVE-2018-13095kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H)CVE-2018-13095
MISC:bugzilla.kernel.org:CVE-2018-13095
MISC:git.kernel.org:CVE-2018-13095
MISC:github.com:CVE-2018-13095
OSS:2018/09/18/4
RH:CVE-2018-13095
RHSA-2019:1350
RHSA-2019:2029
RHSA-2019:2043
SMASH Issue 209319
UBUNTU:CVE-2018-13095
bnc#1099999
rh#1575866
rh#1597775
rh#1890354
CVE-2018-13096kernel-source-rt:Unsupportedmoderate ()CONFIRM:git.kernel.org:CVE-2018-13096
CVE-2018-13096
MISC:bugzilla.kernel.org:CVE-2018-13096
MISC:git.kernel.org:CVE-2018-13096
MISC:packetstormsecurity.com:CVE-2018-19985
MISC:seclists.org:CVE-2018-19985
MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
OSS:2018/09/18/4
RH:CVE-2018-13096
SMASH Issue 209320
SUSE:openSUSE-SU-2018:3202
UBUNTU:CVE-2018-13096
UBUNTU:USN-3821-1
UBUNTU:USN-3821-2
USN-4094-1
USN-4118-1
bnc#1100062
rh#1597782
CVE-2018-13405kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)AIXAPAR:IT02314
AIXAPAR:IV61506
BID:100215
BID:100503
BID:100514
BID:100861
BID:101758
BID:102291
BID:102293
BID:102367
BID:102503
BID:102813
BID:103356
BID:103423
BID:103459
BID:103605
BID:104229
BID:104232
BID:104909
BID:105647
BID:105656
BID:105658
BID:106503
BID:67121
BID:79091
BID:91067
BID:91068
BID:91787
BID:91869
BID:93132
BID:93287
BID:93604
BID:94371
BID:94377
BID:94925
BID:95429
BID:99619
BUGTRAQ:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
BUGTRAQ:20190624 [SECURITY] [DSA 4469-1] libvirt security update
CERT-VN:VU#180049
CERT-VN:VU#978508
CERT:TA18-141A
CISCO:20140605 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products
CISCO:20180522 CPU Side-Channel Information Disclosure Vulnerabilities: May 2018
CONFIRM:access.redhat.com:CVE-2014-0114
CONFIRM:access.redhat.com:CVE-2014-0224
CONFIRM:advisories.mageia.org:CVE-2014-0114
CONFIRM:aix.software.ibm.com:CVE-2014-3470
CONFIRM:blogs.oracle.com:CVE-2014-0224
CONFIRM:bugs.jython.org:CVE-2016-4000
CONFIRM:bugs.launchpad.net:CVE-2015-8866
CONFIRM:bugs.launchpad.net:CVE-2015-8867
CONFIRM:bugs.php.net:CVE-2015-8866
CONFIRM:bugs.php.net:CVE-2015-8867
CONFIRM:bugzilla.kernel.org:CVE-2018-10876
CONFIRM:bugzilla.kernel.org:CVE-2018-10880
CONFIRM:bugzilla.kernel.org:CVE-2018-10882
CONFIRM:bugzilla.redhat.com:CVE-2018-10853
CONFIRM:bugzilla.redhat.com:CVE-2018-10876
CONFIRM:bugzilla.redhat.com:CVE-2018-10877
CONFIRM:bugzilla.redhat.com:CVE-2018-10880
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CONFIRM:bugzilla.redhat.com:CVE-2018-1120
CONFIRM:bugzilla.redhat.com:CVE-2018-1122
CONFIRM:bugzilla.redhat.com:CVE-2018-1123
CONFIRM:bugzilla.redhat.com:CVE-2018-1124
CONFIRM:bugzilla.redhat.com:CVE-2018-1125
CONFIRM:bugzilla.redhat.com:CVE-2018-1126
CONFIRM:cdn.kernel.org:CVE-2018-5803
CONFIRM:cert-portal.siemens.com:CVE-2017-5715
CONFIRM:cert-portal.siemens.com:CVE-2017-5753
CONFIRM:cert-portal.siemens.com:CVE-2018-3640
CONFIRM:commons.apache.org:CVE-2014-0114
CONFIRM:dev.mysql.com:CVE-2014-0224
CONFIRM:developer.arm.com:CVE-2017-5754
CONFIRM:discussions.nessus.org:CVE-2014-0224
CONFIRM:esupport.trendmicro.com:CVE-2014-0224
CONFIRM:filezilla-project.org:CVE-2014-0224
CONFIRM:git.kernel.org:CVE-2017-10661
CONFIRM:git.kernel.org:CVE-2017-17805
CONFIRM:git.kernel.org:CVE-2017-17806
CONFIRM:git.kernel.org:CVE-2017-18075
CONFIRM:git.kernel.org:CVE-2018-1068
CONFIRM:git.kernel.org:CVE-2018-10853
CONFIRM:git.kernel.org:CVE-2018-10876
CONFIRM:git.kernel.org:CVE-2018-10880
CONFIRM:git.kernel.org:CVE-2018-10882
CONFIRM:git.kernel.org:CVE-2018-1120
CONFIRM:git.kernel.org:CVE-2018-13405
CONFIRM:git.kernel.org:CVE-2018-5803
CONFIRM:git.kernel.org:CVE-2018-7566
CONFIRM:git.openssl.org:CVE-2014-0224
CONFIRM:git.php.net:CVE-2015-8866
CONFIRM:git.php.net:CVE-2015-8867
CONFIRM:github.com:CVE-2016-1182
CONFIRM:github.com:CVE-2016-9389
CONFIRM:github.com:CVE-2016-9394
CONFIRM:github.com:CVE-2016-9583
CONFIRM:github.com:CVE-2017-10661
CONFIRM:github.com:CVE-2017-14735
CONFIRM:github.com:CVE-2017-17805
CONFIRM:github.com:CVE-2017-17806
CONFIRM:github.com:CVE-2017-18075
CONFIRM:github.com:CVE-2017-8831
CONFIRM:github.com:CVE-2018-1000204
CONFIRM:github.com:CVE-2018-1068
CONFIRM:h20566.www2.hpe.com:CVE-2016-0705
CONFIRM:h20566.www2.hpe.com:CVE-2016-0763
CONFIRM:h20566.www2.hpe.com:CVE-2016-5388
CONFIRM:help.ecostruxureit.com:CVE-2017-5754
CONFIRM:hg.python.org:CVE-2016-4000
CONFIRM:issues.apache.org:CVE-2014-0114
CONFIRM:issues.apache.org:CVE-2015-1832
CONFIRM:issues.apache.org:CVE-2016-1000031
CONFIRM:kb.bluecoat.com:CVE-2014-3470
CONFIRM:kb.juniper.net:CVE-2014-0224
CONFIRM:kb.juniper.net:CVE-2014-3470
CONFIRM:kc.mcafee.com:CVE-2014-3470
CONFIRM:kc.mcafee.com:CVE-2017-12942
CONFIRM:linux.oracle.com:CVE-2014-3510
CONFIRM:nvidia.custhelp.com:CVE-2017-0330
CONFIRM:patchwork.kernel.org:CVE-2018-5750
CONFIRM:patchwork.ozlabs.org:CVE-2018-10876
CONFIRM:patchwork.ozlabs.org:CVE-2018-10880
CONFIRM:portal.msrc.microsoft.com:CVE-2018-3639
CONFIRM:psirt.global.sonicwall.com:CVE-2018-3639
CONFIRM:puppetlabs.com:CVE-2014-0224
CONFIRM:rwkbp.makekb.com:CVE-2015-8965
CONFIRM:security-tracker.debian.org:CVE-2016-1181
CONFIRM:security-tracker.debian.org:CVE-2016-1182
CONFIRM:security.netapp.com:CVE-2014-0114
CONFIRM:security.netapp.com:CVE-2016-1000031
CONFIRM:security.netapp.com:CVE-2016-1182
CONFIRM:security.netapp.com:CVE-2017-5645
CONFIRM:security.netapp.com:CVE-2018-3640
CONFIRM:source.android.com:CVE-2017-10663
CONFIRM:source.android.com:CVE-2017-6280
CONFIRM:support.apple.com:CVE-2014-4979
CONFIRM:support.citrix.com:CVE-2014-3470
CONFIRM:support.citrix.com:CVE-2018-3639
CONFIRM:support.f5.com:CVE-2014-0224
CONFIRM:support.f5.com:CVE-2017-18017
CONFIRM:support.f5.com:CVE-2018-13405
CONFIRM:support.hpe.com:CVE-2018-3640
CONFIRM:support.lenovo.com:CVE-2018-3640
CONFIRM:support.oracle.com:CVE-2018-3639
CONFIRM:svn.apache.org:CVE-2015-1832
CONFIRM:www-01.ibm.com:CVE-2014-0114
CONFIRM:www-01.ibm.com:CVE-2014-0224
CONFIRM:www-01.ibm.com:CVE-2014-3022
CONFIRM:www-01.ibm.com:CVE-2014-3470
CONFIRM:www-01.ibm.com:CVE-2015-1832
CONFIRM:www-947.ibm.com:CVE-2014-0224
CONFIRM:www-947.ibm.com:CVE-2014-3470
CONFIRM:www.blackberry.com:CVE-2014-3470
CONFIRM:www.f-secure.com:CVE-2014-3470
CONFIRM:www.fortiguard.com:CVE-2014-0224
CONFIRM:www.fujitsu.com:CVE-2018-3640
CONFIRM:www.huawei.com:CVE-2014-3470
CONFIRM:www.ibm.com:CVE-2014-0224
CONFIRM:www.ibm.com:CVE-2014-0963
CONFIRM:www.ibm.com:CVE-2014-3470
CONFIRM:www.innominate.com:CVE-2014-0224
CONFIRM:www.intel.com:CVE-2018-3640
CONFIRM:www.intersectalliance.com:CVE-2014-0224
CONFIRM:www.kerio.com:CVE-2014-3857
CONFIRM:www.kernel.org:CVE-2017-10661
CONFIRM:www.kernel.org:CVE-2017-17806
CONFIRM:www.kernel.org:CVE-2017-18075
CONFIRM:www.mitel.com:CVE-2018-3640
CONFIRM:www.novell.com:CVE-2014-3470
CONFIRM:www.openssl.org:CVE-2014-3470
CONFIRM:www.oracle.com:CVE-2014-0114
CONFIRM:www.oracle.com:CVE-2014-4271
CONFIRM:www.oracle.com:CVE-2014-6564
CONFIRM:www.oracle.com:CVE-2015-0437
CONFIRM:www.oracle.com:CVE-2016-5477
CONFIRM:www.oracle.com:CVE-2017-3626
CONFIRM:www.oracle.com:CVE-2017-5689
CONFIRM:www.oracle.com:CVE-2017-5709
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CONFIRM:www.splunk.com:CVE-2014-3470
CONFIRM:www.synology.com:CVE-2018-3640
CONFIRM:www.tenable.com:CVE-2014-0224
CONFIRM:www.vmware.com:CVE-2014-0114
CONFIRM:www.vmware.com:CVE-2014-3470
CONFIRM:www.vmware.com:CVE-2014-8371
CONFIRM:www.websense.com:CVE-2015-2773
CONFIRM:www14.software.ibm.com:CVE-2014-3470
CONFIRM:xenbits.xen.org:CVE-2018-3639
CVE-2014-0114
CVE-2014-0224
CVE-2014-4651
CVE-2015-0852
CVE-2015-1832
CVE-2015-2613
CVE-2015-2769
CVE-2015-2770
CVE-2015-7940
CVE-2015-8965
CVE-2015-9251
CVE-2016-0635
CVE-2016-1000031
CVE-2016-1181
CVE-2016-1182
CVE-2016-4000
CVE-2016-5684
CVE-2016-6814
CVE-2016-9389
CVE-2016-9392
CVE-2016-9583
CVE-2017-0379
CVE-2017-10661
CVE-2017-13166
CVE-2017-13168
CVE-2017-13745
CVE-2017-14229
CVE-2017-14735
CVE-2017-15095
CVE-2017-16012
CVE-2017-16648
CVE-2017-17805
CVE-2017-17806
CVE-2017-18017
CVE-2017-18075
CVE-2017-18232
CVE-2017-18344
CVE-2017-8813
CVE-2017-8831
CVE-2018-1000026
CVE-2018-1000204
CVE-2018-10021
CVE-2018-1065
CVE-2018-1068
CVE-2018-10853
CVE-2018-10876
CVE-2018-10877
CVE-2018-10880
CVE-2018-10882
CVE-2018-1120
CVE-2018-1122
CVE-2018-1123
CVE-2018-1124
CVE-2018-1125
CVE-2018-1126
CVE-2018-13405
CVE-2018-3639
CVE-2018-5344
CVE-2018-5750
CVE-2018-5803
CVE-2018-7566
CVE-2018-7995
D:CVE-2014-0224
D:CVE-2017-10661
D:CVE-2017-8831
D:CVE-2018-1068
D:CVE-2018-1126
D:CVE-2018-3639
D:CVE-2018-5750
D:CVE-2018-5803
DEBIAN:DSA-3959
DEBIAN:DSA-4073
DEBIAN:DSA-4082
DEBIAN:DSA-4120
DEBIAN:DSA-4187
DEBIAN:DSA-4188
DEBIAN:DSA-4208
DEBIAN:DSA-4210
DEBIAN:DSA-4266
DEBIAN:DSA-4273
DSA-2940
DSA-2950
DSA-3392
DSA-3417
DSA-3893
DSA-3981
DSA-4073
DSA-4082
DSA-4120
DSA-4187
DSA-4188
DSA-4208
DSA-4210
DSA-4266
DSA-4273
DSA-5257
DSA-5378
EXPLOIT-DB:43345
EXPLOIT-DB:44695
EXPLOIT-DB:45033
EXPLOIT-DB:45175
FEDORA:FEDORA-2014-9301
FEDORA:FEDORA-2014-9308
FEDORA:FEDORA-2014-9380
FEDORA:FEDORA-2015-16104
FEDORA:FEDORA-2015-16105
FEDORA:FEDORA-2015-16106
FEDORA:FEDORA-2015-7d95466eda
FEDORA:FEDORA-2015-992342e82f
FEDORA:FEDORA-2015-decbab7c9f
FEDORA:FEDORA-2022-3a60c34473
FEDORA:FEDORA-2022-5d0676b098
FULLDISC:20140607 Re: More OpenSSL issues
FULLDISC:20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
GENTOO:GLSA-201407-05
GENTOO:GLSA-201607-09
GENTOO:GLSA-201701-68
GENTOO:GLSA-201710-28
HP:HPSBGN03041
HP:HPSBGN03050
HP:HPSBGN03068
HP:HPSBHF03052
HP:HPSBHF03088
HP:HPSBHF03145
HP:HPSBMU03051
HP:HPSBMU03053
HP:HPSBMU03055
HP:HPSBMU03056
HP:HPSBMU03057
HP:HPSBMU03058
HP:HPSBMU03062
HP:HPSBMU03065
HP:HPSBMU03070
HP:HPSBMU03071
HP:HPSBMU03074
HP:HPSBMU03076
HP:HPSBMU03078
HP:HPSBMU03083
HP:HPSBMU03089
HP:HPSBMU03090
HP:HPSBMU03094
HP:HPSBMU03101
HP:HPSBOV03047
HP:HPSBPI03107
HP:HPSBST03097
HP:HPSBST03098
HP:HPSBST03103
HP:HPSBST03106
HP:HPSBST03160
HP:HPSBST03195
HP:HPSBST03265
HP:HPSBUX03046
HP:SSRT101818
JVN:JVN#03188560
JVN:JVN#65044642
JVNDB:JVNDB-2016-000096
JVNDB:JVNDB-2016-000097
L3:41161
L3:42389
MANDRIVA:MDVSA-2014:095
MANDRIVA:MDVSA-2014:105
MANDRIVA:MDVSA-2014:106
MANDRIVA:MDVSA-2015:062
MISC:blogs.gentoo.org:CVE-2016-9399
MISC:bugs.chromium.org:CVE-2018-3639
MISC:bugs.launchpad.net:CVE-2017-18017
MISC:bugs.launchpad.net:OSS:2018/Q3/76
MISC:bugzilla.kernel.org:CVE-2017-8831
MISC:bugzilla.redhat.com:MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
MISC:ccsinjection.lepidum.co.jp:CVE-2014-0224
MISC:cdn.kernel.org:CVE-2017-18344
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:eprint.iacr.org:CVE-2017-0379
MISC:git.gnupg.org:CVE-2017-0379
MISC:git.kernel.org:CVE-2017-18017
MISC:git.kernel.org:CVE-2017-18232
MISC:git.kernel.org:CVE-2018-10021
MISC:git.kernel.org:CVE-2018-1065
MISC:git.kernel.org:CVE-2018-13405
MISC:git.kernel.org:CVE-2018-5344
MISC:git.kernel.org:CVE-2018-7995
MISC:git.kernel.org:OSS:2014/03/05/6
MISC:git.kernel.org:OSS:2018/Q3/35
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:github.com:CVE-2015-9251
MISC:github.com:CVE-2017-14229
MISC:github.com:CVE-2017-18017
MISC:github.com:CVE-2017-18232
MISC:github.com:CVE-2017-18344
MISC:github.com:CVE-2018-10021
MISC:github.com:CVE-2018-1065
MISC:github.com:CVE-2018-13405
MISC:github.com:CVE-2018-5344
MISC:github.com:OSS:2018/Q3/76
MISC:gitlab.com:OSS:2018/Q2/136
MISC:groups.google.com:CVE-2017-16648
MISC:ics-cert.us-cert.gov:CVE-2015-9251
MISC:lists.debian.org:CVE-2017-0379
MISC:lists.openwall.net:CVE-2018-1065
MISC:lkml.org:CVE-2017-18017
MISC:lkml.org:CVE-2018-7995
MISC:mail-archives.apache.org:CVE-2016-6814
MISC:openwall.com:CVE-2018-13405
MISC:patchwork.kernel.org:CVE-2017-16648
MISC:patchwork.ozlabs.org:CVE-2017-18017
MISC:patchwork.ozlabs.org:CVE-2018-1000026
MISC:patchwork.ozlabs.org:CVE-2018-1065
MISC:secuniaresearch.flexerasoftware.com:CVE-2018-5803
MISC:security-tracker.debian.org:CVE-2016-4000
MISC:security-tracker.debian.org:CVE-2017-0379
MISC:snyk.io:CVE-2015-9251
MISC:snyk.io:CVE-2016-4000
MISC:sw.aveva.com:CVE-2015-9251
MISC:twitter.com:CVE-2018-13405
MISC:web-in-security.blogspot.ca:CVE-2015-7940
MISC:www.arista.com:CVE-2017-18017
MISC:www.imperialviolet.org:CVE-2014-0224
MISC:www.kernel.org:CVE-2017-18017
MISC:www.openwall.com:CVE-2018-1000204
MISC:www.openwall.com:CVE-2018-10853
MISC:www.oracle.com:CVE-2014-0107
MISC:www.oracle.com:CVE-2015-7501
MISC:www.qualys.com:OSS:2018/Q2/122
MISC:www.securityfocus.com:CVE-2017-8831
MISC:www.talosintelligence.com:CVE-2016-5684
MISC:www.tenable.com:CVE-2016-1000031
MISC:www.tenable.com:CVE-2016-6793
MLIST:[alsa-devel] 20180214 [PATCH] ALSA: seq: Fix racy pool initializations
MLIST:[announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior
MLIST:[apache-ignite-developers] 20180601 [CVE-2014-0114]: Apache Ignite is vulnerable to existing CVE-2014-0114
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
MLIST:[debian-lts-announce] 20180531 [SECURITY] [DLA 1390-1] procps security update
MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
MLIST:[debian-lts-announce] 20180727 [SECURITY] [DLA 1446-1] intel-microcode security update
MLIST:[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update
MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
MLIST:[linux-netdev] 20180305 BUG: unable to handle kernel paging request in compat_copy_entries
MLIST:[linux-netdev] 20180305 [PATCH net] netfilter: check for out-of-bounds while copying compat entries
MLIST:[linux-sctp] 20180209 skb_over_panic on INIT/INIT_ACK packet sending
MLIST:[netdev] 20180116 http://lists.openwall.net/netdev/2018/01/16/40
MLIST:[netdev] 20180118 http://lists.openwall.net/netdev/2018/01/18/96
MLIST:[netdev] 20180207 [Secunia Research] Linux Kernel Vulnerability - Sending information
MLIST:[oss-security] 20140616 CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE
MLIST:[oss-security] 20140707 Re: CVE request for commons-beanutils: 'class' property is exposed, potentially leading to RCE
MLIST:[oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp
MLIST:[oss-security] 20151022 CVE Request: invalid curve attack on bouncycastle
MLIST:[oss-security] 20151022 Re: CVE Request: invalid curve attack on bouncycastle
MLIST:[oss-security] 20161117 Re: jasper: multiple assertion failures
MLIST:[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
OSS:2014/03/05/6
OSS:2017/Q3/526
OSS:2017/Q4/244
OSS:2018/Q1/212
OSS:2018/Q1/240
OSS:2018/Q2/136
OSS:2018/Q3/208
OSS:2018/Q3/35
OSS:2018/Q3/76
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
OSS:2020/Q2/177
OSS:2022/11/10/2
OSS:2022/12/27/3
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2022/Q4/244
OSS:2022/Q4/30
Oracle:CVE-2013-2566
Oracle:CVE-2014-0224
Oracle:CVE-2015-1832
Oracle:CVE-2015-8965
Oracle:CVE-2016-0635
Oracle:CVE-2016-6814
Oracle:CVE-2017-0861
Oracle:CVE-2017-14735
Oracle:CVE-2017-17558
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
Oracle:CVE-2017-6074
Oracle:CVE-2018-3639
Oracle:CVE-2018-3646
Oracle:CVE-2018-5390
RH:CVE-2014-0224
RH:CVE-2017-10661
RH:CVE-2017-13166
RH:CVE-2017-13168
RH:CVE-2017-16012
RH:CVE-2017-16648
RH:CVE-2017-17805
RH:CVE-2017-17806
RH:CVE-2017-18017
RH:CVE-2017-18075
RH:CVE-2017-18232
RH:CVE-2017-18344
RH:CVE-2017-8831
RH:CVE-2018-1000026
RH:CVE-2018-1000204
RH:CVE-2018-1065
RH:CVE-2018-1068
RH:CVE-2018-1120
RH:CVE-2018-1122
RH:CVE-2018-1123
RH:CVE-2018-1124
RH:CVE-2018-1125
RH:CVE-2018-1126
RH:CVE-2018-13405
RH:CVE-2018-3639
RH:CVE-2018-5344
RH:CVE-2018-5750
RH:CVE-2018-5803
RH:CVE-2018-7566
RHBA-2020:0547
RHSA-2014:0474
RHSA-2014:0497
RHSA-2014:0498
RHSA-2014:0500
RHSA-2014:0511
RHSA-2014:0624
RHSA-2014:0625
RHSA-2014:0626
RHSA-2014:0627
RHSA-2014:0628
RHSA-2014:0629
RHSA-2014:0630
RHSA-2014:0631
RHSA-2014:0632
RHSA-2014:0633
RHSA-2014:0679
RHSA-2014:0680
RHSA-2015:1176
RHSA-2016:2035
RHSA-2016:2036
RHSA-2016:2130
RHSA-2016:2131
RHSA-2016:2595
RHSA-2016:2749
RHSA-2016:2927
RHSA-2016:2928
RHSA-2017:0184
RHSA-2017:0272
RHSA-2017:0868
RHSA-2017:1208
RHSA-2017:2486
RHSA-2017:2596
RHSA-2017:3189
RHSA-2017:3190
RHSA-2018:0342
RHSA-2018:0478
RHSA-2018:0479
RHSA-2018:0480
RHSA-2018:0481
RHSA-2018:0501
RHSA-2018:0576
RHSA-2018:0577
RHSA-2018:0676
RHSA-2018:1062
RHSA-2018:1130
RHSA-2018:1170
RHSA-2018:1318
RHSA-2018:1319
RHSA-2018:1355
RHSA-2018:1447
RHSA-2018:1448
RHSA-2018:1449
RHSA-2018:1450
RHSA-2018:1451
RHSA-2018:1629
RHSA-2018:1630
RHSA-2018:1632
RHSA-2018:1633
RHSA-2018:1635
RHSA-2018:1636
RHSA-2018:1637
RHSA-2018:1638
RHSA-2018:1639
RHSA-2018:1640
RHSA-2018:1641
RHSA-2018:1642
RHSA-2018:1643
RHSA-2018:1644
RHSA-2018:1645
RHSA-2018:1646
RHSA-2018:1647
RHSA-2018:1648
RHSA-2018:1649
RHSA-2018:1650
RHSA-2018:1651
RHSA-2018:1652
RHSA-2018:1653
RHSA-2018:1654
RHSA-2018:1655
RHSA-2018:1656
RHSA-2018:1657
RHSA-2018:1658
RHSA-2018:1659
RHSA-2018:1660
RHSA-2018:1661
RHSA-2018:1662
RHSA-2018:1663
RHSA-2018:1664
RHSA-2018:1665
RHSA-2018:1666
RHSA-2018:1667
RHSA-2018:1668
RHSA-2018:1669
RHSA-2018:1674
RHSA-2018:1675
RHSA-2018:1676
RHSA-2018:1686
RHSA-2018:1688
RHSA-2018:1689
RHSA-2018:1690
RHSA-2018:1696
RHSA-2018:1700
RHSA-2018:1710
RHSA-2018:1711
RHSA-2018:1737
RHSA-2018:1738
RHSA-2018:1777
RHSA-2018:1820
RHSA-2018:1826
RHSA-2018:1854
RHSA-2018:1965
RHSA-2018:1967
RHSA-2018:1997
RHSA-2018:2001
RHSA-2018:2003
RHSA-2018:2006
RHSA-2018:2060
RHSA-2018:2161
RHSA-2018:2162
RHSA-2018:2164
RHSA-2018:2171
RHSA-2018:2172
RHSA-2018:2216
RHSA-2018:2228
RHSA-2018:2246
RHSA-2018:2250
RHSA-2018:2258
RHSA-2018:2267
RHSA-2018:2268
RHSA-2018:2289
RHSA-2018:2309
RHSA-2018:2328
RHSA-2018:2363
RHSA-2018:2364
RHSA-2018:2384
RHSA-2018:2387
RHSA-2018:2390
RHSA-2018:2394
RHSA-2018:2395
RHSA-2018:2396
RHSA-2018:2669
RHSA-2018:2927
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
RHSA-2018:3396
RHSA-2018:3397
RHSA-2018:3398
RHSA-2018:3399
RHSA-2018:3400
RHSA-2018:3401
RHSA-2018:3402
RHSA-2018:3407
RHSA-2018:3423
RHSA-2018:3424
RHSA-2018:3425
RHSA-2018:3459
RHSA-2018:3540
RHSA-2018:3586
RHSA-2018:3590
RHSA-2018:3591
RHSA-2019:0148
RHSA-2019:0525
RHSA-2019:0641
RHSA-2019:0717
RHSA-2019:1046
RHSA-2019:1170
RHSA-2019:1190
RHSA-2019:1483
RHSA-2019:1487
RHSA-2019:1944
RHSA-2019:2189
RHSA-2019:2401
RHSA-2019:2473
RHSA-2019:2476
RHSA-2019:2566
RHSA-2019:2696
RHSA-2019:2730
RHSA-2019:2995
RHSA-2019:4057
RHSA-2019:4058
RHSA-2019:4159
RHSA-2019:4164
RHSA-2020:0036
RHSA-2020:0595
RHSA-2020:0983
RHSA-2020:1265
RHSA-2020:1464
RHSA-2020:3804
RHSA-2020:3810
SECTRACK:1031032
SECTRACK:1031594
SECTRACK:1034077
SECTRACK:1036056
SECTRACK:1036377
SECTRACK:1036378
SECTRACK:1036393
SECTRACK:1036397
SECTRACK:1037036
SECTRACK:1037046
SECTRACK:1037053
SECTRACK:1037640
SECTRACK:1039600
SECTRACK:1040319
SECTRACK:1040446
SECTRACK:1040949
SECTRACK:1041057
SECTRACK:1041294
SECTRACK:1041414
SECTRACK:1042004
SECUNIA:57477
SECUNIA:58128
SECUNIA:58337
SECUNIA:58385
SECUNIA:58433
SECUNIA:58492
SECUNIA:58579
SECUNIA:58615
SECUNIA:58639
SECUNIA:58660
SECUNIA:58667
SECUNIA:58710
SECUNIA:58713
SECUNIA:58714
SECUNIA:58716
SECUNIA:58719
SECUNIA:58742
SECUNIA:58745
SECUNIA:58759
SECUNIA:58851
SECUNIA:58930
SECUNIA:58945
SECUNIA:58947
SECUNIA:58977
SECUNIA:59004
SECUNIA:59012
SECUNIA:59014
SECUNIA:59040
SECUNIA:59043
SECUNIA:59055
SECUNIA:59063
SECUNIA:59093
SECUNIA:59101
SECUNIA:59118
SECUNIA:59132
SECUNIA:59135
SECUNIA:59142
SECUNIA:59163
SECUNIA:59167
SECUNIA:59175
SECUNIA:59186
SECUNIA:59188
SECUNIA:59189
SECUNIA:59190
SECUNIA:59191
SECUNIA:59192
SECUNIA:59202
SECUNIA:59211
SECUNIA:59214
SECUNIA:59215
SECUNIA:59223
SECUNIA:59228
SECUNIA:59231
SECUNIA:59245
SECUNIA:59246
SECUNIA:59264
SECUNIA:59282
SECUNIA:59284
SECUNIA:59287
SECUNIA:59305
SECUNIA:59306
SECUNIA:59310
SECUNIA:59325
SECUNIA:59338
SECUNIA:59347
SECUNIA:59354
SECUNIA:59362
SECUNIA:59364
SECUNIA:59365
SECUNIA:59368
SECUNIA:59370
SECUNIA:59374
SECUNIA:59375
SECUNIA:59380
SECUNIA:59383
SECUNIA:59389
SECUNIA:59429
SECUNIA:59430
SECUNIA:59435
SECUNIA:59437
SECUNIA:59440
SECUNIA:59441
SECUNIA:59442
SECUNIA:59444
SECUNIA:59445
SECUNIA:59446
SECUNIA:59447
SECUNIA:59448
SECUNIA:59449
SECUNIA:59454
SECUNIA:59459
SECUNIA:59460
SECUNIA:59464
SECUNIA:59479
SECUNIA:59480
SECUNIA:59483
SECUNIA:59502
SECUNIA:59506
SECUNIA:59518
SECUNIA:59525
SECUNIA:59529
SECUNIA:59589
SECUNIA:59602
SECUNIA:59661
SECUNIA:59677
SECUNIA:59704
SECUNIA:59718
SECUNIA:59824
SECUNIA:59827
SECUNIA:59878
SECUNIA:59885
SECUNIA:59894
SECUNIA:59916
SECUNIA:60176
SECUNIA:60177
SECUNIA:60522
SECUNIA:60567
SECUNIA:60577
SECUNIA:60703
SECUNIA:60819
SECUNIA:61254
SECUNIA:61815
SECUNIA:81331
SMASH Issue 184883
SMASH Issue 190204
SMASH Issue 194646
SMASH Issue 196268
SMASH Issue 196270
SMASH Issue 196659
SMASH Issue 197016
SMASH Issue 197017
SMASH Issue 197538
SMASH Issue 198115
SMASH Issue 198879
SMASH Issue 198893
SMASH Issue 199072
SMASH Issue 199429
SMASH Issue 201048
SMASH Issue 201050
SMASH Issue 201087
SMASH Issue 201115
SMASH Issue 201727
SMASH Issue 201990
SMASH Issue 202009
SMASH Issue 202788
SMASH Issue 204752
SMASH Issue 205325
SMASH Issue 207690
SMASH Issue 207826
SMASH Issue 209676
SMASH Issue 211888
SMASH Issue 218336
SMASH Issue 218348
SMASH Issue 218349
SMASH Issue 218448
SMASH Issue 218452
SMASH Issue 218461
SMASH Issue 226841
SMASH Issue 55084
SMASH Issue 99325
SUSE:SUSE-SU-2015:0578
SUSE:SUSE-SU-2015:0743
SUSE:SUSE-SU-2018:0010
SUSE:SUSE-SU-2018:0011
SUSE:SUSE-SU-2018:0012
SUSE:SUSE-SU-2018:0383
SUSE:SUSE-SU-2018:0416
SUSE:SUSE-SU-2018:0482
SUSE:SUSE-SU-2018:0555
SUSE:SUSE-SU-2018:0660
SUSE:SUSE-SU-2018:0834
SUSE:SUSE-SU-2018:0841
SUSE:SUSE-SU-2018:0848
SUSE:SUSE-SU-2018:0986
SUSE:openSUSE-SU-2015:0229
SUSE:openSUSE-SU-2015:1911
SUSE:openSUSE-SU-2016:0640
SUSE:openSUSE-SU-2018:0022
SUSE:openSUSE-SU-2018:0023
SUSE:openSUSE-SU-2018:0408
SUSE:openSUSE-SU-2019:1407
SUSE:openSUSE-SU-2019:1438
SUSE:openSUSE-SU-2019:1439
SUSE:openSUSE-SU-2019:2376
SUSE:openSUSE-SU-2019:2379
SUSE:openSUSE-SU-2020:1325
UBUNTU:CVE-2013-2566
UBUNTU:CVE-2014-0224
UBUNTU:CVE-2017-10661
UBUNTU:CVE-2017-13166
UBUNTU:CVE-2017-13168
UBUNTU:CVE-2017-16648
UBUNTU:CVE-2017-17805
UBUNTU:CVE-2017-17806
UBUNTU:CVE-2017-18017
UBUNTU:CVE-2017-18075
UBUNTU:CVE-2017-18232
UBUNTU:CVE-2017-18344
UBUNTU:CVE-2017-8831
UBUNTU:CVE-2018-1000026
UBUNTU:CVE-2018-1000204
UBUNTU:CVE-2018-10021
UBUNTU:CVE-2018-1065
UBUNTU:CVE-2018-1068
UBUNTU:CVE-2018-10853
UBUNTU:CVE-2018-1120
UBUNTU:CVE-2018-1122
UBUNTU:CVE-2018-1123
UBUNTU:CVE-2018-1124
UBUNTU:CVE-2018-1125
UBUNTU:CVE-2018-1126
UBUNTU:CVE-2018-13405
UBUNTU:CVE-2018-3639
UBUNTU:CVE-2018-5344
UBUNTU:CVE-2018-5750
UBUNTU:CVE-2018-5803
UBUNTU:CVE-2018-7566
UBUNTU:CVE-2018-7995
UBUNTU:USN-3583-1
UBUNTU:USN-3583-2
UBUNTU:USN-3617-1
UBUNTU:USN-3617-2
UBUNTU:USN-3617-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3620-1
UBUNTU:USN-3620-2
UBUNTU:USN-3631-1
UBUNTU:USN-3631-2
UBUNTU:USN-3632-1
UBUNTU:USN-3651-1
UBUNTU:USN-3652-1
UBUNTU:USN-3653-1
UBUNTU:USN-3653-2
UBUNTU:USN-3654-1
UBUNTU:USN-3654-2
UBUNTU:USN-3655-1
UBUNTU:USN-3655-2
UBUNTU:USN-3656-1
UBUNTU:USN-3658-1
UBUNTU:USN-3658-2
UBUNTU:USN-3658-3
UBUNTU:USN-3674-1
UBUNTU:USN-3674-2
UBUNTU:USN-3677-1
UBUNTU:USN-3677-2
UBUNTU:USN-3678-1
UBUNTU:USN-3678-2
UBUNTU:USN-3678-3
UBUNTU:USN-3678-4
UBUNTU:USN-3679-1
UBUNTU:USN-3680-1
UBUNTU:USN-3693-1
UBUNTU:USN-3696-1
UBUNTU:USN-3696-2
UBUNTU:USN-3727-1
UBUNTU:USN-3742-1
UBUNTU:USN-3742-2
UBUNTU:USN-3752-1
UBUNTU:USN-3752-2
UBUNTU:USN-3752-3
UBUNTU:USN-3753-1
UBUNTU:USN-3753-2
UBUNTU:USN-3754-1
UBUNTU:USN-3756-1
UBUNTU:USN-3777-1
UBUNTU:USN-3777-2
UBUNTU:USN-3777-3
UBUNTU:USN-3798-1
UBUNTU:USN-3798-2
UBUNTU:USN-3820-1
UBUNTU:USN-3820-2
UBUNTU:USN-3820-3
UBUNTU:USN-3821-1
UBUNTU:USN-3821-2
UBUNTU:USN-3822-1
UBUNTU:USN-3822-2
USN-3583-1
USN-3583-2
USN-3910-1
USN-3910-2
ZDI-16-570
ZDI-22-1462
bdo#1033297
bdo#797165
bdo#802671
bdo#864859
bdo#866511
bdo#873383
bdo#875881
bdo#899170
bnc#1037994
bnc#1053152
bnc#1053153
bnc#1067087
bnc#1067118
bnc#1072831
bnc#1072865
bnc#1073792
bnc#1073874
bnc#1074488
bnc#1075825
bnc#1077402
bnc#1077404
bnc#1077892
bnc#1079384
bnc#1083483
bnc#1083488
bnc#1083650
bnc#1083900
bnc#1084755
bnc#1085107
bnc#1085413
bnc#1085447
bnc#1089281
bnc#1096723
bnc#1100416
bnc#1102851
bnc#1103203
bnc#1103580
bnc#1129735
bnc#1190006
bnc#882572
bnc#885777
bnc#901237
bnc#903703
bnc#905857
bnc#914447
bnc#916239
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2638fd0f92d4397884fd991d8f4925cb3f081901
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=318aaf34f1179b39fa9c30fa0f3288b645beee39
jsc#CAR-1230
linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f
linux.git:commit:7f7ccc2ccc2e70c6054685f5e3522efa81556830
linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc
linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f
linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f
linux.git:commit:d36260050e1881dce09625a9352d8729c911a6e3
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6
rh#1091938
rh#1103586
rh#1112877
rh#1243852
rh#1343538
rh#1343540
rh#1396963
rh#1396971
rh#1435719
rh#1449980
rh#1462147
rh#1462158
rh#1481136
rh#1481178
rh#1485274
rh#1495089
rh#1498016
rh#1516257
rh#1519780
rh#1527393
rh#1528312
rh#1528323
rh#1531135
rh#1533909
rh#1539508
rh#1539599
rh#1539706
rh#1541846
rh#1547824
rh#1548412
rh#1550142
rh#1551051
rh#1552048
rh#1553911
rh#1558066
rh#1566407
rh#1566890
rh#1573699
rh#1575465
rh#1575466
rh#1575472
rh#1575474
rh#1575852
rh#1575853
rh#1589324
rh#1589890
rh#1591854
rh#1596773
rh#1596795
rh#1596812
rh#1596842
rh#1599161
rh#1601704
rh#1609664
rh#1610958
rh#1658985
rh#2027239
rh#2044863
rh#2061700
rh#2119127
rh#2123056
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2139586
rh#2139598
CVE-2018-13410zip:Ignorecritical ()CVE-2018-13410
MISC:seclists.org:CVE-2018-13410
SMASH Issue 214815
UBUNTU:CVE-2018-13410
bnc#1191696
CVE-2018-14326check:Analysisimportant ()CVE-2018-14326
D:CVE-2018-14326
FEDORA:FEDORA-2019-1030f4816a
FEDORA:FEDORA-2019-6469ad8129
FEDORA:FEDORA-2019-d53d4a79ac
MISC:www.openwall.com:CVE-2018-14325
SMASH Issue 210738
UBUNTU:CVE-2018-14326
bnc#1101415
https://github.com/enzo1982/mp4v2/releases/tag/v2.1.0
rh#1601674
CVE-2018-14609kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)BID:104917
CVE-2018-14609
D:CVE-2018-14609
DEBIAN:DSA-4308
MISC:bugzilla.kernel.org:CVE-2018-14609
MISC:patchwork.kernel.org:CVE-2018-14609
MLIST:[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
OSS:2018/09/18/4
Oracle:CVE-2017-5753
RH:CVE-2018-14609
SMASH Issue 211771
UBUNTU:CVE-2018-14609
UBUNTU:USN-3821-1
UBUNTU:USN-3821-2
USN-4094-1
bnc#1102875
rh#1575472
rh#1575866
rh#1609664
rh#1610074
rh#1619846
rh#1660375
rh#1660385
rh#1686136
rh#1890354
CVE-2018-14610kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)BID:104917
CVE-2018-14610
D:CVE-2018-14610
MISC:bugzilla.kernel.org:CVE-2018-14610
MISC:patchwork.kernel.org:CVE-2018-14610
MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
OSS:2018/09/18/4
Oracle:CVE-2017-5753
RH:CVE-2018-14610
SMASH Issue 211772
UBUNTU:CVE-2018-14610
USN-3932-1
USN-3932-2
USN-4094-1
USN-4118-1
bnc#1102877
rh#1575472
rh#1575866
rh#1609664
rh#1610079
rh#1619846
rh#1660375
rh#1660385
rh#1686136
rh#1890354
CVE-2018-14611kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)BID:104917
CVE-2018-14611
D:CVE-2018-14611
MISC:bugzilla.kernel.org:CVE-2018-14611
MISC:patchwork.kernel.org:CVE-2018-14611
MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
OSS:2018/09/18/4
Oracle:CVE-2017-5753
RH:CVE-2018-14611
SMASH Issue 211773
UBUNTU:CVE-2018-14611
USN-3932-1
USN-3932-2
USN-4094-1
USN-4118-1
bnc#1102879
rh#1575472
rh#1575866
rh#1609664
rh#1610084
rh#1619846
rh#1660375
rh#1660385
rh#1686136
rh#1890354
CVE-2018-14612kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)BID:104917
CVE-2018-14612
D:CVE-2018-14612
MISC:bugzilla.kernel.org:CVE-2018-14612
MISC:patchwork.kernel.org:CVE-2018-14612
MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
OSS:2018/09/18/4
Oracle:CVE-2017-5753
RH:CVE-2018-14612
SMASH Issue 211774
UBUNTU:CVE-2018-14612
USN-3932-1
USN-3932-2
USN-4094-1
USN-4118-1
bnc#1102882
rh#1575472
rh#1575866
rh#1609664
rh#1610088
rh#1619846
rh#1660375
rh#1660385
rh#1686136
rh#1890354
CVE-2018-14613kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)BID:104917
CONFIRM:community.otrs.com:CVE-2018-14593
CVE-2018-14613
D:CVE-2018-14613
DEBIAN:DSA-4317
MISC:bugzilla.kernel.org:CVE-2018-14613
MISC:patchwork.kernel.org:CVE-2018-14613
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20180821 [SECURITY] [DLA 1473-1] otrs2 security update
MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
OSS:2018/09/18/4
Oracle:CVE-2017-5753
RH:CVE-2018-14613
SMASH Issue 211775
UBUNTU:CVE-2018-14613
USN-3932-1
USN-3932-2
USN-4094-1
USN-4118-1
bnc#1102896
rh#1575472
rh#1575866
rh#1609664
rh#1610092
rh#1619846
rh#1660375
rh#1660385
rh#1686136
rh#1890354
CVE-2018-14625kernel-source-rt:Already fixedmoderate5.3 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H)CONFIRM:bugzilla.redhat.com:CVE-2018-14625
CVE-2018-14625
MISC:syzkaller.appspot.com:CVE-2018-14625
MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
Oracle:CVE-2017-5753
RH:CVE-2018-14625
RHSA-2019:2029
RHSA-2019:2043
RHSA-2019:4154
SMASH Issue 213527
UBUNTU:CVE-2018-14625
USN-3871-1
USN-3871-3
USN-3871-4
USN-3871-5
USN-3872-1
USN-3878-1
USN-3878-2
bnc#1106615
linux.git:commit:834e772c8db0c6a275d75315d90aba4ebbb1e249
rh#1619846
rh#1660375
rh#1660385
CVE-2018-14633kernel-source-rt:Not affectedimportant8.8 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:105388
CONFIRM:bugzilla.redhat.com:CVE-2018-14633
CONFIRM:git.kernel.org:CVE-2018-14633
CVE-2018-14633
DEBIAN:DSA-4308
MISC:seclists.org:CVE-2018-14633
MLIST:[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
OSS:2018/09/18/4
OSS:2018/09/25/4
OSS:2018/Q3/270
Oracle:CVE-2018-5390
RH:CVE-2018-14633
RHSA-2018:3651
RHSA-2018:3666
RHSA-2019:1946
SMASH Issue 214018
SMASH Issue 214020
UBUNTU:CVE-2018-14633
UBUNTU:USN-3775-1
UBUNTU:USN-3775-2
UBUNTU:USN-3776-1
UBUNTU:USN-3776-2
UBUNTU:USN-3777-1
UBUNTU:USN-3777-2
UBUNTU:USN-3777-3
UBUNTU:USN-3779-1
bnc#1107829
bnc#1107832
linux.git:commit:1816494330a83f2a064499d8ed2797045641f92c
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1575866
rh#1601704
rh#1609664
rh#1626035
rh#1660375
rh#1660385
rh#1667782
rh#1686136
rh#1701224
rh#1701842
rh#1890354
CVE-2018-14656kernel-source-rt:Unsupportedmoderate ()CONFIRM:bugzilla.redhat.com:CVE-2018-14656
CONFIRM:git.kernel.org:CVE-2018-14656
CVE-2018-14656
MISC:bugs.chromium.org:CVE-2018-14656
MISC:lore.kernel.org:CVE-2018-14656
MISC:seclists.org:CVE-2018-14656
OSS:2018/Q4/9
RH:CVE-2018-14656
SECTRACK:1041804
SMASH Issue 216113
UBUNTU:CVE-2018-14656
bnc#1110710
https://lore.kernel.org/lkml/20180828154901.112726-1-jannh%40google.com/T/
rh#1629940
CVE-2018-14678kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:104924
CVE-2018-14678
D:CVE-2018-14678
DEBIAN:DSA-4308
MISC:xenbits.xen.org:CVE-2018-14678
MLIST:[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
OSS:2018/09/18/4
OSS:2018/Q3/123
OSS:2018/Q3/69
Oracle:CVE-2018-3646
Oracle:CVE-2018-5390
RH:CVE-2018-14678
SECTRACK:1041397
SMASH Issue 211727
SMASH Issue 211811
UBUNTU:CVE-2018-14678
USN-3931-1
USN-3931-2
bnc#1102715
rh#1575866
rh#1601704
rh#1608559
rh#1609664
rh#1890354
CVE-2018-15471kernel-source-rt:Already fixedimportant7.8 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H)CVE-2018-15471
D:CVE-2018-15471
DEBIAN:DSA-4313
MISC:bugs.chromium.org:CVE-2018-15471
MISC:xenbits.xen.org:CVE-2018-15471
MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
OSS:2018/Q3/140
Oracle:CVE-2018-3646
RH:CVE-2018-15471
SMASH Issue 211911
SMASH Issue 213000
UBUNTU:CVE-2018-15471
UBUNTU:USN-3819-1
UBUNTU:USN-3820-1
UBUNTU:USN-3820-2
UBUNTU:USN-3820-3
bnc#1103277
linux.git:commit:780e83c259fc33e8959fed8dfdad17e378d72b62
rh#1609664
rh#1610555
CVE-2018-15572kernel-source-rt:Not affectedimportant4.7 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2018-15572
DEBIAN:DSA-4308
MISC:cdn.kernel.org:CVE-2018-15594
MISC:git.kernel.org:CVE-2018-15572
MISC:github.com:CVE-2018-15572
MLIST:[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
OSS:2018/09/18/4
OSS:2018/09/25/4
RH:CVE-2018-15572
SMASH Issue 211578
SMASH Issue 213025
UBUNTU:CVE-2018-15572
UBUNTU:USN-3775-1
UBUNTU:USN-3775-2
UBUNTU:USN-3776-1
UBUNTU:USN-3776-2
UBUNTU:USN-3777-1
UBUNTU:USN-3777-2
UBUNTU:USN-3777-3
bnc#1102517
bnc#1105296
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1575866
rh#1609664
rh#1616245
rh#1660375
rh#1660385
rh#1667782
rh#1686136
rh#1701224
rh#1701842
rh#1890354
CVE-2018-15919openssh:Ignoremoderate5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)BID:105163
CVE-2018-15919
D:CVE-2018-15919
L3:52440
L3:52578
L3:52580
L3:52775
L3:52893
OSS:2018/Q3/180
OSS:2018/Q3/185
RH:CVE-2018-15919
SMASH Issue 213391
SMASH Issue 232254
UBUNTU:CVE-2018-15919
bnc#1106163
rh#1619063
rh#1623184
CVE-2018-16151strongswan:Not affectedmoderate4.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)CONFIRM:www.strongswan.org:CVE-2018-16152
CVE-2018-16151
CVE-2018-16152
DEBIAN:DSA-4305
DSA-4305
MLIST:[debian-lts-announce] 20180926 [SECURITY] [DLA 1522-1] strongswan security update
RH:CVE-2018-16151
RH:CVE-2018-16152
SMASH Issue 214023
UBUNTU:CVE-2018-16151
UBUNTU:CVE-2018-16152
bnc#1107874
rh#1635870
rh#1635873
rh#1635877
CVE-2018-16152strongswan:Not affectedmoderate4.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)CONFIRM:www.strongswan.org:CVE-2018-16152
CVE-2018-16151
CVE-2018-16152
DEBIAN:DSA-4305
DSA-4305
MLIST:[debian-lts-announce] 20180926 [SECURITY] [DLA 1522-1] strongswan security update
RH:CVE-2018-16151
RH:CVE-2018-16152
SMASH Issue 214023
SMASH Issue 214024
UBUNTU:CVE-2018-16151
UBUNTU:CVE-2018-16152
bnc#1107874
rh#1635870
rh#1635873
rh#1635877
CVE-2018-16276kernel-source-rt:Not affectedimportant7.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)CVE-2018-16276
D:CVE-2018-16276
DEBIAN:DSA-4308
MISC:cdn.kernel.org:CVE-2018-16276
MISC:git.kernel.org:CVE-2018-16276
MISC:github.com:CVE-2018-16276
MLIST:[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
OSS:2018/09/18/4
OSS:2018/09/25/4
RH:CVE-2018-16276
SMASH Issue 213357
UBUNTU:CVE-2018-16276
UBUNTU:USN-3776-1
UBUNTU:USN-3776-2
USN-3847-1
USN-3847-2
USN-3847-3
USN-3849-1
USN-3849-2
bnc#1106095
rh#1624507
CVE-2018-16301tcpdump:Releasedimportant ()CONFIRM:github.com:CVE-2018-10103
CONFIRM:github.com:CVE-2018-16301
CVE-2018-16301
RH:CVE-2018-16301
SMASH Issue 244121
UBUNTU:CVE-2018-16301
rh#1760500
CVE-2018-16597kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)BID:105394
BUGTRAQ:20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)
CONFIRM:git.kernel.org:CVE-2018-16597
CONFIRM:security.netapp.com:CVE-2018-16597
CONFIRM:support.f5.com:CVE-2018-16597
CVE-2018-16597
MISC:packetstormsecurity.com:CVE-2019-13272
OSS:2018/09/18/4
RH:CVE-2018-16597
RHSA-2016:2574
SMASH Issue 213508
SUSE:openSUSE-SU-2018:3202
UBUNTU:CVE-2018-16597
bnc#1106512
rh#1632443
CVE-2018-16862kernel-source-rt:Already fixedmoderate5.3 (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N)BID:106009
CONFIRM:bugzilla.redhat.com:CVE-2018-16862
CONFIRM:lore.kernel.org:CVE-2018-16862
CVE-2018-16862
MLIST:[oss-security] 20181123 CVE-2018-16862: Linux kernel: cleancache: deleted files infoleak
OSS:2018/Q4/169
Oracle:CVE-2017-5753
Oracle:CVE-2018-3639
RH:CVE-2018-16862
SMASH Issue 219603
UBUNTU:CVE-2018-16862
bnc#1117186
rh#1575472
rh#1609664
rh#1619846
rh#1649017
rh#1660375
rh#1660385
CVE-2018-16880kernel-source-rt:Not affectedmoderate ()BID:106735
CONFIRM:bugzilla.redhat.com:CVE-2018-16880
CONFIRM:support.f5.com:CVE-2018-16880
CVE-2018-16880
Oracle:CVE-2017-5753
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2018-16880
SMASH Issue 223523
SUSE:openSUSE-SU-2019:1404
UBUNTU:CVE-2018-16880
USN-3903-1
USN-3903-2
bnc#1122767
linux.git:commit:b46a0bf78ad7b150ef5910da83859f7f5a514ffd
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1655162
rh#1656472
rh#1664110
rh#1667782
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1718176
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
CVE-2018-16885kernel-source-rt:Unsupportedmoderate ()BID:106296
CONFIRM:bugzilla.redhat.com:CVE-2018-16885
CVE-2018-16885
RH:CVE-2018-16885
RHSA-2019:2029
RHSA-2019:2043
SMASH Issue 221531
bnc#1120258
rh#1661503
CVE-2018-17540strongswan:Not affectedmoderate7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H)CONFIRM:download.strongswan.org:CVE-2018-17540
CONFIRM:www.strongswan.org:CVE-2018-17540
CVE-2018-17540
DEBIAN:DSA-4309
DSA-4309
GENTOO:GLSA-201811-16
MLIST:[debian-lts-announce] 20181002 [SECURITY] [DLA 1528-1] strongswan security update
RH:CVE-2018-17540
SMASH Issue 215710
SMASH Issue 215711
UBUNTU:CVE-2018-17540
UBUNTU:USN-3774-1
bnc#1109845
rh#1635877
CVE-2018-17953pam:Not affectedimportant7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)CVE-2018-17953
RH:CVE-2018-17953
SMASH Issue 219101
UBUNTU:CVE-2018-17953
bnc#1115640
bnc#1197021
rh#1652593
CVE-2018-17972kernel-source-rt:Already fixedmoderate ()BID:105525
CONFIRM:support.f5.com:CVE-2018-17972
CVE-2018-17972
MISC:marc.info:CVE-2018-17972
MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2018-17972
RHSA-2019:0512
RHSA-2019:0514
RHSA-2019:0831
RHSA-2019:2473
SMASH Issue 216151
SUSE:openSUSE-SU-2019:1407
UBUNTU:CVE-2018-17972
UBUNTU:USN-3821-1
UBUNTU:USN-3821-2
UBUNTU:USN-3832-1
UBUNTU:USN-3835-1
USN-3871-1
USN-3871-3
USN-3871-4
USN-3871-5
USN-3880-1
USN-3880-2
bnc#1110785
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1205079
rh#1636349
rh#1664110
rh#1667782
rh#1699856
rh#1701224
rh#1701842
rh#1715554
rh#1716328
CVE-2018-18021kernel-source-rt:Already fixedlow3.9 (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L)BID:105550
CVE-2018-18021
D:CVE-2018-18021
MISC:cdn.kernel.org:CVE-2018-18021
MISC:git.kernel.org:CVE-2018-18021
MISC:github.com:CVE-2018-18021
MISC:www.openwall.com:CVE-2018-18021
OSS:2018/Q4/20
Oracle:CVE-2017-5753
RH:CVE-2018-18021
RHSA-2018:3656
SMASH Issue 216245
UBUNTU:CVE-2018-18021
bnc#1110998
rh#1619846
rh#1635475
rh#1660375
rh#1660385
CVE-2018-18312perl:Not affectedmoderate5.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)BID:106179
CONFIRM:metacpan.org:CVE-2018-18312
CONFIRM:metacpan.org:CVE-2018-18314
CONFIRM:rt.perl.org:CVE-2018-18312
CONFIRM:security.netapp.com:CVE-2018-18311
CVE-2018-18312
DEBIAN:DSA-4347
FEDORA:FEDORA-2018-9dbe983805
GLSA-201909-01
MISC:www.oracle.com:CVE-2015-7501
Oracle:CVE-2018-18311
Oracle:CVE-2018-18314
RH:CVE-2018-18312
RHSA-2019:0001
RHSA-2019:0010
SECTRACK:1042181
SMASH Issue 218665
UBUNTU:CVE-2018-18312
UBUNTU:USN-3834-1
bnc#1114675
rh#1646734
CVE-2018-18386kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2018-18386
DSA-5378
MISC:cdn.kernel.org:CVE-2018-18386
MISC:git.kernel.org:CVE-2018-18386
MISC:github.com:CVE-2018-18386
OSS:2018/09/18/4
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2018-3639
RH:CVE-2018-18386
RHSA-2019:0831
SMASH Issue 208752
UBUNTU:CVE-2018-18386
bdo#1033297
bnc#1094825
bnc#1110711
bnc#1112039
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1519780
rh#1527393
rh#1573699
rh#1575472
rh#1575866
rh#1599161
rh#1609664
rh#1640598
rh#1660375
rh#1660385
rh#1667782
rh#1686136
rh#1701224
rh#1701842
rh#1890354
rh#2027239
rh#2044863
rh#2061700
rh#2119127
CVE-2018-18397kernel-source-rt:Already fixedmoderate6.1 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N)CVE-2018-18397
MISC:bugs.chromium.org:OSS:2018/Q4/219
MISC:cdn.kernel.org:CVE-2018-18397
MISC:git.kernel.org:CVE-2018-18397
MISC:git.kernel.org:OSS:2018/Q4/219
MISC:github.com:CVE-2018-18397
OSS:2018/Q4/219
Oracle:CVE-2017-5753
RH:CVE-2018-18397
RHBA-2019:0327
RHSA-2019:0163
RHSA-2019:0202
RHSA-2019:0324
RHSA-2019:0831
SMASH Issue 219837
UBUNTU:CVE-2018-18397
USN-3901-1
USN-3901-2
USN-3903-1
USN-3903-2
bnc#1117656
rh#1619846
rh#1641548
rh#1660375
rh#1660385
CVE-2018-18445kernel-source-rt:Not affectedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CONFIRM:support.f5.com:CVE-2018-18445
CVE-2018-18445
MISC:bugs.chromium.org:CVE-2018-18445
MISC:cdn.kernel.org:CVE-2018-18445
MISC:git.kernel.org:CVE-2018-18445
MISC:github.com:CVE-2018-18445
OSS:2018/09/18/4
OSS:2018/Q4/69
RH:CVE-2018-18445
RHSA-2019:0512
RHSA-2019:0514
SMASH Issue 216953
UBUNTU:CVE-2018-18445
UBUNTU:USN-3832-1
UBUNTU:USN-3835-1
USN-3847-1
USN-3847-2
USN-3847-3
bnc#1112372
rh#1575866
rh#1640596
rh#1890354
CVE-2018-18559kernel-source-rt:Not affectedimportant7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2018-18559
D:CVE-2018-18559
L3:53934
MISC:blogs.securiteam.com:CVE-2018-18559
OSS:2018/09/18/4
Oracle:CVE-2019-5489
RH:CVE-2018-18559
RHBA-2019:0327
RHSA-2019:0163
RHSA-2019:0188
RHSA-2019:1170
RHSA-2019:1190
RHSA-2019:3967
RHSA-2019:4159
RHSA-2020:0174
SMASH Issue 217761
SMASH Issue 217809
UBUNTU:CVE-2018-18559
bnc#1112859
bnc#1112921
bnc#1129782
rh#1641878
rh#1664110
rh#1680540
rh#1683191
CVE-2018-18751gettext-runtime:Releasedlow4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2018-18751
MISC:github.com:CVE-2018-18751
RH:CVE-2018-18751
RHSA-2019:3643
RHSA-2020:1138
RHSA-2020:2485
RHSA-2020:2846
SMASH Issue 218203
SUSE:openSUSE-SU-2020:1270
SUSE:openSUSE-SU-2020:1278
SUSE:openSUSE-SU-2020:1385
UBUNTU:CVE-2018-18751
UBUNTU:USN-3815-1
UBUNTU:USN-3815-2
bnc#1113719
rh#1647043
CVE-2018-18955kernel-source-rt:Unsupported, ltp:Releasedmoderate ()BID:105941
CONFIRM:security.netapp.com:CVE-2018-18955
CONFIRM:support.f5.com:CVE-2018-18955
CVE-2018-18955
D:CVE-2018-18955
EXPLOIT-DB:45886
EXPLOIT-DB:45915
MISC:bugs.chromium.org:CVE-2018-18955
MISC:cdn.kernel.org:CVE-2018-18955
MISC:git.kernel.org:CVE-2018-18955
MISC:git.kernel.org:OSS:2018/Q4/150
OSS:2018/Q4/150
RH:CVE-2018-18955
SMASH Issue 219347
UBUNTU:CVE-2018-18955
UBUNTU:USN-3832-1
UBUNTU:USN-3833-1
UBUNTU:USN-3835-1
UBUNTU:USN-3836-1
UBUNTU:USN-3836-2
bnc#1116303
linux.git:commit:d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd
rh#1651384
CVE-2018-19406kernel-source-rt:Unsupportedmoderate ()BID:105988
CVE-2018-19406
D:CVE-2018-19406
MISC:lkml.org:CVE-2018-19406
RH:CVE-2018-19406
SMASH Issue 219518
UBUNTU:CVE-2018-19406
bnc#1116855
rh#1652650
CVE-2018-19787python-lxml:Releasedmoderate5.4 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)CVE-2018-19787
D:CVE-2018-19787
MISC:github.com:CVE-2018-19787
MLIST:[debian-lts-announce] 20181210 [SECURITY] [DLA 1604-1] lxml security update
MLIST:[debian-lts-announce] 20201126 [SECURITY] [DLA 2467-1] lxml security update
RH:CVE-2018-19787
SMASH Issue 220014
UBUNTU:CVE-2018-19787
USN-3841-1
USN-3841-2
bnc#1118088
jsc#CAR-1590
rh#1660235
CVE-2018-19824kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:106109
CONFIRM:support.f5.com:CVE-2018-19824
CVE-2018-19824
MISC:git.kernel.org:CVE-2018-19824
MISC:github.com:CVE-2018-19824
MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
OSS:2018/Q4/199
Oracle:CVE-2017-5753
Oracle:CVE-2018-3639
RH:CVE-2018-19824
RHSA-2019:2029
RHSA-2019:2703
RHSA-2019:2741
SMASH Issue 220051
UBUNTU:CVE-2018-19824
USN-3879-1
USN-3879-2
USN-3930-1
USN-3930-2
USN-3931-1
USN-3931-2
USN-3933-1
USN-3933-2
bnc#1118152
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1575472
rh#1609664
rh#1619846
rh#1655816
rh#1660375
rh#1660385
rh#1667782
rh#1686136
rh#1701224
rh#1701842
CVE-2018-20169kernel-source-rt:Already fixedmoderate6.3 (CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2018-20169
MISC:cdn.kernel.org:CVE-2018-20169
MISC:git.kernel.org:CVE-2018-20169
MISC:github.com:CVE-2018-20169
MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
Oracle:CVE-2017-5753
Oracle:CVE-2018-3639
RH:CVE-2018-20169
RHSA-2019:3309
RHSA-2019:3517
RHSA-2020:1016
RHSA-2020:1070
RHSA-2020:2522
RHSA-2020:2770
RHSA-2020:2777
RHSA-2020:2851
SMASH Issue 221218
SMASH Issue 221219
UBUNTU:CVE-2018-20169
USN-3879-1
USN-3879-2
USN-4094-1
USN-4118-1
bnc#1119714
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1575472
rh#1609664
rh#1619846
rh#1660375
rh#1660385
rh#1667782
rh#1686136
rh#1701224
rh#1701842
CVE-2018-20346sqlite3:Ignoreimportant7 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:106323
CONFIRM:chromereleases.googleblog.com:CVE-2018-17480
CONFIRM:support.apple.com:CVE-2019-6200
CONFIRM:support.apple.com:CVE-2019-6202
CONFIRM:support.apple.com:CVE-2019-6205
CONFIRM:support.apple.com:CVE-2019-6212
CONFIRM:www.synology.com:CVE-2018-20346
CVE-2018-20346
D:CVE-2018-20346
FEDORA:FEDORA-2019-49f80a78bc
FREEBSD:FreeBSD-EN-19:03
GLSA-201904-21
MISC:access.redhat.com:CVE-2018-20346
MISC:blade.tencent.com:CVE-2018-20346
MISC:bugzilla.redhat.com:OSS:2018/Q4/270
MISC:chromium.googlesource.com:CVE-2018-20346
MISC:crbug.com:CVE-2018-20346
MISC:github.com:CVE-2018-20346
MISC:news.ycombinator.com:CVE-2018-20346
MISC:sqlite.org:CVE-2018-20346
MISC:worthdoingbadly.com:CVE-2018-20346
MISC:www.mail-archive.com:CVE-2018-20346
MISC:www.oracle.com:CVE-2019-2880
MISC:www.sqlite.org:CVE-2018-20346
MLIST:[debian-lts-announce] 20181222 [SECURITY] [DLA 1613-1] sqlite3 security update
MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
OSS:2018/Q4/270
RH:CVE-2018-20346
SMASH Issue 221212
SMASH Issue 221689
SUSE:openSUSE-SU-2019:1159
SUSE:openSUSE-SU-2019:1222
UBUNTU:CVE-2018-20346
USN-4019-1
USN-4019-2
bnc#1119687
rh#1659379
CVE-2018-20511kernel-source-rt:Not affectedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2018-20511
RH:CVE-2018-20511
SMASH Issue 221893
SMASH Issue 221923
UBUNTU:CVE-2018-20511
bnc#1120388
rh#1663072
CVE-2018-20573yaml-cpp:Releasedmoderate5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2018-20573
D:CVE-2018-20573
MISC:github.com:CVE-2018-20573
RH:CVE-2018-20573
SMASH Issue 221934
UBUNTU:CVE-2018-20573
bnc#1121227
jsc#CAR-1660
rh#1665567
CVE-2018-20574yaml-cpp:Releasedmoderate5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2018-20574
D:CVE-2018-20574
MISC:github.com:CVE-2018-20574
RH:CVE-2018-20574
SMASH Issue 221933
UBUNTU:CVE-2018-20574
bnc#1121230
jsc#CAR-1659
rh#1665571
CVE-2018-20679busybox:Releasedmoderate5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CONFIRM:busybox.net:CVE-2016-2148
CVE-2018-20679
FULLDISC:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
MISC:bugs.busybox.net:CVE-2018-20679
MISC:git.busybox.net:CVE-2018-20679
RH:CVE-2018-20679
SMASH Issue 222539
UBUNTU:CVE-2018-20679
USN-3935-1
bnc#1121426
rh#1666667
rh#1667067
CVE-2018-20784kernel-source-rt:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2018-20784
MISC:cdn.kernel.org:CVE-2018-20784
MISC:git.kernel.org:CVE-2018-20784
MISC:github.com:CVE-2018-20784
RH:CVE-2018-20784
RHSA-2019:1959
RHSA-2019:1971
SMASH Issue 225243
UBUNTU:CVE-2018-20784
USN-4115-1
USN-4118-1
USN-4211-1
USN-4211-2
bnc#1126703
jsc#CAR-1495
rh#1680540
CVE-2018-20796glibc:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)BID:107160
CONFIRM:security.netapp.com:CVE-2009-5155
CVE-2018-20796
MISC:debbugs.gnu.org:CVE-2018-20796
MISC:lists.gnu.org:CVE-2018-20796
RH:CVE-2018-20796
SMASH Issue 225378
UBUNTU:CVE-2018-20796
bnc#1127311
rh#1683150
rh#1684374
CVE-2018-20836kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H)BID:108196
BUGTRAQ:20190812 [SECURITY] [DSA 4495-1] linux security update
BUGTRAQ:20190813 [SECURITY] [DSA 4497-1] linux security update
CONFIRM:security.netapp.com:CVE-2019-11811
CONFIRM:support.f5.com:CVE-2018-20836
CVE-2018-20836
DSA-4495
DSA-4497
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:git.kernel.org:CVE-2018-20836
MISC:github.com:CVE-2018-20836
MLIST:[debian-lts-announce] 20190814 [SECURITY] [DLA 1884-1] linux security update
MLIST:[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update
OSS:2020/04/06/2
Oracle:CVE-2017-5753
Oracle:CVE-2018-5390
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2018-20836
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:5656
RHSA-2021:0019
SMASH Issue 232341
SUSE:openSUSE-SU-2019:1716
SUSE:openSUSE-SU-2019:1757
UBUNTU:CVE-2018-20836
USN-4076-1
bnc#1134395
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1601704
rh#1655162
rh#1664110
rh#1667782
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1716992
rh#1718176
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
CVE-2018-20843expat:Releasedmoderate5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)BUGTRAQ:20190628 [SECURITY] [DSA 4472-1] expat security update
CONFIRM:security.netapp.com:CVE-2018-20843
CONFIRM:support.f5.com:CVE-2018-20843
CONFIRM:www.tenable.com:CVE-2019-16168
CVE-2018-20843
DSA-4472
FEDORA:FEDORA-2019-139fcda84d
FEDORA:FEDORA-2019-18868e1715
GLSA-201911-08
MISC:bugs.chromium.org:CVE-2018-20843
MISC:github.com:CVE-2018-20843
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2019-2880
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2021-35666
MLIST:[debian-lts-announce] 20190629 [SECURITY] [DLA 1839-1] expat security update
Oracle:CVE-2018-20843
RH:CVE-2018-20843
RHSA-2020:2644
RHSA-2020:2646
RHSA-2020:3952
RHSA-2020:4484
RHSA-2020:4846
SMASH Issue 235643
SUSE:openSUSE-SU-2019:1777
UBUNTU:CVE-2018-20843
USN-4040-1
USN-4040-2
bdo#931031
bnc#1139937
rh#1723723
CVE-2018-20854kernel-source-rt:Unsupportedimportant ()CVE-2018-20854
MISC:git.kernel.org:CVE-2018-20854
MISC:github.com:CVE-2018-20854
RH:CVE-2018-20854
SMASH Issue 238066
SMASH Issue 238089
UBUNTU:CVE-2018-20854
bnc#1143038
rh#1738711
CVE-2018-20855kernel-source-rt:Already fixedmoderate5.1 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2019-15098
CVE-2018-20855
MISC:cdn.kernel.org:CVE-2018-20855
MISC:git.kernel.org:CVE-2018-20855
MISC:github.com:CVE-2018-20855
Oracle:CVE-2017-5753
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2018-20855
SMASH Issue 238067
SMASH Issue 238090
SUSE:openSUSE-SU-2019:1923
SUSE:openSUSE-SU-2019:1924
UBUNTU:CVE-2018-20855
bnc#1143045
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1655162
rh#1664110
rh#1667782
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1716992
rh#1718176
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
rh#1738708
rh#1757368
CVE-2018-20961kernel-source-rt:Ignoremoderate5.7 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H)BUGTRAQ:20190826 [slackware-security] Slackware 14.2 kernel (SSA:2019-238-01)
CONFIRM:security.netapp.com:CVE-2019-15098
CONFIRM:support.f5.com:/csp/article/K58502654
CVE-2018-20961
MISC:cdn.kernel.org:CVE-2018-20961
MISC:git.kernel.org:CVE-2018-20961
MISC:github.com:CVE-2018-20961
MISC:packetstormsecurity.com:/files/154228/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
MISC:packetstormsecurity.com:CVE-2019-0136
RH:CVE-2018-20961
SMASH Issue 239209
UBUNTU:CVE-2018-20961
USN-4145-1
bnc#1144823
rh#1743502
CVE-2018-20976kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2018-20976
MISC:git.kernel.org:CVE-2018-20976
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
OSS:2019/09/17/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2018-20976
RHSA-2020:0178
RHSA-2020:0543
RHSA-2020:0592
RHSA-2020:0609
RHSA-2020:0661
SMASH Issue 240427
UBUNTU:CVE-2018-20976
bnc#1146285
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1746732
rh#1757368
rh#1781514
CVE-2018-21008kernel-source-rt:Not affectedmoderate5.6 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)CVE-2018-21008
MISC:cdn.kernel.org:CVE-2018-21008
MISC:git.kernel.org:CVE-2018-21008
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2018-21008
SMASH Issue 241748
UBUNTU:CVE-2018-21008
bnc#1149591
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1667782
rh#1743547
rh#1746628
rh#1757368
rh#1759188
rh#1773519
rh#1783498
CVE-2018-21232re2c:Unsupportedmoderate ()CVE-2018-21232
MISC:github.com:CVE-2018-21232
MISC:www.openwall.com:CVE-2018-21232
OSS:2020/Q2/111
RH:CVE-2018-21232
SMASH Issue 258804
UBUNTU:CVE-2018-21232
bnc#1170890
rh#1837650
CVE-2018-25015kernel-source-rt:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2018-25015
MISC:cdn.kernel.org:CVE-2018-25015
MISC:git.kernel.org:CVE-2018-25015
MISC:sites.google.com:CVE-2018-25015
MISC:syzkaller.appspot.com:CVE-2018-25015
SMASH Issue 301366
bnc#1187046
rh#1969529
CVE-2018-25020kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2018-25020
CVE-2018-25020
D:CVE-2018-25020
L3:62421
MISC:github.com:CVE-2018-25020
MISC:packetstormsecurity.com:CVE-2021-33909
SMASH Issue 316802
bnc#1193575
bnc#1193863
bnc#1194309
rh#2031183
CVE-2018-25032zlib:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-333517.pdf
CONFIRM:github.com:CVE-2018-25032
CONFIRM:security.netapp.com:CVE-2018-25032
CONFIRM:security.netapp.com:CVE-2022-21569
CONFIRM:support.apple.com:CVE-2018-25032
CVE-2018-25032
D:CVE-2018-25032
DSA-5111
FEDORA:FEDORA-2022-12b89e2aad
FEDORA:FEDORA-2022-3a92250fd5
FEDORA:FEDORA-2022-413a80a102
FEDORA:FEDORA-2022-61cf1c64f6
FEDORA:FEDORA-2022-b58a85e167
FEDORA:FEDORA-2022-dbd2935e44
FULLDISC:20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
FULLDISC:20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
GLSA-202210-42
L3:63778
L3:68111
MISC:github.com:CVE-2018-25032
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220402 [SECURITY] [DLA 2968-1] zlib security update
MLIST:[debian-lts-announce] 20220507 [SECURITY] [DLA 2993-1] libz-mingw-w64 security update
MLIST:[debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
OSS:2022/03/24/1
OSS:2022/03/25/2
OSS:2022/03/26/1
OSS:2022/03/28/1
OSS:2022/03/28/3
OSS:2022/Q1/195
Oracle:CVE-2018-25032
RHSA-2022:1591
RHSA-2022:1642
RHSA-2022:1661
RHSA-2022:2192
RHSA-2022:2197
RHSA-2022:2198
RHSA-2022:2201
RHSA-2022:2213
RHSA-2022:2214
RHSA-2022:4584
RHSA-2022:4592
RHSA-2022:4845
RHSA-2022:4896
RHSA-2022:5439
RHSA-2022:7144
RHSA-2022:7813
RHSA-2022:8420
RHSA-2023:0943
RHSA-2023:0975
RHSA-2023:0976
SMASH Issue 327120
SMASH Issue 327236
bdo#1008265
bnc#1197459
jsc#CAR-1618
rh#2067945
CVE-2018-5332kernel-source-rt:Not affectedlow3.6 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L)BID:102507
CONFIRM:git.kernel.org:CVE-2018-5332
CONFIRM:github.com:CVE-2018-5332
CVE-2018-5332
D:CVE-2018-5332
DEBIAN:DSA-4187
DSA-4187
DSA-5378
MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
RH:CVE-2018-5332
RHSA-2018:0470
SMASH Issue 198027
UBUNTU:CVE-2018-5332
UBUNTU:USN-3617-1
UBUNTU:USN-3617-2
UBUNTU:USN-3617-3
UBUNTU:USN-3619-1
UBUNTU:USN-3619-2
UBUNTU:USN-3620-1
UBUNTU:USN-3620-2
UBUNTU:USN-3632-1
bdo#1033297
bnc#1075621
rh#1495089
rh#1498016
rh#1519780
rh#1533890
rh#1539599
rh#2061700
rh#2119127
CVE-2018-5333kernel-source-rt:Not affectedlow2.9 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)BID:102510
CONFIRM:git.kernel.org:CVE-2018-5333
CONFIRM:github.com:CVE-2018-5333
CVE-2018-5333
D:CVE-2018-5333
DSA-4187
DSA-5378
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
RH:CVE-2018-5333
RHSA-2018:0470
SMASH Issue 198028
UBUNTU:CVE-2018-5333
bdo#1033297
bnc#1075617
rh#1495089
rh#1498016
rh#1519780
rh#1533891
rh#1539599
rh#2061700
rh#2119127
CVE-2018-5389strongswan:Not affectedmoderate6.7 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CERT-VN:VU#857035
CVE-2018-5389
D:CVE-2018-5389
MISC:blogs.cisco.com:CVE-2018-5389
MISC:web-in-security.blogspot.com:CVE-2018-5389
MISC:www.usenix.org:CVE-2018-5389
RH:CVE-2018-5389
SMASH Issue 211125
UBUNTU:CVE-2018-5389
bnc#1101792
rh#1603064
CVE-2018-5703kernel-source-rt:Not affectedimportant7.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H)CVE-2018-5703
MISC:groups.google.com:CVE-2018-5703
RH:CVE-2018-5703
SMASH Issue 198321
UBUNTU:CVE-2018-5703
bnc#1076200
rh#1535110
CVE-2018-5814kernel-source-rt:Releasedmoderate5.3 (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cdn.kernel.org:CVE-2018-5814
CONFIRM:git.kernel.org:CVE-2018-5814
CVE-2018-5814
D:CVE-2018-5814
DSA-5378
MISC:secuniaresearch.flexerasoftware.com:CVE-2018-5814
OSS:2018/Q2/165
OSS:2022/11/10/2
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2018-3639
Oracle:CVE-2018-3646
Oracle:CVE-2018-5390
RH:CVE-2018-5814
SECTRACK:1041050
SECUNIA:81540
SMASH Issue 207587
UBUNTU:CVE-2018-5814
bdo#1033297
bnc#1096480
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1519780
rh#1527393
rh#1573699
rh#1575472
rh#1588620
rh#1599161
rh#1601704
rh#1609664
rh#1667782
rh#1701224
rh#1701842
rh#2027239
rh#2044863
rh#2061700
rh#2119127
CVE-2018-5953kernel-source-rt:Ignorelow3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)BID:105045
CONFIRM:git.kernel.org:CVE-2018-5953
CVE-2018-5953
D:CVE-2018-5953
MISC:github.com:CVE-2018-5953
MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
RH:CVE-2018-5953
SMASH Issue 212443
UBUNTU:CVE-2018-5953
bnc#1104131
rh#1614057
CVE-2018-5995kernel-source-rt:Unsupportedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)BID:105049
CVE-2018-5995
D:CVE-2018-5995
DSA-4497
MISC:github.com:CVE-2018-5995
MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update
MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update
RH:CVE-2018-5995
SMASH Issue 212444
UBUNTU:CVE-2018-5995
bnc#1104130
rh#1614061
CVE-2018-6554kernel-source-rt:Not affectedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)BID:105302
CVE-2018-6554
D:CVE-2018-6554
DEBIAN:DSA-4308
MLIST:[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
MLIST:[stable] 20180904 [PATCH 1/2] irda: Fix memory leak caused by repeated binds of irda socket
OSS:2018/09/18/4
OSS:2018/09/25/4
RH:CVE-2018-6554
SMASH Issue 213505
UBUNTU:CVE-2018-6554
UBUNTU:USN-3775-1
UBUNTU:USN-3775-2
UBUNTU:USN-3776-1
UBUNTU:USN-3776-2
UBUNTU:USN-3777-1
UBUNTU:USN-3777-2
UBUNTU:USN-3777-3
bnc#1106509
rh#1575866
rh#1623610
rh#1890354
CVE-2018-6555kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)BID:105304
CVE-2018-6555
D:CVE-2018-6555
DEBIAN:DSA-4308
MLIST:[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
MLIST:[stable] 20180904 [PATCH 2/2] irda: Only insert new objects into the global database via setsockopt
OSS:2018/09/18/4
OSS:2018/09/25/4
RH:CVE-2018-6555
SMASH Issue 213506
UBUNTU:CVE-2018-6555
UBUNTU:USN-3775-1
UBUNTU:USN-3775-2
UBUNTU:USN-3776-1
UBUNTU:USN-3776-2
UBUNTU:USN-3777-1
UBUNTU:USN-3777-2
UBUNTU:USN-3777-3
bnc#1106511
rh#1575866
rh#1623614
rh#1890354
CVE-2018-6952patch:Releasedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)BID:103047
CVE-2018-6952
D:CVE-2018-6952
MISC:savannah.gnu.org:CVE-2018-6952
RH:CVE-2018-6952
RHSA-2019:2033
SMASH Issue 199945
UBUNTU:CVE-2018-6952
bnc#1080985
jsc#CAR-1824
rh#1545053
rh#1818934
CVE-2018-7480kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H)CVE-2018-7480
DEBIAN:DSA-4188
DSA-4188
MISC:git.kernel.org:CVE-2018-7480
MISC:github.com:CVE-2018-7480
OSS:2018/09/18/4
RH:CVE-2018-7480
SMASH Issue 200843
UBUNTU:CVE-2018-7480
UBUNTU:USN-3654-1
UBUNTU:USN-3654-2
UBUNTU:USN-3656-1
bnc#1082863
rh#1549427
CVE-2018-7492kernel-source-rt:Already fixedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:103185
CVE-2018-7492
D:CVE-2018-7492
DSA-4187
DSA-5378
MISC:git.kernel.org:CVE-2018-7492
MISC:git.kernel.org:OSS:2014/03/05/6
MISC:github.com:CVE-2018-7492
MISC:patchwork.kernel.org:CVE-2018-7492
MISC:www.kernel.org:CVE-2018-7492
MISC:xorl.wordpress.com:CVE-2018-7492
OSS:2014/03/05/6
OSS:2018/Q1/191
OSS:2022/11/10/2
OSS:2022/12/27/3
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2022/Q4/244
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2018-3639
Oracle:CVE-2018-3646
RH:CVE-2018-7492
SMASH Issue 200869
UBUNTU:CVE-2018-7492
bdo#1033297
bnc#1082962
rh#1519780
rh#1527393
rh#1573699
rh#1575472
rh#1599161
rh#2027239
rh#2044863
rh#2061700
rh#2119127
CVE-2018-7995kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)BID:103356
BID:106503
BID:99619
CONFIRM:bugzilla.kernel.org:CVE-2018-10876
CONFIRM:bugzilla.kernel.org:CVE-2018-10880
CONFIRM:bugzilla.kernel.org:CVE-2018-10882
CONFIRM:bugzilla.redhat.com:CVE-2018-10853
CONFIRM:bugzilla.redhat.com:CVE-2018-10876
CONFIRM:bugzilla.redhat.com:CVE-2018-10877
CONFIRM:bugzilla.redhat.com:CVE-2018-10880
CONFIRM:bugzilla.redhat.com:CVE-2018-10882
CONFIRM:git.kernel.org:CVE-2018-10853
CONFIRM:git.kernel.org:CVE-2018-10876
CONFIRM:git.kernel.org:CVE-2018-10880
CONFIRM:git.kernel.org:CVE-2018-10882
CONFIRM:github.com:CVE-2017-8831
CONFIRM:github.com:CVE-2018-1000204
CONFIRM:patchwork.ozlabs.org:CVE-2018-10876
CONFIRM:patchwork.ozlabs.org:CVE-2018-10880
CONFIRM:source.android.com:CVE-2017-6280
CVE-2017-13168
CVE-2017-8813
CVE-2017-8831
CVE-2018-1000204
CVE-2018-10021
CVE-2018-10853
CVE-2018-10876
CVE-2018-10877
CVE-2018-10880
CVE-2018-10882
CVE-2018-13405
CVE-2018-7995
D:CVE-2017-8831
D:CVE-2018-7995
DEBIAN:DSA-4187
DEBIAN:DSA-4188
DEBIAN:DSA-4266
DSA-4187
DSA-4188
EXPLOIT-DB:45033
MISC:bugzilla.kernel.org:CVE-2017-8831
MISC:git.kernel.org:CVE-2018-10021
MISC:git.kernel.org:CVE-2018-13405
MISC:git.kernel.org:CVE-2018-7995
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:github.com:CVE-2018-10021
MISC:github.com:CVE-2018-13405
MISC:lkml.org:CVE-2018-7995
MISC:openwall.com:CVE-2018-13405
MISC:twitter.com:CVE-2018-13405
MISC:www.openwall.com:CVE-2018-10853
MISC:www.securityfocus.com:CVE-2017-8831
MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
MLIST:[debian-lts-announce] 20180815 [SECURITY] [DLA 1466-1] linux-4.9 security update
OSS:2018/09/18/4
OSS:2018/09/25/4
OSS:2018/Q3/208
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2017-6074
Oracle:CVE-2018-3646
Oracle:CVE-2018-5390
RH:CVE-2017-13168
RH:CVE-2017-8831
RH:CVE-2018-10021
RH:CVE-2018-10853
RH:CVE-2018-7995
RHSA-2018:2948
RHSA-2018:3083
RHSA-2018:3096
RHSA-2019:2029
RHSA-2019:2043
RHSA-2020:0036
RHSA-2020:0103
RHSA-2020:0179
SMASH Issue 184883
SMASH Issue 196270
SMASH Issue 196659
SMASH Issue 201551
SMASH Issue 207826
SMASH Issue 207855
SUSE:openSUSE-SU-2019:1407
UBUNTU:CVE-2017-13168
UBUNTU:CVE-2017-8831
UBUNTU:CVE-2018-10021
UBUNTU:CVE-2018-10853
UBUNTU:CVE-2018-7995
UBUNTU:USN-3654-1
UBUNTU:USN-3654-2
UBUNTU:USN-3656-1
UBUNTU:USN-3678-1
UBUNTU:USN-3678-2
UBUNTU:USN-3678-3
UBUNTU:USN-3678-4
UBUNTU:USN-3696-1
UBUNTU:USN-3696-2
UBUNTU:USN-3752-1
UBUNTU:USN-3752-2
UBUNTU:USN-3752-3
UBUNTU:USN-3753-1
UBUNTU:USN-3753-2
UBUNTU:USN-3754-1
UBUNTU:USN-3777-1
UBUNTU:USN-3777-2
UBUNTU:USN-3820-1
UBUNTU:USN-3820-2
UBUNTU:USN-3820-3
UBUNTU:USN-3821-1
UBUNTU:USN-3821-2
UBUNTU:USN-3822-1
UBUNTU:USN-3822-2
bnc#1037994
bnc#1072831
bnc#1084755
bnc#1089281
bnc#1097104
bnc#1097108
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=318aaf34f1179b39fa9c30fa0f3288b645beee39
linux.git:commit:3c9fa24ca7c9c47605672916491f79e8ccacb9e6
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1435719
rh#1449980
rh#1462147
rh#1462158
rh#1481178
rh#1553911
rh#1566407
rh#1589324
rh#1589890
rh#1596812
rh#1596842
rh#1599161
rh#1601704
rh#1609664
rh#1658985
rh#1667782
rh#1701224
rh#1701842
rh#2027239
rh#2044863
CVE-2018-8740sqlite3:Already fixedlow4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)BID:103466
CVE-2018-8740
FEDORA:FEDORA-2019-49f80a78bc
MISC:bugs.chromium.org:CVE-2018-8740
MISC:bugs.launchpad.net:CVE-2018-8740
MISC:www.sqlite.org:CVE-2018-8740
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[debian-lts-announce] 20190111 [SECURITY] [DLA 1633-1] sqlite3 security update
MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
OSS:2018/Q1/244
Oracle:CVE-2019-8457
RH:CVE-2018-8740
SMASH Issue 202195
SUSE:openSUSE-SU-2019:1426
UBUNTU:CVE-2018-8740
USN-4205-1
USN-4394-1
bnc#1085790
https://lists.debian.org/debian-lts-announce/2023/05/msg00022.html
rh#1558804
rh#1716881
CVE-2018-8769elfutils:Not affectedmoderate4.4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L)CONFIRM:sourceware.org:CVE-2018-8769
CVE-2018-8769
D:CVE-2018-8769
RH:CVE-2018-8769
SMASH Issue 202205
UBUNTU:CVE-2018-8769
bnc#1085809
rh#1559241
CVE-2018-8822kernel-source-rt:Already fixedmoderate6.4 (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H)BID:103476
CONFIRM:www.mail-archive.com:CVE-2018-8822
CVE-2018-8822
D:CVE-2018-8822
DEBIAN:DSA-4187
DEBIAN:DSA-4188
DSA-4187
DSA-4188
DSA-5378
MISC:git.kernel.org:OSS:2014/03/05/6
MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
OSS:2014/03/05/6
OSS:2022/11/10/2
OSS:2022/12/27/3
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2022/Q4/244
Oracle:CVE-2017-0861
Oracle:CVE-2017-5715
Oracle:CVE-2018-3639
RH:CVE-2018-8822
SMASH Issue 202284
UBUNTU:CVE-2018-8822
UBUNTU:USN-3653-1
UBUNTU:USN-3653-2
UBUNTU:USN-3654-1
UBUNTU:USN-3654-2
UBUNTU:USN-3655-1
UBUNTU:USN-3655-2
UBUNTU:USN-3656-1
UBUNTU:USN-3657-1
bdo#1033297
bnc#1086162
https://www.mail-archive.com/netdev%40vger.kernel.org/msg223373.html
rh#1243852
rh#1495089
rh#1519780
rh#1527393
rh#1558697
rh#2061700
rh#2119127
CVE-2019-0136kernel-source-rt:Already fixedimportant7.4 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)BID:108777
CONFIRM:support.lenovo.com:CVE-2019-0136
CVE-2019-0136
JVN:JVN#75617741
L3:62183
MISC:git.kernel.org:OSS:2020/Q1/69
MISC:packetstormsecurity.com:CVE-2019-0136
MISC:www.intel.com:CVE-2018-12147
MISC:www.intel.com:CVE-2019-0136
MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update
MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2020/02/11/1
OSS:2020/02/11/2
OSS:2020/02/14/4
Oracle:CVE-2018-3693
RHSA-2020:3220
RHSA-2021:4687
SMASH Issue 235112
UBUNTU:CVE-2019-0136
USN-4115-1
USN-4118-1
USN-4145-1
USN-4147-1
bnc#1193068
bnc#1193157
bnc#1193161
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1420236
rh#1481178
rh#2010970
rh#2027798
CVE-2019-1010065crash:Unsupportedlow ()CVE-2019-1010065
FEDORA:FEDORA-2019-2e68c0a0ee
FEDORA:FEDORA-2019-52f83932a1
MISC:github.com:CVE-2019-1010065
MISC:issuetracker.google.com:CVE-2019-1010065
MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3054-1] sleuthkit security update
SMASH Issue 237652
UBUNTU:CVE-2019-1010065
bnc#1142201
rh#1735531
CVE-2019-10125kernel-source-rt:Not affectedcritical ()BID:107655
CONFIRM:security.netapp.com:CVE-2019-10124
CONFIRM:support.f5.com:CVE-2019-10125
CVE-2019-10125
MISC:patchwork.kernel.org:CVE-2019-10125
RH:CVE-2019-10125
SMASH Issue 227195
UBUNTU:CVE-2019-10125
bnc#1130695
rh#1695074
CVE-2019-10142kernel-source-rt:Not affectedimportant ()CVE-2019-10142
MISC:bugzilla.redhat.com:OSS:2019/Q2/126
MISC:git.kernel.org:OSS:2019/Q2/126
OSS:2019/Q2/126
RH:CVE-2019-10142
SMASH Issue 233416
UBUNTU:CVE-2019-10142
bnc#1135955
rh#1711194
CVE-2019-10155strongswan:Analysislow ()CONFIRM:bugzilla.redhat.com:CVE-2019-10155
CVE-2019-10155
FEDORA:FEDORA-2019-1bd9cfb718
FEDORA:FEDORA-2019-f7fb531958
MISC:libreswan.org:CVE-2019-10155
RH:CVE-2019-10155
RHSA-2019:3391
SMASH Issue 234817
UBUNTU:CVE-2019-10155
rh#1714141
CVE-2019-10207kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:bugzilla.redhat.com:CVE-2019-10207
CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-10207
DSA-4495
DSA-4497
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
OSS:2019/09/17/1
OSS:2019/Q3/81
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-10207
RHSA-2019:3309
RHSA-2019:3517
RHSA-2020:1016
RHSA-2020:1070
SMASH Issue 237982
SMASH Issue 237987
UBUNTU:CVE-2019-10207
bnc#1123959
bnc#1142857
linux.git:commit:b36a1552d7319bbfd5cf7f08726c23c5c66d4f73
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1731000
rh#1733874
rh#1734243
rh#1734246
rh#1743547
rh#1746628
rh#1746732
rh#1757368
rh#1781514
CVE-2019-10638kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)BID:109092
BUGTRAQ:20190812 [SECURITY] [DSA 4495-1] linux security update
BUGTRAQ:20190813 [SECURITY] [DSA 4497-1] linux security update
BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
CONFIRM:security.netapp.com:CVE-2019-12984
CVE-2019-10638
D:CVE-2019-10638
DSA-4495
DSA-4497
MISC:arxiv.org:CVE-2019-10638
MISC:cdn.kernel.org:CVE-2019-10638
MISC:cdn.kernel.org:CVE-2019-11486
MISC:git.kernel.org:CVE-2019-10638
MISC:github.com:CVE-2019-10638
MISC:packetstormsecurity.com:CVE-2019-15098
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20190814 [SECURITY] [DLA 1884-1] linux security update
MLIST:[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update
Oracle:CVE-2017-5753
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2019-10638
RHSA-2019:3309
RHSA-2019:3517
RHSA-2020:1016
RHSA-2020:1070
SMASH Issue 236581
SMASH Issue 237719
SUSE:openSUSE-SU-2019:1716
SUSE:openSUSE-SU-2019:1757
UBUNTU:CVE-2019-10638
USN-4114-1
USN-4115-1
USN-4116-1
USN-4117-1
USN-4118-1
bnc#1140575
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1655162
rh#1664110
rh#1667782
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1716992
rh#1718176
rh#1727756
rh#1729931
rh#1729933
rh#1731000
rh#1734243
rh#1734246
CVE-2019-11477kernel-source-rt:Already fixedimportant8.2 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)BID:108818
BUGTRAQ:20190722 [SECURITY] [DSA 4484-1] linux security update
CERT-VN:VU#905115
CONFIRM:cert-portal.siemens.com:CVE-2019-11477
CONFIRM:kb.pulsesecure.net:CVE-2019-11477
CONFIRM:kc.mcafee.com:CVE-2019-11477
CONFIRM:psirt.global.sonicwall.com:CVE-2019-11477
CONFIRM:psirt.global.sonicwall.com:CVE-2019-11478
CONFIRM:psirt.global.sonicwall.com:CVE-2019-11479
CONFIRM:security.netapp.com:CVE-2019-11477
CONFIRM:support.f5.com:CVE-2019-11477
CONFIRM:support.f5.com:CVE-2019-11478
CONFIRM:support.f5.com:CVE-2019-11479
CONFIRM:www.arubanetworks.com:CVE-2019-11477
CONFIRM:www.huawei.com:CVE-2019-11477
CONFIRM:www.synology.com:CVE-2019-11477
CONFIRM:www.vmware.com:CVE-2019-11477
CVE-2019-11477
CVE-2019-11478
CVE-2019-11479
DSA-4465
MISC:access.redhat.com:CVE-2019-11477
MISC:azure.microsoft.com:MLIST:[oss-security] 20190706 Re: linux-distros membership application - Microsoft
MISC:bugs.chromium.org:MISC:www.openwall.com:CVE-2019-11190
MISC:bugs.launchpad.net:MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft
MISC:git.kernel.org:CVE-2019-11477
MISC:git.kernel.org:CVE-2019-11478
MISC:git.kernel.org:CVE-2019-11479
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MLIST:[oss-security] 20190617 Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues
MISC:packetstormsecurity.com:CVE-2019-0136
MISC:packetstormsecurity.com:CVE-2019-11477
MISC:packetstormsecurity.com:CVE-2019-11478
MISC:wiki.ubuntu.com:CVE-2019-11477
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2014-3596
MISC:www.us-cert.gov:CVE-2019-11477
MISC:www.us-cert.gov:CVE-2019-11479
MLIST:[oss-security] 20190617 Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues
MLIST:[oss-security] 20190620 Re: Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues
MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft
MLIST:[oss-security] 20190706 Re: linux-distros membership application - Microsoft
MLIST:[oss-security] 20191023 Membership application for linux-distros - VMware
MLIST:[oss-security] 20191029 Re: Membership application for linux-distros - VMware
OSS:2019/04/03/4
OSS:2019/09/17/1
OSS:2019/Q2/182
OSS:2019/Q2/234
Oracle:CVE-2017-5753
Oracle:CVE-2018-12207
Oracle:CVE-2018-5390
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
Oracle:CVE-2019-5489
RH:CVE-2019-11477
RH:CVE-2019-11478
RH:CVE-2019-11479
RHSA-2019:1479
RHSA-2019:1480
RHSA-2019:1481
RHSA-2019:1482
RHSA-2019:1483
RHSA-2019:1484
RHSA-2019:1485
RHSA-2019:1486
RHSA-2019:1487
RHSA-2019:1488
RHSA-2019:1489
RHSA-2019:1490
RHSA-2019:1594
RHSA-2019:1602
RHSA-2019:1699
SMASH Issue 234528
UBUNTU:CVE-2019-11477
UBUNTU:CVE-2019-11478
UBUNTU:CVE-2019-11479
USN-4041-1
USN-4041-2
bdo#928989
bnc#1137586
bnc#1137597
linux.git:commit:3b4929f65b0d8249f19a50245cd88ed1a2f78cff
linux.git:commit:5f3e2bf008c2221478101ee72f5cb4654b9fc363
linux.git:commit:967c05aee439e6e5d7d805e195b3a20ef5c433d6
linux.git:commit:b617158dc096709d8600c53b6052144d12b89fab
linux.git:commit:f070ef2ac66716357066b683fb0baf55f8191a2e
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1205079
rh#1601704
rh#1646768
rh#1655162
rh#1664110
rh#1667782
rh#1699856
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1716992
rh#1718176
rh#1719123
rh#1719128
rh#1719129
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
rh#1743547
rh#1746628
rh#1746732
rh#1757368
rh#1781514
CVE-2019-11478kernel-source-rt:Already fixedimportant5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)BID:108818
BUGTRAQ:20190722 [SECURITY] [DSA 4484-1] linux security update
CERT-VN:VU#905115
CONFIRM:cert-portal.siemens.com:CVE-2019-11477
CONFIRM:kb.pulsesecure.net:CVE-2019-11477
CONFIRM:kc.mcafee.com:CVE-2019-11477
CONFIRM:psirt.global.sonicwall.com:CVE-2019-11477
CONFIRM:psirt.global.sonicwall.com:CVE-2019-11478
CONFIRM:psirt.global.sonicwall.com:CVE-2019-11479
CONFIRM:security.netapp.com:CVE-2019-11477
CONFIRM:support.f5.com:CVE-2019-11477
CONFIRM:support.f5.com:CVE-2019-11478
CONFIRM:support.f5.com:CVE-2019-11479
CONFIRM:www.arubanetworks.com:CVE-2019-11477
CONFIRM:www.huawei.com:CVE-2019-11477
CONFIRM:www.synology.com:CVE-2019-11477
CONFIRM:www.vmware.com:CVE-2019-11477
CVE-2019-11477
CVE-2019-11478
CVE-2019-11479
DSA-4465
MISC:access.redhat.com:CVE-2019-11477
MISC:azure.microsoft.com:MLIST:[oss-security] 20190706 Re: linux-distros membership application - Microsoft
MISC:bugs.chromium.org:MISC:www.openwall.com:CVE-2019-11190
MISC:bugs.launchpad.net:MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft
MISC:git.kernel.org:CVE-2019-11477
MISC:git.kernel.org:CVE-2019-11478
MISC:git.kernel.org:CVE-2019-11479
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MLIST:[oss-security] 20190617 Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues
MISC:packetstormsecurity.com:CVE-2019-0136
MISC:packetstormsecurity.com:CVE-2019-11477
MISC:packetstormsecurity.com:CVE-2019-11478
MISC:wiki.ubuntu.com:CVE-2019-11477
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2014-3596
MISC:www.us-cert.gov:CVE-2019-11477
MISC:www.us-cert.gov:CVE-2019-11479
MLIST:[oss-security] 20190617 Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues
MLIST:[oss-security] 20190620 Re: Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues
MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft
MLIST:[oss-security] 20190706 Re: linux-distros membership application - Microsoft
MLIST:[oss-security] 20191023 Membership application for linux-distros - VMware
MLIST:[oss-security] 20191029 Re: Membership application for linux-distros - VMware
OSS:2019/04/03/4
OSS:2019/09/17/1
OSS:2019/Q2/182
OSS:2019/Q2/234
Oracle:CVE-2017-5753
Oracle:CVE-2018-12207
Oracle:CVE-2018-5390
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
Oracle:CVE-2019-5489
RH:CVE-2019-11477
RH:CVE-2019-11478
RH:CVE-2019-11479
RHSA-2019:1479
RHSA-2019:1480
RHSA-2019:1481
RHSA-2019:1482
RHSA-2019:1483
RHSA-2019:1484
RHSA-2019:1485
RHSA-2019:1486
RHSA-2019:1487
RHSA-2019:1488
RHSA-2019:1489
RHSA-2019:1490
RHSA-2019:1594
RHSA-2019:1602
RHSA-2019:1699
SMASH Issue 234528
UBUNTU:CVE-2019-11477
UBUNTU:CVE-2019-11478
UBUNTU:CVE-2019-11479
USN-4041-1
USN-4041-2
bdo#928989
bnc#1137586
bnc#1137597
linux.git:commit:3b4929f65b0d8249f19a50245cd88ed1a2f78cff
linux.git:commit:5f3e2bf008c2221478101ee72f5cb4654b9fc363
linux.git:commit:967c05aee439e6e5d7d805e195b3a20ef5c433d6
linux.git:commit:b617158dc096709d8600c53b6052144d12b89fab
linux.git:commit:f070ef2ac66716357066b683fb0baf55f8191a2e
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1205079
rh#1601704
rh#1646768
rh#1655162
rh#1664110
rh#1667782
rh#1699856
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1716992
rh#1718176
rh#1719123
rh#1719128
rh#1719129
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
rh#1743547
rh#1746628
rh#1746732
rh#1757368
rh#1781514
CVE-2019-11479kernel-source-rt:Already fixedimportant7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:108818
BUGTRAQ:20190722 [SECURITY] [DSA 4484-1] linux security update
CERT-VN:VU#905115
CONFIRM:cert-portal.siemens.com:CVE-2019-11477
CONFIRM:kb.pulsesecure.net:CVE-2019-11477
CONFIRM:kc.mcafee.com:CVE-2019-11477
CONFIRM:psirt.global.sonicwall.com:CVE-2019-11477
CONFIRM:psirt.global.sonicwall.com:CVE-2019-11478
CONFIRM:psirt.global.sonicwall.com:CVE-2019-11479
CONFIRM:security.netapp.com:CVE-2019-11477
CONFIRM:support.f5.com:CVE-2019-11477
CONFIRM:support.f5.com:CVE-2019-11478
CONFIRM:support.f5.com:CVE-2019-11479
CONFIRM:www.arubanetworks.com:CVE-2019-11477
CONFIRM:www.huawei.com:CVE-2019-11477
CONFIRM:www.synology.com:CVE-2019-11477
CONFIRM:www.vmware.com:CVE-2019-11477
CVE-2019-11477
CVE-2019-11478
CVE-2019-11479
DSA-4465
MISC:access.redhat.com:CVE-2019-11477
MISC:azure.microsoft.com:MLIST:[oss-security] 20190706 Re: linux-distros membership application - Microsoft
MISC:bugs.chromium.org:MISC:www.openwall.com:CVE-2019-11190
MISC:bugs.launchpad.net:MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft
MISC:git.kernel.org:CVE-2019-11477
MISC:git.kernel.org:CVE-2019-11478
MISC:git.kernel.org:CVE-2019-11479
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MLIST:[oss-security] 20190617 Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues
MISC:packetstormsecurity.com:CVE-2019-0136
MISC:packetstormsecurity.com:CVE-2019-11477
MISC:packetstormsecurity.com:CVE-2019-11478
MISC:wiki.ubuntu.com:CVE-2019-11477
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2014-3596
MISC:www.us-cert.gov:CVE-2019-11477
MISC:www.us-cert.gov:CVE-2019-11479
MLIST:[oss-security] 20190617 Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues
MLIST:[oss-security] 20190620 Re: Linux and FreeBSD Kernel: Multiple TCP-based remote denial of service issues
MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft
MLIST:[oss-security] 20190706 Re: linux-distros membership application - Microsoft
MLIST:[oss-security] 20191023 Membership application for linux-distros - VMware
MLIST:[oss-security] 20191029 Re: Membership application for linux-distros - VMware
OSS:2019/04/03/4
OSS:2019/09/17/1
OSS:2019/Q2/182
OSS:2019/Q2/234
Oracle:CVE-2017-5753
Oracle:CVE-2018-12207
Oracle:CVE-2018-5390
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
Oracle:CVE-2019-5489
RH:CVE-2019-11477
RH:CVE-2019-11478
RH:CVE-2019-11479
RHSA-2019:1479
RHSA-2019:1480
RHSA-2019:1481
RHSA-2019:1482
RHSA-2019:1483
RHSA-2019:1484
RHSA-2019:1485
RHSA-2019:1486
RHSA-2019:1487
RHSA-2019:1488
RHSA-2019:1489
RHSA-2019:1490
RHSA-2019:1594
RHSA-2019:1602
RHSA-2019:1699
SMASH Issue 234528
UBUNTU:CVE-2019-11477
UBUNTU:CVE-2019-11478
UBUNTU:CVE-2019-11479
USN-4041-1
USN-4041-2
bdo#928989
bnc#1137586
bnc#1137597
linux.git:commit:3b4929f65b0d8249f19a50245cd88ed1a2f78cff
linux.git:commit:5f3e2bf008c2221478101ee72f5cb4654b9fc363
linux.git:commit:967c05aee439e6e5d7d805e195b3a20ef5c433d6
linux.git:commit:b617158dc096709d8600c53b6052144d12b89fab
linux.git:commit:f070ef2ac66716357066b683fb0baf55f8191a2e
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1205079
rh#1601704
rh#1646768
rh#1655162
rh#1664110
rh#1667782
rh#1699856
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1716992
rh#1718176
rh#1719123
rh#1719128
rh#1719129
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
rh#1743547
rh#1746628
rh#1746732
rh#1757368
rh#1781514
CVE-2019-11599kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)BID:108113
BUGTRAQ:20190618 [SECURITY] [DSA 4465-1] linux security update
BUGTRAQ:20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)
CONFIRM:security.netapp.com:CVE-2018-20509
CONFIRM:security.netapp.com:CVE-2019-11599
CONFIRM:support.f5.com:CVE-2019-11599
CVE-2019-11599
DSA-4465
EXPLOIT-DB:46781
MISC:cdn.kernel.org:CVE-2019-11599
MISC:git.kernel.org:CVE-2019-11599
MISC:git.kernel.org:MLIST:[oss-security] 20190429 Linux kernel: multiple issues
MISC:git.kernel.org:MLIST:[oss-security] 20190430 Re: Linux kernel: multiple issues
MISC:github.com:CVE-2019-11599
MISC:packetstormsecurity.com:CVE-2019-11599
MISC:packetstormsecurity.com:CVE-2019-13272
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update
MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update
MLIST:[debian-lts-announce] 20190618 [SECURITY] [DLA 1824-1] linux-4.9 security update
MLIST:[oss-security] 20190429 Linux kernel: multiple issues
MLIST:[oss-security] 20190429 Re: Linux kernel: multiple issues
MLIST:[oss-security] 20190430 Re: Linux kernel: multiple issues
OSS:2019/Q2/74
OSS:2019/Q2/75
OSS:2019/Q2/77
Oracle:CVE-2017-5753
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2019-11599
RHSA-2019:2029
RHSA-2019:2043
RHSA-2019:3309
RHSA-2019:3517
RHSA-2020:0100
RHSA-2020:0103
RHSA-2020:0179
RHSA-2020:0328
RHSA-2020:0339
RHSA-2020:0374
RHSA-2020:0375
RHSA-2020:0543
SMASH Issue 230436
SMASH Issue 230464
SUSE:openSUSE-SU-2019:1716
SUSE:openSUSE-SU-2019:1757
UBUNTU:CVE-2019-11599
USN-4069-1
USN-4069-2
USN-4095-1
USN-4115-1
USN-4118-1
bdo#928989
bnc#1133738
https://support.f5.com/csp/article/K51674118?utm_source=f5support&%3Butm_medium=RSS
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
pz#1752
pz#1790
rh#1655162
rh#1664110
rh#1667782
rh#1696015
rh#1701224
rh#1701842
rh#1703063
rh#1705937
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1716992
rh#1718176
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
rh#1774671
CVE-2019-11810kernel-source-rt:Not affectedlow3.9 (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L)BID:108286
CONFIRM:security.netapp.com:CVE-2019-11811
CONFIRM:support.f5.com:CVE-2019-11810
CVE-2019-11810
MISC:cdn.kernel.org:CVE-2019-11810
MISC:git.kernel.org:CVE-2019-11810
MISC:github.com:CVE-2019-11810
MLIST:[debian-lts-announce] 20190617 [SECURITY] [DLA 1823-1] linux security update
Oracle:CVE-2017-5753
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2019-11810
RHSA-2019:1959
RHSA-2019:1971
RHSA-2019:2029
RHSA-2019:2043
RHSA-2019:2736
RHSA-2019:2837
RHSA-2019:3217
RHSA-2020:0036
SMASH Issue 232343
SUSE:openSUSE-SU-2019:1923
SUSE:openSUSE-SU-2019:1924
UBUNTU:CVE-2019-11810
USN-4005-1
USN-4008-1
USN-4008-3
USN-4115-1
USN-4118-1
bnc#1134399
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1655162
rh#1664110
rh#1667782
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1709164
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1716992
rh#1718176
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
rh#1757368
CVE-2019-11811kernel-source-rt:Not affectedlow3.9 (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L)BID:108410
CONFIRM:security.netapp.com:CVE-2019-11811
CONFIRM:support.f5.com:CVE-2019-11811
CVE-2019-11811
MISC:cdn.kernel.org:CVE-2019-10124
MISC:git.kernel.org:CVE-2019-11811
MISC:github.com:CVE-2019-11811
Oracle:CVE-2017-5753
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2019-11811
RHSA-2019:1873
RHSA-2019:1891
RHSA-2019:1959
RHSA-2019:1971
RHSA-2019:4057
RHSA-2019:4058
RHSA-2020:0036
RHSA-2020:2854
SMASH Issue 232344
SUSE:openSUSE-SU-2019:1479
UBUNTU:CVE-2019-11811
bnc#1134397
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1655162
rh#1664110
rh#1667782
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1709180
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1718176
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
CVE-2019-11922zstd:Already fixedlow0 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N)CONFIRM:www.facebook.com:CVE-2019-11922
CVE-2019-11922
DSA-4850
MISC:github.com:CVE-2019-11922
MISC:www.oracle.com:CVE-2013-7285
Oracle:CVE-2019-11922
SMASH Issue 238018
SMASH Issue 277625
SUSE:openSUSE-SU-2019:1845
SUSE:openSUSE-SU-2019:1952
SUSE:openSUSE-SU-2019:2008
UBUNTU:CVE-2019-11922
USN-4108-1
bdo#981404
bnc#1142941
rh#2124187
CVE-2019-12379kernel-source-rt:Not affectedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)BID:108478
CONFIRM:security.netapp.com:CVE-2019-12380
CVE-2019-12379
FEDORA:FEDORA-2019-7ec378191e
FEDORA:FEDORA-2019-f40bd7826f
MISC:git.kernel.org:CVE-2019-12379
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
RH:CVE-2019-12379
SMASH Issue 233865
UBUNTU:CVE-2019-12379
bnc#1136602
rh#1715491
CVE-2019-12455kernel-source-rt:Not affectedmoderate ()CONFIRM:security.netapp.com:CVE-2019-12380
CVE-2019-12455
D:CVE-2019-12455
FEDORA:FEDORA-2019-f40bd7826f
MISC:git.kernel.org:CVE-2019-12455
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
MISC:www.mail-archive.com:CVE-2019-12455
RH:CVE-2019-12455
SMASH Issue 234027
UBUNTU:CVE-2019-12455
bnc#1136946
https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg2010240.html
rh#1716990
CVE-2019-12456kernel-source-rt:Not affectedimportant7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:support.f5.com:CVE-2019-12456
CVE-2019-12456
D:CVE-2019-12456
FEDORA:FEDORA-2019-83858fc57b
FEDORA:FEDORA-2019-c03eda3cc6
MISC:bugs.chromium.org:MISC:www.openwall.com:CVE-2019-11190
MISC:git.kernel.org:CVE-2019-12456
MISC:lkml.org:CVE-2019-12456
OSS:2019/04/03/4
Oracle:CVE-2017-5753
Oracle:CVE-2018-5390
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2019-12456
SMASH Issue 234039
SMASH Issue 234058
SUSE:openSUSE-SU-2019:1570
SUSE:openSUSE-SU-2019:1571
SUSE:openSUSE-SU-2019:1579
UBUNTU:CVE-2019-12456
bnc#1136922
bnc#1136978
bnc#1136993
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MDURACJVGIBIYBSGDZJTRDPX46H5WPZW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OBJHGQXA4PQ5EOGCOXEH3KFDNVZ2I4X7/
https://support.f5.com/csp/article/K84310302?utm_source=f5support&%3Butm_medium=RSS
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1601704
rh#1655162
rh#1664110
rh#1667782
rh#1699856
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1716992
rh#1717182
rh#1718176
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
rh#1783498
rh#1851480
CVE-2019-12614kernel-source-rt:Already fixedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:108550
CVE-2019-12614
D:CVE-2019-12614
FEDORA:FEDORA-2019-83858fc57b
FEDORA:FEDORA-2019-c03eda3cc6
MISC:git.kernel.org:CVE-2019-12614
MISC:lkml.org:CVE-2019-12614
Oracle:CVE-2017-5753
Oracle:CVE-2018-5390
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2019-12614
RHSA-2020:2104
RHSA-2020:4060
RHSA-2020:4431
SMASH Issue 234210
SMASH Issue 234214
UBUNTU:CVE-2019-12614
bnc#1137194
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1601704
rh#1655162
rh#1664110
rh#1667782
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1716992
rh#1718176
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
CVE-2019-12615kernel-source-rt:Unsupportedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BID:108549
CONFIRM:security.netapp.com:CVE-2019-12380
CONFIRM:support.f5.com:CVE-2019-12615
CVE-2019-12615
D:CVE-2019-12615
MISC:git.kernel.org:CVE-2019-12615
MISC:www.mail-archive.com:CVE-2019-12615
RH:CVE-2019-12615
SMASH Issue 234211
SMASH Issue 234215
UBUNTU:CVE-2019-12615
bnc#1137195
rh#1718179
CVE-2019-12749dbus-1:Releasedimportant7.1 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)BID:108751
BUGTRAQ:20190613 [SECURITY] [DSA 4462-1] dbus security update
CVE-2019-12749
D:CVE-2019-12749
DSA-4462
FEDORA:FEDORA-2019-d5ded5326b
GLSA-201909-08
L3:56948
MISC:gitlab.freedesktop.org:MLIST:[oss-security] 20190611 CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass
MISC:lists.freedesktop.org:MLIST:[oss-security] 20190611 CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass
MISC:www.openwall.com:CVE-2019-12749
MLIST:[debian-lts-announce] 20190614 [SECURITY] [DLA 1818-1] dbus security update
MLIST:[oss-security] 20190611 CVE-2019-12749: DBusServer DBUS_COOKIE_SHA1 authentication bypass
OSS:2019/Q2/156
RH:CVE-2019-12749
RHSA-2019:1726
RHSA-2019:2868
RHSA-2019:2870
RHSA-2019:3707
RHSA-2020:4032
SMASH Issue 234787
SMASH Issue 234788
SUSE:openSUSE-SU-2019:1604
SUSE:openSUSE-SU-2019:1671
SUSE:openSUSE-SU-2019:1750
UBUNTU:CVE-2019-12749
USN-4015-1
USN-4015-2
bdo#930375
bnc#1137832
bnc#1166220
rh#1719344
CVE-2019-12817kernel-source-rt:Not affectedimportant8.1 (CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L)BID:108884
BUGTRAQ:20190812 [SECURITY] [DSA 4495-1] linux security update
CONFIRM:cdn.kernel.org:CVE-2019-12817
CONFIRM:support.f5.com:CVE-2019-12817
CVE-2019-12817
DSA-4495
FEDORA:FEDORA-2019-6817686c4d
FEDORA:FEDORA-2019-69c132b061
MISC:git.kernel.org:MLIST:[oss-security] 20190625 CVE-2019-12817: Linux kernel: powerpc: Unrelated processes may be able to read/write to each other's virtual memory
MLIST:[oss-security] 20190625 CVE-2019-12817: Linux kernel: powerpc: Unrelated processes may be able to read/write to each other's virtual memory
OSS:2019/Q2/200
Oracle:CVE-2017-5753
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2019-12817
RHSA-2019:2703
SMASH Issue 235155
SUSE:openSUSE-SU-2019:1757
UBUNTU:CVE-2019-12817
USN-4031-1
bnc#1138263
bnc#1138264
bnc#1139619
linux.git:commit:26df62aaae9f85e900cd5f1a5c28e44488f60de6
linux.git:commit:8b8dc695143642c6a8bee2242f2f7af4232298ab
linux.git:commit:b7cbb5240130520ba572ab1146431ad01d1f5099
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1655162
rh#1664110
rh#1667782
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1716992
rh#1718176
rh#1720616
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
CVE-2019-12818kernel-source-rt:Already fixedmoderate4.1 (CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)BID:108776
CVE-2019-12818
MISC:bugs.chromium.org:MISC:www.openwall.com:CVE-2019-11190
MISC:git.kernel.org:CVE-2019-12818
MISC:github.com:CVE-2019-12818
MISC:www.kernel.org:CVE-2019-12818
OSS:2019/04/03/4
Oracle:CVE-2017-5753
Oracle:CVE-2018-5390
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2019-12818
SMASH Issue 235149
SUSE:openSUSE-SU-2019:1570
SUSE:openSUSE-SU-2019:1571
UBUNTU:CVE-2019-12818
bnc#1138293
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1601704
rh#1655162
rh#1664110
rh#1667782
rh#1699856
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1716992
rh#1718176
rh#1721967
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
CVE-2019-12819kernel-source-rt:Already fixedlow3.4 (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L)BID:108768
CVE-2019-12819
MISC:bugs.chromium.org:MISC:www.openwall.com:CVE-2019-11190
MISC:git.kernel.org:CVE-2019-12819
MISC:github.com:CVE-2019-12819
OSS:2019/04/03/4
Oracle:CVE-2017-5753
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2019-12819
RHSA-2020:1567
RHSA-2020:1769
SMASH Issue 235150
SMASH Issue 235159
SUSE:openSUSE-SU-2019:1570
SUSE:openSUSE-SU-2019:1571
UBUNTU:CVE-2019-12819
bnc#1138291
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1655162
rh#1664110
rh#1667782
rh#1699856
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1716992
rh#1718176
rh#1721962
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
CVE-2019-12972binutils:Releasedmoderate ()BID:108903
CVE-2019-12972
GLSA-202007-39
MISC:sourceware.org:CVE-2019-12972
RH:CVE-2019-12972
SMASH Issue 235748
SMASH Issue 236057
SUSE:openSUSE-SU-2020:1790
SUSE:openSUSE-SU-2020:1804
UBUNTU:CVE-2019-12972
USN-4336-1
bnc#1140126
rh#1831873
CVE-2019-13117libxslt:Releasedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)CONFIRM:security.netapp.com:CVE-2019-13117
CONFIRM:security.netapp.com:CVE-2020-2583
CVE-2019-13117
FEDORA:FEDORA-2019-fdf6ec39b4
MISC:bugs.chromium.org:CVE-2019-13117
MISC:gitlab.gnome.org:CVE-2019-13117
MISC:oss-fuzz.com:CVE-2019-13117
MISC:www.oracle.com:CVE-2014-3596
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[debian-lts-announce] 20190722 [SECURITY] [DLA 1860-1] libxslt security update
MLIST:[oss-security] 20191117 Nokogiri security update v1.10.5
OSS:2019/Q4/71
Oracle:CVE-2019-13117
Oracle:CVE-2019-13118
Oracle:CVE-2019-18197
RH:CVE-2019-13117
SMASH Issue 235949
SUSE:openSUSE-SU-2020:0731
UBUNTU:CVE-2019-13117
USN-4164-1
bnc#1140095
rh#1728541
rh#1728546
rh#1770768
CVE-2019-13118libxslt:Releasedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)BUGTRAQ:20190723 APPLE-SA-2019-7-22-1 iOS 12.4
BUGTRAQ:20190723 APPLE-SA-2019-7-22-4 watchOS 5.3
BUGTRAQ:20190723 APPLE-SA-2019-7-22-5 tvOS 12.4
BUGTRAQ:20190724 APPLE-SA-2019-7-23-1 iCloud for Windows 7.13
BUGTRAQ:20190724 APPLE-SA-2019-7-23-2 iTunes for Windows 12.9.6
BUGTRAQ:20190724 APPLE-SA-2019-7-23-3 iCloud for Windows 10.6
BUGTRAQ:20190814 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra
BUGTRAQ:20190814 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4
BUGTRAQ:20190814 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3
BUGTRAQ:20190814 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4
CONFIRM:security.netapp.com:CVE-2019-13117
CONFIRM:security.netapp.com:CVE-2020-2583
CONFIRM:support.apple.com:CVE-2018-19860
CONFIRM:support.apple.com:CVE-2019-13118
CVE-2019-13118
FEDORA:FEDORA-2019-fdf6ec39b4
FULLDISC:20190723 APPLE-SA-2019-7-22-1 iOS 12.4
FULLDISC:20190723 APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra
FULLDISC:20190723 APPLE-SA-2019-7-22-4 watchOS 5.3
FULLDISC:20190723 APPLE-SA-2019-7-22-5 tvOS 12.4
FULLDISC:20190726 APPLE-SA-2019-7-23-1 iCloud for Windows 7.13
FULLDISC:20190726 APPLE-SA-2019-7-23-2 iTunes for Windows 12.9.6
FULLDISC:20190726 APPLE-SA-2019-7-23-3 iCloud for Windows 10.6
FULLDISC:20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra
FULLDISC:20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4
FULLDISC:20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3
FULLDISC:20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4
MISC:bugs.chromium.org:CVE-2019-13118
MISC:gitlab.gnome.org:CVE-2019-13118
MISC:oss-fuzz.com:CVE-2019-13118
MISC:www.oracle.com:CVE-2014-3596
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[debian-lts-announce] 20190722 [SECURITY] [DLA 1860-1] libxslt security update
MLIST:[oss-security] 20191117 Nokogiri security update v1.10.5
OSS:2019/Q4/71
Oracle:CVE-2019-13117
Oracle:CVE-2019-13118
Oracle:CVE-2019-18197
RH:CVE-2019-13118
SMASH Issue 235950
SUSE:openSUSE-SU-2020:0731
UBUNTU:CVE-2019-13118
USN-4164-1
bnc#1140101
rh#1728541
rh#1728546
rh#1770768
CVE-2019-13224oniguruma:Releasedmoderate6.6 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H)CONFIRM:github.com:CVE-2019-13224
CONFIRM:support.f5.com:CVE-2019-13224
CVE-2019-13224
FEDORA:FEDORA-2019-3f3d0953db
FEDORA:FEDORA-2019-5409bb5e68
GLSA-201911-03
L3:64172
MLIST:[debian-lts-announce] 20190717 [SECURITY] [DLA 1854-1] libonig security update
RH:CVE-2019-13224
RHSA-2020:3662
SMASH Issue 236862
UBUNTU:CVE-2019-13224
USN-4088-1
bnc#1142847
bnc#1203568
rh#1728970
rh#1768997
rh#1802061
rh#1802068
CVE-2019-13272kernel-source-rt:Already fixedimportant7.4 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)BUGTRAQ:20190722 [SECURITY] [DSA 4484-1] linux security update
BUGTRAQ:20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)
CONFIRM:security.netapp.com:CVE-2019-12984
CONFIRM:support.f5.com:CVE-2019-13272
CVE-2019-13272
DSA-4484
FEDORA:FEDORA-2019-a95015e60f
MISC:cdn.kernel.org:CVE-2019-13272
MISC:git.kernel.org:CVE-2019-13272
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-13272
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:packetstormsecurity.com:/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html
MISC:packetstormsecurity.com:CVE-2019-13272
MLIST:[debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update
MLIST:[debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update
OSS:2019/09/17/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-13272
RHSA-2019:2405
RHSA-2019:2411
RHSA-2019:2809
SMASH Issue 236639
SMASH Issue 236640
UBUNTU:CVE-2019-13272
USN-4093-1
USN-4094-1
USN-4095-1
USN-4117-1
USN-4118-1
bnc#1140671
bnc#1156321
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
pz#1903
rh#1646768
rh#1655162
rh#1730895
rh#1743547
rh#1746732
rh#1757368
rh#1781514
CVE-2019-13636patch:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)CVE-2019-13636
DSA-4489
MISC:git.savannah.gnu.org:CVE-2019-13636
MLIST:[debian-lts-announce] 20190719 [SECURITY] [DLA 1856-1] patch security update
RH:CVE-2019-13636
RHSA-2020:1852
SMASH Issue 237588
UBUNTU:CVE-2019-13636
USN-4071-1
USN-4071-2
bdo#932401
bdo#933140
bnc#1142041
jsc#CAR-1825
rh#1732781
CVE-2019-13648kernel-source-rt:Already fixedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:git.kernel.org:CVE-2019-13648
CVE-2019-13648
DSA-4495
DSA-4497
MISC:patchwork.ozlabs.org:CVE-2019-13648
MLIST:[oss-security] 20190730 CVE-2019-13648: Linux kernel: powerpc: kernel crash in TM handling triggerable by any local user
OSS:2019/Q3/101
Oracle:CVE-2017-5753
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2019-13648
RHSA-2019:3517
RHSA-2020:1016
RHSA-2020:3019
SMASH Issue 237721
UBUNTU:CVE-2019-13648
bnc#1142254
bnc#1142265
linux.git:commit:f16d80b75a096c52354c6e0a574993f3b0dfbdfe
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1655162
rh#1664110
rh#1667782
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1716992
rh#1718176
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
rh#1735630
CVE-2019-14250binutils:Releasedmoderate5.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)BID:109354
CONFIRM:security.netapp.com:CVE-2019-14250
CVE-2019-14250
D:CVE-2019-14250
GLSA-202007-39
MISC:gcc.gnu.org:CVE-2019-14250
RH:CVE-2019-14250
SMASH Issue 237923
SUSE:openSUSE-SU-2019:2364
SUSE:openSUSE-SU-2019:2365
SUSE:openSUSE-SU-2020:0716
SUSE:openSUSE-SU-2020:1790
SUSE:openSUSE-SU-2020:1804
UBUNTU:CVE-2019-14250
USN-4326-1
USN-4336-1
bnc#1142649
rh#1739490
CVE-2019-14283kernel-source-rt:Already fixedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2019-14283
D:CVE-2019-14283
DSA-4495
DSA-4497
MISC:cdn.kernel.org:CVE-2019-14283
MISC:git.kernel.org:CVE-2019-14283
MISC:github.com:CVE-2019-14283
Oracle:CVE-2017-5753
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2019-14283
RHSA-2020:1016
RHSA-2020:1070
RHSA-2020:2522
SMASH Issue 238104
UBUNTU:CVE-2019-14283
bnc#1143191
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1655162
rh#1664110
rh#1667782
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1716992
rh#1718176
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
rh#1757368
CVE-2019-14444binutils:Releasedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-14250
CVE-2019-14444
GLSA-202007-39
MISC:sourceware.org:CVE-2019-14444
RH:CVE-2019-14444
SMASH Issue 238329
SUSE:openSUSE-SU-2020:1790
SUSE:openSUSE-SU-2020:1804
UBUNTU:CVE-2019-14444
USN-4336-1
bnc#1143609
rh#1740469
CVE-2019-14821kernel-source-rt:Not affectedmoderate6.8 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)BUGTRAQ:20190925 [SECURITY] [DSA 4531-1] linux security update
BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
CONFIRM:bugzilla.redhat.com:CVE-2019-14821
CONFIRM:security.netapp.com:CVE-2019-15916
CVE-2019-14821
DSA-4531
FEDORA:FEDORA-2019-15e141c6a7
FEDORA:FEDORA-2019-a570a92d5a
L3:67469
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:git.kernel.org:MLIST:[oss-security] 20190920 CVE-2019-14821 Kernel: KVM: OOB memory access via mmio ring buffer
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/TRZQQQANZWQMPILZV7OTS3RGGRLLE2Q7/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/
MISC:packetstormsecurity.com:CVE-2019-0136
MISC:packetstormsecurity.com:CVE-2019-15098
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.oracle.com:CVE-2019-2880
MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
MLIST:[debian-lts-announce] 20191001 [SECURITY] [DLA 1940-1] linux-4.9 security update
MLIST:[oss-security] 20190920 CVE-2019-14821 Kernel: KVM: OOB memory access via mmio ring buffer
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q3/238
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-14821
RHSA-2019:3309
RHSA-2019:3517
RHSA-2019:3978
RHSA-2019:3979
RHSA-2019:4154
RHSA-2019:4256
RHSA-2020:0027
RHSA-2020:0204
RHSA-2020:2851
SMASH Issue 242949
SMASH Issue 242952
SUSE:openSUSE-SU-2019:2307
SUSE:openSUSE-SU-2019:2308
UBUNTU:CVE-2019-14821
USN-4157-1
USN-4157-2
USN-4162-1
USN-4162-2
USN-4163-1
USN-4163-2
bnc#1151350
linux.git:commit:404e634fdb96a3c99c7517353bfafbd88e04ab41
linux.git:commit:b60fe990c6b07ef6d4df67bc0530c7c90a62623a
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1746708
rh#1746732
rh#1757368
rh#1773519
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1851480
rh#1997467
CVE-2019-14855gpg2:Won't fixmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
CONFIRM:bugzilla.redhat.com:CVE-2019-14855
CVE-2019-14855
MISC:lists.gnupg.org:CVE-2019-14855
MISC:rwc.iacr.org:CVE-2019-14855
RH:CVE-2019-14855
SMASH Issue 247968
UBUNTU:CVE-2019-14855
USN-4516-1
bnc#1157900
jsc#CAR-1246
rh#1770900
CVE-2019-14895kernel-source-rt:Already fixedimportant8 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:bugzilla.redhat.com:CVE-2019-14895
CVE-2019-14895
FEDORA:FEDORA-2019-8846a1a5a2
FEDORA:FEDORA-2019-91f6e7bb71
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/
MISC:packetstormsecurity.com:CVE-2019-14615
MISC:packetstormsecurity.com:CVE-2019-14897
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:patchwork.kernel.org:OSS:2019/Q4/95
MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/95
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-14895
RHSA-2020:0328
RHSA-2020:0339
RHSA-2020:0374
RHSA-2020:0375
RHSA-2020:0543
RHSA-2020:0592
RHSA-2020:0609
RHSA-2020:0653
RHSA-2020:0661
RHSA-2020:0664
RHSA-2020:0831
RHSA-2020:1493
SMASH Issue 247598
SMASH Issue 247663
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-14895
USN-4225-1
USN-4225-2
USN-4226-1
USN-4227-1
USN-4227-2
USN-4228-1
USN-4228-2
bnc#1157158
bnc#1173660
linux.git:commit:040cda8a15210f19da7e29232c897ca6ca6cc950
linux.git:commit:3d94a4a8373bf5f45cf5f939e88b8354dbf2311b
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774870
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-14896kernel-source-rt:Already fixedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:bugzilla.redhat.com:CVE-2019-14896
CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-14896
FEDORA:FEDORA-2019-8846a1a5a2
FEDORA:FEDORA-2019-91f6e7bb71
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/
MISC:packetstormsecurity.com:CVE-2019-14615
MISC:packetstormsecurity.com:CVE-2019-14897
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:patchwork.kernel.org:OSS:2019/Q4/95
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/95
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2019-14896
RHSA-2020:3548
SMASH Issue 247597
SMASH Issue 247667
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-14896
USN-4225-1
USN-4225-2
USN-4226-1
USN-4227-1
USN-4227-2
USN-4228-1
USN-4228-2
bnc#1157157
linux.git:commit:e5e884b42639c74b5b57dc277909915c0aefc8bb
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1667782
rh#1773519
rh#1774875
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
rh#1997467
CVE-2019-14897kernel-source-rt:Already fixedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:bugzilla.redhat.com:CVE-2019-14897
CVE-2019-14897
FEDORA:FEDORA-2019-8846a1a5a2
FEDORA:FEDORA-2019-91f6e7bb71
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/
MISC:packetstormsecurity.com:CVE-2019-14615
MISC:packetstormsecurity.com:CVE-2019-14897
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:patchwork.kernel.org:OSS:2019/Q4/95
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/95
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2019-14897
SMASH Issue 247596
SMASH Issue 247662
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-14897
USN-4225-1
USN-4225-2
USN-4226-1
USN-4227-1
USN-4227-2
USN-4228-1
USN-4228-2
bnc#1157155
linux.git:commit:e5e884b42639c74b5b57dc277909915c0aefc8bb
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1667782
rh#1773519
rh#1774879
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
rh#1997467
CVE-2019-14901kernel-source-rt:Already fixedimportant8.8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:bugzilla.redhat.com:CVE-2019-14901
CVE-2019-14901
FEDORA:FEDORA-2019-8846a1a5a2
FEDORA:FEDORA-2019-91f6e7bb71
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/D4ISVNIC44SOGXTUBCIZFSUNQJ5LRKNZ/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/MN6MLCN7G7VFTSXSZYXKXEFCUMFBUAXQ/
MISC:packetstormsecurity.com:CVE-2019-14615
MISC:packetstormsecurity.com:CVE-2019-14897
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/97
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-14901
RHSA-2020:0204
RHSA-2020:0328
RHSA-2020:0339
RHSA-2020:0374
RHSA-2020:0375
RHSA-2020:1493
SMASH Issue 247533
SMASH Issue 247882
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-14901
USN-4225-1
USN-4225-2
USN-4226-1
USN-4227-1
USN-4227-2
USN-4228-1
USN-4228-2
bnc#1157042
bnc#1173661
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-15030kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-15916
CVE-2019-15030
CVE-2019-15031
D:CVE-2019-15031
MISC:git.kernel.org:CVE-2019-15030
MISC:git.kernel.org:CVE-2019-15031
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:patchwork.ozlabs.org:MISC:www.openwall.com:CVE-2019-15030
MISC:www.openwall.com:CVE-2019-15030
MISC:www.openwall.com:CVE-2019-15031
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q3/209
OSS:2019/Q3/210
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15030
RH:CVE-2019-15031
RHSA-2020:0740
RHSA-2020:1372
RHSA-2020:1493
SMASH Issue 241870
SMASH Issue 241871
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15030
UBUNTU:CVE-2019-15031
USN-4135-1
USN-4135-2
bnc#1149713
linux.git:commit:8205d5d98ef7f155de211f5e2eb6ca03d95a5a60
linux.git:commit:a8318c13e79badb92bc6640704a64cc022a6eb97
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1757368
rh#1759313
rh#1760063
rh#1773519
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1851480
rh#1997467
CVE-2019-15031kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-15916
CVE-2019-15030
CVE-2019-15031
D:CVE-2019-15031
MISC:git.kernel.org:CVE-2019-15030
MISC:git.kernel.org:CVE-2019-15031
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:patchwork.ozlabs.org:MISC:www.openwall.com:CVE-2019-15030
MISC:www.openwall.com:CVE-2019-15030
MISC:www.openwall.com:CVE-2019-15031
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q3/209
OSS:2019/Q3/210
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15030
RH:CVE-2019-15031
RHSA-2020:0740
RHSA-2020:1372
RHSA-2020:1493
SMASH Issue 241869
SMASH Issue 241871
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15030
UBUNTU:CVE-2019-15031
USN-4135-1
USN-4135-2
bnc#1149713
linux.git:commit:8205d5d98ef7f155de211f5e2eb6ca03d95a5a60
linux.git:commit:a8318c13e79badb92bc6640704a64cc022a6eb97
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1757368
rh#1759313
rh#1760063
rh#1773519
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1851480
rh#1997467
CVE-2019-15090kernel-source-rt:Already fixedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-15098
CVE-2019-15090
MISC:cdn.kernel.org:CVE-2019-15090
MISC:git.kernel.org:CVE-2019-15090
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-15090
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
OSS:2019/09/17/1
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15090
RHSA-2020:1016
RHSA-2020:1567
RHSA-2020:1769
SMASH Issue 240280
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15090
USN-4115-1
USN-4118-1
USN-4147-1
bnc#1146399
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1743526
rh#1743547
rh#1746628
rh#1757368
CVE-2019-15098kernel-source-rt:Already fixedmoderate5.2 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H)BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
CONFIRM:security.netapp.com:CVE-2019-15098
CONFIRM:support.f5.com:CVE-2019-15098
CVE-2019-15098
CVE-2019-15215
CVE-2019-15290
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:git.kernel.org:MLIST:[oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:lore.kernel.org:CVE-2019-15098
MISC:packetstormsecurity.com:CVE-2019-15098
MISC:syzkaller.appspot.com:CVE-2019-15290
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
MLIST:[oss-security] 20190821 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
MLIST:[oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
OSS:2019/09/17/1
OSS:2019/Q3/146
OSS:2019/Q3/250
OSS:2019/Q3/252
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15098
RH:CVE-2019-15290
SMASH Issue 240282
SMASH Issue 240548
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15098
UBUNTU:CVE-2019-15290
USN-4184-1
USN-4185-1
USN-4186-1
USN-4186-2
bnc#1146378
bnc#1146543
linux.git:commit:39d170b3cb62ba98567f5c4f40c27b5864b304e5
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1743552
rh#1746628
rh#1746732
rh#1749977
rh#1757368
rh#1781514
CVE-2019-15099kernel-source-rt:Already fixedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-15098
CONFIRM:support.f5.com:/csp/article/K76295179
CVE-2019-15099
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:lore.kernel.org:CVE-2019-15099
OSS:2019/09/17/1
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15099
RHSA-2020:1493
RHSA-2020:1567
RHSA-2020:1769
SMASH Issue 240283
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15099
USN-4258-1
USN-4284-1
USN-4287-1
USN-4287-2
bnc#1146368
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1743547
rh#1743560
rh#1746628
rh#1757368
CVE-2019-15117kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2019-15117
D:CVE-2019-15117
MISC:git.kernel.org:CVE-2019-15117
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:lore.kernel.org:CVE-2019-15117
OSS:2019/09/17/1
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15117
SMASH Issue 240325
SMASH Issue 240334
UBUNTU:CVE-2019-15117
bnc#1145920
bnc#1173934
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1731000
rh#1734243
rh#1734246
rh#1743547
rh#1746628
rh#1746769
rh#1757368
CVE-2019-15211kernel-source-rt:Already fixedmoderate4.6 (CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-15098
CVE-2019-15211
CVE-2019-15215
MISC:cdn.kernel.org:CVE-2019-15211
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:git.kernel.org:CVE-2019-15211
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:syzkaller.appspot.com:CVE-2019-15211
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update
MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q3/146
Oracle:CVE-2017-17558
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15211
SMASH Issue 240496
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-15211
USN-4115-1
USN-4118-1
USN-4145-1
USN-4147-1
bnc#1146519
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743544
rh#1743547
rh#1746628
rh#1746732
rh#1757368
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-15212kernel-source-rt:Not affectedmoderate5.7 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)CONFIRM:security.netapp.com:CVE-2019-15098
CVE-2019-15212
CVE-2019-15215
MISC:cdn.kernel.org:CVE-2019-15212
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:git.kernel.org:CVE-2019-15212
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:syzkaller.appspot.com:CVE-2019-15212
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update
MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
OSS:2019/09/17/1
OSS:2019/Q3/146
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15212
SMASH Issue 240494
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15212
USN-4115-1
USN-4118-1
USN-4147-1
bnc#1146391
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1743556
rh#1746628
rh#1746732
rh#1757368
rh#1781514
CVE-2019-15213kernel-source-rt:Not affectedmoderate5.2 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)CONFIRM:security.netapp.com:CVE-2019-15098
CVE-2019-15213
MISC:cdn.kernel.org:CVE-2019-14283
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:git.kernel.org:CVE-2019-15213
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:syzkaller.appspot.com:CVE-2019-15213
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q3/146
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-15213
SMASH Issue 240495
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-15213
bnc#1146544
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743580
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-15214kernel-source-rt:Not affectedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2019-15214
MISC:cdn.kernel.org:CVE-2019-11599
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:git.kernel.org:CVE-2019-15214
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:syzkaller.appspot.com:CVE-2019-15214
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
OSS:2019/09/17/1
OSS:2019/Q3/146
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15214
RHSA-2019:3517
RHSA-2020:1016
SMASH Issue 240497
UBUNTU:CVE-2019-15214
bnc#1146550
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1743591
rh#1746628
rh#1746732
rh#1757368
rh#1781514
CVE-2019-15215kernel-source-rt:Already fixedmoderate4.9 (CVSS:3.0/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
CONFIRM:security.netapp.com:CVE-2019-15098
CONFIRM:support.f5.com:CVE-2019-15098
CVE-2019-15098
CVE-2019-15211
CVE-2019-15212
CVE-2019-15215
CVE-2019-15216
CVE-2019-15218
CVE-2019-15219
CVE-2019-15220
CVE-2019-15221
CVE-2019-15222
CVE-2019-15223
CVE-2019-15290
CVE-2019-15291
D:CVE-2019-15216
D:CVE-2019-15218
D:CVE-2019-15219
D:CVE-2019-15220
D:CVE-2019-15221
D:CVE-2019-15222
D:CVE-2019-15223
MISC:cdn.kernel.org:CVE-2019-13272
MISC:cdn.kernel.org:CVE-2019-15211
MISC:cdn.kernel.org:CVE-2019-15212
MISC:cdn.kernel.org:CVE-2019-15216
MISC:cdn.kernel.org:CVE-2019-15220
MISC:cdn.kernel.org:CVE-2019-15222
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:git.kernel.org:CVE-2019-15211
MISC:git.kernel.org:CVE-2019-15212
MISC:git.kernel.org:CVE-2019-15215
MISC:git.kernel.org:CVE-2019-15216
MISC:git.kernel.org:CVE-2019-15218
MISC:git.kernel.org:CVE-2019-15219
MISC:git.kernel.org:CVE-2019-15220
MISC:git.kernel.org:CVE-2019-15221
MISC:git.kernel.org:CVE-2019-15222
MISC:git.kernel.org:CVE-2019-15223
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:git.kernel.org:MLIST:[oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:lore.kernel.org:CVE-2019-15098
MISC:packetstormsecurity.com:CVE-2019-15098
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:syzkaller.appspot.com:CVE-2019-15211
MISC:syzkaller.appspot.com:CVE-2019-15212
MISC:syzkaller.appspot.com:CVE-2019-15215
MISC:syzkaller.appspot.com:CVE-2019-15216
MISC:syzkaller.appspot.com:CVE-2019-15218
MISC:syzkaller.appspot.com:CVE-2019-15219
MISC:syzkaller.appspot.com:CVE-2019-15220
MISC:syzkaller.appspot.com:CVE-2019-15221
MISC:syzkaller.appspot.com:CVE-2019-15222
MISC:syzkaller.appspot.com:CVE-2019-15223
MISC:syzkaller.appspot.com:CVE-2019-15290
MISC:syzkaller.appspot.com:CVE-2019-15291
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update
MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
MLIST:[oss-security] 20190821 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
MLIST:[oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q3/146
OSS:2019/Q3/149
OSS:2019/Q3/250
OSS:2019/Q3/252
Oracle:CVE-2017-17558
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15098
RH:CVE-2019-15211
RH:CVE-2019-15212
RH:CVE-2019-15215
RH:CVE-2019-15216
RH:CVE-2019-15218
RH:CVE-2019-15219
RH:CVE-2019-15220
RH:CVE-2019-15221
RH:CVE-2019-15222
RH:CVE-2019-15223
RH:CVE-2019-15290
RH:CVE-2019-15291
RHSA-2020:1016
RHSA-2020:1070
RHSA-2020:1567
RHSA-2020:1769
SMASH Issue 240282
SMASH Issue 240477
SMASH Issue 240478
SMASH Issue 240479
SMASH Issue 240480
SMASH Issue 240481
SMASH Issue 240482
SMASH Issue 240484
SMASH Issue 240494
SMASH Issue 240496
SMASH Issue 240498
SMASH Issue 240549
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-15098
UBUNTU:CVE-2019-15211
UBUNTU:CVE-2019-15212
UBUNTU:CVE-2019-15215
UBUNTU:CVE-2019-15216
UBUNTU:CVE-2019-15218
UBUNTU:CVE-2019-15219
UBUNTU:CVE-2019-15220
UBUNTU:CVE-2019-15221
UBUNTU:CVE-2019-15222
UBUNTU:CVE-2019-15223
UBUNTU:CVE-2019-15290
UBUNTU:CVE-2019-15291
USN-4115-1
USN-4118-1
USN-4145-1
USN-4147-1
USN-4184-1
USN-4185-1
USN-4186-1
USN-4186-2
USN-4286-1
USN-4286-2
bnc#1146361
bnc#1146378
bnc#1146391
bnc#1146413
bnc#1146425
bnc#1146519
bnc#1146524
bnc#1146526
bnc#1146529
bnc#1146531
bnc#1146535
bnc#1146540
bnc#1146543
linux.git:commit:39d170b3cb62ba98567f5c4f40c27b5864b304e5
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743544
rh#1743547
rh#1743552
rh#1743556
rh#1745514
rh#1745523
rh#1745530
rh#1745536
rh#1746628
rh#1746732
rh#1749973
rh#1749974
rh#1749975
rh#1749976
rh#1749977
rh#1749978
rh#1757368
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-15216kernel-source-rt:Already fixedmoderate4.9 (CVSS:3.0/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-15098
CVE-2019-15215
CVE-2019-15216
D:CVE-2019-15216
MISC:cdn.kernel.org:CVE-2019-15216
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:git.kernel.org:CVE-2019-15216
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:syzkaller.appspot.com:CVE-2019-15216
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update
MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
OSS:2019/09/17/1
OSS:2019/Q3/146
OSS:2019/Q3/149
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15216
SMASH Issue 240484
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15216
USN-4115-1
USN-4118-1
bnc#1146361
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1745523
rh#1746628
rh#1746732
rh#1757368
rh#1781514
CVE-2019-15217kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-15098
CVE-2019-15217
D:CVE-2019-15217
MISC:cdn.kernel.org:CVE-2019-14283
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:git.kernel.org:CVE-2019-15217
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:syzkaller.appspot.com:CVE-2019-15217
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
OSS:2019/09/17/1
OSS:2019/Q3/146
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15217
RHSA-2020:4060
RHSA-2020:4062
SMASH Issue 240483
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15217
USN-4147-1
USN-4286-1
USN-4286-2
USN-4302-1
bnc#1146547
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1745528
rh#1746628
rh#1746732
rh#1757368
rh#1781514
CVE-2019-15218kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-15098
CVE-2019-15215
CVE-2019-15218
D:CVE-2019-15218
MISC:cdn.kernel.org:CVE-2019-15212
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:git.kernel.org:CVE-2019-15218
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:syzkaller.appspot.com:CVE-2019-15218
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update
MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
OSS:2019/09/17/1
OSS:2019/Q3/146
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15218
SMASH Issue 240482
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15218
USN-4115-1
USN-4118-1
USN-4147-1
bnc#1146413
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1745530
rh#1746628
rh#1746732
rh#1757368
rh#1781514
CVE-2019-15219kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-15098
CVE-2019-15215
CVE-2019-15219
D:CVE-2019-15219
MISC:cdn.kernel.org:CVE-2019-15212
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:git.kernel.org:CVE-2019-15219
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:syzkaller.appspot.com:CVE-2019-15219
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update
MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
MLIST:[oss-security] 20190822 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
OSS:2019/09/17/1
OSS:2019/Q3/146
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15219
SMASH Issue 240481
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15219
bnc#1146524
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1745536
rh#1746628
rh#1746732
rh#1757368
rh#1781514
CVE-2019-15220kernel-source-rt:Not affectedmoderate5.2 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-15098
CVE-2019-15215
CVE-2019-15220
D:CVE-2019-15220
MISC:cdn.kernel.org:CVE-2019-15220
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:git.kernel.org:CVE-2019-15220
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:syzkaller.appspot.com:CVE-2019-15220
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update
MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
OSS:2019/09/17/1
OSS:2019/Q3/146
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15220
SMASH Issue 240480
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15220
USN-4115-1
USN-4118-1
USN-4147-1
USN-4286-1
USN-4286-2
bnc#1146526
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1746732
rh#1749973
rh#1757368
rh#1781514
CVE-2019-15221kernel-source-rt:Already fixedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-15098
CVE-2019-15215
CVE-2019-15221
D:CVE-2019-15221
MISC:cdn.kernel.org:CVE-2019-13272
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:git.kernel.org:CVE-2019-15221
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:syzkaller.appspot.com:CVE-2019-15221
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update
MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
OSS:2019/09/17/1
OSS:2019/Q3/146
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15221
RHSA-2020:1016
RHSA-2020:1070
RHSA-2020:1567
RHSA-2020:1769
SMASH Issue 240479
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15221
USN-4115-1
USN-4118-1
USN-4147-1
USN-4286-1
USN-4286-2
bnc#1146529
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1746732
rh#1749974
rh#1757368
rh#1781514
CVE-2019-15222kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-15098
CVE-2019-15215
CVE-2019-15222
D:CVE-2019-15222
MISC:cdn.kernel.org:CVE-2019-15222
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:git.kernel.org:CVE-2019-15222
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:syzkaller.appspot.com:CVE-2019-15222
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
OSS:2019/09/17/1
OSS:2019/Q3/146
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15222
SMASH Issue 240478
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15222
bnc#1146531
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1743547
rh#1746628
rh#1749975
rh#1757368
CVE-2019-15223kernel-source-rt:Unsupportedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-15098
CVE-2019-15215
CVE-2019-15223
D:CVE-2019-15223
MISC:cdn.kernel.org:CVE-2019-15212
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:git.kernel.org:CVE-2019-15223
MISC:syzkaller.appspot.com:CVE-2019-15223
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
OSS:2019/Q3/146
RH:CVE-2019-15223
RHSA-2020:1567
RHSA-2020:1769
SMASH Issue 240477
UBUNTU:CVE-2019-15223
USN-4147-1
bnc#1146535
rh#1749976
CVE-2019-15290kernel-source-rt:Already fixedmoderate5.2 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H)BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
CONFIRM:security.netapp.com:CVE-2019-15098
CONFIRM:support.f5.com:CVE-2019-15098
CVE-2019-15098
CVE-2019-15215
CVE-2019-15290
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:git.kernel.org:MLIST:[oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:lore.kernel.org:CVE-2019-15098
MISC:packetstormsecurity.com:CVE-2019-15098
MISC:syzkaller.appspot.com:CVE-2019-15290
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
MLIST:[oss-security] 20190821 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
MLIST:[oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
OSS:2019/09/17/1
OSS:2019/Q3/146
OSS:2019/Q3/250
OSS:2019/Q3/252
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15098
RH:CVE-2019-15290
SMASH Issue 240282
SMASH Issue 240548
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15098
UBUNTU:CVE-2019-15290
USN-4184-1
USN-4185-1
USN-4186-1
USN-4186-2
bnc#1146378
bnc#1146543
linux.git:commit:39d170b3cb62ba98567f5c4f40c27b5864b304e5
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1743552
rh#1746628
rh#1746732
rh#1749977
rh#1757368
rh#1781514
CVE-2019-15291kernel-source-rt:Already fixedmoderate4.6 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2019-15215
CVE-2019-15291
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:syzkaller.appspot.com:CVE-2019-15291
MISC:www.cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q3/146
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
MLIST:[oss-security] 20190821 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
OSS:2019/09/17/1
OSS:2019/Q3/146
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15291
SMASH Issue 240549
UBUNTU:CVE-2019-15291
bnc#1146540
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1746732
rh#1749978
rh#1757368
rh#1781514
CVE-2019-15292kernel-source-rt:Not affectedimportant8.1 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-15098
CONFIRM:support.f5.com:/csp/article/K27112954
CVE-2019-15292
MISC:cdn.kernel.org:CVE-2019-15292
MISC:git.kernel.org:CVE-2019-15292
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update
MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
OSS:2019/09/17/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15292
SMASH Issue 240718
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15292
USN-4115-1
USN-4118-1
bnc#1146678
bnc#1173939
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1746732
rh#1757368
rh#1781514
CVE-2019-15504kernel-source-rt:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-15098
CONFIRM:support.f5.com:/csp/article/K33554143
CVE-2019-15504
FEDORA:FEDORA-2019-4c91a2f76e
FEDORA:FEDORA-2019-97380355ae
MISC:lore.kernel.org:CVE-2019-15504
RH:CVE-2019-15504
SMASH Issue 241022
UBUNTU:CVE-2019-15504
USN-4157-1
USN-4157-2
bnc#1147116
bnc#1185852
linux.git:commit:8b51dc7291473093c821195c4b6af85fadedbc2f
rh#1746725
CVE-2019-15505kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H)BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
CONFIRM:security.netapp.com:CVE-2019-15098
CONFIRM:support.f5.com:CVE-2019-15505
CVE-2019-15505
FEDORA:FEDORA-2019-4c91a2f76e
FEDORA:FEDORA-2019-97380355ae
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:git.linuxtv.org:CVE-2019-15505
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:lore.kernel.org:CVE-2019-15505
MISC:packetstormsecurity.com:CVE-2019-15098
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2019/09/17/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15505
SMASH Issue 241023
UBUNTU:CVE-2019-15505
USN-4157-1
USN-4157-2
USN-4162-1
USN-4162-2
USN-4163-1
USN-4163-2
bnc#1147122
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1746732
rh#1757368
rh#1781514
CVE-2019-1563openssl-1_1:Already fixedmoderate5.3 (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N)BUGTRAQ:20190912 [slackware-security] openssl (SSA:2019-254-03)
BUGTRAQ:20191001 [SECURITY] [DSA 4539-1] openssl security update
BUGTRAQ:20191001 [SECURITY] [DSA 4540-1] openssl1.0 security update
CONFIRM:git.openssl.org:CVE-2019-1563
CONFIRM:security.netapp.com:CVE-2019-1549
CONFIRM:support.f5.com:CVE-2019-1563
CONFIRM:www.openssl.org:CVE-2019-1547
CONFIRM:www.tenable.com:CVE-2019-1551
CVE-2019-1563
D:CVE-2019-1563
DSA-4539
DSA-4540
FEDORA:FEDORA-2019-d15aac6c4e
FEDORA:FEDORA-2019-d51641f152
GLSA-201911-04
L3:64689
MISC:packetstormsecurity.com:CVE-2019-1547
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2014-3596
MISC:www.oracle.com:CVE-2015-7501
MISC:www.oracle.com:CVE-2019-0217
MISC:www.oracle.com:CVE-2019-2880
MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1932-1] openssl security update
Oracle:CVE-2019-1547
Oracle:CVE-2019-1549
Oracle:CVE-2019-1551
RH:CVE-2019-1563
RHSA-2020:1336
RHSA-2020:1337
RHSA-2020:1840
SMASH Issue 242157
SMASH Issue 252538
SUSE:openSUSE-SU-2019:2158
SUSE:openSUSE-SU-2019:2189
SUSE:openSUSE-SU-2019:2268
SUSE:openSUSE-SU-2019:2269
UBUNTU:CVE-2019-1563
USN-4376-1
USN-4376-2
USN-4504-1
bnc#1150250
rh#1752100
rh#1780995
CVE-2019-15666kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-15916
CONFIRM:support.f5.com:CVE-2019-15666
CVE-2019-15666
D:CVE-2019-15666
MISC:cdn.kernel.org:CVE-2019-15666
MISC:git.kernel.org:CVE-2019-15666
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update
OSS:2019/09/17/1
OSS:2020/06/04/4
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15666
RHSA-2019:3309
RHSA-2019:3517
RHSA-2020:1493
SMASH Issue 241290
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15666
bnc#1148394
bnc#1172140
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1746732
rh#1747334
rh#1757368
rh#1781514
rh#1842525
CVE-2019-15794kernel-source-rt:Not affectedimportant ()CVE-2019-15794
MISC:git.launchpad.net:CVE-2019-15794
MISC:usn.ubuntu.com:CVE-2019-15794
RH:CVE-2019-15794
SMASH Issue 248124
UBUNTU:CVE-2019-15794
bnc#1158156
rh#1831055
CVE-2019-15807kernel-source-rt:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-15916
CONFIRM:support.f5.com:CVE-2019-15807
CVE-2019-15807
D:CVE-2019-15807
MISC:cdn.kernel.org:CVE-2019-12984
MISC:git.kernel.org:CVE-2019-15807
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update
MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
OSS:2019/09/17/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15807
RHSA-2020:4060
RHSA-2020:4062
SMASH Issue 241484
SMASH Issue 241498
UBUNTU:CVE-2019-15807
bnc#1148938
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1746732
rh#1747216
rh#1757368
rh#1781514
CVE-2019-15847gcc:Ignore, gcc7:Ignoremoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2019-15847
D:CVE-2019-15847
MISC:gcc.gnu.org:CVE-2019-15847
RH:CVE-2019-15847
RHSA-2020:0924
RHSA-2020:1864
RHSA-2020:2274
SMASH Issue 241632
SUSE:openSUSE-SU-2019:2364
SUSE:openSUSE-SU-2019:2365
SUSE:openSUSE-SU-2020:0716
UBUNTU:CVE-2019-15847
bnc#1149145
jsc#CAR-2254
rh#1755523
CVE-2019-15916kernel-source-rt:Not affectedlow3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-15916
CONFIRM:support.f5.com:CVE-2019-15916
CVE-2019-15916
MISC:cdn.kernel.org:CVE-2019-15916
MISC:git.kernel.org:CVE-2019-15916
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-15916
RHSA-2019:3309
RHSA-2019:3517
RHSA-2020:0740
RHSA-2020:1016
RHSA-2020:1070
RHSA-2020:2522
RHSA-2020:2851
SMASH Issue 241740
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-15916
bnc#1149448
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1750813
rh#1773519
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1851480
rh#1997467
CVE-2019-15918kernel-source-rt:Unsupportedmoderate6.1 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-15916
CVE-2019-15918
MISC:cdn.kernel.org:CVE-2019-11599
MISC:github.com:CVE-2019-15918
RH:CVE-2019-15918
SMASH Issue 241755
UBUNTU:CVE-2019-15918
USN-4162-1
USN-4162-2
bnc#1149548
rh#1760550
CVE-2019-15919kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2019-15919
MISC:cdn.kernel.org:CVE-2019-11599
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-15919
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
OSS:2019/09/17/1
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15919
RHSA-2019:3517
SMASH Issue 241756
SMASH Issue 241777
UBUNTU:CVE-2019-15919
bnc#1149552
bnc#1172957
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1743547
rh#1746628
rh#1750410
rh#1757368
CVE-2019-15920kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-15916
CVE-2019-15920
MISC:cdn.kernel.org:CVE-2019-11599
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-15920
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
OSS:2019/09/17/1
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15920
RHSA-2019:3517
SMASH Issue 241757
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15920
bnc#1149626
bnc#1156335
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1743547
rh#1746628
rh#1757368
rh#1760864
CVE-2019-15924kernel-source-rt:Not affectedlow3.7 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2019-15924
D:CVE-2019-15924
MISC:cdn.kernel.org:CVE-2019-15924
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-15924
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update
OSS:2019/09/17/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15924
RHSA-2019:3309
RHSA-2019:3517
SMASH Issue 241761
UBUNTU:CVE-2019-15924
bnc#1149612
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1746732
rh#1757368
rh#1763869
rh#1781514
CVE-2019-15925kernel-source-rt:Not affectedimportant ()CONFIRM:security.netapp.com:CVE-2019-15916
CVE-2019-15925
D:CVE-2019-15925
MISC:cdn.kernel.org:CVE-2019-14283
MISC:git.kernel.org:CVE-2019-15925
RH:CVE-2019-15925
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 241762
UBUNTU:CVE-2019-15925
USN-4147-1
bnc#1149532
rh#1759052
CVE-2019-15926kernel-source-rt:Not affectedmoderate4.8 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-15916
CONFIRM:support.f5.com:/csp/article/K32034450
CVE-2019-15926
D:CVE-2019-15926
MISC:cdn.kernel.org:CVE-2019-14283
MISC:git.kernel.org:CVE-2019-15926
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MLIST:[debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update
MLIST:[debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
OSS:2019/09/17/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15926
SMASH Issue 241763
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15926
USN-4145-1
USN-4147-1
bnc#1149527
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1746732
rh#1750802
rh#1757368
rh#1781514
CVE-2019-15927kernel-source-rt:Not affectedmoderate4.9 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)CONFIRM:security.netapp.com:CVE-2019-15916
CVE-2019-15927
D:CVE-2019-15927
MISC:cdn.kernel.org:CVE-2018-20784
MISC:git.kernel.org:CVE-2019-15927
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
OSS:2019/09/17/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-15927
RHSA-2019:2029
RHSA-2019:3517
SMASH Issue 241764
SUSE:openSUSE-SU-2019:2173
SUSE:openSUSE-SU-2019:2181
UBUNTU:CVE-2019-15927
bnc#1149522
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1746732
rh#1757368
rh#1759059
rh#1781514
CVE-2019-16056python3:Releasedmoderate6.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)CONFIRM:security.netapp.com:CVE-2019-16056
CVE-2019-16056
D:CVE-2019-16056
FEDORA:FEDORA-2019-0d3fcae639
FEDORA:FEDORA-2019-232f092db0
FEDORA:FEDORA-2019-2b1f72899a
FEDORA:FEDORA-2019-4954d8773c
FEDORA:FEDORA-2019-50772cf122
FEDORA:FEDORA-2019-57462fa10d
FEDORA:FEDORA-2019-5dc275c9f2
FEDORA:FEDORA-2019-74ba24605e
FEDORA:FEDORA-2019-758824a3ff
FEDORA:FEDORA-2019-7ec5bb5d22
FEDORA:FEDORA-2019-986622833f
FEDORA:FEDORA-2019-a268ba7b23
FEDORA:FEDORA-2019-aba3cca74a
FEDORA:FEDORA-2019-b06ec6159b
FEDORA:FEDORA-2019-d202cda4f8
MISC:bugs.python.org:CVE-2019-16056
MISC:github.com:CVE-2019-16056
MISC:www.oracle.com:CVE-2015-7501
MISC:www.oracle.com:CVE-2019-2880
MLIST:[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
MLIST:[debian-lts-announce] 20190916 [SECURITY] [DLA 1924-1] python3.4 security update
MLIST:[debian-lts-announce] 20190916 [SECURITY] [DLA 1925-1] python2.7 security update
MLIST:[debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
Oracle:CVE-2018-20852
Oracle:CVE-2019-15903
Oracle:CVE-2019-16056
Oracle:CVE-2019-9636
RH:CVE-2019-16056
RHBA-2020:1539
RHBA-2020:1540
RHSA-2019:3725
RHSA-2019:3948
RHSA-2020:1131
RHSA-2020:1132
RHSA-2020:1605
RHSA-2020:1764
RHSA-2020:2520
SMASH Issue 241920
SUSE:openSUSE-SU-2019:2389
SUSE:openSUSE-SU-2019:2393
SUSE:openSUSE-SU-2019:2438
SUSE:openSUSE-SU-2019:2453
SUSE:openSUSE-SU-2020:0086
UBUNTU:CVE-2019-16056
USN-4151-1
USN-4151-2
bnc#1149955
rh#1749839
rh#1752592
rh#750555
CVE-2019-16089kernel-source-rt:Not affectedlow2.9 (CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-15916
CONFIRM:support.f5.com:CVE-2019-16089
CVE-2019-16089
MISC:lore.kernel.org:CVE-2019-16089
RH:CVE-2019-16089
SMASH Issue 241942
UBUNTU:CVE-2019-16089
USN-4414-1
USN-4425-1
USN-4439-1
USN-4440-1
bnc#1150004
rh#1751393
CVE-2019-16163oniguruma:Releasedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2019-16163
FEDORA:FEDORA-2019-6a931c8eec
FEDORA:FEDORA-2019-e4819c6510
L3:64172
MISC:github.com:CVE-2019-16163
MLIST:[debian-lts-announce] 20190912 [SECURITY] [DLA 1918-1] libonig security update
RH:CVE-2019-16163
RHSA-2020:3662
SMASH Issue 242069
UBUNTU:CVE-2019-16163
USN-4460-1
bnc#1150130
rh#1768997
CVE-2019-16168sqlite3:Releasedmoderate6.5 (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:kc.mcafee.com:CVE-2020-15719
CONFIRM:security.netapp.com:CVE-2019-16168
CONFIRM:security.netapp.com:CVE-2020-2583
CONFIRM:www.tenable.com:CVE-2019-16168
CONFIRM:www.tenable.com:CVE-2021-23358
CVE-2019-16168
FEDORA:FEDORA-2019-b1636e0b70
GLSA-202003-16
MISC:www.mail-archive.com:CVE-2019-16168
MISC:www.oracle.com:CVE-2014-3596
MISC:www.oracle.com:CVE-2019-2880
MISC:www.sqlite.org:CVE-2019-16168
MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
Oracle:CVE-2019-16168
RH:CVE-2019-16168
RHSA-2020:4442
RHSA-2021:1968
SMASH Issue 242074
SUSE:openSUSE-SU-2019:2298
SUSE:openSUSE-SU-2019:2300
UBUNTU:CVE-2019-16168
USN-4205-1
bnc#1150137
rh#1768986
CVE-2019-16413kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-15916
CVE-2019-16413
D:CVE-2019-16413
MISC:cdn.kernel.org:CVE-2019-10124
MISC:git.kernel.org:CVE-2019-16413
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:CVE-2019-16413
OSS:2019/09/17/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-16413
SMASH Issue 242945
UBUNTU:CVE-2019-16413
bnc#1151347
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1746732
rh#1757321
rh#1757368
rh#1781514
CVE-2019-16714kernel-source-rt:Unsupportedmoderate5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CONFIRM:security.netapp.com:CVE-2019-16746
CONFIRM:support.f5.com:CVE-2019-16714
CVE-2019-16714
D:CVE-2019-16714
MISC:cdn.kernel.org:CVE-2019-16714
MISC:github.com:MLIST:[oss-security] 20190925 CVE-2019-16714: Linux kernel net/rds: info leak vulnerability in rds6_inc_info_copy
MISC:nvd.nist.gov:MLIST:[oss-security] 20190925 CVE-2019-16714: Linux kernel net/rds: info leak vulnerability in rds6_inc_info_copy
MLIST:[oss-security] 20190924 CVE-2019-16714: info leak in RDS rds6_inc_info_copy
MLIST:[oss-security] 20190925 CVE-2019-16714: Linux kernel net/rds: info leak vulnerability in rds6_inc_info_copy
OSS:2019/Q3/246
OSS:2019/Q3/247
RH:CVE-2019-16714
SMASH Issue 243158
SMASH Issue 243194
UBUNTU:CVE-2019-16714
USN-4157-1
USN-4157-2
bnc#1151791
rh#1755544
CVE-2019-16746kernel-source-rt:Not affectedimportant7.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
CONFIRM:security.netapp.com:CVE-2019-16746
CVE-2019-16746
D:CVE-2019-16746
FEDORA:FEDORA-2019-057d691fd4
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:marc.info:CVE-2019-16746
MISC:packetstormsecurity.com:CVE-2019-15098
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/06/18/1
OSS:2020/07/28/2
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-16746
RHSA-2020:1016
RHSA-2020:1070
RHSA-2020:1769
SMASH Issue 243204
SMASH Issue 243355
SUSE:openSUSE-SU-2020:0336
SUSE:openSUSE-SU-2020:1153
UBUNTU:CVE-2019-16746
USN-4183-1
USN-4186-1
USN-4209-1
USN-4210-1
bnc#1152107
bnc#1173659
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1708775
rh#1760306
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1831726
rh#1831849
rh#1832397
rh#1832860
rh#1839634
rh#1842525
rh#1847832
rh#1849926
rh#1851480
rh#1865751
rh#1997467
CVE-2019-16994kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-16746
CVE-2019-16994
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:git.kernel.org:CVE-2019-16994
MISC:github.com:CVE-2019-16994
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2019-16994
RHSA-2019:3309
RHSA-2019:3517
RHSA-2020:4060
RHSA-2020:4062
SMASH Issue 243538
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-16994
bnc#1161523
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1759681
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
rh#1997467
CVE-2019-16995kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-16746
CVE-2019-16995
MISC:cdn.kernel.org:CVE-2019-16995
MISC:git.kernel.org:CVE-2019-16995
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-16995
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-16995
SMASH Issue 243539
SMASH Issue 243901
SUSE:openSUSE-SU-2019:2444
SUSE:openSUSE-SU-2019:2503
UBUNTU:CVE-2019-16995
bnc#1152685
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746732
rh#1757368
rh#1759684
rh#1773519
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1851480
rh#1997467
CVE-2019-17006mozilla-nss:Releasedmoderate6.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N)CONFIRM:cert-portal.siemens.com:CVE-2018-12404
CONFIRM:security.netapp.com:CVE-2019-17006
CVE-2019-17006
MISC:bugzilla.mozilla.org:CVE-2019-17006
MISC:developer.mozilla.org:CVE-2019-17006
MISC:us-cert.cisa.gov:CVE-2019-17006
RH:CVE-2019-17006
RHSA-2020:3280
RHSA-2020:4076
RHSA-2021:0758
RHSA-2021:0876
RHSA-2021:1026
SMASH Issue 249778
UBUNTU:CVE-2019-17006
bnc#1159819
rh#1775916
rh#1826177
CVE-2019-17007mozilla-nss:Already fixedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:CVE-2018-12404
CVE-2019-17007
DSA-4579
L3:64517
MISC:bugzilla.mozilla.org:CVE-2019-17007
MISC:developer.mozilla.org:CVE-2019-17007
MISC:us-cert.cisa.gov:CVE-2019-17006
RH:CVE-2019-17007
RHEA-2019:3280
RHSA-2019:1951
RHSA-2019:2237
RHSA-2021:0876
SMASH Issue 248091
UBUNTU:CVE-2019-17007
bnc#1132479
bnc#1184805
pz#1798
rh#1703979
CVE-2019-17053kernel-source-rt:Ignorelow4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L)CVE-2019-17053
MISC:git.kernel.org:CVE-2019-17052
MISC:git.kernel.org:CVE-2019-17053
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
OSS:2019/09/17/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-17053
RHSA-2020:1567
RHSA-2020:1769
RHSA-2020:4060
RHSA-2020:4062
SMASH Issue 243912
UBUNTU:CVE-2019-17053
bnc#1152789
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746628
rh#1746732
rh#1757368
rh#1758242
rh#1781514
CVE-2019-17133kernel-source-rt:Already fixedimportant8.8 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)BUGTRAQ:20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
CONFIRM:security.netapp.com:CVE-2019-16746
CVE-2019-17133
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:marc.info:CVE-2019-17133
MISC:packetstormsecurity.com:CVE-2019-15098
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2018-5390
Oracle:CVE-2019-11477
Oracle:CVE-2019-14821
RH:CVE-2019-17133
RHSA-2020:0174
RHSA-2020:0374
RHSA-2020:0375
RHSA-2020:0543
RHSA-2020:0592
RHSA-2020:0609
RHSA-2020:0653
RHSA-2020:0661
RHSA-2020:0664
RHSA-2020:0790
SMASH Issue 244203
SMASH Issue 244249
SUSE:openSUSE-SU-2019:2392
SUSE:openSUSE-SU-2019:2444
UBUNTU:CVE-2019-17133
USN-4208-1
USN-4210-1
USN-4211-1
USN-4211-2
USN-4226-1
bnc#1153158
bnc#1153161
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1601704
rh#1646768
rh#1703063
rh#1743547
rh#1746628
rh#1746732
rh#1757368
rh#1771909
rh#1773519
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1851480
rh#1997467
CVE-2019-17450binutils:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-17450
CVE-2019-17450
GLSA-202007-39
MISC:sourceware.org:CVE-2019-17450
RH:CVE-2019-17450
RHSA-2020:4465
SMASH Issue 244717
SUSE:openSUSE-SU-2020:1790
SUSE:openSUSE-SU-2020:1804
UBUNTU:CVE-2019-17450
USN-4336-1
bnc#1153770
rh#1771677
CVE-2019-17451binutils:Releasedlow4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-17450
CVE-2019-17451
GLSA-202007-39
MISC:sourceware.org:CVE-2019-17451
RH:CVE-2019-17451
RHSA-2020:1797
SMASH Issue 244718
SUSE:openSUSE-SU-2020:1790
SUSE:openSUSE-SU-2020:1804
UBUNTU:CVE-2019-17451
USN-4336-1
bnc#1153768
rh#1771668
CVE-2019-17666kernel-source-rt:Already fixedmoderate5.4 (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)CONFIRM:security.netapp.com:CVE-2019-16746
CVE-2019-17666
FEDORA:FEDORA-2019-6a67ff8793
MISC:arstechnica.com:CVE-2019-17666
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:lkml.org:CVE-2019-17666
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:twitter.com:CVE-2019-17666
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-17666
RHBA-2020:0930
RHSA-2020:0328
RHSA-2020:0339
RHSA-2020:0543
RHSA-2020:0661
RHSA-2020:0740
RHSA-2020:0831
RHSA-2020:0834
RHSA-2020:0839
RHSA-2020:1347
RHSA-2020:1353
RHSA-2020:1465
RHSA-2020:1473
RHSA-2020:1524
SMASH Issue 245234
SUSE:openSUSE-SU-2019:2392
SUSE:openSUSE-SU-2019:2444
UBUNTU:CVE-2019-17666
USN-4183-1
USN-4184-1
USN-4185-1
USN-4186-1
USN-4186-2
bnc#1154372
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746732
rh#1757368
rh#1763690
rh#1773519
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1851480
rh#1997467
CVE-2019-18197libxslt:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-18197
CONFIRM:security.netapp.com:CVE-2020-2754
CVE-2019-18197
MISC:bugs.chromium.org:CVE-2019-18197
MISC:gitlab.gnome.org:CVE-2019-18197
MISC:www.oracle.com:CVE-2019-2880
MLIST:[debian-lts-announce] 20191027 [SECURITY] [DLA 1973-1] libxslt security update
MLIST:[oss-security] 20191117 Nokogiri security update v1.10.5
OSS:2019/Q4/71
Oracle:CVE-2019-13117
Oracle:CVE-2019-13118
Oracle:CVE-2019-18197
RH:CVE-2019-18197
RHSA-2020:0514
RHSA-2020:4005
RHSA-2020:4464
SMASH Issue 245445
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
SUSE:openSUSE-SU-2020:0731
UBUNTU:CVE-2019-18197
USN-4164-1
bnc#1154609
rh#1728541
rh#1728546
rh#1770768
CVE-2019-18198kernel-source-rt:Unsupportedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-16746
CVE-2019-18198
MISC:cdn.kernel.org:CVE-2019-18198
MISC:git.kernel.org:CVE-2019-18198
MISC:github.com:CVE-2019-18198
MISC:launchpad.net:CVE-2019-18198
RH:CVE-2019-18198
SMASH Issue 245442
UBUNTU:CVE-2019-18198
USN-4161-1
bnc#1154617
rh#1771486
CVE-2019-18218file:Releasedcritical9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-18218
CVE-2019-18218
DSA-4550
FEDORA:FEDORA-2019-18036b898e
FEDORA:FEDORA-2019-554c3c691f
FEDORA:FEDORA-2019-97dcb2762a
GLSA-202003-24
MISC:bugs.chromium.org:CVE-2019-18218
MISC:github.com:CVE-2019-18218
MLIST:[debian-lts-announce] 20191023 [SECURITY] [DLA 1969-1] file security update
MLIST:[debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update
RH:CVE-2019-18218
RHSA-2021:4374
SMASH Issue 245465
SMASH Issue 245468
SUSE:openSUSE-SU-2020:0677
UBUNTU:CVE-2019-18218
USN-4172-1
USN-4172-2
bnc#1154661
rh#1765272
CVE-2019-18282kernel-source-rt:Already fixedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CONFIRM:git.kernel.org:CVE-2019-18282
CONFIRM:security.netapp.com:CVE-2019-19966
CVE-2019-18282
MISC:cdn.kernel.org:CVE-2019-19049
MISC:www.computer.org:CVE-2019-18282
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
RH:CVE-2019-18282
RHSA-2020:1567
RHSA-2020:1769
RHSA-2020:5437
RHSA-2020:5441
SMASH Issue 251268
UBUNTU:CVE-2019-18282
bnc#1161121
rh#1796360
CVE-2019-18348python3:Releasedmoderate6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)CONFIRM:security.netapp.com:CVE-2019-18348
CVE-2019-18348
FEDORA:FEDORA-2019-57462fa10d
FEDORA:FEDORA-2019-b06ec6159b
FEDORA:FEDORA-2019-d202cda4f8
FEDORA:FEDORA-2020-8bdd3fd7a4
FEDORA:FEDORA-2020-ea5bdbcc90
MISC:bugs.python.org:CVE-2019-18348
MISC:www.oracle.com:CVE-2013-7285
MLIST:[debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
RH:CVE-2019-18348
RHSA-2020:4273
RHSA-2020:4285
SMASH Issue 245655
SUSE:openSUSE-SU-2020:0696
UBUNTU:CVE-2019-18348
USN-4333-1
USN-4333-2
bnc#1155094
rh#1727276
rh#1800749
CVE-2019-18786kernel-source-rt:Unsupportedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2019-18786
RH:CVE-2019-18786
SMASH Issue 246556
UBUNTU:CVE-2019-18786
USN-4284-1
USN-4285-1
USN-4287-1
USN-4287-2
bnc#1156043
rh#1772538
upstream patch
CVE-2019-18805kernel-source-rt:Not affectedlow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-18805
MISC:cdn.kernel.org:CVE-2019-15924
MISC:git.kernel.org:CVE-2019-18805
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-18805
RHSA-2020:0740
RHSA-2020:1567
RHSA-2020:1769
SMASH Issue 246686
SUSE:openSUSE-SU-2019:2503
SUSE:openSUSE-SU-2019:2507
UBUNTU:CVE-2019-18805
bnc#1156187
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1743547
rh#1746732
rh#1771496
rh#1773519
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1851480
rh#1997467
CVE-2019-18808kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-18808
CVE-2021-3744
DSA-5096
FEDORA:FEDORA-2019-124a241044
FEDORA:FEDORA-2019-b86a7bdba0
FEDORA:FEDORA-2021-79cbbefebe
FEDORA:FEDORA-2021-9dd76a1ed0
FEDORA:FEDORA-2021-ffda3d6fa1
MISC:access.redhat.com:/errata/RHSA-2022:1975
MISC:access.redhat.com:/errata/RHSA-2022:1988
MISC:access.redhat.com:/security/cve/CVE-2021-3744
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-18808
MISC:github.com:CVE-2021-3744
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:kernel.googlesource.com:CVE-2021-3744
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:seclists.org:CVE-2021-3744
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2021/07/22/1
OSS:2021/09/14/1
OSS:2021/Q3/164
OSS:2022/01/25/12
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-18808
RHSA-2020:2854
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:4431
RHSA-2020:4609
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 246712
SMASH Issue 308494
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-18808
USN-4525-1
USN-4526-1
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1156259
bnc#1189884
jsc#CAR-938
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1777418
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1980646
rh#1997467
rh#2000627
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2019-18809kernel-source-rt:Already fixedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-18809
FEDORA:FEDORA-2019-124a241044
FEDORA:FEDORA-2019-b86a7bdba0
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-18809
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-18809
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 246713
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-18809
USN-4285-1
USN-4287-1
USN-4287-2
USN-4300-1
bnc#1156258
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1777449
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-18814kernel-source-rt:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CONFIRM:security.netapp.com:CVE-2019-18680
CONFIRM:support.f5.com:CVE-2019-18814
CVE-2019-18814
MISC:lore.kernel.org:CVE-2019-18814
MLIST:[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package
RH:CVE-2019-18814
SMASH Issue 246718
SMASH Issue 246739
UBUNTU:CVE-2019-18814
bnc#1156256
rh#1772518
CVE-2019-19039kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)CVE-2019-19039
MISC:github.com:CVE-2019-19039
MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
RH:CVE-2019-19039
SMASH Issue 247696
UBUNTU:CVE-2019-19039
USN-4414-1
bnc#1157719
rh#1775803
CVE-2019-19043kernel-source-rt:Unsupportedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19043
FEDORA:FEDORA-2019-021c968423
FEDORA:FEDORA-2019-34a75d7e61
MISC:github.com:CVE-2019-19043
RH:CVE-2019-19043
SMASH Issue 247481
UBUNTU:CVE-2019-19043
USN-4300-1
bnc#1159375
rh#1774972
CVE-2019-19044kernel-source-rt:Unsupportedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19044
MISC:cdn.kernel.org:CVE-2019-19044
MISC:github.com:CVE-2019-19044
RH:CVE-2019-19044
SMASH Issue 247482
UBUNTU:CVE-2019-19044
USN-4225-1
bnc#1159370
rh#1774977
CVE-2019-19045kernel-source-rt:Already fixedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19045
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:cdn.kernel.org:CVE-2019-19044
MISC:github.com:CVE-2019-19045
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2019-19045
RHSA-2020:1567
RHSA-2020:1769
SMASH Issue 247483
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-19045
USN-4225-1
USN-4225-2
USN-4226-1
USN-4227-1
USN-4227-2
bnc#1161522
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
rh#1997467
CVE-2019-19047kernel-source-rt:Already fixedlow1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19047
MISC:cdn.kernel.org:CVE-2019-19044
MISC:github.com:CVE-2019-19047
RH:CVE-2019-19047
RHSA-2020:1567
RHSA-2020:1769
SMASH Issue 247485
UBUNTU:CVE-2019-19047
USN-4225-1
bnc#1157715
rh#1774991
CVE-2019-19048kernel-source-rt:Not affectedimportant ()CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19048
MISC:cdn.kernel.org:CVE-2019-19048
MISC:github.com:CVE-2019-19048
RH:CVE-2019-19048
SMASH Issue 247486
UBUNTU:CVE-2019-19048
USN-4208-1
USN-4226-1
bnc#1157720
rh#1774994
CVE-2019-19049kernel-source-rt:Already fixedmoderate1.6 (CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2019-19049
MISC:cdn.kernel.org:CVE-2019-19049
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19049
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19049
SMASH Issue 247487
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19049
bnc#1157173
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19050kernel-source-rt:Unsupportedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19050
FEDORA:FEDORA-2019-021c968423
FEDORA:FEDORA-2019-34a75d7e61
MISC:github.com:CVE-2019-19050
MISC:packetstormsecurity.com:CVE-2019-14615
RH:CVE-2019-19050
SMASH Issue 247488
UBUNTU:CVE-2019-19050
USN-4258-1
USN-4284-1
bnc#1157336
rh#1774998
CVE-2019-19051kernel-source-rt:Already fixedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19051
MISC:cdn.kernel.org:CVE-2019-19044
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19051
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19051
SMASH Issue 247489
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-19051
USN-4225-1
USN-4225-2
USN-4286-1
USN-4286-2
USN-4302-1
USN-4344-1
bnc#1159024
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19054kernel-source-rt:Already fixedmoderate2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19054
FEDORA:FEDORA-2019-021c968423
FEDORA:FEDORA-2019-34a75d7e61
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:github.com:CVE-2019-19054
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2019-19054
SMASH Issue 247492
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-19054
USN-4525-1
USN-4526-1
USN-4527-1
bnc#1161518
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1775063
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
rh#1997467
CVE-2019-19056kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19056
FEDORA:FEDORA-2019-021c968423
FEDORA:FEDORA-2019-34a75d7e61
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19056
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19056
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 247494
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19056
USN-4286-1
USN-4286-2
USN-4300-1
USN-4301-1
USN-4302-1
bnc#1157197
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1775097
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19059kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19059
FEDORA:FEDORA-2019-021c968423
FEDORA:FEDORA-2019-34a75d7e61
MISC:github.com:CVE-2019-19059
RH:CVE-2019-19059
RHSA-2020:1567
RHSA-2020:1769
RHSA-2020:4060
RHSA-2020:4062
SMASH Issue 247497
UBUNTU:CVE-2019-19059
USN-4300-1
USN-4301-1
bnc#1157296
rh#1775042
CVE-2019-19060kernel-source-rt:Already fixedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19060
MISC:cdn.kernel.org:CVE-2019-19048
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19060
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19060
SMASH Issue 247498
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19060
USN-4208-1
USN-4210-1
USN-4226-1
USN-4364-1
bnc#1157178
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1775035
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19061kernel-source-rt:Unsupportedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19061
MISC:cdn.kernel.org:CVE-2019-19048
MISC:github.com:CVE-2019-19061
RH:CVE-2019-19061
SMASH Issue 247499
UBUNTU:CVE-2019-19061
USN-4208-1
USN-4526-1
bnc#1157192
rh#1775029
CVE-2019-19063kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)BUGTRAQ:20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19063
FEDORA:FEDORA-2019-021c968423
FEDORA:FEDORA-2019-34a75d7e61
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19063
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:packetstormsecurity.com:CVE-2019-19332
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.oracle.com:CVE-2021-3450
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19063
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 247501
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19063
USN-4254-1
USN-4254-2
USN-4284-1
USN-4285-1
USN-4287-1
USN-4287-2
bnc#1157298
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1775015
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19064kernel-source-rt:Unsupportedmoderate1.6 (CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2019-19064
FEDORA:FEDORA-2019-021c968423
FEDORA:FEDORA-2019-34a75d7e61
MISC:github.com:CVE-2019-19064
RH:CVE-2019-19064
SMASH Issue 247502
UBUNTU:CVE-2019-19064
USN-4300-1
bnc#1157300
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
rh#1775010
CVE-2019-19066kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19066
FEDORA:FEDORA-2019-021c968423
FEDORA:FEDORA-2019-34a75d7e61
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19066
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19066
SMASH Issue 247504
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-19066
USN-4286-1
USN-4286-2
USN-4300-1
USN-4301-1
USN-4302-1
bnc#1157303
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1667782
rh#1773519
rh#1774976
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19068kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19068
FEDORA:FEDORA-2019-021c968423
FEDORA:FEDORA-2019-34a75d7e61
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19068
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19068
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 247506
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19068
USN-4286-1
USN-4286-2
USN-4300-1
USN-4301-1
USN-4302-1
bnc#1157307
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774963
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19069kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19069
MISC:cdn.kernel.org:CVE-2019-19048
MISC:github.com:CVE-2019-19069
RH:CVE-2019-19069
SMASH Issue 247507
UBUNTU:CVE-2019-19069
USN-4208-1
bnc#1157064
rh#1774960
CVE-2019-19070kernel-source-rt:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2019-19070
FEDORA:FEDORA-2019-021c968423
FEDORA:FEDORA-2019-34a75d7e61
MISC:github.com:CVE-2019-19070
RH:CVE-2019-19070
SMASH Issue 247508
UBUNTU:CVE-2019-19070
bnc#1157294
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O3PSDE6PTOTVBK2YTKB2TFQP2SUBVSNF/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PY7LJMSPAGRIKABJPDKQDTXYW3L5RX2T/
rh#1774957
CVE-2019-19071kernel-source-rt:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19071
FEDORA:FEDORA-2019-021c968423
FEDORA:FEDORA-2019-34a75d7e61
MISC:github.com:CVE-2019-19071
RH:CVE-2019-19071
SMASH Issue 247509
UBUNTU:CVE-2019-19071
USN-4258-1
USN-4284-1
USN-4287-1
USN-4287-2
bnc#1157067
rh#1774949
CVE-2019-19072kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19072
FEDORA:FEDORA-2019-021c968423
FEDORA:FEDORA-2019-34a75d7e61
MISC:github.com:CVE-2019-19072
RH:CVE-2019-19072
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 247510
UBUNTU:CVE-2019-19072
USN-4225-1
USN-4225-2
USN-4226-1
bnc#1157069
rh#1774946
CVE-2019-19073kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19073
FEDORA:FEDORA-2019-021c968423
FEDORA:FEDORA-2019-34a75d7e61
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19073
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19073
RHSA-2020:1567
RHSA-2020:1769
SMASH Issue 247511
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19073
USN-4526-1
USN-4527-1
bnc#1157070
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774937
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19074kernel-source-rt:Already fixedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19074
FEDORA:FEDORA-2019-021c968423
FEDORA:FEDORA-2019-34a75d7e61
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19074
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19074
RHSA-2020:1567
RHSA-2020:1769
SMASH Issue 247512
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19074
USN-4526-1
USN-4527-1
bnc#1157143
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774933
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19075kernel-source-rt:Already fixedlow3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19075
MISC:cdn.kernel.org:CVE-2019-18810
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19075
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19075
SMASH Issue 247513
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19075
USN-4208-1
USN-4210-1
USN-4226-1
bnc#1157162
bnc#1173958
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1776842
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19076kernel-source-rt:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19076
MISC:cdn.kernel.org:CVE-2019-19076
MISC:git.kernel.org:CVE-2019-19076
MISC:github.com:CVE-2019-19076
MISC:lore.kernel.org:CVE-2019-19076
RH:CVE-2019-19076
SMASH Issue 247514
UBUNTU:CVE-2019-19076
USN-4209-1
bnc#1157164
https://lore.kernel.org/lkml/20191204103955.63c4d9af%40cakuba.netronome.com/
linux.git:commit:1d1997db870f4058676439ef7014390ba9e24eb2
rh#1776852
CVE-2019-19077kernel-source-rt:Already fixedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19077
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19077
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19077
RHSA-2020:1567
RHSA-2020:1769
SMASH Issue 247515
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19077
USN-4258-1
USN-4284-1
bnc#1157171
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1775724
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19078kernel-source-rt:Already fixedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19078
FEDORA:FEDORA-2019-8846a1a5a2
FEDORA:FEDORA-2019-91f6e7bb71
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19078
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.oracle.com:CVE-2021-3450
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19078
SMASH Issue 247516
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19078
USN-4258-1
USN-4284-1
USN-4287-1
USN-4287-2
bnc#1157032
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1776353
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19080kernel-source-rt:Already fixedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19080
MISC:cdn.kernel.org:CVE-2019-18198
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19080
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19080
SMASH Issue 247518
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19080
bnc#1157044
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1776372
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19081kernel-source-rt:Already fixedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19081
MISC:cdn.kernel.org:CVE-2019-18198
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19081
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19081
SMASH Issue 247519
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19081
bnc#1157045
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1776375
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19082kernel-source-rt:Already fixedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-18680
CVE-2019-19082
CVE-2019-25161
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19082
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19082
SMASH Issue 247520
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19082
USN-4258-1
USN-4284-1
USN-4287-1
USN-4287-2
bnc#1157046
https://git.kernel.org/stable/c/104c307147ad379617472dd91a5bcb368d72bd6d
https://git.kernel.org/stable/c/60e1b411bf0fd9fda2d2de7f45dc3b1d9960b85e
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1776832
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19203oniguruma:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2019-19203
FEDORA:FEDORA-2019-73197ff9a0
FEDORA:FEDORA-2019-d942abd0d4
L3:64172
MISC:github.com:CVE-2019-19012
MISC:github.com:CVE-2019-19203
RH:CVE-2019-19203
RHSA-2020:3662
RHSA-2020:5275
SMASH Issue 247788
UBUNTU:CVE-2019-19203
bnc#1164550
rh#1802061
CVE-2019-19204oniguruma:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2019-19204
FEDORA:FEDORA-2019-73197ff9a0
FEDORA:FEDORA-2019-d942abd0d4
L3:64172
MISC:github.com:CVE-2019-19012
MISC:github.com:CVE-2019-19204
MLIST:[debian-lts-announce] 20191204 [SECURITY] [DLA 2020-1] libonig security update
RH:CVE-2019-19204
RHSA-2020:3662
RHSA-2020:5275
SMASH Issue 247789
UBUNTU:CVE-2019-19204
bnc#1164569
rh#1802068
CVE-2019-19227kernel-source-rt:Not affectedmoderate4.8 (CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-19227
MISC:cdn.kernel.org:CVE-2019-19227
MISC:git.kernel.org:CVE-2019-19227
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19227
SMASH Issue 247840
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19227
bnc#1157678
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19241kernel-source-rt:Not affectedimportant ()CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-19241
MISC:cdn.kernel.org:CVE-2019-19602
MISC:git.kernel.org:CVE-2019-19241
RH:CVE-2019-19241
SMASH Issue 249213
UBUNTU:CVE-2019-19241
USN-4284-1
bnc#1159441
pz#1975
rh#1784942
CVE-2019-19244sqlite3:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CVE-2019-19244
MISC:github.com:CVE-2019-19244
MISC:www.oracle.com:CVE-2019-2880
RH:CVE-2019-19244
SMASH Issue 247931
UBUNTU:CVE-2019-19244
USN-4205-1
bnc#1157818
rh#1777945
CVE-2019-19246oniguruma:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2019-19246
FEDORA:FEDORA-2019-d942abd0d4
L3:64172
MISC:bugs.php.net:CVE-2019-19246
MISC:github.com:CVE-2019-19246
MLIST:[debian-lts-announce] 20191204 [SECURITY] [DLA 2020-1] libonig security update
RH:CVE-2019-19246
RHSA-2020:3662
RHSA-2020:5275
SMASH Issue 247917
UBUNTU:CVE-2019-19246
USN-4460-1
bnc#1157805
rh#1777537
CVE-2019-19252kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-19252
MISC:git.kernel.org:CVE-2019-19252
MISC:lore.kernel.org:CVE-2019-19252
RH:CVE-2019-19252
SMASH Issue 247920
UBUNTU:CVE-2019-19252
bnc#1157813
rh#1778860
CVE-2019-19317sqlite3:Releasedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19317
CVE-2019-19317
MISC:github.com:CVE-2019-19317
MISC:www.oracle.com:CVE-2019-2880
RH:CVE-2019-19317
SMASH Issue 248456
UBUNTU:CVE-2019-19317
bnc#1158812
rh#1784111
CVE-2019-19318kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-19318
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:github.com:CVE-2019-19318
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2019-19318
SMASH Issue 248077
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-19318
USN-4414-1
bnc#1158026
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1784141
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
rh#1997467
CVE-2019-19319kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H)CONFIRM:git.kernel.org:CVE-2019-19319
CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-19319
DSA-4698
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19319
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19319
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 248078
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-19319
USN-4391-1
bdo#952660
bnc#1158021
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1667782
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1784130
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
rh#1997467
CVE-2019-19332kernel-source-rt:Already fixedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:bugzilla.redhat.com:CVE-2019-19332
CONFIRM:security.netapp.com:CVE-2019-19966
CVE-2019-19332
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:lore.kernel.org:/kvm/000000000000ea5ec20598d90e50%40google.com/
MISC:lore.kernel.org:CVE-2019-19332
MISC:packetstormsecurity.com:CVE-2019-19332
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:CVE-2019-19332
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/159
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19332
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 248363
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-19332
USN-4254-1
USN-4254-2
USN-4258-1
USN-4284-1
USN-4287-1
USN-4287-2
bnc#1158827
linux.git:commit:433f4ba1904100da65a311033f17a9bf586b287e
linux.git:commit:aedc0650f9135f3b92b39cbed1a8fe98d8088825
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1779594
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19377kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-19377
L3:65879
MISC:github.com:CVE-2019-19377
MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
RH:CVE-2019-19377
SMASH Issue 248192
UBUNTU:CVE-2019-19377
USN-4367-1
USN-4369-1
USN-4414-1
bnc#1158266
bnc#1162338
linux.git:commit:b3ff8f1d380e65dddd772542aa9bff6c86bf715a
rh#1781894
CVE-2019-19378kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-19378
MISC:github.com:CVE-2019-19378
RH:CVE-2019-19378
SMASH Issue 248190
UBUNTU:CVE-2019-19378
bnc#1158270
bnc#1185853
rh#1781899
CVE-2019-19447kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-19447
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:CVE-2019-19447
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19447
RHSA-2020:2104
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:4431
RHSA-2020:4609
RHSA-2020:5206
RHSA-2020:5430
RHSA-2020:5656
SMASH Issue 248544
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-19447
bnc#1158819
bnc#1173869
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1667782
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1781679
rh#1783498
rh#1783515
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
rh#1997467
CVE-2019-19448kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-19448
MISC:github.com:CVE-2019-19448
MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
RH:CVE-2019-19448
SMASH Issue 248545
UBUNTU:CVE-2019-19448
USN-4578-1
bnc#1158820
bnc#1162369
linux.git:commit:bf53d4687b8f3f6b752f091eb85f62369a515dfd
rh#1781674
CVE-2019-19449kernel-source-rt:Not affectedimportant7.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H)CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-19449
MISC:github.com:CVE-2019-19449
RH:CVE-2019-19449
SMASH Issue 248546
UBUNTU:CVE-2019-19449
bnc#1158821
rh#1781668
CVE-2019-19462kernel-source-rt:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)
CONFIRM:security.netapp.com:CVE-2019-19462
CVE-2019-19462
DSA-4698
DSA-4699
L3:64868
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:lore.kernel.org:CVE-2019-19462
MISC:syzkaller-ppc64.appspot.com:CVE-2019-19462
MISC:syzkaller.appspot.com:CVE-2019-19462
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/06/18/1
RH:CVE-2019-19462
SMASH Issue 248189
SUSE:openSUSE-SU-2020:0801
SUSE:openSUSE-SU-2020:0935
UBUNTU:CVE-2019-19462
USN-4414-1
USN-4425-1
USN-4439-1
USN-4440-1
bdo#952660
bdo#960271
bnc#1158265
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1774983
rh#1781839
rh#1795624
rh#1831726
rh#1831849
rh#1832397
rh#1832860
rh#1839634
rh#1842525
rh#1847832
rh#1849926
CVE-2019-19523kernel-source-rt:Already fixedmoderate5.7 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)CVE-2019-19523
MISC:cdn.kernel.org:CVE-2019-19523
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:git.kernel.org:CVE-2019-19523
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/115
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19523
RHSA-2020:4060
RHSA-2020:4062
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 248284
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-19523
bnc#1158823
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783434
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19524kernel-source-rt:Already fixedlow2.4 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)BUGTRAQ:20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
CVE-2019-19524
MISC:cdn.kernel.org:CVE-2019-19524
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:git.kernel.org:CVE-2019-19524
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:packetstormsecurity.com:CVE-2019-19332
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/115
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19524
RHSA-2020:2104
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 248279
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19524
USN-4225-1
USN-4225-2
USN-4226-1
USN-4227-1
USN-4227-2
USN-4228-1
USN-4228-2
bnc#1158413
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783459
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19525kernel-source-rt:Already fixedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)CVE-2019-19525
MISC:cdn.kernel.org:CVE-2019-19076
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:git.kernel.org:CVE-2019-19525
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/115
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19525
SMASH Issue 248278
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19525
bnc#1158417
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783478
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19526kernel-source-rt:Already fixedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2019-19526
MISC:cdn.kernel.org:CVE-2019-19048
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:git.kernel.org:CVE-2019-19526
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/115
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19526
SMASH Issue 248281
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-19526
USN-4226-1
bnc#1158893
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783494
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19527kernel-source-rt:Already fixedmoderate5.7 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)CVE-2019-19527
MISC:cdn.kernel.org:CVE-2019-19527
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:git.kernel.org:CVE-2019-19527
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/115
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19527
RHSA-2020:1372
RHSA-2020:1378
RHSA-2020:3220
RHSA-2020:3221
RHSA-2020:4236
SMASH Issue 248280
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-19527
bnc#1158900
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19528kernel-source-rt:Already fixedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)CVE-2019-19528
MISC:cdn.kernel.org:CVE-2019-19523
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:git.kernel.org:CVE-2019-19528
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/115
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19528
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 248276
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19528
bnc#1158407
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783507
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19529kernel-source-rt:Already fixedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2019-19529
MISC:cdn.kernel.org:CVE-2019-19044
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:git.kernel.org:CVE-2019-19529
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/115
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19529
SMASH Issue 248275
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19529
USN-4225-1
USN-4225-2
USN-4226-1
USN-4227-1
USN-4227-2
bnc#1158381
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19530kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2019-19530
MISC:cdn.kernel.org:CVE-2019-19527
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:git.kernel.org:CVE-2019-19530
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/115
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19530
RHSA-2020:4060
RHSA-2020:4062
SMASH Issue 248273
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19530
bnc#1158410
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1783518
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19531kernel-source-rt:Already fixedlow2.1 (CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2019-19531
MISC:cdn.kernel.org:CVE-2019-19531
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:git.kernel.org:CVE-2019-19531
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/115
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19531
SMASH Issue 248285
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19531
bnc#1158445
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1783523
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19532kernel-source-rt:Already fixedmoderate6.8 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2019-19532
MISC:cdn.kernel.org:CVE-2019-19048
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:git.kernel.org:CVE-2019-19532
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/115
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19532
RHSA-2020:1567
RHSA-2020:1769
RHSA-2021:0856
RHSA-2021:0857
RHSA-2021:1531
RHSA-2021:2164
RHSA-2021:2355
SMASH Issue 248282
UBUNTU:CVE-2019-19532
USN-4226-1
bnc#1158824
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1781821
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19533kernel-source-rt:Already fixedlow2.4 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2019-19533
MISC:cdn.kernel.org:CVE-2019-18198
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:git.kernel.org:CVE-2019-19533
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/115
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19533
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 248283
UBUNTU:CVE-2019-19533
bnc#1158834
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1783534
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19534kernel-source-rt:Already fixedlow2.4 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2019-19534
MISC:cdn.kernel.org:CVE-2019-19044
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:git.kernel.org:CVE-2019-19534
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/115
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19534
RHSA-2020:1567
RHSA-2020:1769
RHSA-2020:4060
RHSA-2020:4062
SMASH Issue 248274
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19534
USN-4225-1
USN-4225-2
USN-4226-1
USN-4227-1
USN-4227-2
USN-4228-1
USN-4228-2
bnc#1158398
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1783540
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19535kernel-source-rt:Already fixedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2019-19535
MISC:cdn.kernel.org:CVE-2019-19531
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:git.kernel.org:CVE-2019-19535
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/115
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19535
SMASH Issue 248271
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-19535
bnc#1158903
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1783547
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19536kernel-source-rt:Not affectedlow2.4 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2019-19536
MISC:cdn.kernel.org:CVE-2019-19531
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:git.kernel.org:CVE-2019-19536
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/115
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19536
SMASH Issue 248272
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19536
bnc#1158394
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1783552
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19537kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2019-19537
MISC:cdn.kernel.org:CVE-2019-19527
MISC:cve.mitre.org:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:cve.mitre.org:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MISC:git.kernel.org:CVE-2019-19537
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q4/115
MISC:www.openwall.com:MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2019/Q4/115
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19537
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 248277
UBUNTU:CVE-2019-19537
bnc#1158904
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1783561
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19543kernel-source-rt:Already fixedlow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-19543
CVE-2019-19543
MISC:cdn.kernel.org:CVE-2019-19543
MISC:git.kernel.org:CVE-2019-19543
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-19543
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 248310
SUSE:openSUSE-SU-2019:2675
UBUNTU:CVE-2019-19543
bnc#1158427
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1781810
rh#1783498
rh#1783515
rh#1795624
rh#1851480
rh#1997467
CVE-2019-19602kernel-source-rt:Already fixedlow3.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L)CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-19602
MISC:bugzilla.kernel.org:CVE-2019-19602
MISC:cdn.kernel.org:CVE-2019-19602
MISC:git.kernel.org:CVE-2019-19602
MISC:github.com:CVE-2019-19602
RH:CVE-2019-19602
RHSA-2020:4431
SMASH Issue 248463
UBUNTU:CVE-2019-19602
USN-4284-1
bnc#1158887
rh#1784572
CVE-2019-19603sqlite3:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19317
CVE-2019-19603
MISC:github.com:CVE-2019-19603
MISC:www.oracle.com:CVE-2019-2880
MISC:www.sqlite.org:CVE-2019-19603
MLIST:[guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans.
RH:CVE-2019-19603
RHSA-2021:4396
SMASH Issue 248618
UBUNTU:CVE-2019-19603
USN-4394-1
bnc#1158960
rh#1785318
CVE-2019-19645sqlite3:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19317
CONFIRM:www.tenable.com:CVE-2021-23358
CVE-2019-19645
MISC:github.com:CVE-2019-19645
MISC:www.oracle.com:CVE-2019-2880
RH:CVE-2019-19645
SMASH Issue 248603
UBUNTU:CVE-2019-19645
USN-4394-1
bnc#1158958
rh#1783305
CVE-2019-19646sqlite3:Releasedmoderate6.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19317
CONFIRM:www.tenable.com:CVE-2021-23358
CVE-2019-19646
MISC:github.com:CVE-2019-19646
MISC:www.oracle.com:CVE-2019-2880
MISC:www.sqlite.org:CVE-2019-19603
Oracle:CVE-2019-19646
RH:CVE-2019-19646
SMASH Issue 248619
UBUNTU:CVE-2019-19646
bnc#1158959
rh#1786743
CVE-2019-19768kernel-source-rt:Already fixedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-19768
DSA-4698
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:bugzilla.kernel.org:CVE-2019-19768
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2019-19768
RHSA-2020:1567
RHSA-2020:1769
RHSA-2020:1966
RHSA-2020:2082
RHSA-2020:2085
RHSA-2020:2104
RHSA-2020:2199
RHSA-2020:2203
RHSA-2020:2214
RHSA-2020:2242
RHSA-2020:2277
RHSA-2020:2285
RHSA-2020:2289
RHSA-2020:2291
RHSA-2020:2519
RHSA-2020:2522
SMASH Issue 248985
SUSE:openSUSE-SU-2020:0388
UBUNTU:CVE-2019-19768
USN-4342-1
USN-4344-1
USN-4345-1
USN-4346-1
bdo#952660
bnc#1159285
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1667782
rh#1707796
rh#1773519
rh#1774983
rh#1783498
rh#1786164
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
CVE-2019-19769kernel-source-rt:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:H)CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-19769
FEDORA:FEDORA-2020-73c00eda1c
FEDORA:FEDORA-2020-76966b3419
MISC:bugzilla.kernel.org:CVE-2019-19769
RH:CVE-2019-19769
SMASH Issue 248986
UBUNTU:CVE-2019-19769
USN-4368-1
bnc#1159280
linux.git:commit:6d390e4b5d48ec03bb87e63cf0a2bff5f4e116da
rh#1786174
CVE-2019-19770kernel-source-rt:Already fixedmoderate5.7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H)CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-19770
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:bugzilla.kernel.org:CVE-2019-19770
MISC:lore.kernel.org:CVE-2019-19770
MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2019-19770
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 248987
SUSE:openSUSE-SU-2020:0543
UBUNTU:CVE-2019-19770
bnc#1159198
https://lore.kernel.org/linux-block/20200402000002.7442-1-mcgrof%40kernel.org/
linux.git:commit:bad8e64fb19d3a0de5e564d9a7271c31bd684369
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1707796
rh#1774983
rh#1786179
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
CVE-2019-19813kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H)CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-19813
MISC:github.com:CVE-2019-19813
MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
RH:CVE-2019-19813
SMASH Issue 249200
UBUNTU:CVE-2019-19813
USN-4414-1
bnc#1159435
rh#1784911
CVE-2019-19814kernel-source-rt:Not affectedcritical ()CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-19814
MISC:github.com:CVE-2019-19814
RH:CVE-2019-19814
SMASH Issue 249201
UBUNTU:CVE-2019-19814
bnc#1159437
rh#1784917
CVE-2019-19816kernel-source-rt:Not affectedimportant7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-10207
CVE-2019-19816
MISC:github.com:CVE-2019-19816
MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
RH:CVE-2019-19816
SMASH Issue 249203
SMASH Issue 270185
UBUNTU:CVE-2019-19816
USN-4414-1
bnc#1159439
bnc#1173871
rh#1784923
CVE-2019-19880sqlite3:Already fixedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 249293
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1159491
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2019-19922kernel-source-rt:Unsupportedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-19966
CVE-2019-19922
MISC:cdn.kernel.org:CVE-2019-19048
MISC:git.kernel.org:CVE-2019-19922
MISC:github.com:CVE-2019-19922
MISC:relistan.com:CVE-2019-19922
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
RH:CVE-2019-19922
RHSA-2020:1493
RHSA-2020:1567
RHSA-2020:1769
SMASH Issue 249665
UBUNTU:CVE-2019-19922
USN-4226-1
bnc#1159717
rh#1792512
CVE-2019-19923sqlite3:Releasedmoderate6.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 249763
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1160309
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2019-19924sqlite3:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19924
MISC:github.com:CVE-2019-19924
MISC:www.oracle.com:CVE-2019-2880
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
RH:CVE-2019-19924
RHSA-2020:1810
SMASH Issue 249764
UBUNTU:CVE-2019-19924
USN-4298-1
bnc#1159850
rh#1788842
CVE-2019-19925sqlite3:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19925
DSA-4638
MISC:github.com:CVE-2019-19925
MISC:www.oracle.com:CVE-2019-2880
RH:CVE-2019-19925
RHSA-2020:0514
RHSA-2020:1810
SMASH Issue 249768
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19925
USN-4298-1
bnc#1159847
rh#1788866
CVE-2019-19926sqlite3:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 249666
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1159715
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2019-19956libxml2:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:cert-portal.siemens.com:CVE-2019-19956
CONFIRM:security.netapp.com:CVE-2019-19956
CONFIRM:us-cert.cisa.gov:CVE-2019-19956
CVE-2019-19956
FEDORA:FEDORA-2020-0c71c00af4
FEDORA:FEDORA-2020-7694e8be73
MISC:gitlab.gnome.org:CVE-2019-19956
MISC:www.oracle.com:CVE-2015-7501
MLIST:[debian-lts-announce] 20191228 [SECURITY] [DLA 2048-1] libxml2 security update
MLIST:[debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
Oracle:CVE-2020-7595
RH:CVE-2019-19956
RHSA-2020:2644
RHSA-2020:2646
RHSA-2020:3996
RHSA-2020:4479
SMASH Issue 249766
SUSE:openSUSE-SU-2020:0681
SUSE:openSUSE-SU-2020:0781
UBUNTU:CVE-2019-19956
USN-4274-1
bnc#1159928
rh#1788856
rh#1799734
rh#1799786
CVE-2019-19959sqlite3:Releasedmoderate5.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2019-19959
MISC:github.com:CVE-2019-19959
RH:CVE-2019-19959
RHSA-2020:1810
SMASH Issue 250347
UBUNTU:CVE-2019-19959
bnc#1160438
rh#1789595
CVE-2019-19965kernel-source-rt:Already fixedmoderate4.2 (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-19966
CVE-2019-19965
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:git.kernel.org:CVE-2019-19965
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2019-19965
SMASH Issue 249775
SMASH Issue 249937
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-19965
USN-4284-1
USN-4285-1
USN-4286-1
USN-4286-2
USN-4287-1
USN-4287-2
bnc#1159911
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1667782
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1794404
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
rh#1997467
CVE-2019-20054kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-19966
CVE-2019-20054
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:cdn.kernel.org:CVE-2019-15921
MISC:cdn.kernel.org:CVE-2019-15924
MISC:git.kernel.org:CVE-2019-20054
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-20054
RHSA-2020:1493
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 249908
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-20054
bnc#1159910
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1667782
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1790063
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
rh#1997467
CVE-2019-20096kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2019-20096
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:cdn.kernel.org:CVE-2019-19227
MISC:git.kernel.org:CVE-2019-20096
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:packetstormsecurity.com:CVE-2019-14615
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
RH:CVE-2019-20096
SMASH Issue 249933
SMASH Issue 249936
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2019-20096
USN-4285-1
USN-4286-1
USN-4286-2
USN-4287-1
USN-4287-2
bnc#1159908
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1667782
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1791959
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
rh#1997467
CVE-2019-20218sqlite3:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2019-20218
GLSA-202007-26
MISC:github.com:CVE-2019-20218
MISC:www.oracle.com:CVE-2019-2880
MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2340-2] sqlite3 regression update
RH:CVE-2019-20218
RHSA-2020:4442
SMASH Issue 250278
UBUNTU:CVE-2019-20218
USN-4298-1
bnc#1160439
rh#1791313
CVE-2019-20388libxml2:Releasedlow3.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-20388
CVE-2019-20388
FEDORA:FEDORA-2020-0c71c00af4
FEDORA:FEDORA-2020-41fe1680f6
FEDORA:FEDORA-2020-7694e8be73
GLSA-202010-04
MISC:gitlab.gnome.org:CVE-2019-20388
MISC:www.oracle.com:CVE-2015-7501
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
Oracle:CVE-2020-7595
RH:CVE-2019-20388
RHSA-2020:2644
RHSA-2020:2646
RHSA-2020:3996
RHSA-2020:4479
SMASH Issue 251484
SUSE:openSUSE-SU-2020:0681
UBUNTU:CVE-2019-20388
bnc#1161521
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/
rh#1788856
rh#1799734
rh#1799786
CVE-2019-2054kernel-source-rt:Not affectedimportant8.4 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:source.android.com:CVE-2018-6243
CVE-2019-2054
D:CVE-2019-2054
MISC:packetstormsecurity.com:CVE-2019-0136
MISC:packetstormsecurity.com:CVE-2019-2054
RH:CVE-2019-2054
SMASH Issue 232414
UBUNTU:CVE-2019-2054
USN-4076-1
USN-4095-2
bnc#1134561
bnc#1181039
rh#1709898
CVE-2019-20636kernel-source-rt:Already fixedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-20636
CVE-2019-20636
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:cdn.kernel.org:CVE-2019-20636
MISC:git.kernel.org:CVE-2019-20636
MISC:github.com:CVE-2019-20636
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2019-20636
RHSA-2020:2854
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:4431
RHSA-2020:4609
RHSA-2020:5430
RHSA-2020:5656
RHSA-2021:0019
SMASH Issue 256077
SMASH Issue 256757
UBUNTU:CVE-2019-20636
bnc#1168075
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1667782
rh#1707796
rh#1773519
rh#1774983
rh#1783498
rh#1795624
rh#1824059
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
CVE-2019-20794kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:github.com:CVE-2019-20794
CONFIRM:security.netapp.com:CVE-2019-11599
CONFIRM:sourceforge.net:CVE-2019-20794
CVE-2019-20794
MLIST:[oss-security] 20200824 CVE-2019-20794 kernel: task processes not being properly ended could lead to resource exhaustion
OSS:2020/Q3/131
RH:CVE-2019-20794
SMASH Issue 259355
UBUNTU:CVE-2019-20794
bnc#1171737
rh#1849005
CVE-2019-20806kernel-source-rt:Not affectedlow2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-20806
CVE-2019-20806
DSA-4698
MISC:cdn.kernel.org:CVE-2020-7053
MISC:git.kernel.org:CVE-2019-20806
MISC:github.com:CVE-2019-20806
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2019-20806
SMASH Issue 260141
SUSE:openSUSE-SU-2020:0801
UBUNTU:CVE-2019-20806
bdo#952660
bnc#1172199
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1842547
CVE-2019-20807vim:Releasedmoderate6.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L)CONFIRM:support.apple.com:CVE-2019-14899
CVE-2019-20807
D:CVE-2019-20807
FULLDISC:20200717 APPLE-SA-2020-07-15-2 macOS Catalina 10.15.6, Security Update 2020-004 Mojave, Security Update 2020-004 High Sierra
MISC:github.com:CVE-2019-20807
MISC:www.starwindsoftware.com:CVE-2019-20807
MLIST:[debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
RH:CVE-2019-20807
RHSA-2020:4453
SMASH Issue 260198
SMASH Issue 260199
SUSE:openSUSE-SU-2020:0794
UBUNTU:CVE-2019-20807
USN-4582-1
bnc#1172225
rh#1842658
CVE-2019-20810kernel-source-rt:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CONFIRM:cdn.kernel.org:CVE-2020-12768
CVE-2019-20810
L3:64868
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:git.kernel.org:CVE-2019-20810
MLIST:[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/06/18/1
OSS:2020/07/28/2
RH:CVE-2019-20810
SMASH Issue 260495
SUSE:openSUSE-SU-2020:0935
SUSE:openSUSE-SU-2020:1153
UBUNTU:CVE-2019-20810
USN-4427-1
USN-4439-1
USN-4440-1
USN-4483-1
USN-4485-1
bnc#1172458
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1774983
rh#1795624
rh#1831726
rh#1831849
rh#1832397
rh#1832860
rh#1839634
rh#1842525
rh#1847832
rh#1849926
rh#1850249
rh#1865751
CVE-2019-20811kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2019-20811
DSA-4698
MISC:cdn.kernel.org:CVE-2019-15921
MISC:git.kernel.org:CVE-2019-20811
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
RH:CVE-2019-20811
RHSA-2019:3517
RHSA-2020:5023
RHSA-2020:5026
SMASH Issue 260496
UBUNTU:CVE-2019-20811
USN-4527-1
bdo#952660
bnc#1172456
rh#1846439
CVE-2019-20812kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-20812
L3:64868
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:cdn.kernel.org:CVE-2019-20812
MISC:git.kernel.org:CVE-2019-20812
MISC:www.oracle.com:CVE-2021-3450
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/06/18/1
RH:CVE-2019-20812
RHSA-2020:4431
SMASH Issue 260497
SUSE:openSUSE-SU-2020:0801
SUSE:openSUSE-SU-2020:0935
UBUNTU:CVE-2019-20812
bnc#1172453
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1774983
rh#1795624
rh#1831726
rh#1831849
rh#1832397
rh#1832860
rh#1839634
rh#1842525
rh#1846462
rh#1847832
rh#1849926
CVE-2019-20838pcre:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:support.apple.com:CVE-2019-14899
CONFIRM:support.apple.com:CVE-2019-20838
CONFIRM:www.pcre.org:CVE-2015-2325
CVE-2019-20838
FULLDISC:20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
FULLDISC:20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave
MISC:bugs.gentoo.org:CVE-2019-20838
MISC:lists.apache.org:/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
RH:CVE-2019-20838
RHSA-2021:4373
RHSA-2021:4613
RHSA-2021:4614
SMASH Issue 261517
UBUNTU:CVE-2019-20838
bnc#1172973
jsc#CAR-641
rh#1848444
CVE-2019-20907python3:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:bugs.python.org:CVE-2019-20907
CONFIRM:github.com:CVE-2019-20907
CONFIRM:security.netapp.com:CVE-2019-20907
CVE-2019-20907
FEDORA:FEDORA-2020-1ddd5273d6
FEDORA:FEDORA-2020-826b24c329
FEDORA:FEDORA-2020-87c0a0a52d
FEDORA:FEDORA-2020-97d775e649
FEDORA:FEDORA-2020-982b2950db
FEDORA:FEDORA-2020-aab24d3714
FEDORA:FEDORA-2020-bb919e575e
FEDORA:FEDORA-2020-c3b07cc5c9
FEDORA:FEDORA-2020-c539babb0a
FEDORA:FEDORA-2020-d30881c970
FEDORA:FEDORA-2020-d808fdd597
FEDORA:FEDORA-2020-dfb11916cc
FEDORA:FEDORA-2020-e9251de272
FEDORA:FEDORA-2020-efb908b6a8
GLSA-202008-01
MISC:www.oracle.com:CVE-2012-2098
MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
MLIST:[debian-lts-announce] 20201119 [SECURITY] [DLA 2456-1] python3.5 security update
RH:CVE-2019-20907
RHSA-2020:4273
RHSA-2020:4285
RHSA-2020:4299
RHSA-2020:4433
RHSA-2020:4641
RHSA-2020:4654
RHSA-2020:5009
RHSA-2020:5010
RHSA-2021:0528
RHSA-2021:0761
RHSA-2021:0881
SMASH Issue 263148
SUSE:openSUSE-SU-2020:1254
SUSE:openSUSE-SU-2020:1257
SUSE:openSUSE-SU-2020:1258
SUSE:openSUSE-SU-2020:1265
UBUNTU:CVE-2019-20907
USN-4428-1
bnc#1174091
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
rh#1856481
CVE-2019-20908kernel-source-rt:Already fixedimportant7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N)CVE-2019-20908
MISC:cdn.kernel.org:CVE-2019-20908
MISC:cve.mitre.org:MLIST:[oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar
MISC:git.kernel.org:CVE-2019-20908
MISC:git.zx2c4.com:CVE-2019-20908
MISC:mailarchives.bentasker.co.uk:CVE-2019-20908
MISC:www.openwall.com:MLIST:[oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar
MLIST:[oss-security] 20200720 Re: Re: lockdown bypass on ubuntu 18.04's 4.15 kernel for loading unsigned modules
MLIST:[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
MLIST:[oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar
MLIST:[oss-security] 20200730 UEFI SecureBoot bypass fixes rolled out to kernels below radar
OSS:2020/06/18/1
OSS:2020/07/28/2
OSS:2020/Q3/41
OSS:2020/Q3/65
OSS:2020/Q3/67
RH:CVE-2019-20908
RHSA-2020:3218
RHSA-2020:3219
RHSA-2020:3222
RHSA-2020:3228
SMASH Issue 262662
SMASH Issue 263806
SUSE:openSUSE-SU-2020:1153
UBUNTU:CVE-2019-20908
USN-4426-1
USN-4427-1
USN-4439-1
USN-4440-1
bnc#1173567
bnc#1174187
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1832397
rh#1847832
rh#1849926
rh#1852942
rh#1857859
rh#1865751
CVE-2019-20916python-setuptools:Released, python3:Releasedmoderate6.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N)CVE-2019-20916
MISC:github.com:CVE-2019-20916
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20200911 [SECURITY] [DLA 2370-1] python-pip security update
Oracle:CVE-2019-20916
RH:CVE-2019-20916
RHSA-2020:4273
RHSA-2020:4285
RHSA-2020:4432
RHSA-2020:4654
RHSA-2022:5234
SMASH Issue 266797
SUSE:openSUSE-SU-2020:1598
SUSE:openSUSE-SU-2020:1613
UBUNTU:CVE-2019-20916
bnc#1176262
jsc#CAR-1484
rh#1868135
CVE-2019-20934kernel-source-rt:Already fixedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2019-20934
MISC:cdn.kernel.org:CVE-2019-15211
MISC:git.kernel.org:CVE-2019-20934
RH:CVE-2019-20934
RHSA-2021:2725
RHSA-2021:2726
RHSA-2021:3987
SMASH Issue 272432
bnc#1179663
bnc#1179666
pz#1913
rh#1902788
CVE-2019-25013glibc:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-25013
CVE-2019-25013
FEDORA:FEDORA-2021-6e581c051a
FEDORA:FEDORA-2021-6feb090c97
GLSA-202107-07
L3:67771
MISC:lists.apache.org:/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
MISC:sourceware.org:CVE-2019-25013
MISC:www.oracle.com:CVE-2022-21498
MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
MLIST:[kafka-dev] 20210420 [jira] [Created] (KAFKA-12698) CVE-2019-25013 vulnerability reported in Kafka
MLIST:[kafka-jira] 20210420 [jira] [Created] (KAFKA-12698) CVE-2019-25013 vulnerability reported in Kafka
MLIST:[kafka-jira] 20210423 [jira] [Comment Edited] (KAFKA-12698) CVE-2019-25013 high priority vulnerability reported in Kafka
MLIST:[kafka-jira] 20210423 [jira] [Commented] (KAFKA-12698) CVE-2019-25013 high priority vulnerability reported in Kafka
MLIST:[kafka-jira] 20210423 [jira] [Updated] (KAFKA-12698) CVE-2019-25013 high priority vulnerability reported in Kafka
MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
MLIST:[zookeeper-dev] 20210423 [jira] [Created] (ZOOKEEPER-4285) High CVE-2019-25013 reported by Clair scanner for Zookeeper 3.6.1
MLIST:[zookeeper-issues] 20210423 [jira] [Created] (ZOOKEEPER-4285) High CVE-2019-25013 reported by Clair scanner for Zookeeper 3.6.1
MLIST:[zookeeper-issues] 20210506 [jira] [Resolved] (ZOOKEEPER-4285) High CVE-2019-25013 reported by Clair scanner for Zookeeper 3.6.1
RH:CVE-2019-25013
RHSA-2021:0348
RHSA-2021:1585
SMASH Issue 274507
bnc#1182117
https://lists.apache.org/thread.html/r32d767ac804e9b8aad4355bb85960a6a1385eab7afff549a5e98660f%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r448bb851cc8e6e3f93f3c28c70032b37062625d81214744474ac49e7%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r4806a391091e082bdea17266452ca656ebc176e51bb3932733b3a0a2%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r499e4f96d0b5109ef083f2feccd33c51650c1b7d7068aa3bd47efca9%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r5af4430421bb6f9973294691a7904bbd260937e9eef96b20556f43ff%40%3Cjira.kafka.apache.org%3E
https://lists.apache.org/thread.html/r750eee18542bc02bd8350861c424ee60a9b9b225568fa09436a37ece%40%3Cissues.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/r7a2e94adfe0a2f0a1d42e4927e8c32ecac97d37db9cb68095fe9ddbc%40%3Cdev.zookeeper.apache.org%3E
https://lists.apache.org/thread.html/rd2354f9ccce41e494fbadcbc5ad87218de6ec0fff8a7b54c8462226c%40%3Cissues.zookeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4Y6TX47P47KABSFOL26FLDNVCWXDKDEZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVCUNLQ3HXGS4VPUQKWTJGRAW2KTFGXS/
https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ee7a3144c9922808181009b7b3e50e852fb4999b
rh#1912960
CVE-2019-25044kernel-source-rt:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-25044
CVE-2019-25044
MISC:cdn.kernel.org:CVE-2020-7053
MISC:git.kernel.org:CVE-2019-25044
MISC:sites.google.com:CVE-2019-25044
MISC:syzkaller.appspot.com:CVE-2019-25044
SMASH Issue 284323
bnc#1186175
bnc#1186176
jsc#CAR-612
rh#1961292
CVE-2019-25045kernel-source-rt:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-25045
CVE-2019-25045
MISC:cdn.kernel.org:CVE-2019-15666
MISC:git.kernel.org:CVE-2019-25045
MISC:sites.google.com:CVE-2019-25045
MISC:syzkaller.appspot.com:CVE-2019-25045
SMASH Issue 301365
bnc#1187049
rh#1969541
CVE-2019-25160kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2019-25160
SMASH Issue 395204
bnc#1220394
https://git.kernel.org/stable/c/1c973f9c7cc2b3caae93192fdc8ecb3f0b4ac000
https://git.kernel.org/stable/c/5578de4834fe0f2a34fedc7374be691443396d1f
https://git.kernel.org/stable/c/97bc3683c24999ee621d847c9348c75d2fe86272
https://git.kernel.org/stable/c/c61d01faa5550e06794dcf86125ccd325bfad950
https://git.kernel.org/stable/c/dc18101f95fa6e815f426316b8b9a5cee28a334e
https://git.kernel.org/stable/c/e3713abc4248aa6bcc11173d754c418b02a62cbb
https://git.kernel.org/stable/c/fbf9578919d6c91100ec63acf2cba641383f6c78
https://git.kernel.org/stable/c/fcfe700acdc1c72eab231300e82b962bac2b2b2c
rh#2266290
CVE-2019-2708libdb-4_8:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2019-2708
MISC:www.oracle.com:CVE-2018-2880
Oracle:CVE-2019-2708
RH:CVE-2019-2708
RHSA-2021:1675
SMASH Issue 229896
bnc#1174414
rh#1853242
CVE-2019-3459kernel-source-rt:Not affectedmoderate2.6 (CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:bugzilla.novell.com:CVE-2019-3459
CONFIRM:git.kernel.org:CVE-2019-3459
CONFIRM:git.kernel.org:CVE-2019-3460
CONFIRM:people.canonical.com:CVE-2019-3459
CONFIRM:people.canonical.com:CVE-2019-3460
CVE-2019-3459
CVE-2019-3460
MISC:access.redhat.com:CVE-2019-3459
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q2/225
MISC:www.openwall.com:MLIST:[oss-security] 20190811 Re: linux-distros membership application - Microsoft
MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update
MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update
MLIST:[linux-bluetooth] 20190110 [PATCH 1/2] Bluetooth: check message types in l2cap_get_conf_opt
MLIST:[linux-bluetooth] 20190110 [PATCH 2/2] Bluetooth: check the buffer size for some messages before parsing
MLIST:[oss-security] 20190111 Linux kernel: Bluetooth: two remote infoleaks (CVE-2019-3459, CVE-2019-3460)
MLIST:[oss-security] 20190627 Re: linux-distros membership application - Microsoft
MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft
MLIST:[oss-security] 20190811 Re: linux-distros membership application - Microsoft
OSS:2019/Q2/225
Oracle:CVE-2017-5753
Oracle:CVE-2018-5390
RH:CVE-2019-3459
RH:CVE-2019-3460
RHSA-2019:2029
RHSA-2019:2043
RHSA-2019:3309
RHSA-2019:3517
RHSA-2020:0740
SMASH Issue 222041
UBUNTU:CVE-2019-3459
UBUNTU:CVE-2019-3460
bnc#1120758
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1575472
rh#1601704
rh#1609664
rh#1660375
rh#1660385
rh#1663176
rh#1663179
rh#1667782
rh#1686136
rh#1701224
rh#1701842
rh#1707796
rh#1718176
CVE-2019-3460kernel-source-rt:Not affectedmoderate2.6 (CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:bugzilla.novell.com:CVE-2019-3459
CONFIRM:git.kernel.org:CVE-2019-3459
CONFIRM:git.kernel.org:CVE-2019-3460
CONFIRM:people.canonical.com:CVE-2019-3459
CONFIRM:people.canonical.com:CVE-2019-3460
CVE-2019-3459
CVE-2019-3460
MISC:access.redhat.com:CVE-2019-3459
MISC:www.openwall.com:MISC:www.openwall.com:OSS:2019/Q2/225
MISC:www.openwall.com:MLIST:[oss-security] 20190811 Re: linux-distros membership application - Microsoft
MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update
MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update
MLIST:[linux-bluetooth] 20190110 [PATCH 1/2] Bluetooth: check message types in l2cap_get_conf_opt
MLIST:[linux-bluetooth] 20190110 [PATCH 2/2] Bluetooth: check the buffer size for some messages before parsing
MLIST:[oss-security] 20190111 Linux kernel: Bluetooth: two remote infoleaks (CVE-2019-3459, CVE-2019-3460)
MLIST:[oss-security] 20190627 Re: linux-distros membership application - Microsoft
MLIST:[oss-security] 20190628 Re: linux-distros membership application - Microsoft
MLIST:[oss-security] 20190811 Re: linux-distros membership application - Microsoft
OSS:2019/Q2/225
Oracle:CVE-2017-5753
Oracle:CVE-2018-5390
RH:CVE-2019-3459
RH:CVE-2019-3460
RHSA-2019:2029
RHSA-2019:2043
RHSA-2019:3309
RHSA-2019:3517
RHSA-2020:0740
SMASH Issue 222041
UBUNTU:CVE-2019-3459
UBUNTU:CVE-2019-3460
bnc#1120758
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1575472
rh#1601704
rh#1609664
rh#1660375
rh#1660385
rh#1663176
rh#1663179
rh#1667782
rh#1686136
rh#1701224
rh#1701842
rh#1707796
rh#1718176
CVE-2019-3701kernel-source-rt:Already fixedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2019-3701
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2019-3701
SMASH Issue 221922
UBUNTU:CVE-2019-3701
bnc#1120386
linux.git:commit:0aaa81377c5a01f686bcdb8c7a6929a7bf330c68
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1663729
rh#1667782
rh#1707796
rh#1773519
rh#1774983
rh#1783498
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
CVE-2019-3819kernel-source-rt:Not affectedmoderate4.2 (CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H)BID:106730
CONFIRM:bugzilla.redhat.com:CVE-2019-3819
CVE-2019-3819
MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
Oracle:CVE-2017-5753
RH:CVE-2019-3819
RHSA-2019:2029
RHSA-2019:2043
SMASH Issue 223750
SUSE:openSUSE-SU-2019:1193
UBUNTU:CVE-2019-3819
USN-3932-1
USN-3932-2
USN-4115-1
USN-4118-1
bnc#1123161
linux.git:commit:13054abbaa4f1fd4e6f3b4b63439ec033b4c8035
linux.git:commit:d47e3da1759230e394096fd742aad423c291ba48
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1609664
rh#1631036
rh#1660375
rh#1660385
rh#1667782
rh#1669187
rh#1686136
rh#1701224
rh#1701842
rh#1731000
rh#1734243
rh#1734246
rh#1757368
CVE-2019-3843systemd:Already fixedmoderate4.5 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)BID:108116
CONFIRM:bugzilla.redhat.com:CVE-2019-3843
CONFIRM:security.netapp.com:CVE-2019-3843
CVE-2019-3843
FEDORA:FEDORA-2019-7322053e74
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
RH:CVE-2019-3843
RHSA-2020:1794
SMASH Issue 230356
UBUNTU:CVE-2019-3843
USN-4269-1
bnc#1133506
pz#1771
rh#1668521
rh#1684607
CVE-2019-3844systemd:Already fixedmoderate4.5 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)BID:108096
CONFIRM:bugzilla.redhat.com:CVE-2019-3844
CONFIRM:security.netapp.com:CVE-2019-3843
CVE-2019-3844
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
RH:CVE-2019-3844
RHSA-2020:1794
SMASH Issue 230355
UBUNTU:CVE-2019-3844
USN-4269-1
bnc#1133509
rh#1668521
rh#1684610
CVE-2019-3882kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)BUGTRAQ:20190813 [SECURITY] [DSA 4497-1] linux security update
CONFIRM:bugzilla.redhat.com:CVE-2019-3882
CONFIRM:security.netapp.com:CVE-2019-11486
CVE-2019-3882
D:CVE-2019-3882
DSA-4497
MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update
MLIST:[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update
MLIST:[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update
Oracle:CVE-2017-5753
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2019-3882
RHSA-2019:2029
RHSA-2019:2043
RHSA-2019:3309
RHSA-2019:3517
SMASH Issue 228701
SMASH Issue 228702
SUSE:openSUSE-SU-2019:1404
SUSE:openSUSE-SU-2019:1407
SUSE:openSUSE-SU-2019:1479
UBUNTU:CVE-2019-3882
USN-3979-1
USN-3980-1
USN-3980-2
USN-3981-1
USN-3981-2
USN-3982-1
USN-3982-2
bnc#1131427
linux.git:commit:3e28fb0fcb69dbedfe254939143198b46d83bfa1
linux.git:commit:492855939bdb59c6f947b0b5b44af9ad82b7e38c
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1575472
rh#1575866
rh#1609664
rh#1655162
rh#1660375
rh#1660385
rh#1664110
rh#1667782
rh#1686136
rh#1689426
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1718176
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
rh#1890354
CVE-2019-5010python3:Releasedimportant7.5 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2019-5010
D:CVE-2013-2882
D:CVE-2015-3194
GLSA-202003-26
MISC:github.com:MLIST:[oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
MISC:github.com:OSS:2023/10/18/8
MISC:rustsec.org:OSS:2023/10/18/8
MISC:talosintelligence.com:CVE-2019-5010
MLIST:[bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
MLIST:[debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
OSS:2023/10/18/8
Oracle:CVE-2016-2183
Oracle:CVE-2016-6304
Oracle:CVE-2017-3736
Oracle:CVE-2018-0732
Oracle:CVE-2018-20852
Oracle:CVE-2019-15903
Oracle:CVE-2019-16056
Oracle:CVE-2019-9511
Oracle:CVE-2019-9517
Oracle:CVE-2019-9636
Oracle:CVE-2021-22884
RH:CVE-2019-5010
RHBA-2020:0547
RHSA-2019:2030
RHSA-2019:3520
RHSA-2019:3725
SMASH Issue 222820
SUSE:openSUSE-SU-2020:0086
UBUNTU:CVE-2019-5010
bnc#1122191
https://github.com/advisories/GHSA-xpw8-rcwv-8f8p
https://github.com/netty/netty/commit/58f75f665aa81a8cbcf6ffa74820042a285c5e61
https://linkerd.io/2023/10/12/linkerd-cve-2023-44487/
https://lists.w3.org/Archives/Public/ietf-http-wg/2023OctDec/0025.html
https://www.haproxy.com/blog/haproxy-is-not-affected-by-the-http-2-rapid-reset-attack-cve-2023-44487
rh#1103586
rh#1369383
rh#1666519
rh#1752592
rh#1932024
rh#2161287
rh#750555
CVE-2019-5108kernel-source-rt:Not affectedimportant7.4 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-19966
CVE-2019-5108
DSA-4698
L3:57698
L3:57724
MISC:git.kernel.org:CVE-2019-5108
MISC:packetstormsecurity.com:CVE-2019-14615
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:talosintelligence.com:CVE-2019-5108
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
RH:CVE-2019-5108
RHBA-2020:3527
RHSA-2020:1016
RHSA-2020:1493
RHSA-2020:1567
RHSA-2020:1769
SMASH Issue 249683
UBUNTU:CVE-2019-5108
USN-4285-1
USN-4286-1
USN-4286-2
USN-4287-1
USN-4287-2
bdo#952660
bnc#1159912
bnc#1159913
bnc#1173340
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1667782
rh#1708775
rh#1773519
rh#1783498
rh#1789927
rh#1831849
rh#1832860
rh#1849926
CVE-2019-5489kernel-source-rt:Already fixedmoderate5.6 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)BID:106478
BUGTRAQ:20190618 [SECURITY] [DSA 4465-1] linux security update
CONFIRM:security.netapp.com:CVE-2019-5489
CONFIRM:www.huawei.com:CVE-2019-5489
CVE-2019-5489
D:CVE-2019-5489
DSA-4465
MISC:arxiv.org:CVE-2019-5489
MISC:bugs.chromium.org:MISC:www.openwall.com:CVE-2019-11190
MISC:git.kernel.org:CVE-2019-5489
MISC:github.com:CVE-2019-5489
MISC:www.oracle.com:CVE-2015-7501
MISC:www.theregister.co.uk:CVE-2019-5489
MLIST:[debian-lts-announce] 20190617 [SECURITY] [DLA 1823-1] linux security update
MLIST:[debian-lts-announce] 20190618 [SECURITY] [DLA 1824-1] linux-4.9 security update
OSS:2019/04/03/4
OSS:2019/Q1/28
Oracle:CVE-2017-5753
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2019-5489
RHSA-2019:2029
RHSA-2019:2043
RHSA-2019:2473
RHSA-2019:2808
RHSA-2019:2809
RHSA-2019:2837
RHSA-2019:3309
RHSA-2019:3517
RHSA-2019:3967
RHSA-2019:4056
RHSA-2019:4057
RHSA-2019:4058
RHSA-2019:4159
RHSA-2019:4164
RHSA-2019:4255
RHSA-2020:0204
SMASH Issue 222259
SMASH Issue 222272
SUSE:openSUSE-SU-2019:1479
SUSE:openSUSE-SU-2019:1570
SUSE:openSUSE-SU-2019:1579
UBUNTU:CVE-2019-5489
bdo#928989
bnc#1120843
bnc#1120885
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1205079
rh#1655162
rh#1664110
rh#1667782
rh#1699856
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1718176
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
CVE-2019-5747busybox:Releasedlow3.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)BUGTRAQ:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
CVE-2019-5747
D:CVE-2019-5747
FULLDISC:20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
MISC:bugs.busybox.net:CVE-2018-20679
MISC:git.busybox.net:CVE-2019-5747
MISC:packetstormsecurity.com:CVE-2015-9261
RH:CVE-2019-5747
SMASH Issue 222536
UBUNTU:CVE-2019-5747
USN-3935-1
bnc#1121428
rh#1667067
CVE-2019-5805libxslt:Ignoreimportant ()BUGTRAQ:20190813 [SECURITY] [DSA 4500-1] chromium security update
CVE-2019-5805
CVE-2019-5815
D:CVE-2019-5797
DSA-4500
FEDORA:FEDORA-2019-8fb8240d14
FEDORA:FEDORA-2019-a1af621faf
GLSA-201908-18
MISC:bugs.chromium.org:CVE-2019-5815
MISC:chromereleases.googleblog.com:CVE-2019-5805
MISC:crbug.com:CVE-2019-5805
MISC:gitlab.gnome.org:CVE-2019-5815
MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update
RH:CVE-2019-5805
RH:CVE-2019-5815
RHSA-2019:1021
SMASH Issue 230193
SMASH Issue 230205
SUSE:openSUSE-SU-2019:1666
UBUNTU:CVE-2019-5805
UBUNTU:CVE-2019-5815
bnc#1133313
rh#1702895
rh#1702905
rh#1706805
CVE-2019-5815libxslt:Ignoreimportant ()BUGTRAQ:20190813 [SECURITY] [DSA 4500-1] chromium security update
CVE-2019-5805
CVE-2019-5815
D:CVE-2019-5797
DSA-4500
FEDORA:FEDORA-2019-8fb8240d14
FEDORA:FEDORA-2019-a1af621faf
GLSA-201908-18
MISC:bugs.chromium.org:CVE-2019-5815
MISC:chromereleases.googleblog.com:CVE-2019-5805
MISC:crbug.com:CVE-2019-5805
MISC:gitlab.gnome.org:CVE-2019-5815
MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update
RH:CVE-2019-5805
RH:CVE-2019-5815
RHSA-2019:1021
SMASH Issue 230196
SMASH Issue 230205
SUSE:openSUSE-SU-2019:1666
UBUNTU:CVE-2019-5805
UBUNTU:CVE-2019-5815
bnc#1133313
rh#1702895
rh#1702905
rh#1706805
CVE-2019-6285yaml-cpp:Releasedmoderate5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2019-6285
D:CVE-2019-6285
MISC:github.com:CVE-2019-6285
RH:CVE-2019-6285
SMASH Issue 222773
UBUNTU:CVE-2019-6285
bnc#1122004
jsc#CAR-1658
rh#1668104
CVE-2019-6292yaml-cpp:Releasedmoderate5.3 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2019-6292
D:CVE-2019-6292
MISC:github.com:CVE-2019-6292
RH:CVE-2019-6292
SMASH Issue 222778
UBUNTU:CVE-2019-6292
bnc#1122021
jsc#CAR-1657
rh#1668108
CVE-2019-6974kernel-source-rt:Already fixedimportant7.8 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H)BID:107127
CONFIRM:support.f5.com:CVE-2019-6974
CVE-2019-6974
EXPLOIT-DB:46388
MISC:cdn.kernel.org:CVE-2019-6974
MISC:git.kernel.org:CVE-2019-6974
MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
Oracle:CVE-2017-5753
RH:CVE-2019-6974
RHBA-2019:0959
RHSA-2019:0818
RHSA-2019:0833
RHSA-2019:2809
RHSA-2019:3967
RHSA-2020:0103
SMASH Issue 224390
UBUNTU:CVE-2019-6974
USN-3930-1
USN-3930-2
USN-3931-1
USN-3931-2
USN-3932-1
USN-3932-2
USN-3933-1
USN-3933-2
bnc#1124728
linux.git:commit:6fb845f0e78de19eaaf6a2d351702474e44b6a9e
linux.git:commit:cfa39381173d5f969daf43582c95ad679189cbc9
linux.git:commit:e303a067ceede918fbf90ff3dc8affbb98bad4e8
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
pz#1765
rh#1575472
rh#1609664
rh#1660375
rh#1660385
rh#1667782
rh#1671913
rh#1686136
rh#1701224
rh#1701842
CVE-2019-7222kernel-source-rt:Already fixedlow2.8 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N)BID:106963
CONFIRM:security.netapp.com:CVE-2018-19985
CVE-2019-7222
FEDORA:FEDORA-2019-164946aa7f
FEDORA:FEDORA-2019-3da64f3e61
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-7221
MISC:github.com:CVE-2019-7221
MISC:packetstormsecurity.com:CVE-2019-7222
MISC:www.openwall.com:CVE-2019-7221
MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
MLIST:[opensuse-security-announce] 20190218 [security-announce] openSUSE-SU-2019:0203-1: important: Security update for the Linux Kernel
Oracle:CVE-2017-5753
RH:CVE-2019-7222
RHSA-2019:2029
RHSA-2019:2043
RHSA-2019:3309
RHSA-2019:3517
SMASH Issue 224391
SMASH Issue 224423
UBUNTU:CVE-2019-7222
USN-3930-1
USN-3930-2
USN-3931-1
USN-3931-2
USN-3932-1
USN-3932-2
USN-3933-1
USN-3933-2
bnc#1124735
linux.git:commit:353c0956a618a07ba4bbe7ad00ff29fe70e8412a
linux.git:commit:6fb845f0e78de19eaaf6a2d351702474e44b6a9e
linux.git:commit:e303a067ceede918fbf90ff3dc8affbb98bad4e8
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
pz#1759
pz#1760
pz#1765
rh#1575472
rh#1609664
rh#1660375
rh#1660385
rh#1667782
rh#1671930
rh#1686136
rh#1701224
rh#1701842
CVE-2019-7308kernel-source-rt:Not affectedimportant5.6 (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)CVE-2019-7308
MISC:bugs.chromium.org:CVE-2019-7308
Oracle:CVE-2017-5753
RH:CVE-2019-7308
SMASH Issue 224076
UBUNTU:CVE-2019-7308
bnc#1124055
rh#1672355
rh#1686136
CVE-2019-8912kernel-source-rt:Already fixedimportant7.8 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:107063
CVE-2019-8912
L3:53779
MISC:bugzilla.redhat.com:CVE-2019-8912
MISC:patchwork.ozlabs.org:CVE-2019-8912
Oracle:CVE-2017-5753
RH:CVE-2019-8912
RHSA-2020:0174
SMASH Issue 224994
SUSE:openSUSE-SU-2019:1193
UBUNTU:CVE-2019-8912
USN-3930-1
USN-3930-2
USN-3931-1
USN-3931-2
bnc#1125907
bnc#1126284
rh#1678685
rh#1686136
CVE-2019-8956kernel-source-rt:Not affectedimportant ()CONFIRM:support.f5.com:CVE-2019-8956
CVE-2019-8956
MISC:cdn.kernel.org:CVE-2019-6974
MISC:git.kernel.org:CVE-2019-8956
MISC:secuniaresearch.flexerasoftware.com:CVE-2019-8956
RH:CVE-2019-8956
SMASH Issue 224146
UBUNTU:CVE-2019-8956
USN-3930-1
USN-3930-2
bnc#1124136
rh#1679889
CVE-2019-8980kernel-source-rt:Already fixedlow3.3 (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)BID:107120
CONFIRM:support.f5.com:CVE-2019-8980
CVE-2019-8980
MISC:www.mail-archive.com:CVE-2019-8980
MLIST:[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
Oracle:CVE-2017-5753
RH:CVE-2019-8980
RHSA-2020:1567
RHSA-2020:1769
SMASH Issue 225117
SUSE:openSUSE-SU-2019:1193
UBUNTU:CVE-2019-8980
USN-3930-1
USN-3930-2
USN-3931-1
USN-3931-2
bnc#1126209
rh#1679972
rh#1686136
CVE-2019-9003kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)BID:107145
CONFIRM:security.netapp.com:CVE-2019-9003
CVE-2019-9003
MISC:cdn.kernel.org:CVE-2019-9003
MISC:git.kernel.org:CVE-2019-9003
MISC:github.com:CVE-2019-9003
Oracle:CVE-2017-5753
Oracle:CVE-2019-11477
Oracle:CVE-2019-5489
RH:CVE-2019-9003
RHSA-2019:1167
SMASH Issue 225261
SUSE:openSUSE-SU-2019:1404
UBUNTU:CVE-2019-9003
USN-3930-1
USN-3930-2
bnc#1126704
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1655162
rh#1664110
rh#1667782
rh#1681007
rh#1701224
rh#1701842
rh#1703063
rh#1707796
rh#1710405
rh#1715494
rh#1715554
rh#1716328
rh#1718176
rh#1727756
rh#1729933
rh#1731000
rh#1734243
rh#1734246
CVE-2019-9074binutils:Releasedmoderate6.2 (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-9070
CONFIRM:support.f5.com:CVE-2019-9074
CVE-2019-9074
D:CVE-2019-9074
GLSA-202107-24
MISC:sourceware.org:CVE-2019-9074
RH:CVE-2019-9074
SMASH Issue 225329
SUSE:openSUSE-SU-2020:1790
SUSE:openSUSE-SU-2020:1804
UBUNTU:CVE-2019-9074
USN-4336-1
bnc#1126831
rh#1680665
CVE-2019-9075binutils:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-9070
CONFIRM:support.f5.com:CVE-2019-9075
CVE-2019-9075
D:CVE-2019-9075
GLSA-202107-24
MISC:sourceware.org:CVE-2019-9075
RH:CVE-2019-9075
SMASH Issue 225330
SUSE:openSUSE-SU-2020:1790
SUSE:openSUSE-SU-2020:1804
UBUNTU:CVE-2019-9075
USN-4336-1
bnc#1126829
rh#1680669
CVE-2019-9077binutils:Releasedmoderate5.3 (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)BID:107139
CONFIRM:security.netapp.com:CVE-2019-9070
CONFIRM:support.f5.com:CVE-2019-9077
CVE-2019-9077
D:CVE-2019-9077
GLSA-202107-24
MISC:sourceware.org:CVE-2019-9077
RH:CVE-2019-9077
SMASH Issue 225332
SUSE:openSUSE-SU-2020:1790
SUSE:openSUSE-SU-2020:1804
UBUNTU:CVE-2019-9077
USN-4336-1
bnc#1126826
rh#1680675
CVE-2019-9162kernel-source-rt:Not affectedimportant ()BID:107159
CONFIRM:security.netapp.com:CVE-2019-9003
CONFIRM:support.f5.com:CVE-2019-9162
CVE-2019-9162
EXPLOIT-DB:46477
MISC:cdn.kernel.org:CVE-2019-9162
MISC:git.kernel.org:CVE-2019-9162
MISC:github.com:CVE-2019-9162
RH:CVE-2019-9162
SMASH Issue 225411
UBUNTU:CVE-2019-9162
USN-3930-1
USN-3930-2
bnc#1127324
pz#1776
rh#1683191
CVE-2019-9192glibc:Ignorelow2.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)CONFIRM:support.f5.com:CVE-2019-9192
CVE-2019-9192
MISC:sourceware.org:CVE-2019-9192
RH:CVE-2019-9192
SMASH Issue 231590
UBUNTU:CVE-2019-9192
bnc#1182116
https://support.f5.com/csp/article/K26346590?utm_source=f5support&%3Butm_medium=RSS
rh#1684374
CVE-2019-9475kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2019-9475
MISC:source.android.com:CVE-2018-9425
SMASH Issue 301981
bnc#1189429
CVE-2019-9740python3:Already fixedmoderate5.4 (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N)BID:107466
BUGTRAQ:20191021 [slackware-security] python (SSA:2019-293-01)
CONFIRM:security.netapp.com:CVE-2019-9740
CVE-2019-9740
D:CVE-2019-9740
FEDORA:FEDORA-2019-1ffd6b6064
FEDORA:FEDORA-2019-57462fa10d
FEDORA:FEDORA-2019-7723d4774a
FEDORA:FEDORA-2019-7df59302e0
FEDORA:FEDORA-2019-b06ec6159b
FEDORA:FEDORA-2019-d202cda4f8
FEDORA:FEDORA-2019-ec26883852
GLSA-202003-26
MISC:bugs.python.org:CVE-2019-9740
MISC:github.com:MLIST:[oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
MISC:nvd.nist.gov:MLIST:[oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
MISC:packetstormsecurity.com:CVE-2019-9740
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
MLIST:[debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
MLIST:[debian-lts-announce] 20190625 [SECURITY] [DLA 1835-2] python3.4 regression update
MLIST:[debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
MLIST:[oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
OSS:2021/Q1/104
RH:CVE-2019-9740
RHBA-2020:0547
RHSA-2019:1260
RHSA-2019:2030
RHSA-2019:3335
RHSA-2019:3520
RHSA-2019:3725
RHSA-2020:1268
RHSA-2020:1346
RHSA-2020:1462
SMASH Issue 226038
SUSE:openSUSE-SU-2019:2131
SUSE:openSUSE-SU-2019:2133
UBUNTU:CVE-2019-9740
USN-4127-1
USN-4127-2
bnc#1129071
rh#1649153
rh#1688169
rh#1695572
rh#2244340
CVE-2020-0110kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:www.intel.com:CVE-2020-0110
CVE-2020-0110
MISC:source.android.com:CVE-2020-0024
RH:CVE-2020-0110
SMASH Issue 259198
UBUNTU:CVE-2020-0110
bnc#1171374
bnc#1174874
rh#1836936
CVE-2020-0305kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2020-0305
MISC:source.android.com:CVE-2020-0124
OSS:2020/04/30/5
OSS:2020/06/18/1
OSS:2020/07/28/2
RH:CVE-2020-0305
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 263973
SUSE:openSUSE-SU-2020:1153
SUSE:openSUSE-SU-2020:1236
UBUNTU:CVE-2020-0305
bnc#1174462
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1831849
rh#1832397
rh#1832860
rh#1839634
rh#1847832
rh#1849926
rh#1860065
rh#1865751
CVE-2020-0404kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-0404
MISC:source.android.com:CVE-2020-0074
MISC:www.oracle.com:CVE-2022-21586
RH:CVE-2020-0404
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 266919
SUSE:openSUSE-SU-2020:1586
SUSE:openSUSE-SU-2020:1655
UBUNTU:CVE-2020-0404
bnc#1176423
rh#1919791
CVE-2020-0427kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2020-0427
MISC:packetstormsecurity.com:CVE-2020-0427
MISC:source.android.com:CVE-2020-0387
MISC:www.starwindsoftware.com:CVE-2020-0427
MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
RH:CVE-2020-0427
RHSA-2021:0856
RHSA-2021:0857
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 267625
SUSE:openSUSE-SU-2020:1586
SUSE:openSUSE-SU-2020:1655
UBUNTU:CVE-2020-0427
bnc#1176725
rh#1919893
CVE-2020-0431kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2020-0431
MISC:source.android.com:CVE-2020-0387
RH:CVE-2020-0431
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 267629
SUSE:openSUSE-SU-2020:1586
SUSE:openSUSE-SU-2020:1655
UBUNTU:CVE-2020-0431
bnc#1176722
bnc#1176896
rh#1919889
CVE-2020-0432kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2020-0432
MISC:source.android.com:CVE-2020-0387
RH:CVE-2020-0432
SMASH Issue 267630
SUSE:openSUSE-SU-2020:1586
SUSE:openSUSE-SU-2020:1655
UBUNTU:CVE-2020-0432
bnc#1176721
bnc#1177165
rh#1919906
CVE-2020-0444kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2020-0444
MISC:source.android.com:CVE-2020-0016
RH:CVE-2020-0444
RHSA-2020:4431
RHSA-2021:0686
RHSA-2021:0689
RHSA-2021:0763
RHSA-2021:0765
RHSA-2021:0774
SMASH Issue 273331
bnc#1180027
bnc#1180028
rh#1920474
CVE-2020-0465kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2020-0465
MISC:source.android.com:CVE-2020-0016
RH:CVE-2020-0465
RHSA-2022:0620
RHSA-2022:0622
SMASH Issue 273340
bnc#1180029
bnc#1180030
rh#1920471
CVE-2020-0466kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2020-0466
MISC:source.android.com:CVE-2020-0016
RH:CVE-2020-0466
RHSA-2021:1081
RHSA-2021:1093
RHSA-2021:2099
RHSA-2021:2106
RHSA-2021:2167
RHSA-2021:2185
RHSA-2021:2190
RHSA-2022:0529
RHSA-2022:0531
RHSA-2022:0533
RHSA-2022:0592
RHSA-2022:0620
RHSA-2022:0622
RHSA-2022:0712
RHSA-2022:0718
RHSA-2022:1104
RHSA-2022:1417
SMASH Issue 273341
bnc#1180031
bnc#1180032
rh#1920480
CVE-2020-0543kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)CONFIRM:cert-portal.siemens.com:CVE-2020-0543
CONFIRM:kc.mcafee.com:CVE-2019-3738
CVE-2020-0543
FEDORA:FEDORA-2020-11ddbfbdf0
FEDORA:FEDORA-2020-1afbe7ba2d
FEDORA:FEDORA-2020-3364913ace
FEDORA:FEDORA-2020-e8835a5f8e
L3:63823
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:www.intel.com:OSS:2020/Q2/176
MISC:xenbits.xen.org:OSS:2019/Q4/67
MISC:xenbits.xen.org:OSS:2020/Q2/176
MLIST:[oss-security] 20200714 Flatcar membership on the linux-distros list
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/Q2/176
OSS:2020/Q2/182
OSS:2020/Q3/26
RH:CVE-2020-0543
RHSA-2020:2431
RHSA-2020:2432
RHSA-2020:2433
RHSA-2020:2677
RHSA-2020:2679
RHSA-2020:2680
RHSA-2020:2706
RHSA-2020:2707
RHSA-2020:2757
RHSA-2020:2758
RHSA-2020:2771
RHSA-2020:2842
RHSA-2021:3027
RHSA-2021:3028
RHSA-2021:3029
RHSA-2021:3176
RHSA-2021:3255
RHSA-2021:3317
RHSA-2021:3322
RHSA-2021:3323
RHSA-2021:3364
SMASH Issue 245557
SMASH Issue 253043
SUSE:openSUSE-SU-2020:0818
SUSE:openSUSE-SU-2020:0965
SUSE:openSUSE-SU-2020:0985
UBUNTU:CVE-2020-0543
USN-4385-1
USN-4387-1
USN-4388-1
USN-4389-1
USN-4390-1
USN-4391-1
USN-4392-1
USN-4393-1
bdo#952660
bdo#960271
bnc#1154824
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1774983
rh#1795624
rh#1827165
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1849926
CVE-2020-10135kernel-source-rt:Releasedmoderate5 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)CERT-VN:VU#647177
CONFIRM:www.bluetooth.com:CVE-2020-10135
CVE-2020-10135
DSA-5161
FULLDISC:20200602 BIAS (Bluetooth Impersonation Attack) CVE 2020-10135 reproduction
MISC:francozappa.github.io:CVE-2020-10135
MISC:packetstormsecurity.com:CVE-2020-10135
OSS:2020/04/30/5
OSS:2020/06/18/1
OSS:2020/07/28/2
RH:CVE-2020-10135
SMASH Issue 259679
SUSE:openSUSE-SU-2020:1153
SUSE:openSUSE-SU-2020:1236
UBUNTU:CVE-2020-10135
ZDI-23-1834
bnc#1171988
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1708775
rh#1832397
rh#1832860
rh#1839634
rh#1847832
rh#1849926
rh#1865751
rh#2039448
rh#2058395
rh#2064604
rh#2074208
rh#2084458
rh#2086753
rh#2089815
rh#2090723
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2104423
CVE-2020-10375python3:Analysismoderate ()CVE-2020-10375
L3:64282
L3:65722
MISC:www.smarty-online.de:CVE-2020-10375
MISC:www.x41-dsec.de:CVE-2020-10375
SMASH Issue 277351
CVE-2020-10543perl:Releasedmoderate6.4 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CONFIRM:github.com:CVE-2020-10543
CONFIRM:security.netapp.com:CVE-2020-10543
CVE-2020-10543
FEDORA:FEDORA-2020-fd73c08076
GLSA-202006-03
L3:68185
MISC:www.oracle.com:CVE-2012-2098
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
N/A:N/A
Oracle:CVE-2020-10543
Oracle:CVE-2020-10878
RH:CVE-2020-10543
RHSA-2021:0343
RHSA-2021:0883
RHSA-2021:1032
RHSA-2021:1266
RHSA-2021:1678
RHSA-2021:2792
SMASH Issue 259609
SMASH Issue 259610
SUSE:openSUSE-SU-2020:0850
UBUNTU:CVE-2020-10543
bnc#1171863
rh#1837975
rh#1837988
rh#1838000
CVE-2020-10711kernel-source-rt:Already fixedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:bugzilla.redhat.com:CVE-2020-10711
CONFIRM:security.netapp.com:CVE-2019-11599
CONFIRM:www.openwall.com:CVE-2020-10711
CVE-2020-10711
DSA-4698
DSA-4699
L3:64868
MISC:bugs.launchpad.net:CONFIRM:N/A
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/06/18/1
OSS:2020/Q2/104
RH:CVE-2020-10711
RHSA-2020:2082
RHSA-2020:2085
RHSA-2020:2102
RHSA-2020:2103
RHSA-2020:2104
RHSA-2020:2125
RHSA-2020:2171
RHSA-2020:2199
RHSA-2020:2203
RHSA-2020:2214
RHSA-2020:2242
RHSA-2020:2277
RHSA-2020:2285
RHSA-2020:2289
RHSA-2020:2291
RHSA-2020:2429
RHSA-2020:2519
RHSA-2020:2522
SMASH Issue 259049
SMASH Issue 259050
SUSE:openSUSE-SU-2020:0801
SUSE:openSUSE-SU-2020:0935
UBUNTU:CVE-2020-10711
USN-4411-1
USN-4412-1
USN-4413-1
USN-4414-1
USN-4419-1
bdo#952660
bdo#960271
bnc#1171191
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1774983
rh#1795624
rh#1825116
rh#1831726
rh#1831849
rh#1832397
rh#1832860
rh#1839634
rh#1842525
rh#1847832
rh#1849926
CVE-2020-10720kernel-source-rt:Already fixedmoderate4.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L)CVE-2020-10720
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:git.kernel.org:CVE-2020-10720
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2020-10720
RHSA-2019:3309
RHSA-2019:3517
RHSA-2020:2854
SMASH Issue 258750
UBUNTU:CVE-2020-10720
bnc#1170778
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1667782
rh#1708775
rh#1773519
rh#1774983
rh#1781204
rh#1783498
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1849926
CVE-2020-10732kernel-source-rt:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CONFIRM:bugzilla.redhat.com:CVE-2020-10732
CONFIRM:security.netapp.com:CVE-2020-10732
CVE-2020-10732
L3:64868
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:git.kernel.org:CVE-2020-10732
MISC:github.com:CVE-2020-10732
MISC:github.com:OSS:2020/Q2/88
MISC:lore.kernel.org:/lkml/CAG_fn=VZZ7yUxtOGzuTLkr7wmfXWtKK9BHHYawj=rt9XWnCYvg%40mail.gmail.com/
MISC:lore.kernel.org:CVE-2020-10732
MISC:twitter.com:CVE-2020-10732
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/06/18/1
OSS:2020/Q2/88
RH:CVE-2020-10732
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 259058
SUSE:openSUSE-SU-2020:0801
SUSE:openSUSE-SU-2020:0935
UBUNTU:CVE-2020-10732
USN-4411-1
USN-4427-1
USN-4439-1
USN-4440-1
USN-4485-1
bdo#952660
bdo#960271
bnc#1171220
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1774983
rh#1795624
rh#1831399
rh#1831726
rh#1831849
rh#1832397
rh#1832860
rh#1839634
rh#1842525
rh#1847832
rh#1849926
CVE-2020-10735python3:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-10735
D:CVE-2020-10735
FEDORA:FEDORA-2022-0b3904c674
FEDORA:FEDORA-2022-141f632a6f
FEDORA:FEDORA-2022-29d436596f
FEDORA:FEDORA-2022-46a44a7f83
FEDORA:FEDORA-2022-4b31e33ed0
FEDORA:FEDORA-2022-66b65beccb
FEDORA:FEDORA-2022-6d57598a23
FEDORA:FEDORA-2022-72213986b8
FEDORA:FEDORA-2022-79843dfb3c
FEDORA:FEDORA-2022-8535093cba
FEDORA:FEDORA-2022-958fd7a32e
FEDORA:FEDORA-2022-ac82a548df
FEDORA:FEDORA-2022-b01214472e
FEDORA:FEDORA-2022-b8b34e62ab
FEDORA:FEDORA-2022-c072cdc3c8
FEDORA:FEDORA-2022-d1682fef04
FEDORA:FEDORA-2022-d4570fc1a6
FEDORA:FEDORA-2022-dd5032bedf
FEDORA:FEDORA-2022-f330bbfda2
FEDORA:FEDORA-2022-f511f8f58b
L3:64282
L3:64314
L3:64315
L3:64542
L3:65195
L3:65722
MISC:access.redhat.com:/errata/RHSA-2022:6766
MISC:access.redhat.com:/errata/RHSA-2022:7323
MISC:access.redhat.com:CVE-2020-10735
MISC:docs.google.com:CVE-2020-10735
MISC:github.com:CVE-2020-10735
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/2VCU6EVQDIXNCEDJUCTFIER2WVNNDTYZ/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/32AAQKABEKFCB5DDV5OONRZK6BS23HPW/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/4EWKR2SPX3JORLWCXFY3KN2U5B5CIUQQ/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/6XL6E5A3I36TRR73VNBOXNIQP4AMZDFZ/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/76YE7AM37MRU76XJV4M27CWDAMUGNRYK/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/HSRPVJZL6DJFWKYRHMNJB7VCEUCBKRF5/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/NHC6IUU7CLRQ3QLPWUXLONSG3SXFTR47/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/OT5U223OE5ZOUHZAZYSYSWVJQIKDE73E/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/OT5WQB7Z3CXOWVBD2AFAHYPA5ONYFFZ4/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/PD7FTLJOIGMUSCDR3JAN6WRFHJEE4PH5/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/SZYJSGLSCQOKXXFVJVJQAXLEOJBIWGEL/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/TD7JDDKJXK6D26XAN3YRFNM2LAJHT5UO/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/TMWPRAAJS7I6U3U45V7GZVXWNSECI22M/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/U4ZZV4CDFRMTPDBI7C5L43RFL3XLIGUY/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/UBPDVCDIUCEBE7C4NAGNA2KQJYOTPBAZ/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/V7ZUJDHK7KNG6SLIFXW7MNZ6O2PUJYK6/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/ZEOAJWGGY55QU35UM2OVZATBW5MX2OZD/
OSS:2022/09/21/1
OSS:2022/09/21/4
OSS:2022/Q3/215
Oracle:CVE-2020-10735
RHSA-2022:6766
RHSA-2022:7323
RHSA-2023:0833
RHSA-2023:2763
RHSA-2023:2764
SMASH Issue 341485
bnc#1203125
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
jsc#CAR-2014
rh#1834423
CVE-2020-10741kernel-source-rt:Unsupportedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CONFIRM:bugzilla.redhat.com:CVE-2020-10741
CVE-2020-10741
MISC:git.kernel.org:CVE-2020-10741
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-10741
MISC:git.zx2c4.com:MISC:www.openwall.com:CVE-2020-10741
MISC:lists.openwall.net:CVE-2020-10741
MISC:lore.kernel.org:MISC:www.openwall.com:CVE-2020-10741
MISC:www.cvedetails.com:MISC:www.openwall.com:CVE-2020-10741
MISC:www.openwall.com:CVE-2020-10741
MISC:www.openwall.com:MISC:www.openwall.com:CVE-2020-10741
RH:CVE-2020-10741
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 259444
bnc#1171985
rh#1822077
CVE-2020-10751kernel-source-rt:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N)CONFIRM:bugzilla.redhat.com:CVE-2020-10751
CONFIRM:lore.kernel.org:CVE-2020-10751
CVE-2020-10751
DSA-4698
DSA-4699
L3:57993
L3:58164
L3:64868
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:git.kernel.org:MLIST:[oss-security] 20200527 CVE-2020-10751 - Linux kernel: SELinux netlink permission check bypass
MISC:lore.kernel.org:/selinux/CACT4Y+b8HiV6KFuAPysZD=5hmyO4QisgxCKi4DHU3CfMPSP=yg%40mail.gmail.com/
MISC:www.openwall.com:MLIST:[oss-security] 20200527 CVE-2020-10751 - Linux kernel: SELinux netlink permission check bypass
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
MLIST:[oss-security] 20200527 CVE-2020-10751 - Linux kernel: SELinux netlink permission check bypass
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/06/18/1
OSS:2020/07/28/2
OSS:2020/Q2/147
Oracle:CVE-2019-14821
RH:CVE-2020-10751
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 259048
SMASH Issue 259809
SUSE:openSUSE-SU-2020:0801
SUSE:openSUSE-SU-2020:0935
UBUNTU:CVE-2020-10751
USN-4389-1
USN-4390-1
USN-4391-1
USN-4412-1
USN-4413-1
bdo#952660
bdo#960271
bnc#1171189
bnc#1173060
bnc#1174956
bnc#1175734
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1731000
rh#1734243
rh#1734246
rh#1743547
rh#1746732
rh#1757368
rh#1774983
rh#1795624
rh#1831726
rh#1831849
rh#1832397
rh#1832860
rh#1833535
rh#1839634
rh#1842525
rh#1847832
rh#1849926
CVE-2020-10757kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-10757
CVE-2020-10757
DSA-4698
DSA-4699
FEDORA:FEDORA-2020-203ffedeb5
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:git.kernel.org:CVE-2020-10757
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/IEM47BXZJLODRH5YNNZSAQ2NVM63MYMC/
MISC:www.openwall.com:CVE-2020-10757
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/Q2/168
RH:CVE-2020-10757
RHSA-2020:3010
RHSA-2020:3016
RHSA-2020:3041
RHSA-2020:3220
RHSA-2020:3221
RHSA-2020:3222
RHSA-2020:3226
RHSA-2020:3598
SMASH Issue 260301
SUSE:openSUSE-SU-2020:0801
UBUNTU:CVE-2020-10757
USN-4426-1
USN-4439-1
USN-4440-1
USN-4483-1
bdo#952660
bdo#960271
bnc#1172317
bnc#1172437
linux.git:commit:5bfea2d9b17f1034a68147a8b03b9789af5700f9
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1774983
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
CVE-2020-10766kernel-source-rt:Releasedmoderate5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)CONFIRM:bugzilla.redhat.com:CVE-2020-10766
CVE-2020-10766
L3:64868
MISC:bugzilla.redhat.com:MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
MISC:git.kernel.org:CVE-2020-10766
MLIST:[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
OSS:2020/04/30/5
OSS:2020/06/18/1
OSS:2020/07/28/2
OSS:2020/Q2/177
Oracle:CVE-2018-3639
RH:CVE-2020-10766
RHSA-2020:3010
RHSA-2020:3016
RHSA-2020:3041
RHSA-2020:3073
RHSA-2020:3222
RHSA-2020:3297
SMASH Issue 261192
UBUNTU:CVE-2020-10766
bnc#1172781
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1832397
rh#1832860
rh#1839634
rh#1845840
rh#1847832
rh#1849926
rh#1865751
CVE-2020-10767kernel-source-rt:Releasedmoderate5.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N)CONFIRM:bugzilla.redhat.com:CVE-2020-10767
CVE-2020-10767
L3:64868
MISC:bugzilla.redhat.com:MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
MISC:git.kernel.org:CVE-2020-10767
MLIST:[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
OSS:2020/04/30/5
OSS:2020/06/18/1
OSS:2020/07/28/2
OSS:2020/Q2/177
Oracle:CVE-2018-3639
RH:CVE-2020-10767
RHSA-2020:3010
RHSA-2020:3016
RHSA-2020:3041
RHSA-2020:3073
RHSA-2020:3222
RHSA-2020:3297
SMASH Issue 261190
UBUNTU:CVE-2020-10767
bnc#1172782
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1832397
rh#1832860
rh#1839634
rh#1845867
rh#1847832
rh#1849926
rh#1865751
CVE-2020-10768kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)CONFIRM:bugzilla.redhat.com:CVE-2020-10768
CVE-2020-10768
L3:64868
MISC:bugzilla.redhat.com:MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
MISC:git.kernel.org:CVE-2020-10768
MLIST:[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
MLIST:[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768
OSS:2020/04/30/5
OSS:2020/06/18/1
OSS:2020/07/28/2
OSS:2020/Q2/177
Oracle:CVE-2018-3639
RH:CVE-2020-10768
RHSA-2020:3010
RHSA-2020:3016
RHSA-2020:3041
RHSA-2020:3073
RHSA-2020:3222
RHSA-2020:3297
SMASH Issue 261191
UBUNTU:CVE-2020-10768
bnc#1172783
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1832397
rh#1832860
rh#1839634
rh#1845868
rh#1847832
rh#1849926
rh#1865751
CVE-2020-10773kernel-source-rt:Releasedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)CONFIRM:bugzilla.redhat.com:CVE-2020-10773
CVE-2020-10773
L3:64868
MISC:git.kernel.org:CVE-2020-10773
OSS:2020/04/30/5
OSS:2020/06/18/1
OSS:2020/07/28/2
RH:CVE-2020-10773
RHSA-2020:4431
SMASH Issue 261446
UBUNTU:CVE-2020-10773
bnc#1172999
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1831849
rh#1832397
rh#1832860
rh#1839634
rh#1846380
rh#1847832
rh#1849926
rh#1865751
CVE-2020-10774kernel-source-rt:Unsupportedmoderate ()CVE-2020-10774
RH:CVE-2020-10774
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 261502
UBUNTU:CVE-2020-10774
rh#1846964
CVE-2020-10781kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:bugzilla.redhat.com:CVE-2020-10781
CVE-2020-10781
MISC:git.kernel.org:CVE-2020-10781
MISC:www.openwall.com:CVE-2020-10781
MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
OSS:2020/04/30/5
OSS:2020/06/18/1
OSS:2020/07/28/2
OSS:2020/Q2/201
RH:CVE-2020-10781
SMASH Issue 261685
UBUNTU:CVE-2020-10781
bnc#1173074
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1832397
rh#1832860
rh#1839634
rh#1847832
rh#1849926
rh#1865751
CVE-2020-10878perl:Releasedmoderate6.4 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CONFIRM:github.com:CVE-2020-10543
CONFIRM:github.com:CVE-2020-10878
CONFIRM:security.netapp.com:CVE-2020-10543
CVE-2020-10878
FEDORA:FEDORA-2020-fd73c08076
GLSA-202006-03
L3:68185
MISC:www.oracle.com:CVE-2012-2098
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
N/A:N/A
Oracle:CVE-2020-10543
Oracle:CVE-2020-10878
RH:CVE-2020-10878
RHSA-2021:0343
RHSA-2021:0883
RHSA-2021:1032
RHSA-2021:1266
RHSA-2021:1678
RHSA-2021:2792
SMASH Issue 259611
SMASH Issue 259612
SUSE:openSUSE-SU-2020:0850
UBUNTU:CVE-2020-10878
bnc#1171864
rh#1837975
rh#1837988
rh#1838000
CVE-2020-11080nghttp2:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:github.com:CVE-2020-11080
CVE-2020-11080
D:CVE-2020-11080
DSA-4696
FEDORA:FEDORA-2020-43d5a372fc
FEDORA:FEDORA-2020-f7d15c8b77
MISC:github.com:CVE-2020-11080
MISC:www.oracle.com:CVE-2012-2098
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2015-7501
MISC:www.oracle.com:CVE-2022-21498
MLIST:[debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update
N/A:N/A
Oracle:CVE-2020-11080
Oracle:CVE-2020-8174
RH:CVE-2020-11080
RHSA-2020:2523
RHSA-2020:2524
RHSA-2020:2644
RHSA-2020:2646
RHSA-2020:2755
RHSA-2020:2784
RHSA-2020:2823
RHSA-2020:2847
RHSA-2020:2848
RHSA-2020:2849
RHSA-2020:2850
RHSA-2020:2852
RHSA-2020:2895
RHSA-2020:3042
RHSA-2020:3084
SMASH Issue 260502
SMASH Issue 276221
SUSE:openSUSE-SU-2020:0802
UBUNTU:CVE-2020-11080
bdo#962145
bnc#1172442
bnc#1181358
https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html
jsc#CAR-1026
rh#1813344
rh#1844929
CVE-2020-11501gnutls:Releasedimportant7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)CONFIRM:security.netapp.com:CVE-2020-11501
CVE-2020-11501
DSA-4652
FEDORA:FEDORA-2020-d14280a6e8
FEDORA:FEDORA-2020-f90fb78f70
GLSA-202004-06
MISC:gitlab.com:CVE-2020-11501
MISC:www.gnutls.org:CVE-2020-11501
RH:CVE-2020-11501
RHSA-2020:1998
SMASH Issue 256260
SUSE:openSUSE-SU-2020:0501
UBUNTU:CVE-2020-11501
USN-4322-1
Upstream Bug
Upstream Fix
bdo#955556
bnc#1168345
rh#1821896
CVE-2020-11565kernel-source-rt:Ignoremoderate4.8 (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:H)CVE-2020-11565
DSA-4667
DSA-4698
MISC:git.kernel.org:CVE-2020-11565
MISC:github.com:CVE-2020-11565
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
RH:CVE-2020-11565
RHSA-2020:2854
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 256525
UBUNTU:CVE-2020-11565
USN-4363-1
USN-4364-1
USN-4367-1
USN-4368-1
USN-4369-1
bdo#952660
bnc#1168831
rh#1824918
CVE-2020-11608kernel-source-rt:Already fixedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-20636
CVE-2020-11608
DSA-4698
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:cdn.kernel.org:CVE-2020-11608
MISC:git.kernel.org:CVE-2020-11608
MISC:github.com:CVE-2020-11608
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2020-11608
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 256577
SUSE:openSUSE-SU-2020:0801
UBUNTU:CVE-2020-11608
USN-4345-1
USN-4364-1
USN-4368-1
USN-4369-1
bdo#952660
bnc#1168829
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1667782
rh#1707796
rh#1773519
rh#1774983
rh#1783498
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1833445
rh#1839634
rh#1842525
rh#1851480
CVE-2020-11609kernel-source-rt:Already fixedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-20636
CVE-2020-11609
DSA-4698
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:cdn.kernel.org:CVE-2020-11608
MISC:git.kernel.org:CVE-2020-11609
MISC:github.com:CVE-2020-11609
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2020-11609
SMASH Issue 256580
SMASH Issue 256607
SUSE:openSUSE-SU-2020:0801
UBUNTU:CVE-2020-11609
USN-4345-1
USN-4364-1
USN-4368-1
USN-4369-1
bdo#952660
bnc#1168854
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1667782
rh#1707796
rh#1773519
rh#1774983
rh#1783498
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1833452
rh#1839634
rh#1842525
rh#1851480
CVE-2020-11668kernel-source-rt:Releasedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-20636
CVE-2020-11668
DSA-4698
L3:61626
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:cdn.kernel.org:CVE-2020-11608
MISC:git.kernel.org:CVE-2020-11668
MISC:github.com:CVE-2020-11668
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2020/04/06/2
RH:CVE-2020-11668
RHSA-2020:4431
RHSA-2020:4609
RHSA-2021:2725
RHSA-2021:2726
SMASH Issue 256751
SMASH Issue 256949
UBUNTU:CVE-2020-11668
USN-4345-1
USN-4364-1
USN-4368-1
USN-4369-1
bdo#952660
bnc#1168952
bnc#1173942
bnc#1190327
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1707796
rh#1824792
CVE-2020-11669kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-11669
CVE-2020-11669
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:cdn.kernel.org:CVE-2020-7053
MISC:git.kernel.org:CVE-2020-11669
MISC:git.kernel.org:MLIST:[oss-security] 20200415 CVE-2020-11669: Linux kernel 4.10 to 5.1: powerpc: guest can cause DoS on POWER9 KVM hosts
MISC:github.com:CVE-2020-11669
MISC:lists.ozlabs.org:CVE-2020-11669
MISC:lists.ozlabs.org:MLIST:[oss-security] 20200415 CVE-2020-11669: Linux kernel 4.10 to 5.1: powerpc: guest can cause DoS on POWER9 KVM hosts
MLIST:[oss-security] 20200415 CVE-2020-11669: Linux kernel 4.10 to 5.1: powerpc: guest can cause DoS on POWER9 KVM hosts
MLIST:[oss-security] 20200415 Re: CVE-2020-11669: Linux kernel 4.10 to 5.1: powerpc: guest can cause DoS on POWER9 KVM hosts
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/Q2/26
RH:CVE-2020-11669
RHSA-2019:3517
RHSA-2021:1379
SMASH Issue 256965
SUSE:openSUSE-SU-2020:0543
UBUNTU:CVE-2020-11669
USN-4368-1
bnc#1169390
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1707796
rh#1774983
rh#1795624
rh#1824803
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
CVE-2020-11725kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2020-11725
MISC:github.com:CVE-2020-11725
MISC:lore.kernel.org:CVE-2020-11725
MISC:twitter.com:CVE-2020-11725
RH:CVE-2020-11725
SMASH Issue 256999
UBUNTU:CVE-2020-11725
bnc#1169384
https://lore.kernel.org/alsa-devel/s5h4ktmlfpx.wl-tiwai%40suse.de/
rh#1824923
CVE-2020-11884kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:git.kernel.org:CVE-2020-11884
CONFIRM:security.netapp.com:CVE-2019-11599
CVE-2020-11884
DSA-4667
FEDORA:FEDORA-2020-16f9239805
FEDORA:FEDORA-2020-64d46a6e29
FEDORA:FEDORA-2020-b453269c4e
MISC:git.kernel.org:CVE-2020-11884
RH:CVE-2020-11884
RHSA-2020:2102
RHSA-2020:2199
RHSA-2020:2429
SMASH Issue 258142
SMASH Issue 258143
UBUNTU:CVE-2020-11884
USN-4342-1
USN-4343-1
USN-4345-1
bnc#1170030
bnc#1173947
linux.git:commit:316ec154810960052d4586b634156c54d0778f74
linux.git:commit:3f777e19d171670ab558a6d5e6b1ac7f9b6c574f
rh#1828149
CVE-2020-12049dbus-1:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:www.openwall.com:CVE-2020-12049
CVE-2020-12049
Debian
MISC:gitlab.freedesktop.org:CONFIRM:www.openwall.com:CVE-2020-12049
MISC:gitlab.freedesktop.org:CVE-2020-12049
MISC:lists.freedesktop.org:CONFIRM:www.openwall.com:CVE-2020-12049
OSS:2020/Q2/167
RH:CVE-2020-12049
RHSA-2020:2894
RHSA-2020:3014
RHSA-2020:3044
RHSA-2020:3298
SMASH Issue 260692
UBUNTU:CVE-2020-12049
bnc#1172505
http://packetstormsecurity.com/files/172840/D-Bus-File-Descriptor-Leak-Denial-Of-Service.html
https://security.gentoo.org/glsa/202007-46
https://securitylab.github.com/advisories/GHSL-2020-057-DBus-DoS-file-descriptor-leak
https://usn.ubuntu.com/4398-1/
https://usn.ubuntu.com/4398-2/
jsc#CAR-941
rh#1849041
CVE-2020-12114kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-11599
CVE-2020-12114
DSA-4698
DSA-4699
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-12114
MISC:packetstormsecurity.com:CVE-2020-14386
MISC:www.openwall.com:CVE-2020-12114
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/Q2/86
RH:CVE-2020-12114
RHSA-2021:1578
RHSA-2021:1739
RHSA-2021:2185
RHSA-2021:2190
SMASH Issue 258962
SUSE:openSUSE-SU-2020:0801
UBUNTU:CVE-2020-12114
USN-4387-1
USN-4388-1
USN-4389-1
USN-4390-1
USN-4391-1
USN-4392-1
bdo#952660
bdo#960271
bnc#1171098
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1774983
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1848652
rh#1849926
CVE-2020-12351kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2020-12351
MISC:packetstormsecurity.com:CVE-2020-12352
MISC:www.intel.com:CVE-2020-12351
RH:CVE-2020-12351
RHSA-2020:4276
RHSA-2020:4277
RHSA-2020:4278
RHSA-2020:4279
RHSA-2020:4280
RHSA-2020:4281
RHSA-2020:4286
RHSA-2020:4287
RHSA-2020:4288
RHSA-2020:4289
RHSA-2020:4685
RHSA-2020:4686
SMASH Issue 269152
UBUNTU:CVE-2020-12351
bdo#908712
bnc#1177724
bnc#1177729
rh#1886521
rh#1891483
CVE-2020-12352kernel-source-rt:Releasedmoderate3.1 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2020-12352
MISC:packetstormsecurity.com:CVE-2020-0427
MISC:packetstormsecurity.com:CVE-2020-12352
MISC:www.intel.com:CVE-2020-12351
RH:CVE-2020-12352
RHSA-2020:4276
RHSA-2020:4277
RHSA-2020:4278
RHSA-2020:4279
RHSA-2020:4280
RHSA-2020:4281
RHSA-2020:4286
RHSA-2020:4287
RHSA-2020:4288
RHSA-2020:4289
RHSA-2020:4685
RHSA-2020:4686
RHSA-2020:4990
RHSA-2020:4991
SMASH Issue 269151
UBUNTU:CVE-2020-12352
bdo#908712
bnc#1177725
rh#1886529
rh#1891484
CVE-2020-12362kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)CVE-2020-12362
MISC:www.intel.com:CVE-2020-0518
RH:CVE-2020-12362
RHSA-2021:1578
RHSA-2021:1620
RHSA-2021:1739
RHSA-2021:2106
RHSA-2021:2164
RHSA-2021:2185
RHSA-2021:2190
RHSA-2021:2293
RHSA-2021:2314
RHSA-2021:2316
RHSA-2021:2355
RHSA-2021:2523
RHSA-2021:2735
SMASH Issue 277030
SMASH Issue 277032
bnc#1181720
bnc#1182033
https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html
rh#1930246
CVE-2020-12363kernel-source-rt:Releasedlow1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2020-12363
MISC:www.intel.com:CVE-2020-0518
RH:CVE-2020-12363
RHSA-2021:1578
RHSA-2021:1620
RHSA-2021:1739
RHSA-2021:2314
RHSA-2021:2316
SMASH Issue 277031
bnc#1181735
https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html
rh#1930249
CVE-2020-12364kernel-source-rt:Releasedlow1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2020-12364
MISC:www.intel.com:CVE-2020-0518
RH:CVE-2020-12364
RHSA-2021:1578
RHSA-2021:1620
RHSA-2021:1739
RHSA-2021:2314
RHSA-2021:2316
SMASH Issue 277028
bnc#1181736
https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html
rh#1930251
CVE-2020-12373kernel-source-rt:Releasedlow1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2020-12373
MISC:www.intel.com:CVE-2020-0518
MISC:www.intel.com:CVE-2020-12373
SMASH Issue 277029
bnc#1181738
CVE-2020-12399mozilla-nss:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N)CVE-2020-12399
DSA-4695
DSA-4702
DSA-4726
GLSA-202007-49
MISC:bugzilla.mozilla.org:CVE-2020-12399
MISC:www.mozilla.org:CVE-2020-12398
MISC:www.mozilla.org:CVE-2020-12399
MLIST:[debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
RH:CVE-2020-12399
RHSA-2020:3280
SMASH Issue 259689
UBUNTU:CVE-2020-12399
USN-4421-1
bnc#1171978
bnc#1172402
rh#1775916
rh#1826177
CVE-2020-12400mozilla-nss:Releasedcritical ()CVE-2020-12400
CVE-2020-12401
CVE-2020-12403
CVE-2020-6829
D:CVE-2020-12403
MISC:bugzilla.mozilla.org:CVE-2020-12400
MISC:bugzilla.mozilla.org:CVE-2020-12401
MISC:bugzilla.mozilla.org:CVE-2020-6829
MISC:developer.mozilla.org:CVE-2020-12403
MISC:www.mozilla.org:CVE-2020-15663
MISC:www.mozilla.org:CVE-2020-15664
RH:CVE-2020-12400
RH:CVE-2020-12401
RH:CVE-2020-12403
RH:CVE-2020-6829
RHSA-2020:4076
RHSA-2021:0538
RHSA-2021:0758
RHSA-2021:0876
RHSA-2021:1026
SMASH Issue 264606
SMASH Issue 264622
UBUNTU:CVE-2020-12400
UBUNTU:CVE-2020-12401
UBUNTU:CVE-2020-12403
UBUNTU:CVE-2020-6829
bnc#1174763
https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
https://security.netapp.com/advisory/ntap-20230324-0006/
rh#1826187
rh#1851294
rh#1853983
rh#1868931
CVE-2020-12401mozilla-nss:Releasedcritical ()CVE-2020-12400
CVE-2020-12401
CVE-2020-12403
CVE-2020-6829
D:CVE-2020-12403
MISC:bugzilla.mozilla.org:CVE-2020-12400
MISC:bugzilla.mozilla.org:CVE-2020-12401
MISC:bugzilla.mozilla.org:CVE-2020-6829
MISC:developer.mozilla.org:CVE-2020-12403
MISC:www.mozilla.org:CVE-2020-15663
MISC:www.mozilla.org:CVE-2020-15664
RH:CVE-2020-12400
RH:CVE-2020-12401
RH:CVE-2020-12403
RH:CVE-2020-6829
RHSA-2020:4076
RHSA-2021:0538
RHSA-2021:0758
RHSA-2021:0876
RHSA-2021:1026
SMASH Issue 264607
SMASH Issue 264622
UBUNTU:CVE-2020-12400
UBUNTU:CVE-2020-12401
UBUNTU:CVE-2020-12403
UBUNTU:CVE-2020-6829
bnc#1174763
https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
https://security.netapp.com/advisory/ntap-20230324-0006/
rh#1826187
rh#1851294
rh#1853983
rh#1868931
CVE-2020-12402mozilla-nss:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N)CVE-2020-12402
DSA-4726
FEDORA:FEDORA-2020-16741ac7ff
FEDORA:FEDORA-2020-3ef1937475
GLSA-202007-10
MISC:bugzilla.mozilla.org:CVE-2020-12402
MISC:www.mozilla.org:CVE-2020-12402
MLIST:[debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
Mitre
RH:CVE-2020-12402
RHSA-2020:3280
RHSA-2020:4076
SMASH Issue 261683
SMASH Issue 261688
SUSE:openSUSE-SU-2020:0953
SUSE:openSUSE-SU-2020:0955
SUSE:openSUSE-SU-2020:0983
SUSE:openSUSE-SU-2020:1017
UBUNTU:CVE-2020-12402
USN-4417-1
USN-4417-2
bnc#1173032
rh#1775916
rh#1826177
rh#1826231
CVE-2020-12403mozilla-nss:Releasedcritical ()CVE-2020-12400
CVE-2020-12401
CVE-2020-12403
CVE-2020-6829
D:CVE-2020-12403
MISC:bugzilla.mozilla.org:CVE-2020-12400
MISC:bugzilla.mozilla.org:CVE-2020-12401
MISC:bugzilla.mozilla.org:CVE-2020-6829
MISC:developer.mozilla.org:CVE-2020-12403
MISC:www.mozilla.org:CVE-2020-15663
MISC:www.mozilla.org:CVE-2020-15664
RH:CVE-2020-12400
RH:CVE-2020-12401
RH:CVE-2020-12403
RH:CVE-2020-6829
RHSA-2020:4076
RHSA-2021:0538
RHSA-2021:0758
RHSA-2021:0876
RHSA-2021:1026
SMASH Issue 264621
SMASH Issue 264622
UBUNTU:CVE-2020-12400
UBUNTU:CVE-2020-12401
UBUNTU:CVE-2020-12403
UBUNTU:CVE-2020-6829
bnc#1174763
https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
https://security.netapp.com/advisory/ntap-20230324-0006/
rh#1826187
rh#1851294
rh#1853983
rh#1868931
CVE-2020-12464kernel-source-rt:Already fixedlow1.8 (CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-11599
CVE-2020-12464
DSA-4698
DSA-4699
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:cdn.kernel.org:CVE-2020-12464
MISC:git.kernel.org:CVE-2020-12464
MISC:github.com:CVE-2020-12464
MISC:lkml.org:CVE-2020-12464
MISC:patchwork.kernel.org:CVE-2020-12464
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2020-12464
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 258832
SUSE:openSUSE-SU-2020:0801
UBUNTU:CVE-2020-12464
USN-4387-1
USN-4388-1
USN-4389-1
USN-4390-1
USN-4391-1
bdo#952660
bdo#960271
bnc#1170901
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1774983
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1849926
CVE-2020-12465kernel-source-rt:Not affectedimportant7.1 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)CONFIRM:security.netapp.com:CVE-2019-11599
CVE-2020-12465
MISC:cdn.kernel.org:CVE-2020-12465
MISC:git.kernel.org:CVE-2020-12465
MISC:github.com:CVE-2020-12465
RH:CVE-2020-12465
RHSA-2020:4431
SMASH Issue 258779
SMASH Issue 258833
UBUNTU:CVE-2020-12465
bnc#1170828
bnc#1170888
rh#1831699
CVE-2020-12652kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-11599
CVE-2020-12652
DSA-4698
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:cdn.kernel.org:CVE-2020-12652
MISC:git.kernel.org:CVE-2020-12652
MISC:github.com:CVE-2020-12652
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2020-12652
SMASH Issue 259051
SUSE:openSUSE-SU-2020:0801
UBUNTU:CVE-2020-12652
bdo#952660
bnc#1171218
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1774983
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1849926
CVE-2020-12656kernel-source-rt:Releasedlow2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2020-12656
L3:64868
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:bugzilla.kernel.org:CVE-2020-12656
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/06/18/1
RH:CVE-2020-12656
SMASH Issue 259055
SUSE:openSUSE-SU-2020:0801
SUSE:openSUSE-SU-2020:0935
UBUNTU:CVE-2020-12656
USN-4483-1
USN-4485-1
bnc#1171219
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1774983
rh#1795624
rh#1831726
rh#1831849
rh#1832397
rh#1832860
rh#1839634
rh#1842525
rh#1847832
rh#1849926
CVE-2020-12657kernel-source-rt:Already fixedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2019-11599
CVE-2020-12657
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:cdn.kernel.org:CVE-2020-12657
MISC:git.kernel.org:CVE-2020-12657
MISC:github.com:CVE-2020-12657
MISC:patchwork.kernel.org:CVE-2020-12657
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2020-12657
RHSA-2020:2427
RHSA-2020:2428
RHSA-2020:2429
RHSA-2020:2567
RHSA-2020:2667
RHSA-2020:2669
SMASH Issue 259056
SUSE:openSUSE-SU-2020:0801
UBUNTU:CVE-2020-12657
USN-4363-1
USN-4367-1
USN-4368-1
USN-4369-1
bnc#1171205
bnc#1201585
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1774983
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1832866
rh#1839634
rh#1842525
rh#1849926
CVE-2020-12659kernel-source-rt:Already fixedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H)CONFIRM:security.netapp.com:CVE-2019-11599
CVE-2020-12659
MISC:bugzilla.kernel.org:CVE-2020-12659
MISC:cdn.kernel.org:CVE-2020-12659
MISC:git.kernel.org:CVE-2020-12659
MISC:github.com:CVE-2020-12659
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2020-12659
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 259057
SUSE:openSUSE-SU-2020:0801
UBUNTU:CVE-2020-12659
USN-4387-1
USN-4388-1
USN-4389-1
bnc#1171214
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1831726
rh#1831849
rh#1832860
rh#1832876
rh#1839634
rh#1842525
CVE-2020-12723perl:Releasedmoderate6.4 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CONFIRM:github.com:CVE-2020-10543
CONFIRM:github.com:CVE-2020-12723
CONFIRM:security.netapp.com:CVE-2020-10543
CVE-2020-12723
FEDORA:FEDORA-2020-fd73c08076
GLSA-202006-03
L3:68185
MISC:github.com:CVE-2020-12723
MISC:www.oracle.com:CVE-2012-2098
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
N/A:N/A
Oracle:CVE-2020-10543
Oracle:CVE-2020-10878
RH:CVE-2020-12723
RHSA-2021:0343
RHSA-2021:0557
RHSA-2021:0883
RHSA-2021:1032
RHSA-2021:1266
RHSA-2021:2184
SMASH Issue 259613
SMASH Issue 259614
SUSE:openSUSE-SU-2020:0850
UBUNTU:CVE-2020-12723
bnc#1171866
rh#1837975
rh#1837988
rh#1838000
CVE-2020-12762json-c:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:cert-portal.siemens.com:CVE-2021-25220
CONFIRM:github.com:CVE-2020-12762
CONFIRM:security.netapp.com:CVE-2020-12762
CVE-2020-12762
DSA-4741
FEDORA:FEDORA-2020-63c6f4ab1d
FEDORA:FEDORA-2020-7eb7eac270
FEDORA:FEDORA-2020-847ad856ab
GLSA-202006-13
L3:65298
MISC:github.com:CVE-2020-12762
MLIST:[debian-lts-announce] 20200531 [SECURITY] [DLA 2228-1] json-c security update
MLIST:[debian-lts-announce] 20200531 [SECURITY] [DLA 2228-2] json-c regression update
MLIST:[debian-lts-announce] 20200730 [SECURITY] [DLA 2301-1] json-c security update
RH:CVE-2020-12762
RHSA-2021:4382
SMASH Issue 259359
UBUNTU:CVE-2020-12762
USN-4360-1
USN-4360-4
bnc#1171479
https://lists.debian.org/debian-lts-announce/2023/06/msg00023.html
rh#1835253
CVE-2020-12768kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cdn.kernel.org:CVE-2020-12768
CONFIRM:git.kernel.org:CVE-2020-12768
CVE-2020-12768
DSA-4699
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2020-12768
SMASH Issue 259365
UBUNTU:CVE-2020-12768
USN-4411-1
USN-4412-1
USN-4413-1
bdo#960271
bnc#1171736
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1831726
rh#1831849
rh#1832860
rh#1834829
rh#1839634
rh#1842525
CVE-2020-12769kernel-source-rt:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CONFIRM:cdn.kernel.org:CVE-2020-12769
CONFIRM:git.kernel.org:CVE-2020-12769
CONFIRM:lkml.org:CVE-2020-12769
CONFIRM:security.netapp.com:CVE-2019-11599
CVE-2020-12769
L3:64868
MISC:bugs.launchpad.net:CONFIRM:N/A
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/06/18/1
RH:CVE-2020-12769
SMASH Issue 259366
SUSE:openSUSE-SU-2020:0801
SUSE:openSUSE-SU-2020:0935
UBUNTU:CVE-2020-12769
USN-4391-1
bnc#1171983
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1774983
rh#1795624
rh#1831726
rh#1831849
rh#1832397
rh#1832860
rh#1834821
rh#1839634
rh#1842525
rh#1847832
rh#1849926
CVE-2020-12770kernel-source-rt:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)CONFIRM:git.kernel.org:CVE-2020-12770
CONFIRM:lkml.org:CVE-2020-12770
CONFIRM:security.netapp.com:CVE-2019-11599
CVE-2020-12770
DSA-4698
DSA-4699
FEDORA:FEDORA-2020-4c69987c40
FEDORA:FEDORA-2020-5a69decc0c
FEDORA:FEDORA-2020-c6b9fff7f8
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
RH:CVE-2020-12770
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:4431
RHSA-2020:4609
RHSA-2020:5206
RHSA-2020:5430
RHSA-2020:5656
SMASH Issue 259367
UBUNTU:CVE-2020-12770
USN-4411-1
USN-4412-1
USN-4413-1
USN-4414-1
USN-4419-1
bdo#952660
bdo#960271
bnc#1171420
jsc#CAR-1908
rh#1834845
CVE-2020-12771kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:lkml.org:CVE-2020-12771
CONFIRM:security.netapp.com:CVE-2019-11599
CVE-2020-12771
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
OSS:2020/04/30/5
OSS:2020/06/18/1
OSS:2020/07/28/2
RH:CVE-2020-12771
SMASH Issue 259368
SUSE:openSUSE-SU-2020:1062
SUSE:openSUSE-SU-2020:1153
UBUNTU:CVE-2020-12771
USN-4462-1
USN-4463-1
USN-4465-1
USN-4483-1
USN-4485-1
bnc#1171732
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1832397
rh#1832860
rh#1834862
rh#1839634
rh#1847832
rh#1849926
rh#1865751
CVE-2020-12826kernel-source-rt:Won't fixmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CONFIRM:security.netapp.com:CVE-2019-11599
CVE-2020-12826
MISC:cdn.kernel.org:CVE-2020-12657
MISC:github.com:CVE-2020-12826
MISC:lists.openwall.net:CVE-2020-10741
MISC:www.openwall.com:CVE-2020-10741
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
RH:CVE-2020-12826
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 259558
UBUNTU:CVE-2020-12826
USN-4367-1
USN-4369-1
USN-4391-1
bnc#1171727
jsc#CAR-1249
rh#1822077
CVE-2020-12888kernel-source-rt:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2019-11599
CVE-2020-12888
FEDORA:FEDORA-2020-5436586091
FEDORA:FEDORA-2020-57bf620276
L3:64868
MISC:lore.kernel.org:CVE-2020-12888
MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
MLIST:[oss-security] 20200519 CVE-2020-12888 Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario
OSS:2020/04/30/5
OSS:2020/06/18/1
OSS:2020/07/28/2
OSS:2020/Q2/129
RH:CVE-2020-12888
RHSA-2020:2664
RHSA-2020:2665
RHSA-2020:2831
RHSA-2020:2832
RHSA-2020:2851
RHSA-2020:2854
RHSA-2020:3010
RHSA-2020:3016
RHSA-2020:3019
RHSA-2020:3041
RHSA-2020:3222
RHSA-2020:3230
SMASH Issue 259583
SUSE:openSUSE-SU-2020:0935
SUSE:openSUSE-SU-2020:1153
UBUNTU:CVE-2020-12888
USN-4525-1
USN-4526-1
bnc#1171868
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:abafbc551fddede3e0a08dee1dcde08fc0eb8476
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1832397
rh#1832860
rh#1836244
rh#1839634
rh#1847832
rh#1849926
rh#1865751
CVE-2020-13143kernel-source-rt:Releasedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2019-11599
CVE-2020-13143
DSA-4698
DSA-4699
L3:64868
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:git.kernel.org:CVE-2020-13143
MISC:www.spinics.net:CVE-2020-13143
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/06/18/1
RH:CVE-2020-13143
SMASH Issue 259680
SMASH Issue 264267
SUSE:openSUSE-SU-2020:0801
SUSE:openSUSE-SU-2020:0935
UBUNTU:CVE-2020-13143
USN-4411-1
USN-4412-1
USN-4413-1
USN-4414-1
USN-4419-1
bdo#952660
bdo#960271
bnc#1171982
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1774983
rh#1795624
rh#1831726
rh#1831849
rh#1832397
rh#1832860
rh#1839634
rh#1842525
rh#1846382
rh#1847832
rh#1849926
CVE-2020-13434sqlite3:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-13434
CONFIRM:support.apple.com:CVE-2019-14899
CONFIRM:support.apple.com:CVE-2020-13434
CONFIRM:support.apple.com:CVE-2020-9773
CVE-2020-13434
FEDORA:FEDORA-2020-0477f8840e
FREEBSD:FreeBSD-SA-20:22
FULLDISC:20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0
FULLDISC:20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0
FULLDISC:20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0
FULLDISC:20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
GLSA-202007-26
L3:61084
MISC:www.oracle.com:CVE-2015-7501
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2022-21498
MISC:www.sqlite.org:CVE-2020-13434
MLIST:[debian-lts-announce] 20200526 [SECURITY] [DLA 2221-1] sqlite3
MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
Oracle:CVE-2019-19646
Oracle:CVE-2020-13434
RH:CVE-2020-13434
RHSA-2021:1581
RHSA-2021:1968
SMASH Issue 260002
UBUNTU:CVE-2020-13434
USN-4394-1
bnc#1172115
bnc#1187849
rh#1841223
CVE-2020-13435sqlite3:Releasedimportant7.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-13434
CONFIRM:support.apple.com:CVE-2019-14899
CONFIRM:support.apple.com:CVE-2020-13434
CONFIRM:support.apple.com:CVE-2020-9773
CVE-2020-13435
FEDORA:FEDORA-2020-0477f8840e
FREEBSD:FreeBSD-SA-20:22
FULLDISC:20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0
FULLDISC:20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0
FULLDISC:20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0
FULLDISC:20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
GLSA-202007-26
MISC:www.oracle.com:CVE-2015-7501
MISC:www.oracle.com:CVE-2021-3450
MISC:www.sqlite.org:CVE-2020-13435
RH:CVE-2020-13435
RHSA-2021:4396
SMASH Issue 260003
SMASH Issue 260079
UBUNTU:CVE-2020-13435
USN-4394-1
bnc#1172091
rh#1841231
CVE-2020-13529systemd:Not affectedmoderate6.1 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-13529
CVE-2020-13529
D:CVE-2020-13529
FEDORA:FEDORA-2021-166e461c8d
GLSA-202107-48
MISC:github.com:MLIST:[oss-security] 20210907 Re: Pop!_OS Membership to linux-distros list
MISC:talosintelligence.com:CVE-2020-13529
MLIST:[oss-security] 20210804 Re: Pop!_OS Membership to linux-distros list
MLIST:[oss-security] 20210817 Re: Pop!_OS Membership to linux-distros list
MLIST:[oss-security] 20210907 Re: Pop!_OS Membership to linux-distros list
OSS:2021/Q3/67
RHSA-2021:4361
SMASH Issue 283925
bnc#1185972
rh#1959397
CVE-2020-13630sqlite3:Releasedmoderate5.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2020-13630
CONFIRM:support.apple.com:CVE-2019-14899
CONFIRM:support.apple.com:CVE-2020-13434
CONFIRM:support.apple.com:CVE-2020-9773
CVE-2020-13630
FEDORA:FEDORA-2020-0477f8840e
FREEBSD:FreeBSD-SA-20:22
FULLDISC:20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0
FULLDISC:20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0
FULLDISC:20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0
FULLDISC:20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
GLSA-202007-26
MISC:bugs.chromium.org:CVE-2020-13630
MISC:sqlite.org:CVE-2020-13630
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2015-7501
MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
Oracle:CVE-2020-13631
RH:CVE-2020-13630
RHSA-2020:4442
RHSA-2021:1968
SMASH Issue 260164
UBUNTU:CVE-2020-13630
USN-4394-1
bnc#1172234
rh#1841562
CVE-2020-13631sqlite3:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2020-13630
CONFIRM:support.apple.com:CVE-2019-14899
CONFIRM:support.apple.com:CVE-2020-13434
CONFIRM:support.apple.com:CVE-2020-9773
CVE-2020-13631
FEDORA:FEDORA-2020-0477f8840e
FREEBSD:FreeBSD-SA-20:22
FULLDISC:20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0
FULLDISC:20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0
FULLDISC:20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0
FULLDISC:20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
GLSA-202007-26
MISC:bugs.chromium.org:CVE-2020-13630
MISC:sqlite.org:CVE-2020-13631
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2015-7501
MLIST:[guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans.
Oracle:CVE-2020-13631
RH:CVE-2020-13631
RHSA-2020:4442
RHSA-2021:1968
SMASH Issue 260165
UBUNTU:CVE-2020-13631
USN-4394-1
bnc#1172236
rh#1841562
rh#1841568
CVE-2020-13632sqlite3:Releasedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2020-13630
CVE-2020-13632
FEDORA:FEDORA-2020-0477f8840e
FREEBSD:FreeBSD-SA-20:22
GLSA-202007-26
MISC:bugs.chromium.org:CVE-2020-13630
MISC:sqlite.org:CVE-2020-13632
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2015-7501
MLIST:[debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
Oracle:CVE-2020-13631
RH:CVE-2020-13632
RHSA-2020:4442
RHSA-2021:1968
SMASH Issue 260166
UBUNTU:CVE-2020-13632
USN-4394-1
bnc#1172240
rh#1841562
rh#1841574
CVE-2020-13777gnutls:Releasedimportant7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)CONFIRM:gnutls.org:CVE-2020-13777
CONFIRM:security.netapp.com:CVE-2020-13777
CVE-2020-13777
DSA-4697
FEDORA:FEDORA-2020-0cce3578e2
FEDORA:FEDORA-2020-4f78f122a3
FEDORA:FEDORA-2020-76b705bb63
FEDORA:FEDORA-2020-ea11cb5ccc
GLSA-202006-01
RH:CVE-2020-13777
RHSA-2020:2637
RHSA-2020:2638
RHSA-2020:2639
SMASH Issue 260689
SUSE:openSUSE-SU-2020:0790
UBUNTU:CVE-2020-13777
USN-4384-1
bdo#962289
bnc#1172506
https://www.debian.org/security/2020/dsa-4697
rh#1843723
CVE-2020-13844gcc:Released, gcc7:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CONFIRM:developer.arm.com:CVE-2017-5754
CONFIRM:developer.arm.com:CVE-2020-13844
CONFIRM:gcc.gnu.org:CVE-2020-13844
CONFIRM:lists.llvm.org:CVE-2020-13844
CVE-2020-13844
MISC:developer.arm.com:CVE-2020-13844
RH:CVE-2020-13844
SMASH Issue 260950
SUSE:openSUSE-SU-2020:1692
SUSE:openSUSE-SU-2020:1693
UBUNTU:CVE-2020-13844
bnc#1172798
bnc#1172875
rh#1848279
CVE-2020-13974kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-13974
L3:64868
MISC:git.kernel.org:CVE-2020-13974
MISC:lkml.org:CVE-2020-13974
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package
OSS:2020/04/30/5
OSS:2020/06/18/1
OSS:2020/07/28/2
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 260964
SUSE:openSUSE-SU-2020:0935
SUSE:openSUSE-SU-2020:1153
UBUNTU:CVE-2020-13974
USN-4427-1
USN-4439-1
USN-4440-1
USN-4483-1
USN-4485-1
bnc#1172775
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1831849
rh#1832397
rh#1832860
rh#1839634
rh#1847832
rh#1849926
rh#1865751
rh#2016169
CVE-2020-14145openssh:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2020-14145
CVE-2020-14145
GLSA-202105-35
L3:58527
MISC:anongit.mindrot.org:MLIST:[oss-security] 20201202 Some mitigation for openssh CVE-2020-14145
MISC:docs.ssh-mitm.at:CVE-2020-14145
MISC:github.com:CVE-2020-14145
MISC:www.fzi.de:CVE-2020-14002
MLIST:[oss-security] 20201202 Some mitigation for openssh CVE-2020-14145
OSS:2020/05/27/1
OSS:2020/Q4/178
RH:CVE-2020-14145
RHSA-2021:4368
SMASH Issue 262543
UBUNTU:CVE-2020-14145
bnc#1173513
bnc#1177569
rh#1852930
rh#1860487
CVE-2020-14155pcre:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:about.gitlab.com:CVE-2020-14155
CONFIRM:security.netapp.com:CVE-2020-14155
CONFIRM:support.apple.com:CVE-2019-14899
CONFIRM:support.apple.com:CVE-2019-20838
CONFIRM:www.pcre.org:CVE-2015-2325
CVE-2020-14155
FULLDISC:20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
FULLDISC:20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave
L3:58310
L3:58341
MISC:bugs.gentoo.org:CVE-2019-20838
MISC:lists.apache.org:/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
MISC:www.oracle.com:CVE-2022-21498
MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
Oracle:CVE-2020-14155
RH:CVE-2020-14155
RHSA-2021:4373
RHSA-2021:4613
RHSA-2021:4614
SMASH Issue 261553
UBUNTU:CVE-2020-14155
bnc#1172974
bnc#1176477
bnc#1176602
jsc#CAR-656
rh#1848436
CVE-2020-14304kernel-source-rt:Ignorelow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N)CONFIRM:bugzilla.redhat.com:CVE-2020-14304
CVE-2020-14304
RH:CVE-2020-14304
SMASH Issue 262238
UBUNTU:CVE-2020-14304
bdo#960702
bnc#1173327
rh#1847539
CVE-2020-14305kernel-source-rt:Not affectedmoderate4.3 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)CONFIRM:security.netapp.com:CVE-2020-14305
CVE-2020-14305
MISC:bugs.openvz.org:CVE-2020-14305
MISC:patchwork.ozlabs.org:CVE-2020-14305
RH:CVE-2020-14305
RHSA-2020:4060
RHSA-2020:4062
SMASH Issue 262272
UBUNTU:CVE-2020-14305
bnc#1173346
rh#1850716
CVE-2020-14314kernel-source-rt:Releasedlow2.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)CONFIRM:bugzilla.redhat.com:CVE-2020-14314
CVE-2020-14314
MISC:git.kernel.org:CVE-2020-14314
MISC:lore.kernel.org:CVE-2020-14314
MISC:www.starwindsoftware.com:CVE-2020-14314
MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
RH:CVE-2020-14314
RHSA-2020:5437
RHSA-2020:5441
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 262901
UBUNTU:CVE-2020-14314
USN-4576-1
USN-4578-1
USN-4579-1
bnc#1173798
rh#1853922
CVE-2020-14331kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2020-14331
MISC:lists.openwall.net:CVE-2020-14331
MISC:www.openwall.com:CVE-2020-14331
MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
OSS:2020/06/18/1
OSS:2020/07/28/2
OSS:2020/Q3/61
RH:CVE-2020-14331
RHSA-2020:4286
RHSA-2020:4289
RHSA-2020:5023
RHSA-2020:5026
SMASH Issue 263842
SMASH Issue 263843
UBUNTU:CVE-2020-14331
bnc#1174205
bnc#1174247
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:ebfdfeeae8c01fcb2b3b74ffaf03876e20835d2d
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1832397
rh#1847832
rh#1849926
rh#1858679
rh#1865751
CVE-2020-14343python-PyYAML:Releasedimportant8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2020-14343
L3:63616
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
Oracle:CVE-2020-14343
RH:CVE-2020-14343
RHSA-2021:2583
RHSA-2021:4702
SMASH Issue 264211
UBUNTU:CVE-2020-14343
bnc#1174514
bnc#1201021
https://github.com/SeldonIO/seldon-core/issues/2252
https://github.com/yaml/pyyaml/issues/420
rh#1860466
CVE-2020-14351kernel-source-rt:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2020-14351
MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
RH:CVE-2020-14351
RHSA-2021:0537
RHSA-2021:0558
RHSA-2021:0686
RHSA-2021:0765
RHSA-2021:0774
RHSA-2021:0848
RHSA-2021:0856
RHSA-2021:0857
RHSA-2021:0878
RHSA-2021:1028
RHSA-2021:1267
SMASH Issue 268404
UBUNTU:CVE-2020-14351
bnc#1177086
rh#1862849
CVE-2020-14356kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-14356
CVE-2020-14356
MISC:bugzilla.kernel.org:CVE-2020-14356
MISC:lore.kernel.org:CVE-2020-14356
MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
RH:CVE-2020-14356
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 265138
SUSE:openSUSE-SU-2020:1236
SUSE:openSUSE-SU-2020:1325
UBUNTU:CVE-2020-14356
USN-4483-1
USN-4484-1
USN-4526-1
bnc#1175213
rh#1868453
rh#1877920
CVE-2020-14381kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2020-14381
MISC:git.kernel.org:CVE-2020-14381
RH:CVE-2020-14381
RHSA-2020:4431
RHSA-2020:4609
SMASH Issue 266398
UBUNTU:CVE-2020-14381
bnc#1176011
bnc#1176012
rh#1874311
CVE-2020-14385kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:bugzilla.redhat.com:CVE-2020-14385
CVE-2020-14385
MISC:git.kernel.org:CVE-2020-14385
MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
RH:CVE-2020-14385
RHSA-2020:4286
RHSA-2020:4287
RHSA-2020:4289
RHSA-2020:4331
RHSA-2020:4332
RHSA-2020:5050
RHSA-2020:5199
RHSA-2020:5437
RHSA-2020:5441
SMASH Issue 266667
SUSE:openSUSE-SU-2020:1586
UBUNTU:CVE-2020-14385
USN-4576-1
bnc#1176137
rh#1874800
CVE-2020-14386kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:bugzilla.redhat.com:CVE-2020-14386
CVE-2020-14386
FEDORA:FEDORA-2020-468121099e
MISC:git.kernel.org:CVE-2020-14386
MISC:packetstormsecurity.com:CVE-2020-14386
MISC:seclists.org:CVE-2020-14386
MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
OSS:2020/Q3/146
OSS:2021/09/17/2
OSS:2021/09/17/4
OSS:2021/09/21/1
OSS:2021/Q3/176
RH:CVE-2020-14386
RHSA-2020:4286
RHSA-2020:4287
RHSA-2020:4289
RHSA-2020:4331
RHSA-2020:4332
RHSA-2020:5199
SMASH Issue 266581
SMASH Issue 266669
SUSE:openSUSE-SU-2020:1655
UBUNTU:CVE-2020-14386
bnc#1176069
linux.git:commit:acf69c946233259ab4d64f8869d4037a198c7f06
rh#1875699
CVE-2020-14390kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2020-14390
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-14390
MISC:seclists.org:CVE-2020-14390
MISC:www.openwall.com:CVE-2020-14390
MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
OSS:2020/Q3/174
RH:CVE-2020-14390
SMASH Issue 266807
SUSE:openSUSE-SU-2020:1586
SUSE:openSUSE-SU-2020:1655
UBUNTU:CVE-2020-14390
bnc#1176235
bnc#1176253
rh#1876788
CVE-2020-14416kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2020-14416
L3:64868
MISC:cdn.kernel.org:CVE-2020-14416
MISC:git.kernel.org:CVE-2020-14416
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/06/18/1
OSS:2020/07/28/2
RH:CVE-2020-14416
SMASH Issue 261786
SUSE:openSUSE-SU-2020:0935
SUSE:openSUSE-SU-2020:1153
UBUNTU:CVE-2020-14416
bnc#1162002
bnc#1173105
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1831726
rh#1831849
rh#1832397
rh#1832860
rh#1839634
rh#1842525
rh#1847832
rh#1849926
rh#1865751
CVE-2020-14422python3:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-14422
CVE-2020-14422
FEDORA:FEDORA-2020-1ddd5273d6
FEDORA:FEDORA-2020-705c6ea5be
FEDORA:FEDORA-2020-87c0a0a52d
FEDORA:FEDORA-2020-982b2950db
FEDORA:FEDORA-2020-b513391ca8
FEDORA:FEDORA-2020-bb919e575e
FEDORA:FEDORA-2020-c3b07cc5c9
FEDORA:FEDORA-2020-c539babb0a
FEDORA:FEDORA-2020-d30881c970
FEDORA:FEDORA-2020-d808fdd597
FEDORA:FEDORA-2020-dfb11916cc
FEDORA:FEDORA-2020-efb908b6a8
GLSA-202008-01
MISC:bugs.python.org:CVE-2020-14422
MISC:github.com:CVE-2020-14422
MISC:www.oracle.com:CVE-2012-2098
MLIST:[debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
RH:CVE-2020-14422
RHSA-2020:4285
RHSA-2020:4299
RHSA-2020:4433
RHSA-2020:4641
RHSA-2020:5010
SMASH Issue 261807
SUSE:openSUSE-SU-2020:0931
SUSE:openSUSE-SU-2020:0940
SUSE:openSUSE-SU-2020:0989
SUSE:openSUSE-SU-2020:1002
UBUNTU:CVE-2020-14422
USN-4428-1
bnc#1173274
https://lists.debian.org/debian-lts-announce/2023/05/msg00016.html
rh#1854926
rh#1856481
CVE-2020-14871openssh:Not affectedcritical ()CVE-2020-14871
MISC:packetstormsecurity.com:CVE-2020-14871
MISC:www.oracle.com:CVE-2013-7285
MLIST:[oss-security] 20210302 Announce: OpenSSH 8.5 released
OSS:2021/Q1/190
Oracle:CVE-2020-14871
SMASH Issue 269926
bnc#1183542
CVE-2020-15358sqlite3:Releasedmoderate6.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2020-15358
CONFIRM:support.apple.com:CVE-2019-14899
CONFIRM:support.apple.com:CVE-2019-20838
CONFIRM:support.apple.com:CVE-2020-13434
CONFIRM:support.apple.com:CVE-2020-15358
CONFIRM:support.apple.com:CVE-2020-9773
CVE-2020-15358
FULLDISC:20201115 APPLE-SA-2020-11-13-3 Additional information for APPLE-SA-2020-09-16-1 iOS 14.0 and iPadOS 14.0
FULLDISC:20201115 APPLE-SA-2020-11-13-4 Additional information for APPLE-SA-2020-09-16-2 tvOS 14.0
FULLDISC:20201115 APPLE-SA-2020-11-13-6 Additional information for APPLE-SA-2020-09-16-4 watchOS 7.0
FULLDISC:20201215 APPLE-SA-2020-12-14-4 Additional information for APPLE-SA-2020-11-13-1 macOS Big Sur 11.0.1
FULLDISC:20210201 APPLE-SA-2021-02-01-1 macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave
GLSA-202007-26
L3:60104
MISC:www.oracle.com:CVE-2012-2098
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2022-21498
MISC:www.sqlite.org:CVE-2020-15358
RH:CVE-2020-15358
RHSA-2021:1581
SMASH Issue 262458
SMASH Issue 301422
UBUNTU:CVE-2020-15358
USN-4438-1
bnc#1173641
bnc#1183309
rh#1851957
CVE-2020-15393kernel-source-rt:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2020-15393
MISC:git.kernel.org:CVE-2020-15393
MISC:lkml.org:CVE-2020-15393
MLIST:[debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
OSS:2020/04/30/5
OSS:2020/06/18/1
OSS:2020/07/28/2
RH:CVE-2020-15393
SMASH Issue 262568
SUSE:openSUSE-SU-2020:1062
SUSE:openSUSE-SU-2020:1153
UBUNTU:CVE-2020-15393
USN-4463-1
USN-4465-1
USN-4483-1
USN-4485-1
bnc#1173514
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1832397
rh#1832860
rh#1839634
rh#1847832
rh#1849926
rh#1852584
rh#1865751
CVE-2020-15436kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-15436
CVE-2020-15436
MISC:lkml.org:CVE-2020-15436
RH:CVE-2020-15436
RHSA-2021:0336
RHSA-2021:0338
RHSA-2021:0354
RHSA-2021:1376
RHSA-2021:2523
SMASH Issue 272188
bnc#1179141
rh#1901168
CVE-2020-15437kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2020-15437
MISC:lkml.org:CVE-2020-15437
RH:CVE-2020-15437
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 272189
bnc#1179140
rh#1901161
CVE-2020-15780kernel-source-rt:Releasedimportant7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N)CVE-2020-15780
MISC:cdn.kernel.org:CVE-2020-15780
MISC:cve.mitre.org:MLIST:[oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar
MISC:git.kernel.org:CVE-2020-15780
MISC:git.zx2c4.com:CVE-2020-15780
MISC:www.openwall.com:MLIST:[oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar
MLIST:[oss-security] 20200720 Re: Re: lockdown bypass on mainline kernel for loading unsigned modules
MLIST:[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
MLIST:[oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar
MLIST:[oss-security] 20200730 UEFI SecureBoot bypass fixes rolled out to kernels below radar
OSS:2020/04/30/5
OSS:2020/06/18/1
OSS:2020/07/28/2
OSS:2020/Q3/42
OSS:2020/Q3/65
OSS:2020/Q3/67
RH:CVE-2020-15780
RHSA-2020:3218
RHSA-2020:3219
RHSA-2020:3222
RHSA-2020:3228
SMASH Issue 262663
SMASH Issue 263830
SUSE:openSUSE-SU-2020:1153
SUSE:openSUSE-SU-2020:1236
UBUNTU:CVE-2020-15780
USN-4425-1
USN-4426-1
USN-4439-1
USN-4440-1
bnc#1173573
bnc#1174186
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1832397
rh#1832860
rh#1839634
rh#1847832
rh#1849926
rh#1852962
rh#1857894
rh#1865751
CVE-2020-15888lua53:Not affectedimportant7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)CVE-2020-15888
MISC:github.com:CVE-2020-15888
MISC:lua-users.org:CVE-2020-15888
RH:CVE-2020-15888
SMASH Issue 264073
UBUNTU:CVE-2020-15888
bnc#1174367
rh#1860310
CVE-2020-16119kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:lore.kernel.org:CVE-2020-16119
CONFIRM:security.netapp.com:CVE-2020-16119
CVE-2020-16119
OSS:2020/Q4/59
RH:CVE-2020-16119
SMASH Issue 268976
SMASH Issue 268977
UBUNTU:CVE-2020-16119
bdo#993948
bdo#993978
bnc#1177471
git.launchpad.net:CVE-2020-16119
launchpad.net:CVE-2020-16119
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
rh#1886374
ubuntu.com:CVE-2020-16119
CVE-2020-16120kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:git.kernel.org:CVE-2020-16120
CONFIRM:www.openwall.com:CVE-2020-16120
CVE-2020-16120
MISC:bugs.debian.org:CONFIRM:www.openwall.com:CVE-2020-16120
OSS:2020/Q4/58
RH:CVE-2020-16120
SMASH Issue 268974
SMASH Issue 268975
UBUNTU:CVE-2020-16120
bnc#1177470
launchpad.net:CVE-2020-16120
rh#1886387
ubuntu.com:CVE-2020-16119
CVE-2020-16155perl:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2020-16155
MISC:blog.hackeriet.no:CVE-2020-16156
MISC:metacpan.org:CVE-2020-16155
SMASH Issue 317301
bnc#1193811
CVE-2020-16156perl:Won't fiximportant8.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N)CVE-2020-16156
FEDORA:FEDORA-2022-21e8372c42
FEDORA:FEDORA-2022-84fd87f7eb
L3:63619
MISC:blog.hackeriet.no:CVE-2020-16156
MISC:blogs.perl.org:CVE-2020-16156
MISC:metacpan.org:CVE-2020-16156
Oracle:CVE-2020-16156
SMASH Issue 317300
bnc#1193771
bnc#1201023
jsc#CAR-1756
rh#2035273
CVE-2020-16166kernel-source-rt:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2020-16166
CVE-2020-16166
FEDORA:FEDORA-2020-2cd6393548
FEDORA:FEDORA-2020-8d634e31c0
MISC:arxiv.org:CVE-2020-16166
MISC:git.kernel.org:CVE-2020-16166
MISC:github.com:CVE-2020-16166
MISC:www.oracle.com:CVE-2021-3450
MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
OSS:2020/06/18/1
OSS:2020/07/28/2
RH:CVE-2020-16166
RHSA-2020:4279
RHSA-2020:5418
RHSA-2020:5428
RHSA-2020:5473
RHSA-2020:5506
RHSA-2021:0184
SMASH Issue 264603
SUSE:openSUSE-SU-2020:1153
SUSE:openSUSE-SU-2020:1236
UBUNTU:CVE-2020-16166
USN-4525-1
USN-4526-1
bnc#1174757
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1708775
rh#1832397
rh#1847832
rh#1849926
rh#1865751
CVE-2020-16590binutils:Not affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2020-16590
CVE-2020-16590
MISC:sourceware.org:CVE-2020-16590
RH:CVE-2020-16590
SMASH Issue 273028
bnc#1179898
jsc#CAR-1440
rh#1906782
CVE-2020-16591binutils:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-16590
CVE-2020-16591
MISC:sourceware.org:CVE-2020-16591
RH:CVE-2020-16591
SMASH Issue 273029
bnc#1179899
jsc#CAR-1441
rh#1906771
CVE-2020-16592binutils:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-16590
CVE-2020-16592
FEDORA:FEDORA-2020-18ec0bf4bb
FEDORA:FEDORA-2020-f903e139b1
MISC:sourceware.org:CVE-2020-16592
RH:CVE-2020-16592
SMASH Issue 273030
bnc#1179900
jsc#CAR-1442
rh#1906777
CVE-2020-16593binutils:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-16593
CVE-2020-16593
MISC:sourceware.org:CVE-2020-16593
RH:CVE-2020-16593
SMASH Issue 273031
bnc#1179901
jsc#CAR-1443
rh#1906772
CVE-2020-16598binutils:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2020-16598
MISC:sourceware.org:CVE-2020-16598
RH:CVE-2020-16598
SMASH Issue 273032
bnc#1179902
jsc#CAR-1444
rh#1906756
rh#1906772
CVE-2020-16599binutils:Already fixedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2020-16593
CVE-2020-16599
MISC:sourceware.org:CVE-2020-16599
RH:CVE-2020-16599
SMASH Issue 273033
bnc#1179903
jsc#CAR-1445
rh#1906762
rh#2150768
CVE-2020-1747python-PyYAML:Releasedimportant8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:bugzilla.redhat.com:CVE-2020-1747
CVE-2020-1747
FEDORA:FEDORA-2020-40c35d7b37
FEDORA:FEDORA-2020-bdb0bfa928
FEDORA:FEDORA-2020-e9741a6a15
FEDORA:FEDORA-2021-3342569a0f
FEDORA:FEDORA-2021-eed7193502
MISC:github.com:CVE-2020-1747
MISC:www.oracle.com:CVE-2022-21586
Oracle:CVE-2020-14343
RH:CVE-2020-1747
RHSA-2020:4641
SMASH Issue 254019
SUSE:openSUSE-SU-2020:0507
SUSE:openSUSE-SU-2020:0630
UBUNTU:CVE-2020-1747
bnc#1165439
rh#1807367
rh#1860466
CVE-2020-1749kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:bugzilla.redhat.com:CVE-2020-1749
CVE-2020-1749
L3:61406
OSS:2020/06/04/4
RH:CVE-2020-1749
RHSA-2020:1567
RHSA-2020:1769
RHSA-2020:4060
RHSA-2020:4062
RHSA-2021:0354
SMASH Issue 254158
UBUNTU:CVE-2020-1749
bnc#1165629
bnc#1165631
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1809833
rh#1842525
CVE-2020-1752glibc:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:bugzilla.redhat.com:CVE-2020-1752
CONFIRM:security.netapp.com:CVE-2020-1752
CONFIRM:sourceware.org:CVE-2020-1752
CVE-2020-1752
GLSA-202101-20
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
RH:CVE-2020-1752
RHSA-2020:4444
SMASH Issue 254346
UBUNTU:CVE-2020-1752
USN-4416-1
bnc#1167631
rh#1810670
rh#1810718
CVE-2020-19185ncurses:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2020-19185
SMASH Issue 375945
bnc#1214489
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc1.md
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
jsc#CAR-2823
rh#2234924
CVE-2020-19186ncurses:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2020-19186
SMASH Issue 375946
bnc#1214490
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc2.md
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
jsc#CAR-2826
rh#2234908
CVE-2020-19187ncurses:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2020-19187
SMASH Issue 375947
bnc#1214491
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc3.md
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
jsc#CAR-2830
rh#2234911
CVE-2020-19188ncurses:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2020-19188
SMASH Issue 375948
bnc#1214492
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc4.md
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
jsc#CAR-2825
rh#2234913
CVE-2020-19189ncurses:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2020-19189
SMASH Issue 375949
bnc#1214493
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc5.md
https://lists.debian.org/debian-lts-announce/2023/09/msg00033.html
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
jsc#CAR-2824
rh#2234926
CVE-2020-19190ncurses:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2020-19190
SMASH Issue 375950
bnc#1214494
http://seclists.org/fulldisclosure/2023/Dec/10
http://seclists.org/fulldisclosure/2023/Dec/11
http://seclists.org/fulldisclosure/2023/Dec/9
https://github.com/zjuchenyuan/fuzzpoc/blob/master/infotocap_poc6.md
https://security.netapp.com/advisory/ntap-20231006-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214037
https://support.apple.com/kb/HT214038
jsc#CAR-2827
rh#2234923
CVE-2020-1967openssl-1_1:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:git.openssl.org:CVE-2020-1967
CONFIRM:kb.pulsesecure.net:CVE-2020-1967
CONFIRM:security.netapp.com:CVE-2020-14539
CONFIRM:security.netapp.com:CVE-2020-1967
CONFIRM:www.openssl.org:CVE-2020-1967
CONFIRM:www.synology.com:CVE-2020-1967
CONFIRM:www.tenable.com:CVE-2019-1551
CONFIRM:www.tenable.com:CVE-2020-1967
CONFIRM:www.tenable.com:CVE-2021-3449
CVE-2020-1967
DSA-4661
FEDORA:FEDORA-2020-d7b29838f6
FEDORA:FEDORA-2020-da2d1ef2d7
FEDORA:FEDORA-2020-fcc91a28e8
FREEBSD:FreeBSD-SA-20:11
FULLDISC:20200501 CVE-2020-1967: proving sigalg != NULL
GLSA-202004-10
MISC:github.com:CVE-2020-1967
MISC:packetstormsecurity.com:CVE-2020-1967
MISC:www.oracle.com:CVE-2012-2098
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2015-7501
MISC:www.oracle.com:CVE-2021-3450
MLIST:[oss-security] 20200422 [CVE-2020-1967] OpenSSL 1.1.1d+ Segmentation fault in SSL_check_chain
MLIST:[tomcat-dev] 20200422 Re: Time for Tomcat Native 1.2.24?
MLIST:[tomcat-dev] 20200422 Time for Tomcat Native 1.2.24?
MLIST:[tomcat-dev] 20200423 Re: Time for Tomcat Native 1.2.24?
OSS:2020/Q2/53
Oracle:CVE-2020-1967
RH:CVE-2020-1967
SMASH Issue 257025
SMASH Issue 257026
SUSE:openSUSE-SU-2020:0933
SUSE:openSUSE-SU-2020:0945
UBUNTU:CVE-2020-1967
bnc#1169407
openssl.git:commit:3656c08ab4b1b892730cb5e808b6f4298b08a2e6
openssl.git:commit:a87f3fe01a5a894aa27ccd6a239155fd129988e4
rh#1823670
CVE-2020-1968openssl-1_1:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2020-1968
CONFIRM:www.openssl.org:CVE-2020-1968
CVE-2020-1968
GLSA-202210-02
MISC:www.oracle.com:CVE-2012-2098
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21498
MLIST:[debian-lts-announce] 20200925 [SECURITY] [DLA 2378-1] openssl1.0 security update
N/A:N/A
Oracle:CVE-2020-1968
RH:CVE-2020-1968
SMASH Issue 266935
UBUNTU:CVE-2020-1968
USN-4504-1
bnc#1176331
rh#1877458
CVE-2020-1971openssl:Released, openssl-1_1:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:git.openssl.org:CVE-2020-1971
CONFIRM:kb.pulsesecure.net:CVE-2020-1971
CONFIRM:security.netapp.com:CVE-2020-1971
CONFIRM:security.netapp.com:CVE-2021-2154
CONFIRM:www.openssl.org:CVE-2020-1971
CONFIRM:www.tenable.com:CVE-2019-1551
CONFIRM:www.tenable.com:CVE-2021-23841
CONFIRM:www.tenable.com:CVE-2021-3449
CVE-2020-1971
DSA-4807
FEDORA:FEDORA-2020-a31b01e945
FEDORA:FEDORA-2020-ef1870065a
FREEBSD:FreeBSD-SA-20:33
GLSA-202012-13
MISC:bugs.ghostscript.com:OSS:2021/Q3/165
MISC:www.oracle.com:CVE-2012-2098
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21498
MLIST:[debian-lts-announce] 20201214 [SECURITY] [DLA 2492-1] openssl security update
MLIST:[debian-lts-announce] 20201214 [SECURITY] [DLA 2493-1] openssl1.0 security update
MLIST:[pulsar-commits] 20201216 [GitHub] [pulsar] phijohns-tibco opened a new issue #8978: OpenSSL needs to be updated to 1.1.1i current version is unsupported.
MLIST:[tomcat-dev] 20210207 [Bug 65126] New: A security vulnerability cve-2020-1971 in Tomcat dependency Library in version 9.0.40.
N/A:N/A
OSS:2021/09/14/2
OSS:2021/Q3/165
Oracle:CVE-2020-1971
RH:CVE-2020-1971
RHSA-2020:5422
RHSA-2020:5476
RHSA-2020:5566
RHSA-2020:5588
RHSA-2020:5623
RHSA-2020:5637
RHSA-2020:5639
RHSA-2020:5640
RHSA-2020:5641
RHSA-2020:5642
RHSA-2021:0056
RHSA-2021:0486
RHSA-2021:0488
RHSA-2021:0489
RHSA-2021:0491
RHSA-2021:0494
RHSA-2021:0495
SMASH Issue 272598
bnc#1179491
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2154ab83e14ede338d2ede9bbe5cdfce5d5a6c9e
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f960d81215ebf3f65e03d4d5d857fb9b666d6920
https://lists.apache.org/thread.html/r63c6f2dd363d9b514d0a4bcf624580616a679898cc14c109a49b750c%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rbb769f771711fb274e0a4acb1b5911c8aab544a6ac5e8c12d40c5143%40%3Ccommits.pulsar.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DGSI34Y5LQ5RYXN4M2I5ZQT65LFVDOUU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PWPSSZNZOBJU2YR6Z4TGHXKYW3YP5QG7/
https://security.netapp.com/advisory/ntap-20240621-0006/
openssl.git:commit:b33c48b75aaf33c93aeda42d7138616b9e6a64cb
rh#1903409
CVE-2020-19909curl:Won't fixlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2020-19909
SMASH Issue 375955
bnc#1214495
https://daniel.haxx.se/blog/2023/08/26/cve-2020-19909-is-everything-that-is-wrong-with-cves/
https://github.com/curl/curl/pull/4166
CVE-2020-21047elfutils:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2020-21047
L3:67082
SMASH Issue 375958
bnc#1214589
bnc#1216981
https://lists.debian.org/debian-lts-announce/2023/09/msg00026.html
https://sourceware.org/bugzilla/show_bug.cgi?id=25068
https://sourceware.org/git/?p=elfutils.git;a=commitdiff;h=99dc63b10b3878616b85df2dfd2e4e7103e414b8
jsc#CAR-2831
rh#2223918
CVE-2020-21583util-linux:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2020-21583
SMASH Issue 375965
bdo#786804
bnc#1214593
https://packetstormsecurity.com/files/132061/hwclock-Privilege-Escalation.html
rh#2238716
CVE-2020-21913icu:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2020-21913
D:CVE-2020-21913
DSA-5014
MISC:github.com:CVE-2020-21913
MISC:unicode-org.atlassian.net:CVE-2020-21913
SMASH Issue 310436
bnc#1193951
jsc#CAR-1349
rh#2006950
CVE-2020-22916xz:Analysislow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2020-22916
SMASH Issue 375984
bnc#1214590
http://web.archive.org/web/20230918084612/https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability
https://github.com/snappyJack/CVE-request-XZ-5.2.5-has-denial-of-service-vulnerability
https://github.com/tukaani-project/xz/issues/61
https://security-tracker.debian.org/tracker/CVE-2020-22916
https://tukaani.org/xz/
rh#2234987
CVE-2020-24370lua53:Releasedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2020-24370
FEDORA:FEDORA-2020-c83556709c
FEDORA:FEDORA-2020-d7ed9f18ff
MISC:github.com:CVE-2020-24370
MISC:lua-users.org:CVE-2020-24370
MLIST:[debian-lts-announce] 20200926 [SECURITY] [DLA 2381-1] lua5.3 security update
RH:CVE-2020-24370
RHSA-2021:4510
SMASH Issue 265441
UBUNTU:CVE-2020-24370
bnc#1175448
https://lists.debian.org/debian-lts-announce/2023/06/msg00031.html
rh#1870290
CVE-2020-24371lua53:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-24371
MISC:github.com:CVE-2020-24371
MISC:www.lua.org:CVE-2020-24371
RH:CVE-2020-24371
SMASH Issue 265442
UBUNTU:CVE-2020-24371
bnc#1175449
rh#1870294
CVE-2020-24394kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-24394
CVE-2020-24394
MISC:cdn.kernel.org:CVE-2020-24394
MISC:git.kernel.org:CVE-2020-24394
MISC:www.oracle.com:CVE-2021-3450
MISC:www.starwindsoftware.com:CVE-2020-24394
RH:CVE-2020-24394
RHSA-2020:5437
RHSA-2020:5441
RHSA-2021:0526
RHSA-2021:0760
RHSA-2021:0878
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 265662
SUSE:openSUSE-SU-2020:1325
UBUNTU:CVE-2020-24394
USN-4465-1
USN-4483-1
USN-4485-1
bdo#962254
bnc#1175518
bnc#1175992
rh#1869141
CVE-2020-24490kernel-source-rt:Releasedimportant8.8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:www.intel.com:CVE-2020-24490
CVE-2020-24490
RH:CVE-2020-24490
RHSA-2020:4685
RHSA-2020:4686
SMASH Issue 269150
UBUNTU:CVE-2020-24490
bnc#1177726
bnc#1177727
bnc#1177728
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1888449
CVE-2020-24502kernel-source-rt:Not affectedlow3.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L)CVE-2020-24502
MISC:www.intel.com:CVE-2020-24502
RH:CVE-2020-24502
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 278166
bnc#1182409
rh#1930379
CVE-2020-24503kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2020-24503
MISC:www.intel.com:CVE-2020-24502
RH:CVE-2020-24503
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 278167
bnc#1182405
rh#1930381
CVE-2020-24504kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)CVE-2020-24504
MISC:www.intel.com:CVE-2020-24502
RH:CVE-2020-24504
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 278168
bnc#1182404
rh#1930376
CVE-2020-24586kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N)CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
CONFIRM:www.intel.com:CVE-2020-24587
CVE-2020-24586
CVE-2020-24587
MISC:github.com:CVE-2020-26147
MISC:www.arista.com:CVE-2020-26135
MISC:www.fragattacks.com:CVE-2020-26147
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com
OSS:2021/Q2/126
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 283857
SMASH Issue 283858
bnc#1185859
https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html
jsc#CAR-1025
linux.git:commit:3edc6b0d6c061a70d8ca3c3c72eb1f58ce29bfb1
linux.git:commit:94034c40ab4a3fcf581fbc7f8fdf4e29943c4a24
linux.git:commit:c3944a5621026c176001493d48ee66ff94e1a39a
rh#1959642
rh#1959654
CVE-2020-24587kernel-source-rt:Releasedmoderate4.2 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
CONFIRM:www.intel.com:CVE-2020-24587
CVE-2020-24586
CVE-2020-24587
MISC:github.com:CVE-2020-26147
MISC:www.arista.com:CVE-2020-26135
MISC:www.fragattacks.com:CVE-2020-26147
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com
OSS:2021/Q2/126
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 283856
SMASH Issue 283858
SMASH Issue 283863
bnc#1185859
bnc#1185862
https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html
jsc#CAR-1024
jsc#CAR-1025
linux.git:commit:3edc6b0d6c061a70d8ca3c3c72eb1f58ce29bfb1
linux.git:commit:94034c40ab4a3fcf581fbc7f8fdf4e29943c4a24
linux.git:commit:c3944a5621026c176001493d48ee66ff94e1a39a
rh#1959642
rh#1959654
CVE-2020-24588kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
CONFIRM:cert-portal.siemens.com:CVE-2020-26141
CONFIRM:www.intel.com:CVE-2020-24587
CVE-2020-24588
MISC:github.com:CVE-2020-26147
MISC:www.arista.com:CVE-2020-26135
MISC:www.fragattacks.com:CVE-2020-26147
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com
OSS:2021/Q2/126
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 283861
SMASH Issue 283862
bnc#1185861
https://lists.debian.org/debian-lts-announce/2023/04/msg00002.html
linux.git:commit:079a108feba474b4b32bd3471db03e11f2f83b81
linux.git:commit:270032a2a9c4535799736142e1e7c413ca7b836e
linux.git:commit:28131d896d6d316bc1f6f305d1a9ed6d96c3f2a1
linux.git:commit:2b8a1fee3488c602aca8bea004a087e60806a5cf
linux.git:commit:2c2bdd2372afcfcf24fe11c65ebe3361b7e1cd9f
linux.git:commit:5e7a2c6494813e58252caf342f5ddb166ad44d1a
linux.git:commit:734223d78428de3c7c7d7bc04daf258085780d90
linux.git:commit:d7333a8ec8ca88b106a2f9729b119cb09c7e41dc
rh#1959657
CVE-2020-24659gnutls:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-24659
CVE-2020-24659
FEDORA:FEDORA-2020-0ab6656303
FEDORA:FEDORA-2020-de51ee7cc9
GLSA-202009-01
MISC:gitlab.com:CVE-2020-24659
MISC:www.gnutls.org:CVE-2020-24659
RH:CVE-2020-24659
RHSA-2020:5483
SMASH Issue 266770
SUSE:openSUSE-SU-2020:1724
UBUNTU:CVE-2020-24659
USN-4491-1
bnc#1176181
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00060.html
rh#1872021
CVE-2020-24736sqlite3:Not affectedmoderate ()CVE-2020-24736
RHSA-2023:3840
SMASH Issue 363080
bnc#1210416
https://security.netapp.com/advisory/ntap-20230526-0005/
https://www.sqlite.org/src/info/4feb3159c6bc3f7e33959
rh#2186385
CVE-2020-24977libxml2:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CONFIRM:security.netapp.com:CVE-2020-24977
CVE-2020-24977
FEDORA:FEDORA-2020-20ab468a33
FEDORA:FEDORA-2020-35087800be
FEDORA:FEDORA-2020-7773c53bc8
FEDORA:FEDORA-2020-7dd29dacad
FEDORA:FEDORA-2020-935f62c3d9
FEDORA:FEDORA-2020-b60dbdd538
FEDORA:FEDORA-2020-b6aaf25741
FEDORA:FEDORA-2020-be489044df
FEDORA:FEDORA-2020-dd2fc19b78
FEDORA:FEDORA-2020-ff317550e4
GLSA-202107-05
MISC:gitlab.gnome.org:CVE-2020-24977
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
Oracle:CVE-2020-24977
RH:CVE-2020-24977
RHSA-2021:1597
SMASH Issue 266743
SUSE:openSUSE-SU-2020:1430
SUSE:openSUSE-SU-2020:1465
UBUNTU:CVE-2020-24977
bnc#1176179
rh#1877788
CVE-2020-25211kernel-source-rt:Releasedmoderate5.9 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)CONFIRM:security.netapp.com:CVE-2020-25211
CVE-2020-25211
DSA-4774
FEDORA:FEDORA-2020-3c6fedeb83
FEDORA:FEDORA-2020-5920a7a0b2
MISC:git.kernel.org:CVE-2020-25211
MISC:twitter.com:CVE-2020-25211
MLIST:[debian-lts-announce] 20201028 [SECURITY] [DLA 2417-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
RH:CVE-2020-25211
RHSA-2021:0003
RHSA-2021:0004
RHSA-2021:0184
RHSA-2021:0189
RHSA-2021:0763
RHSA-2021:0765
RHSA-2021:0774
RHSA-2021:0856
RHSA-2021:0857
RHSA-2021:1531
RHSA-2021:2164
RHSA-2021:2355
SMASH Issue 267015
UBUNTU:CVE-2020-25211
bdo#908712
bnc#1176395
rh#1877571
CVE-2020-25212kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2020-25212
L3:58429
MISC:cdn.kernel.org:CVE-2020-25212
MISC:git.kernel.org:CVE-2020-25212
MISC:twitter.com:CVE-2020-25212
MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
RH:CVE-2020-25212
RHSA-2020:4279
RHSA-2020:5437
RHSA-2020:5441
RHSA-2021:0526
RHSA-2021:0760
RHSA-2021:0878
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 267017
SUSE:openSUSE-SU-2020:1655
SUSE:openSUSE-SU-2020:1682
SUSE:openSUSE-SU-2020:1698
UBUNTU:CVE-2020-25212
USN-4525-1
USN-4527-1
USN-4578-1
bnc#1176381
bnc#1176382
bnc#1177027
rh#1877575
CVE-2020-25219libproxy:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-25219
DSA-4800
FEDORA:FEDORA-2020-2407cb0512
FEDORA:FEDORA-2020-7e1e9abf77
FEDORA:FEDORA-2020-f92d372cf1
MISC:github.com:CVE-2020-25219
MLIST:[debian-lts-announce] 20200912 [SECURITY] [DLA 2372-1] libproxy security update
RH:CVE-2020-25219
SMASH Issue 267057
SUSE:openSUSE-SU-2020:1676
SUSE:openSUSE-SU-2020:1680
UBUNTU:CVE-2020-25219
USN-4514-1
bdo#968366
bdo#971394
bnc#1176410
rh#1880349
CVE-2020-25221kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20201001-0003/
CVE-2020-25221
MISC:cdn.kernel.org:CVE-2020-25221
MISC:git.kernel.org:CVE-2020-25221
MISC:www.openwall.com:CVE-2020-25221
MLIST:[oss-security] 20200910 Re: CVE Request: Linux kernel vsyscall page refcounting error
OSS:2020/09/08/4
OSS:2020/Q3/170
RH:CVE-2020-25221
SMASH Issue 266849
UBUNTU:CVE-2020-25221
bnc#1176286
rh#1884341
CVE-2020-25284kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2020-25284
MISC:git.kernel.org:CVE-2020-25284
MISC:twitter.com:CVE-2020-25284
MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
RH:CVE-2020-25284
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 267311
SUSE:openSUSE-SU-2020:1586
SUSE:openSUSE-SU-2020:1655
UBUNTU:CVE-2020-25284
bnc#1176482
rh#1882594
CVE-2020-25285kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-25285
CVE-2020-25285
MISC:cdn.kernel.org:CVE-2020-25285
MISC:git.kernel.org:CVE-2020-25285
MISC:twitter.com:CVE-2020-25285
MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
RH:CVE-2020-25285
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 267312
UBUNTU:CVE-2020-25285
USN-4576-1
USN-4579-1
bnc#1176485
bnc#1176487
rh#1882591
CVE-2020-25639kernel-source-rt:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2020-25639
FEDORA:FEDORA-2021-1db4ab0a3d
FEDORA:FEDORA-2021-a2d3ad5dda
RH:CVE-2020-25639
SMASH Issue 268023
UBUNTU:CVE-2020-25639
bnc#1176846
rh#1876995
CVE-2020-25641kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2020-25641
MISC:git.kernel.org:OSS:2020/Q3/204
MISC:www.kernel.org:CVE-2020-25641
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
MLIST:[oss-security] 20201006 Re: CVE-2020-25641 kernel: soft lockup when submitting zero length bvecs.
OSS:2020/Q3/204
RH:CVE-2020-25641
RHSA-2020:4431
RHSA-2020:4609
RHSA-2020:5079
RHSA-2020:5374
RHSA-2021:0073
RHSA-2021:0136
SMASH Issue 268132
SUSE:openSUSE-SU-2020:1655
SUSE:openSUSE-SU-2020:1698
UBUNTU:CVE-2020-25641
USN-4576-1
bnc#1177121
rh#1881424
rh#1882201
CVE-2020-25643kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-25643
CVE-2020-25643
DSA-4774
MISC:git.kernel.org:CVE-2020-25643
MISC:www.starwindsoftware.com:CVE-2020-25643
MLIST:[debian-lts-announce] 20201028 [SECURITY] [DLA 2417-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
RH:CVE-2020-25643
RHSA-2020:5437
RHSA-2020:5441
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 268633
SUSE:openSUSE-SU-2020:1655
SUSE:openSUSE-SU-2020:1698
UBUNTU:CVE-2020-25643
bdo#908712
bnc#1177206
bnc#1177226
rh#1879981
CVE-2020-25645kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2020-25645
CVE-2020-25645
DSA-4774
MISC:packetstormsecurity.com:CVE-2020-0427
MLIST:[debian-lts-announce] 20201028 [SECURITY] [DLA 2417-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
RH:CVE-2020-25645
RHSA-2021:0856
RHSA-2021:0857
SMASH Issue 268997
SUSE:openSUSE-SU-2020:1682
SUSE:openSUSE-SU-2020:1698
UBUNTU:CVE-2020-25645
bdo#908712
bnc#1177511
bnc#1177513
rh#1883988
CVE-2020-25648mozilla-nss:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-25648
FEDORA:FEDORA-2020-a857113c7a
FEDORA:FEDORA-2020-bb91bf9b8e
FEDORA:FEDORA-2020-f29254bd5e
MISC:developer.mozilla.org:CVE-2020-25648
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21498
MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
N/A:N/A
Oracle:CVE-2020-25648
RH:CVE-2020-25648
RHBA-2021:2854
RHSA-2021:1384
RHSA-2021:3572
SMASH Issue 269713
UBUNTU:CVE-2020-25648
bnc#1177917
https://lists.debian.org/debian-lts-announce/2023/10/msg00039.html
rh#1887319
CVE-2020-25656kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2020-25656
MISC:lkml.org:CVE-2020-25656
MISC:www.starwindsoftware.com:CVE-2020-25656
MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
OSS:2020/Q4/63
RH:CVE-2020-25656
RHSA-2021:0856
RHSA-2021:0857
SMASH Issue 269168
SMASH Issue 269169
UBUNTU:CVE-2020-25656
bnc#1177766
linux.git:commit:82e61c3909db51d91b9d3e2071557b6435018b80
rh#1888726
CVE-2020-25659python-cryptography:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2020-25659
MISC:github.com:CVE-2020-25659
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
RH:CVE-2020-25659
RHSA-2021:1608
RHSA-2021:2239
RHSA-2021:3254
SMASH Issue 270230
UBUNTU:CVE-2020-25659
bnc#1178168
openssl.git:commit:7fc67e0a33102aa47bbaa56533eeecb98c0450f7
rh#1889988
rh#2254432
CVE-2020-25668kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-25668
CVE-2020-25668
MISC:bugzilla.redhat.com:CVE-2020-25668
MISC:git.kernel.org:CVE-2020-25668
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-25668
MISC:github.com:MISC:www.openwall.com:CVE-2020-25668
MISC:www.openwall.com:CVE-2020-25668
MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
MLIST:[oss-security] 20201030 CVE-2020-25668: Linux kernel concurrency use-after-free in vt
MLIST:[oss-security] 20201104 Re: CVE-2020-25668: Linux kernel concurrency use-after-free in vt
OSS:2020/10/30/1,
OSS:2020/11/04/3,
OSS:2020/Q4/84
RH:CVE-2020-25668
SMASH Issue 270218
SMASH Issue 270604
UBUNTU:CVE-2020-25668
bnc#1178123
bnc#1178421
bnc#1178622
rh#1893287
CVE-2020-25669kernel-source-rt:Releasedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-25669
CVE-2020-25669
MISC:github.com:MISC:www.openwall.com:CVE-2020-25669
MISC:www.openwall.com:CVE-2020-25669
MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
MLIST:[oss-security] 20201105 CVE-2020-25669: Linux Kernel use-after-free in sunkbd_reinit
MLIST:[oss-security] 20201120 Re: CVE-2020-25669: Linux Kernel use-after-free in sunkbd_reinit
OSS:2020/11/05/2,
OSS:2020/11/20/5,
OSS:2020/Q4/99
RH:CVE-2020-25669
SMASH Issue 270272
SMASH Issue 270273
UBUNTU:CVE-2020-25669
bnc#1178182
rh#1892176
CVE-2020-25670kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-25673
CVE-2020-25670
CVE-2020-25671
CVE-2020-25672
CVE-2020-25673
D:CVE-2020-25670
D:CVE-2020-25671
D:CVE-2020-25673
FEDORA:FEDORA-2021-1c170a7c7c
FEDORA:FEDORA-2021-21360476b6
FEDORA:FEDORA-2021-d56567bdab
MISC:git.kernel.org:MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets
MISC:lore.kernel.org:MISC:www.openwall.com:CVE-2020-25672
MISC:www.openwall.com:CVE-2020-25672
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[oss-security] 20201101 [CVE-2020-25670,CVE-2020-25671,CVE-2020-25672,CVE-2020-25673]Linux kernel: many bugs in nfc socket
MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets
OSS:2020/Q4/85
OSS:2021/Q2/118
RH:CVE-2020-25670
RH:CVE-2020-25671
RH:CVE-2020-25672
RH:CVE-2020-25673
SMASH Issue 270267
SMASH Issue 270271
UBUNTU:CVE-2020-25670
UBUNTU:CVE-2020-25671
UBUNTU:CVE-2020-25672
UBUNTU:CVE-2020-25673
bnc#1178181
bnc#1194680
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/
linux.git:commit:7574fcdbdcb335763b6b322f6928dc0fd5730451
linux.git:commit:8a4cd82d62b5ec7e5482333a72b58a4eea4979f0
linux.git:commit:c33b1cc62ac05c1dbb1cdafe2eb66da01c76ca8d
rh#1894550
rh#1894552
rh#1894556
rh#1894558
CVE-2020-25671kernel-source-rt:Releasedimportant5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-25673
CVE-2020-25670
CVE-2020-25671
CVE-2020-25672
CVE-2020-25673
D:CVE-2020-25670
D:CVE-2020-25671
D:CVE-2020-25673
FEDORA:FEDORA-2021-1c170a7c7c
FEDORA:FEDORA-2021-21360476b6
FEDORA:FEDORA-2021-d56567bdab
MISC:git.kernel.org:MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets
MISC:lore.kernel.org:MISC:www.openwall.com:CVE-2020-25672
MISC:www.openwall.com:CVE-2020-25672
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[oss-security] 20201101 [CVE-2020-25670,CVE-2020-25671,CVE-2020-25672,CVE-2020-25673]Linux kernel: many bugs in nfc socket
MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets
OSS:2020/Q4/85
OSS:2021/Q2/118
RH:CVE-2020-25670
RH:CVE-2020-25671
RH:CVE-2020-25672
RH:CVE-2020-25673
SMASH Issue 270268
SMASH Issue 270271
UBUNTU:CVE-2020-25670
UBUNTU:CVE-2020-25671
UBUNTU:CVE-2020-25672
UBUNTU:CVE-2020-25673
bnc#1178181
bnc#1194680
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/
linux.git:commit:7574fcdbdcb335763b6b322f6928dc0fd5730451
linux.git:commit:8a4cd82d62b5ec7e5482333a72b58a4eea4979f0
linux.git:commit:c33b1cc62ac05c1dbb1cdafe2eb66da01c76ca8d
rh#1894550
rh#1894552
rh#1894556
rh#1894558
CVE-2020-25672kernel-source-rt:Releasedimportant5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-25673
CVE-2020-25670
CVE-2020-25671
CVE-2020-25672
CVE-2020-25673
D:CVE-2020-25670
D:CVE-2020-25671
D:CVE-2020-25673
FEDORA:FEDORA-2021-1c170a7c7c
FEDORA:FEDORA-2021-21360476b6
FEDORA:FEDORA-2021-d56567bdab
MISC:git.kernel.org:MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets
MISC:lore.kernel.org:MISC:www.openwall.com:CVE-2020-25672
MISC:www.openwall.com:CVE-2020-25672
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[oss-security] 20201101 [CVE-2020-25670,CVE-2020-25671,CVE-2020-25672,CVE-2020-25673]Linux kernel: many bugs in nfc socket
MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets
OSS:2020/Q4/85
OSS:2021/Q2/118
RH:CVE-2020-25670
RH:CVE-2020-25671
RH:CVE-2020-25672
RH:CVE-2020-25673
SMASH Issue 270269
SMASH Issue 270271
UBUNTU:CVE-2020-25670
UBUNTU:CVE-2020-25671
UBUNTU:CVE-2020-25672
UBUNTU:CVE-2020-25673
bnc#1178181
bnc#1194680
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/
linux.git:commit:7574fcdbdcb335763b6b322f6928dc0fd5730451
linux.git:commit:8a4cd82d62b5ec7e5482333a72b58a4eea4979f0
linux.git:commit:c33b1cc62ac05c1dbb1cdafe2eb66da01c76ca8d
rh#1894550
rh#1894552
rh#1894556
rh#1894558
CVE-2020-25673kernel-source-rt:Releasedimportant6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-25673
CVE-2020-25670
CVE-2020-25671
CVE-2020-25672
CVE-2020-25673
D:CVE-2020-25670
D:CVE-2020-25671
D:CVE-2020-25673
FEDORA:FEDORA-2021-1c170a7c7c
FEDORA:FEDORA-2021-21360476b6
FEDORA:FEDORA-2021-d56567bdab
MISC:git.kernel.org:MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets
MISC:lore.kernel.org:MISC:www.openwall.com:CVE-2020-25672
MISC:www.openwall.com:CVE-2020-25672
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[oss-security] 20201101 [CVE-2020-25670,CVE-2020-25671,CVE-2020-25672,CVE-2020-25673]Linux kernel: many bugs in nfc socket
MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets
OSS:2020/Q4/85
OSS:2021/Q2/118
RH:CVE-2020-25670
RH:CVE-2020-25671
RH:CVE-2020-25672
RH:CVE-2020-25673
SMASH Issue 270270
SMASH Issue 270271
UBUNTU:CVE-2020-25670
UBUNTU:CVE-2020-25671
UBUNTU:CVE-2020-25672
UBUNTU:CVE-2020-25673
bnc#1178181
bnc#1194680
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PW3OASG7OEMHANDWBM5US5WKTOC76KMH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UTVACC6PGS6OSD3EYY7FZUAZT2EUMFH5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VEIEGQXUW37YHZ5MTAZTDCIMHUN26NJS/
linux.git:commit:7574fcdbdcb335763b6b322f6928dc0fd5730451
linux.git:commit:8a4cd82d62b5ec7e5482333a72b58a4eea4979f0
linux.git:commit:c33b1cc62ac05c1dbb1cdafe2eb66da01c76ca8d
rh#1894550
rh#1894552
rh#1894556
rh#1894558
CVE-2020-25704kernel-source-rt:Already fixedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-25704
MISC:git.kernel.org:CVE-2020-25704
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-25704
MISC:www.openwall.com:CVE-2020-25704
MISC:www.starwindsoftware.com:CVE-2020-25704
MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
OSS:2020/11/09/1
OSS:2020/Q4/103
RH:CVE-2020-25704
RHSA-2021:1578
RHSA-2021:1739
RHSA-2021:2718
RHSA-2021:2719
RHSA-2022:0063
RHSA-2022:0065
SMASH Issue 270757
SMASH Issue 271209
bnc#1178393
rh#1895961
CVE-2020-25705kernel-source-rt:Already fixedimportant7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)CONFIRM:cert-portal.siemens.com:CVE-2020-25705
CONFIRM:security.netapp.com:CVE-2020-25705
CVE-2020-25705
D:CVE-2020-25705
DSA-5096
MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
OSS:2021/07/22/1
OSS:2022/01/25/12
RH:CVE-2020-25705
RHSA-2021:0537
RHSA-2021:0558
RHSA-2021:0686
RHSA-2021:0765
RHSA-2021:0774
RHSA-2021:0856
RHSA-2021:0857
RHSA-2021:1531
RHSA-2021:2164
RHSA-2021:2355
SADDNS-URL
SMASH Issue 265902
SMASH Issue 271665
SMASH Issue 271666
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1175721
bnc#1178782
bnc#1178783
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1894579
rh#1980646
rh#1997467
rh#2014230
rh#2044561
rh#2053632
rh#2059923
CVE-2020-26088kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2020-26088
MISC:cdn.kernel.org:CVE-2020-26088
MISC:github.com:CVE-2020-26088
MLIST:[debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
MLIST:[debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
RH:CVE-2020-26088
SMASH Issue 268175
SUSE:openSUSE-SU-2020:1586
SUSE:openSUSE-SU-2020:1655
UBUNTU:CVE-2020-26088
USN-4578-1
bnc#1176990
rh#1882508
CVE-2020-26116python3:Releasedmoderate6.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N)CONFIRM:security.netapp.com:CVE-2020-26116
CVE-2020-26116
FEDORA:FEDORA-2020-221823ebdd
FEDORA:FEDORA-2020-887d3fa26f
FEDORA:FEDORA-2020-d30881c970
FEDORA:FEDORA-2020-d42cb01973
FEDORA:FEDORA-2020-e33acdea18
GLSA-202101-18
MISC:bugs.python.org:CVE-2020-26116
MISC:python-security.readthedocs.io:CVE-2020-26116
MISC:www.oracle.com:CVE-2021-35666
MLIST:[debian-lts-announce] 20201119 [SECURITY] [DLA 2456-1] python3.5 security update
RH:CVE-2020-26116
RHSA-2020:4273
RHSA-2020:4285
RHSA-2020:4299
RHSA-2021:0034
RHSA-2021:0079
RHSA-2021:1631
RHSA-2021:1633
RHSA-2021:1761
RHSA-2021:1879
RHSA-2021:3366
RHSA-2022:5235
SMASH Issue 268421
SUSE:openSUSE-SU-2020:1859
UBUNTU:CVE-2020-26116
USN-4581-1
bnc#1177211
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
rh#1883014
rh#1883632
CVE-2020-26139kernel-source-rt:Releasedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
CONFIRM:cert-portal.siemens.com:CVE-2020-26141
CVE-2020-26139
MISC:github.com:CVE-2020-26147
MISC:www.arista.com:CVE-2020-26135
MISC:www.fragattacks.com:CVE-2020-26147
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com
OSS:2021/Q2/126
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 284051
bnc#1186062
jsc#CAR-1023
rh#1959663
CVE-2020-26140kernel-source-rt:Releasedimportant6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
CONFIRM:cert-portal.siemens.com:CVE-2020-26141
CVE-2020-26140
CVE-2020-26142
CVE-2020-26143
CVE-2020-26144
CVE-2020-26146
MISC:github.com:CVE-2020-26147
MISC:www.arista.com:CVE-2020-26135
MISC:www.fragattacks.com:CVE-2020-26147
MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com
OSS:2021/Q2/126
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 283864
SMASH Issue 284052
bnc#1185863
bnc#1188528
jsc#CAR-606
rh#1960490
rh#1960494
rh#1960496
rh#1960498
rh#1960502
CVE-2020-26141kernel-source-rt:Releasedmoderate4.2 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
CONFIRM:cert-portal.siemens.com:CVE-2020-26141
CVE-2020-26141
CVE-2020-26147
D:CVE-2020-26147
MISC:github.com:CVE-2020-26147
MISC:www.arista.com:CVE-2020-26135
MISC:www.fragattacks.com:CVE-2020-26147
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com
OSS:2021/Q2/126
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 284054
bnc#1185987
jsc#CAR-1022
linux.git:commit:0dc267b13f3a7e8424a898815dd357211b737330
linux.git:commit:965a7d72e798eb7af0aa67210e37cf7ecd1c9cad
rh#1960492
rh#1960504
CVE-2020-26142kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
CONFIRM:cert-portal.siemens.com:CVE-2020-26141
CVE-2020-26140
CVE-2020-26142
CVE-2020-26143
CVE-2020-26144
CVE-2020-26146
MISC:github.com:CVE-2020-26147
MISC:www.arista.com:CVE-2020-26135
MISC:www.fragattacks.com:CVE-2020-26147
MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com
OSS:2021/Q2/126
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 283864
SMASH Issue 284049
bnc#1185863
bnc#1188528
jsc#CAR-606
rh#1960490
rh#1960494
rh#1960496
rh#1960498
rh#1960502
CVE-2020-26143kernel-source-rt:Releasedimportant6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
CONFIRM:cert-portal.siemens.com:CVE-2020-26141
CVE-2020-26140
CVE-2020-26142
CVE-2020-26143
CVE-2020-26144
CVE-2020-26146
MISC:github.com:CVE-2020-26147
MISC:www.arista.com:CVE-2020-26135
MISC:www.fragattacks.com:CVE-2020-26147
MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com
OSS:2021/Q2/126
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 283864
SMASH Issue 284050
bnc#1185863
bnc#1188528
jsc#CAR-606
rh#1960490
rh#1960494
rh#1960496
rh#1960498
rh#1960502
CVE-2020-26144kernel-source-rt:Releasedimportant6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
CONFIRM:cert-portal.siemens.com:CVE-2020-26141
CVE-2020-26140
CVE-2020-26142
CVE-2020-26143
CVE-2020-26144
CVE-2020-26146
MISC:github.com:CVE-2020-26147
MISC:www.arista.com:CVE-2020-26135
MISC:www.fragattacks.com:CVE-2020-26147
MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com
OSS:2021/Q2/126
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 283864
SMASH Issue 284048
bnc#1185863
bnc#1188528
jsc#CAR-606
rh#1960490
rh#1960494
rh#1960496
rh#1960498
rh#1960502
CVE-2020-26145kernel-source-rt:Releasedmoderate5.4 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)CONFIRM:cert-portal.siemens.com:CVE-2020-26141
CVE-2020-26145
MISC:github.com:CVE-2020-26147
MISC:www.fragattacks.com:CVE-2020-26147
MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com
OSS:2021/Q2/126
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 283859
SMASH Issue 283860
bnc#1185860
jsc#CAR-1021
linux.git:commit:40e7462dad6f3d06efdb17d26539e61ab6e34db1
linux.git:commit:65c415a144ad8132b6a6d97d4a1919ffc728e2d1
rh#1960500
CVE-2020-26146kernel-source-rt:Releasedimportant5.3 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
CONFIRM:cert-portal.siemens.com:CVE-2020-26141
CVE-2020-26140
CVE-2020-26142
CVE-2020-26143
CVE-2020-26144
CVE-2020-26146
MISC:github.com:CVE-2020-26147
MISC:www.arista.com:CVE-2020-26135
MISC:www.fragattacks.com:CVE-2020-26147
MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com
OSS:2021/Q2/126
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 283864
SMASH Issue 284047
bnc#1185863
bnc#1188528
jsc#CAR-606
rh#1960490
rh#1960494
rh#1960496
rh#1960498
rh#1960502
CVE-2020-26147kernel-source-rt:Releasedmoderate ()CISCO:20210511 Multiple Vulnerabilities in Frame Aggregation and Fragmentation Implementations of 802.11 Specification Affecting Cisco Products: May 2021
CONFIRM:cert-portal.siemens.com:CVE-2020-26141
CVE-2020-26141
CVE-2020-26147
D:CVE-2020-26147
MISC:github.com:CVE-2020-26147
MISC:www.arista.com:CVE-2020-26135
MISC:www.fragattacks.com:CVE-2020-26147
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[oss-security] 20210511 various 802.11 security issues - fragattacks.com
OSS:2021/Q2/126
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 284053
SMASH Issue 284054
bnc#1185987
jsc#CAR-1022
linux.git:commit:0dc267b13f3a7e8424a898815dd357211b737330
linux.git:commit:965a7d72e798eb7af0aa67210e37cf7ecd1c9cad
rh#1960492
rh#1960504
CVE-2020-26154libproxy:Releasedimportant8 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2020-26154
DSA-4800
FEDORA:FEDORA-2020-15b775b07e
FEDORA:FEDORA-2020-941b563a80
MISC:github.com:CVE-2020-26154
MLIST:[debian-lts-announce] 20201113 [SECURITY] [DLA 2450-1] libproxy security update
RH:CVE-2020-26154
SMASH Issue 268490
SUSE:openSUSE-SU-2020:1676
SUSE:openSUSE-SU-2020:1680
UBUNTU:CVE-2020-26154
bdo#968366
bdo#971394
bnc#1177143
rh#1869639
CVE-2020-26159oniguruma:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2020-26159
FEDORA:FEDORA-2020-952c499e9d
FEDORA:FEDORA-2020-bc758654d1
FEDORA:FEDORA-2020-d53469eceb
L3:64172
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:github.com:CVE-2020-26159
MISC:github.com:MLIST:[oss-security] 20200930 [cve-request@...re.org: Re: [scr966354] oniguruma regular expression library - fixed in devel version cbe9f8bd9cfc6c3c87a60fbae58fa1a85db59df0]
MLIST:[debian-lts-announce] 20210130 [SECURITY] [DLA 2431-2] libonig regression update
MLIST:[oss-security] 20200930 [cve-request@...re.org: Re: [scr966354] oniguruma regular expression library - fixed in devel version cbe9f8bd9cfc6c3c87a60fbae58fa1a85db59df0]
OSS:2020/Q3/210
RH:CVE-2020-26159
SMASH Issue 268561
UBUNTU:CVE-2020-26159
bnc#1177179
rh#1884111
CVE-2020-26541kernel-source-rt:Releasedmoderate6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N)CVE-2020-26541
MISC:lkml.org:CVE-2020-26541
RH:CVE-2020-26541
RHBA-2021:2854
RHSA-2021:2570
RHSA-2021:2599
RHSA-2021:2666
RHSA-2021:2718
RHSA-2021:2719
SMASH Issue 268715
UBUNTU:CVE-2020-26541
bnc#1177282
linux.git:commit:56c5812623f95313f6a46fbf0beee7fa17c68bbf
linux.git:commit:b0e22b47f650b53dbb094cd0011a48f6f3ae3e29
rh#1886285
CVE-2020-26555kernel-source-rt:Releasedmoderate5.4 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)CVE-2020-26555
L3:67651
SMASH Issue 272737
bnc#1215237
jsc#CAR-2903
jsc#CAR-2907
linux.git:commit:1ffc6f8cc33268731fcf9629fc4438f6db1191fc
linux.git:commit:33155c4aae5260475def6f7438e4e35564f4f3ba
rh#1918601
CVE-2020-26556kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L)CVE-2020-26556
L3:66835
SMASH Issue 377978
bnc#1215239
bnc#1215554
rh#1960012
CVE-2020-26557kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CVE-2020-26557
SMASH Issue 377979
bnc#1215240
rh#1960009
CVE-2020-26558kernel-source-rt:Releasedmoderate4.2 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)CERT-VN:VU#799380
CONFIRM:www.intel.com:CVE-2020-26558
CVE-2020-26558
D:CVE-2020-26558
DSA-4951
FEDORA:FEDORA-2021-a35b44fd9f
GLSA-202209-16
L3:61103
L3:66747
MISC:kb.cert.org:CVE-2020-26560
MISC:www.bluetooth.com:CVE-2020-26560
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20210626 [SECURITY] [DLA 2692-1] bluez security update
RHSA-2021:4432
SMASH Issue 272738
SMASH Issue 272739
bdo#989614
bnc#1179610
bnc#1187900
bnc#1215220
linux.git:commit:1ffc6f8cc33268731fcf9629fc4438f6db1191fc
linux.git:commit:33155c4aae5260475def6f7438e4e35564f4f3ba
rh#1918601
rh#1918602
rh#1959994
rh#1960009
rh#1960011
rh#1960012
CVE-2020-26559kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CVE-2020-26559
L3:66835
SMASH Issue 377980
bnc#1215242
rh#1960011
CVE-2020-26560kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CVE-2020-26560
L3:66835
SMASH Issue 377981
bnc#1215243
rh#1959994
CVE-2020-27068kernel-source-rt:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2020-27068
MISC:source.android.com:CVE-2020-0244
MISC:source.android.com:CVE-2022-20233
SMASH Issue 273513
bnc#1180086
CVE-2020-27170kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2020-27170
CVE-2020-27171
FEDORA:FEDORA-2021-9503fffad9
FEDORA:FEDORA-2021-e49da8a226
FEDORA:FEDORA-2021-f0181b8085
MISC:cdn.kernel.org:CVE-2021-28950
MISC:git.kernel.org:CVE-2020-27170
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27171
MISC:packetstormsecurity.com:CVE-2020-27170
MISC:www.openwall.com:CVE-2020-27170
MISC:www.openwall.com:CVE-2020-27171
MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update
MLIST:[oss-security] 20210324 Re: [CVE-2020-27170] Protection against speculatively out-of-bounds loads in the Linux kernel can be bypassed by unprivileged local users to leak content of kernel memory
MLIST:[oss-security] 20210324 Re: [CVE-2020-27171] Numeric error when restricting speculative pointer arithmetic allows unprivileged local users to leak content of kernel memory
OSS:2021/Q1/240
OSS:2021/Q1/241
RH:CVE-2020-27170
RH:CVE-2020-27171
RHSA-2021:2314
RHSA-2021:2316
SMASH Issue 280024
SMASH Issue 280026
bnc#1183686
bnc#1183775
jsc#CAR-483
rh#1940623
rh#1940627
CVE-2020-27171kernel-source-rt:Releasedmoderate6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H)CVE-2020-27170
CVE-2020-27171
FEDORA:FEDORA-2021-9503fffad9
FEDORA:FEDORA-2021-e49da8a226
FEDORA:FEDORA-2021-f0181b8085
MISC:cdn.kernel.org:CVE-2021-28950
MISC:git.kernel.org:CVE-2020-27170
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27171
MISC:packetstormsecurity.com:CVE-2020-27170
MISC:www.openwall.com:CVE-2020-27170
MISC:www.openwall.com:CVE-2020-27171
MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update
MLIST:[oss-security] 20210324 Re: [CVE-2020-27170] Protection against speculatively out-of-bounds loads in the Linux kernel can be bypassed by unprivileged local users to leak content of kernel memory
MLIST:[oss-security] 20210324 Re: [CVE-2020-27171] Numeric error when restricting speculative pointer arithmetic allows unprivileged local users to leak content of kernel memory
OSS:2021/Q1/240
OSS:2021/Q1/241
RH:CVE-2020-27170
RH:CVE-2020-27171
RHSA-2021:2314
RHSA-2021:2316
SMASH Issue 280025
SMASH Issue 280026
bnc#1183686
bnc#1183775
jsc#CAR-483
rh#1940623
rh#1940627
CVE-2020-27194kernel-source-rt:Not affectedmoderate ()CVE-2020-27194
MISC:cdn.kernel.org:CVE-2020-27194
MISC:github.com:CVE-2020-27194
RH:CVE-2020-27194
SMASH Issue 269591
UBUNTU:CVE-2020-27194
bnc#1177889
rh#1889477
CVE-2020-27418kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2020-27418
SMASH Issue 375995
bnc#1214919
http://fedora.com
https://patchwork.freedesktop.org/patch/356372/
rh#2236834
CVE-2020-27618glibc:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2020-27618
CONFIRM:sourceware.org:CVE-2016-10228
CVE-2020-27618
GLSA-202107-07
L3:67771
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
Oracle:CVE-2020-27618
RH:CVE-2020-27618
RHSA-2021:1585
SMASH Issue 270652
UBUNTU:CVE-2020-27618
bnc#1178386
rh#1893708
CVE-2020-27619python3:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-27619
CVE-2020-27619
D:CVE-2020-27619
FEDORA:FEDORA-2021-12df7f7382
FEDORA:FEDORA-2021-98720f3785
MISC:bugs.python.org:CVE-2020-27619
MISC:github.com:CVE-2020-27619
MISC:lists.apache.org:/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
MISC:www.oracle.com:CVE-2022-21586
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
RH:CVE-2020-27619
RHSA-2021:1633
RHSA-2021:3252
RHSA-2021:3254
RHSA-2021:4151
RHSA-2021:4162
SMASH Issue 270036
UBUNTU:CVE-2020-27619
bnc#1178009
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RSLQD5CCM75IZGAMBDGUZEATYU5YSGJ7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SGIY6I4YS3WOXAK4SXKIEOC2G4VZKIR7/
https://security.gentoo.org/glsa/202402-04
rh#1889886
CVE-2020-27673kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-27673
GLSA-202011-06
MISC:git.kernel.org:CVE-2020-27673
MISC:github.com:CVE-2020-27673
MISC:xenbits.xen.org:CVE-2020-27673
MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
MLIST:[oss-security] 20210119 Xen Security Advisory 332 v4 (CVE-2020-27673) - Rogue guests can cause DoS of Dom0 via high frequency events
OSS:2021/Q1/54
RH:CVE-2020-27673
SMASH Issue 268926
SMASH Issue 270104
SUSE:openSUSE-SU-2020:1783
SUSE:openSUSE-SU-2020:1844
UBUNTU:CVE-2020-27673
bnc#1177411
rh#1891110
CVE-2020-27675kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-27675
FEDORA:FEDORA-2020-09e4d062fe
FEDORA:FEDORA-2020-474d747b60
FEDORA:FEDORA-2020-920a258c79
GLSA-202011-06
MISC:git.kernel.org:CVE-2020-27675
MISC:github.com:CVE-2020-27675
MISC:xenbits.xen.org:CVE-2020-27675
MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
MLIST:[oss-security] 20210119 Xen Security Advisory 331 v3 (CVE-2020-27675) - Race condition in Linux event handler may crash dom0
OSS:2021/Q1/51
RH:CVE-2020-27675
SMASH Issue 268925
SMASH Issue 270106
UBUNTU:CVE-2020-27675
bnc#1177410
rh#1891114
CVE-2020-27777kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2020-27777
L3:67660
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27777
MISC:www.openwall.com:CVE-2020-27777
OSS:2020/10/09/1
OSS:2020/11/23/2
OSS:2020/Q4/155
RH:CVE-2020-27777
RHSA-2021:3327
RHSA-2021:4356
SMASH Issue 272144
bnc#1179107
rh#1900844
CVE-2020-27783python-lxml:Releasedmoderate6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)CONFIRM:security.netapp.com:CVE-2020-27783
CVE-2020-27783
DSA-4810
FEDORA:FEDORA-2020-0e055ea503
FEDORA:FEDORA-2020-307946cfb6
MISC:advisory.checkmarx.net:CVE-2020-27783
MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2467-2] lxml regression update
N/A:N/A
RH:CVE-2020-27783
RHSA-2021:1761
RHSA-2021:1879
RHSA-2021:1898
RHSA-2021:3254
SMASH Issue 272347
bnc#1179534
jsc#CAR-1591
rh#1901633
CVE-2020-27784kernel-source-rt:Releasedlow4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H)CVE-2020-27784
MISC:git.kernel.org:CVE-2020-27784
SMASH Issue 341085
bnc#1202895
rh#1901728
CVE-2020-27786kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-27786
CVE-2020-27786
MISC:git.kernel.org:MLIST:[oss-security] 20201203 Re: Linux Kernel: ALSA: use-after-free Write in snd_rawmidi_kernel_write1
MLIST:[oss-security] 20201203 Re: Linux Kernel: ALSA: use-after-free Write in snd_rawmidi_kernel_write1
OSS:2020/Q4/179
RH:CVE-2020-27786
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 272654
bnc#1179601
bnc#1179616
rh#1900933
CVE-2020-27815kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-27815
CVE-2020-27815
DSA-4843
MISC:bugzilla.redhat.com:CVE-2020-27815
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815
MISC:www.openwall.com:CVE-2020-27815
MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
MLIST:[oss-security] 20201201 CVE-2020-27815 Linux kernel: jfs: array-index-out-of-bounds in dbAdjTree
MLIST:[oss-security] 20201228 Re: CVE-2020-27815 Linux kernel: jfs: array-index-out-of-bounds in dbAdjTree
OSS:2020/11/30/5%2C
OSS:2020/11/30/5,
OSS:2020/12/28/1%2C
OSS:2020/12/28/1,
OSS:2020/Q4/173
RH:CVE-2020-27815
SMASH Issue 272471
bdo#970736
bdo#972345
bdo#977048
bdo#977615
bnc#1179454
bnc#1179458
https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C
rh#1897668
CVE-2020-27820kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Releasedlow3.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L)CVE-2020-27820
MISC:access.redhat.com:/errata/RHSA-2022:1975
MISC:access.redhat.com:/errata/RHSA-2022:1988
MISC:lore.kernel.org:/dri-devel/20201103194912.184413-2-jcline%40redhat.com/
MISC:lore.kernel.org:/dri-devel/20201103194912.184413-3-jcline%40redhat.com/
MISC:lore.kernel.org:/dri-devel/20201103194912.184413-4-jcline%40redhat.com/
MISC:lore.kernel.org:CVE-2020-27820
MISC:www.oracle.com:CVE-2022-21586
RH:CVE-2020-27820
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 272666
bnc#1179599
linux.git:commit:f55aaf63bde0d0336c3823bb3713bd4a464abbcf
rh#1901726
CVE-2020-27825kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-27825
CVE-2020-27825
DSA-4843
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815
MISC:github.com:OSS:2020/Q4/204
MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
OSS:2020/11/30/5,
OSS:2020/12/28/1,
OSS:2020/Q4/204
RH:CVE-2020-27825
SMASH Issue 273159
bdo#970736
bdo#972345
bdo#977048
bdo#977615
bnc#1179960
bnc#1179961
jsc#CAR-1430
rh#1905155
CVE-2020-27830kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-27830
DSA-4843
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815
MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
MLIST:[oss-security] 20201208 Re: Linux kernel NULL-ptr deref bug in spk_ttyio_receive_buf2
OSS:2020/11/30/5,
OSS:2020/12/28/1,
OSS:2020/Q4/189
OSS:2020/Q4/192
RH:CVE-2020-27830
SMASH Issue 272780
SMASH Issue 272808
bdo#970736
bdo#972345
bdo#977048
bdo#977615
bnc#1179656
rh#1919900
CVE-2020-27835kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2020-27835
RH:CVE-2020-27835
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 272967
bnc#1179878
rh#1901709
CVE-2020-28097kernel-source-rt:Ignoremoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-28097
CVE-2020-28097
MISC:cdn.kernel.org:CVE-2020-36312
MISC:git.kernel.org:CVE-2020-28097
MISC:github.com:CVE-2020-28097
MISC:seclists.org:CVE-2020-28097
SMASH Issue 302908
bnc#1176278
bnc#1187723
jsc#CAR-1002
rh#1880006
rh#1976208
CVE-2020-28374kernel-source-rt:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)CONFIRM:cdn.kernel.org:CVE-2020-28374
CONFIRM:git.kernel.org:CVE-2020-28374
CONFIRM:security.netapp.com:CVE-2020-28374
CVE-2020-28374
DSA-4843
FEDORA:FEDORA-2021-082e638d02
FEDORA:FEDORA-2021-4a91649cf3
FEDORA:FEDORA-2021-620fb40359
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815
MISC:packetstormsecurity.com:CVE-2020-0427
MISC:www.openwall.com:CVE-2021-3139
MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
MLIST:[oss-security] 20210113 Re: CVE-2020-28374: Linux SCSI target (LIO) unrestricted copy offload
OSS:2020/11/30/5,
OSS:2020/12/28/1,
OSS:2021/Q1/31
RH:CVE-2020-28374
RHSA-2021:0856
RHSA-2021:0857
RHSA-2021:0862
RHSA-2021:1081
RHSA-2021:1093
RHSA-2021:1376
RHSA-2021:1377
RHSA-2021:1531
RHSA-2021:1532
RHSA-2021:2099
RHSA-2021:2106
RHSA-2021:2167
RHSA-2021:2185
RHSA-2021:2190
RHSA-2021:2732
SMASH Issue 270735
bdo#970736
bdo#972345
bdo#977048
bdo#977615
bnc#1178372
bnc#1178684
bnc#1180676
linux.git:commit:2896c93811e39d63a4d9b63ccf12a8fbc226e5e4
rh#1899804
CVE-2020-28588kernel-source-rt:Not affectedlow2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2020-28588
MISC:talosintelligence.com:CVE-2020-28588
RH:CVE-2020-28588
SMASH Issue 278597
bnc#1182806
linux.git:commit:4f134b89a24b965991e7c345b9a4591821f7c2a6
rh#1933127
CVE-2020-28600file:Analysismoderate ()CVE-2020-28600
MISC:talosintelligence.com:CVE-2020-28600
SMASH Issue 283908
bnc#1185975
rh#1959716
CVE-2020-28915kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)CVE-2020-28915
MISC:cdn.kernel.org:CVE-2020-27194
MISC:git.kernel.org:CVE-2020-28915
MISC:syzkaller.appspot.com:CVE-2020-28915
RH:CVE-2020-28915
RHSA-2022:5316
RHSA-2022:5344
SMASH Issue 271838
bnc#1178886
rh#1899177
CVE-2020-28941kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-28941
FEDORA:FEDORA-2020-4700a73bd5
FEDORA:FEDORA-2020-8c15928d23
MISC:git.kernel.org:CVE-2020-28941
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-28941
MISC:github.com:CVE-2020-28941
MISC:www.openwall.com:CVE-2020-28941
MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
MLIST:[oss-security] 20201119 Re: Linux kernel NULL-ptr deref bug in spk_ttyio_ldisc_close
OSS:2020/11/19/3
OSS:2020/Q4/146
RH:CVE-2020-28941
SMASH Issue 271527
bnc#1178740
rh#1899985
CVE-2020-28974kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)CONFIRM:security.netapp.com:CVE-2020-28974
CVE-2020-28974
MISC:cdn.kernel.org:CVE-2020-28974
MISC:git.kernel.org:MLIST:[oss-security] 20201124 Re: Linux kernel slab-out-of-bounds Read in fbcon
MISC:nvd.nist.gov:MLIST:[oss-security] 20201124 Re: Linux kernel slab-out-of-bounds Read in fbcon
MISC:seclists.org:CVE-2020-28974
MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
MLIST:[oss-security] 20201124 Re: Linux kernel slab-out-of-bounds Read in fbcon
OSS:2020/Q4/165
RH:CVE-2020-28974
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 271216
SMASH Issue 272124
bnc#1178589
rh#1903126
CVE-2020-29361p11-kit:Unsupportedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-29361
DSA-4822
MISC:github.com:CVE-2020-29361
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[debian-lts-announce] 20210104 [SECURITY] [DLA 2513-1] p11-kit security update
RH:CVE-2020-29361
RHSA-2021:1609
SMASH Issue 273408
bnc#1180064
jsc#CAR-1020
rh#1903592
CVE-2020-29362p11-kit:Unsupportedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2020-29362
DSA-4822
L3:63742
MISC:github.com:CVE-2020-29361
MISC:github.com:CVE-2020-29362
MLIST:[debian-lts-announce] 20210104 [SECURITY] [DLA 2513-1] p11-kit security update
RH:CVE-2020-29362
RHSA-2021:1609
SMASH Issue 273410
bnc#1180065
bnc#1201534
jsc#CAR-1019
rh#1903590
CVE-2020-29363p11-kit:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-29363
DSA-4822
MISC:github.com:CVE-2020-29361
MISC:github.com:CVE-2020-29363
MISC:www.oracle.com:CVE-2022-21498
Oracle:CVE-2020-29363
RH:CVE-2020-29363
RHSA-2021:1609
SMASH Issue 273409
bnc#1180066
rh#1903588
CVE-2020-29368kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-29368
CVE-2020-29368
DSA-5096
MISC:bugs.chromium.org:CVE-2020-29368
MISC:cdn.kernel.org:CVE-2020-29368
MISC:git.kernel.org:CVE-2020-29368
OSS:2021/07/22/1
OSS:2022/01/25/12
RH:CVE-2020-29368
RHSA-2021:4140
RHSA-2021:4356
RHSA-2022:5220
RHSA-2022:5224
RHSA-2022:5626
RHSA-2022:5633
SMASH Issue 272433
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1179660
bnc#1179664
linux.git:commit:3bff7e3f1f16dc7305d12905c51c278b54970f0e
linux.git:commit:53a05ad9f21d858d24f76d12b3e990405f2036d1
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
linux.git:commit:c145e0b47c77ebeefdfd73dbb344577b2fc9b065
rh#1903244
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2059923
CVE-2020-29369kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-29369
CVE-2020-29369
MISC:bugs.chromium.org:MLIST:[oss-security] 20210219 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards()
MISC:cdn.kernel.org:CVE-2020-29369
MISC:git.kernel.org:MLIST:[oss-security] 20210219 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards()
MLIST:[oss-security] 20210210 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards()
MLIST:[oss-security] 20210219 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards()
OSS:2021/Q1/136
RH:CVE-2020-29369
SMASH Issue 272434
bnc#1173504
bnc#1179432
bnc#1179646
rh#1903262
CVE-2020-29370kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-29370
CVE-2020-29370
MISC:bugs.chromium.org:CVE-2020-29370
MISC:cdn.kernel.org:CVE-2020-29370
MISC:git.kernel.org:CVE-2020-29370
RH:CVE-2020-29370
SMASH Issue 272435
bnc#1179435
bnc#1179648
rh#1875840
rh#1903278
CVE-2020-29371kernel-source-rt:Releasedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2020-29371
MISC:bugs.chromium.org:CVE-2020-29371
MISC:cdn.kernel.org:CVE-2020-29371
MISC:git.kernel.org:CVE-2020-29371
RH:CVE-2020-29371
SMASH Issue 272436
bnc#1179429
rh#1894589
CVE-2020-29372kernel-source-rt:Not affectedlow0 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N)CVE-2020-29372
MISC:bugs.chromium.org:CVE-2020-29372
MISC:cdn.kernel.org:CVE-2020-12464
MISC:git.kernel.org:CVE-2020-29372
MISC:packetstormsecurity.com:CVE-2020-27170
RH:CVE-2020-29372
SMASH Issue 272437
bnc#1179433
rh#1874535
rh#1903283
CVE-2020-29373kernel-source-rt:Releasedimportant7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)CONFIRM:cdn.kernel.org:CVE-2020-12768
CVE-2020-29373
MISC:bugs.chromium.org:CVE-2020-29373
MISC:git.kernel.org:CVE-2020-29373
RH:CVE-2020-29373
SMASH Issue 272438
bnc#1179434
bnc#1179779
rh#1875818
rh#1903291
CVE-2020-29374kernel-source-rt:Already fixedlow3.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N)CONFIRM:security.netapp.com:CVE-2020-29374
CVE-2020-29374
DSA-5096
L3:60485
MISC:bugs.chromium.org:CVE-2020-29368
MISC:cdn.kernel.org:CVE-2020-29374
MISC:git.kernel.org:CVE-2020-29374
MISC:packetstormsecurity.com:CVE-2020-27170
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
RH:CVE-2020-29374
SMASH Issue 272439
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1179428
bnc#1184308
jsc#CAR-1018
linux.git:commit:3bff7e3f1f16dc7305d12905c51c278b54970f0e
linux.git:commit:53a05ad9f21d858d24f76d12b3e990405f2036d1
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
linux.git:commit:c145e0b47c77ebeefdfd73dbb344577b2fc9b065
rh#1903249
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2020-29534kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-29534
MISC:bugs.chromium.org:CVE-2020-29534
MISC:cdn.kernel.org:CVE-2020-29534
MISC:git.kernel.org:CVE-2020-29534
RH:CVE-2020-29534
SMASH Issue 272707
bnc#1179598
rh#1905497
CVE-2020-29562glibc:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-29562
CVE-2020-29562
FEDORA:FEDORA-2021-6e581c051a
GLSA-202101-20
L3:67771
MISC:sourceware.org:CVE-2020-29562
MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
RH:CVE-2020-29562
SMASH Issue 272742
bnc#1179694
rh#1905217
CVE-2020-29568kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)CVE-2020-29568
DSA-4843
GLSA-202107-30
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815
MISC:xenbits.xenproject.org:CVE-2020-29568
MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
OSS:2020/11/30/5,
OSS:2020/12/28/1,
OSS:2020/Q4/217
SMASH Issue 272608
SMASH Issue 272827
bdo#970736
bdo#972345
bdo#977048
bdo#977615
bnc#1179508
rh#1905658
CVE-2020-29569kernel-source-rt:Releasedimportant8.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-29569
CVE-2020-29569
DSA-4843
GLSA-202107-30
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815
MISC:xenbits.xenproject.org:CVE-2020-29569
MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
OSS:2020/11/30/5,
OSS:2020/12/28/1,
OSS:2020/Q4/216
SMASH Issue 272609
SMASH Issue 272828
bdo#970736
bdo#972345
bdo#977048
bdo#977615
bnc#1179509
bnc#1180008
rh#1905636
CVE-2020-29573glibc:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-29562
CVE-2020-29573
GLSA-202101-20
L3:60728
L3:60856
L3:62250
L3:67771
MISC:sourceware.org:CVE-2020-29573
RH:CVE-2020-29573
RHSA-2021:0348
RHSA-2021:2813
RHSA-2021:2998
RHSA-2021:3315
SMASH Issue 272771
bnc#1179721
bnc#1185816
bnc#1186446
bnc#1193392
rh#1905213
CVE-2020-29660kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-29660
CVE-2020-29660
CVE-2020-29661
DSA-4843
FEDORA:FEDORA-2020-b732958765
FEDORA:FEDORA-2020-bc0cc81a7a
L3:66541
L3:66770
L3:67469
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815
MISC:git.kernel.org:MLIST:[oss-security] 20201210 2 kernel issues
MISC:packetstormsecurity.com:CVE-2020-29661
MISC:www.oracle.com:CVE-2021-35666
MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
MLIST:[oss-security] 20201210 2 kernel issues
OSS:2020/11/30/5,
OSS:2020/12/28/1,
OSS:2020/Q4/202
Oracle:CVE-2020-29661
RH:CVE-2020-29660
RH:CVE-2020-29661
RHSA-2021:0354
RHSA-2021:0537
RHSA-2021:0558
RHSA-2021:0686
RHSA-2021:0689
RHSA-2021:0763
RHSA-2021:0765
RHSA-2021:0774
RHSA-2021:0856
RHSA-2021:0857
RHSA-2021:0862
RHSA-2021:0878
RHSA-2021:0940
RHSA-2021:1028
RHSA-2021:1031
RHSA-2021:1288
RHSA-2021:2164
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 272809
SMASH Issue 272964
bdo#970736
bdo#972345
bdo#977048
bdo#977615
bnc#1179745
bnc#1179877
rh#1906522
rh#1906525
CVE-2020-29661kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-29660
CVE-2020-29660
CVE-2020-29661
DSA-4843
FEDORA:FEDORA-2020-b732958765
FEDORA:FEDORA-2020-bc0cc81a7a
L3:66541
L3:66770
L3:67469
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815
MISC:git.kernel.org:MLIST:[oss-security] 20201210 2 kernel issues
MISC:packetstormsecurity.com:CVE-2020-29661
MISC:www.oracle.com:CVE-2021-35666
MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
MLIST:[oss-security] 20201210 2 kernel issues
OSS:2020/11/30/5,
OSS:2020/12/28/1,
OSS:2020/Q4/202
Oracle:CVE-2020-29661
RH:CVE-2020-29660
RH:CVE-2020-29661
RHSA-2021:0354
RHSA-2021:0537
RHSA-2021:0558
RHSA-2021:0686
RHSA-2021:0689
RHSA-2021:0763
RHSA-2021:0765
RHSA-2021:0774
RHSA-2021:0856
RHSA-2021:0857
RHSA-2021:0862
RHSA-2021:0878
RHSA-2021:0940
RHSA-2021:1028
RHSA-2021:1031
RHSA-2021:1288
RHSA-2021:2164
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 272809
SMASH Issue 272965
bdo#970736
bdo#972345
bdo#977048
bdo#977615
bnc#1179745
bnc#1179877
rh#1906522
rh#1906525
CVE-2020-35448binutils:Unsupportedmoderate3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2020-35448
CVE-2020-35448
GLSA-202107-24
MISC:sourceware.org:CVE-2020-35448
RHSA-2021:4364
SMASH Issue 274063
bnc#1184794
jsc#CAR-1017
rh#1950478
CVE-2020-35457glib2:Ignoreimportant ()CVE-2020-35457
MISC:gitlab.gnome.org:CVE-2020-35457
SMASH Issue 273376
bnc#1193464
CVE-2020-35493binutils:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-35493
CVE-2020-35493
FEDORA:FEDORA-2020-28c78a6ac3
GLSA-202107-24
RH:CVE-2020-35493
SMASH Issue 274140
SMASH Issue 274255
bnc#1180451
jsc#CAR-1446
rh#1911437
CVE-2020-35494binutils:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-35493
CVE-2020-35494
FEDORA:FEDORA-2020-28c78a6ac3
GLSA-202107-24
RH:CVE-2020-35494
SMASH Issue 274139
SMASH Issue 274256
bnc#1180452
rh#1911439
CVE-2020-35495binutils:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-35493
CVE-2020-35495
FEDORA:FEDORA-2020-28c78a6ac3
GLSA-202107-24
RH:CVE-2020-35495
SMASH Issue 274137
SMASH Issue 274257
bnc#1180453
rh#1911441
CVE-2020-35496binutils:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-35493
CVE-2020-35496
FEDORA:FEDORA-2020-28c78a6ac3
GLSA-202107-24
RH:CVE-2020-35496
SMASH Issue 274138
SMASH Issue 274258
bnc#1180454
jsc#CAR-1447
rh#1911444
CVE-2020-35499kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-35499
RH:CVE-2020-35499
SMASH Issue 274266
SMASH Issue 274267
bnc#1180460
rh#1910048
CVE-2020-35501kernel-source-rt:Not affectedmoderate6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N)CVE-2020-35501
OSS:2021/Q1/155
OSS:2021/Q1/158
OSS:2021/Q1/179
RH:CVE-2020-35501
SMASH Issue 278232
bnc#1182435
rh#1908577
CVE-2020-35507binutils:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-35493
CVE-2020-35507
GLSA-202107-24
RH:CVE-2020-35507
SMASH Issue 274268
bnc#1180461
jsc#CAR-1448
rh#1911691
CVE-2020-35508kernel-source-rt:Not affectedmoderate4.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)CONFIRM:security.netapp.com:CVE-2020-35508
CVE-2020-35508
MISC:access.redhat.com:/errata/RHSA-2021:2718
MISC:access.redhat.com:/errata/RHSA-2021:2719
MISC:github.com:CVE-2020-35508
RH:CVE-2020-35508
RHSA-2021:1578
RHSA-2021:1739
RHSA-2021:2718
RHSA-2021:2719
SMASH Issue 274481
bnc#1180529
rh#1902724
CVE-2020-35512dbus-1:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2020-35512
L3:64519
MISC:bugs.gentoo.org:CVE-2020-35512
RH:CVE-2020-35512
SMASH Issue 274738
bnc#1187105
https://gitlab.freedesktop.org/dbus/dbus/-/issues/305#note_829128
https://security-tracker.debian.org/tracker/CVE-2020-35512
jsc#CAR-1016
rh#1909101
CVE-2020-35513kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2020-35513
MISC:patchwork.kernel.org:CVE-2020-35513
RH:CVE-2020-35513
RHSA-2021:0336
RHSA-2021:0338
SMASH Issue 276218
bnc#1181362
rh#1911309
CVE-2020-35519kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-35519
CVE-2020-35519
L3:65879
OSS:2021/Q1/228
RH:CVE-2020-35519
SMASH Issue 279990
bnc#1183696
bnc#1184953
rh#1908251
CVE-2020-35525sqlite3:Already fixedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-35525
MISC:www.sqlite.org:CVE-2020-35525
RHSA-2022:7108
SMASH Issue 341039
bnc#1202910
https://security.netapp.com/advisory/ntap-20230706-0007/
rh#2122324
CVE-2020-35527sqlite3:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-35527
CVE-2020-35527
MISC:www.sqlite.org:CVE-2020-35527
RHSA-2022:7108
SMASH Issue 341040
bnc#1202912
rh#2122329
CVE-2020-35536gcc:Ignore, gcc7:Won't fixlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2020-35536
D:CVE-2020-35536
MISC:gcc.gnu.org:CVE-2020-35536
SMASH Issue 341086
bnc#1202918
jsc#CAR-2000
rh#2122380
CVE-2020-35537gcc:Ignore, gcc7:Won't fixlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2020-35537
D:CVE-2020-35537
MISC:gcc.gnu.org:CVE-2020-35537
SMASH Issue 341087
bnc#1202922
jsc#CAR-2001
rh#2122381
CVE-2020-36158kernel-source-rt:Releasedimportant8.8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-36158
CVE-2020-36158
DSA-4843
FEDORA:FEDORA-2021-3465ada1ca
MISC:git.kernel.org:CVE-2020-36158
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815
MISC:github.com:CVE-2020-36158
MISC:lore.kernel.org:CVE-2020-36158
MISC:patchwork.kernel.org:CVE-2020-36158
MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
OSS:2020/11/30/5,
OSS:2020/12/28/1,
RH:CVE-2020-36158
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 274526
bdo#970736
bdo#972345
bdo#977048
bdo#977615
bnc#1180559
bnc#1180562
jsc#CAR-1015
rh#1913348
CVE-2020-36242python-cryptography:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:github.com:CVE-2020-36242
CVE-2020-36242
FEDORA:FEDORA-2021-8e36e7ed1a
MISC:github.com:CVE-2020-36242
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
Oracle:CVE-2020-36242
RH:CVE-2020-36242
RHSA-2021:1608
RHSA-2021:2239
RHSA-2021:3254
SMASH Issue 277390
bnc#1182066
jsc#CAR-1014
rh#1926226
CVE-2020-36310kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-36310
DSA-5095
DSA-5096
MISC:cdn.kernel.org:CVE-2020-36310
MISC:git.kernel.org:CVE-2020-36310
OSS:2021/07/22/1
OSS:2022/01/25/12
RH:CVE-2020-36310
SMASH Issue 281255
bdo#988044
bdo#989285
bdo#990279
bdo#990411
bdo#994050
bnc#1184512
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1947982
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2059923
CVE-2020-36311kernel-source-rt:Releasedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2020-36311
DSA-4941
MISC:cdn.kernel.org:CVE-2020-36311
MISC:git.kernel.org:CVE-2020-36311
MLIST:[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update
RH:CVE-2020-36311
SMASH Issue 281256
bnc#1184511
rh#1947994
CVE-2020-36312kernel-source-rt:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2020-36312
MISC:cdn.kernel.org:CVE-2020-36312
MISC:git.kernel.org:CVE-2020-36312
RH:CVE-2020-36312
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 281257
bnc#1184509
jsc#CAR-1001
rh#1947991
CVE-2020-36313kernel-source-rt:Not affectedimportant ()CONFIRM:security.netapp.com:CVE-2020-36313
CVE-2020-36313
MISC:cdn.kernel.org:CVE-2020-36313
MISC:git.kernel.org:CVE-2020-36313
RH:CVE-2020-36313
SMASH Issue 281258
bnc#1184504
rh#1947986
CVE-2020-36322kernel-source-rt:Releasedimportant7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H)CVE-2020-36322
DSA-5096
L3:61260
L3:61406
L3:61476
MISC:cdn.kernel.org:CVE-2020-36322
MISC:git.kernel.org:CVE-2020-36322
MISC:github.com:OSS:2021/Q2/224
MISC:www.starwindsoftware.com:CVE-2020-36322
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/06/19/1
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2021:1578
RHSA-2022:0063
RHSA-2022:0065
RHSA-2022:0072
RHSA-2022:0078
SMASH Issue 280771
SMASH Issue 281984
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1184211
bnc#1184952
bnc#1188554
bnc#1189664
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1949560
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2020-36385kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-36385
CVE-2020-36385
L3:61406
MISC:cdn.kernel.org:CVE-2020-36385
MISC:git.kernel.org:CVE-2020-36385
MISC:sites.google.com:CVE-2020-36385
MISC:syzkaller.appspot.com:CVE-2020-36385
MISC:www.starwindsoftware.com:CVE-2020-36385
RHSA-2021:3987
RHSA-2021:4056
RHSA-2021:4088
RHSA-2021:4122
RHSA-2021:4597
RHSA-2021:4687
RHSA-2021:4692
RHSA-2021:4768
RHSA-2021:4770
RHSA-2021:4773
RHSA-2021:4774
RHSA-2021:4777
RHSA-2021:4779
RHSA-2021:4798
RHSA-2021:4859
RHSA-2021:4871
RHSA-2021:4875
RHSA-2021:4971
RHSA-2021:5035
RHSA-2022:0157
SMASH Issue 301329
bnc#1187050
bnc#1187052
jsc#CAR-1000
rh#1974319
CVE-2020-36386kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)CVE-2020-36386
MISC:cdn.kernel.org:CVE-2020-36386
MISC:git.kernel.org:CVE-2020-36386
MISC:sites.google.com:CVE-2020-36386
MISC:syzkaller.appspot.com:CVE-2020-36386
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 301364
bnc#1187038
jsc#CAR-998
rh#1969489
CVE-2020-36387kernel-source-rt:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2020-36387
MISC:cdn.kernel.org:CVE-2020-26088
MISC:git.kernel.org:CVE-2020-36387
MISC:sites.google.com:CVE-2020-36387
MISC:syzkaller.appspot.com:CVE-2020-36387
SMASH Issue 301363
bnc#1187053
https://security.netapp.com/advisory/ntap-20210727-0006/
rh#1969497
CVE-2020-36394pam:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2020-36394
MISC:seclists.org:CVE-2020-36394
SMASH Issue 302787
bnc#1188682
CVE-2020-36516kernel-source-rt:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H)CONFIRM:security.netapp.com:CVE-2020-36516
CVE-2020-36516
D:CVE-2020-36516
L3:64310
L3:64329
MISC:dl.acm.org:CVE-2020-36516
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 324891
bnc#1196616
bnc#1196867
jsc#CAR-1577
rh#2059928
CVE-2020-36557kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2020-36557
L3:64012
L3:64525
L3:64549
L3:64602
MISC:cdn.kernel.org:CVE-2020-36557
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-25668
RHSA-2021:1578
SMASH Issue 337947
SMASH Issue 337949
bnc#1201429
bnc#1201742
jsc#CAR-1918
rh#2112688
CVE-2020-36558kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2020-36558
L3:64525
L3:64549
L3:64602
MISC:cdn.kernel.org:CVE-2020-36558
MISC:git.kernel.org:CVE-2020-36558
RHSA-2022:7444
RHSA-2022:7683
RHSA-2023:5627
SMASH Issue 337946
SMASH Issue 337948
bnc#1200910
bnc#1201752
jsc#CAR-1919
rh#2112693
CVE-2020-36691kernel-source-rt:Ignoremoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-36691
MISC:cdn.kernel.org:CVE-2020-36310
SMASH Issue 360815
SMASH Issue 361172
bnc#1209613
bnc#1209777
https://github.com/torvalds/linux/commit/7690aa1cdf7c4565ad6b013b324c28b685505e24
jsc#CAR-2473
rh#2181614
CVE-2020-36694kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2020-36694
D:CVE-2020-36694
MISC:cdn.kernel.org:CVE-2020-36385
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 367086
bnc#1211596
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c
https://security.netapp.com/advisory/ntap-20230622-0005/
https://syzkaller.appspot.com/bug?id=0c4fd9c6aa04ec116d01e915d3b186f71a212cb2
rh#2212140
CVE-2020-36766kernel-source-rt:Releasedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2020-36766
SMASH Issue 378140
bnc#1215299
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.6
https://github.com/torvalds/linux/commit/6c42227c3467549ddc65efe99c869021d2f4a570
jsc#CAR-2908
rh#2239712
CVE-2020-36775kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2020-36775
SMASH Issue 395207
bnc#1220412
https://git.kernel.org/stable/c/0478ccdc8ea016de1ebaf6fe6da0275c2b258c5b
https://git.kernel.org/stable/c/8e8542437bb4070423c9754d5ba270ffdbae8c8d
https://git.kernel.org/stable/c/df77fbd8c5b222c680444801ffd20e8bbc90a56e
rh#2266267
CVE-2020-36776kernel-source-rt:Not affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2020-36776
SMASH Issue 395343
bnc#1220506
https://git.kernel.org/stable/c/34ab17cc6c2c1ac93d7e5d53bb972df9a968f085
https://git.kernel.org/stable/c/6bf443acf6ca4f666d0e4225614ba9993a3aa1a9
https://git.kernel.org/stable/c/876a5f33e5d961d879c5436987c09b3d9ef70379
https://git.kernel.org/stable/c/c24a20912eef00587416628149c438e885eb1304
rh#2266748
CVE-2020-36777kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2020-36777
SMASH Issue 395344
bnc#1220526
https://git.kernel.org/stable/c/06854b943e0571ccbd7ad0a529babed1a98ff275
https://git.kernel.org/stable/c/32168ca1f123316848fffb85d059860adf3c409f
https://git.kernel.org/stable/c/43263fd43083e412311fa764cd04a727b0c6a749
https://git.kernel.org/stable/c/9185b3b1c143b8da409c19ac5a785aa18d67a81b
https://git.kernel.org/stable/c/9ad15e214fcd73694ea51967d86055f47b802066
https://git.kernel.org/stable/c/bf9a40ae8d722f281a2721779595d6df1c33a0bf
https://git.kernel.org/stable/c/cd89f79be5d553c78202f686e8e4caa5fbe94e98
https://git.kernel.org/stable/c/cede24d13be6c2a62be6d7ceea63c2719b0cfa82
rh#2266746
CVE-2020-36778kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2020-36778
SMASH Issue 395415
bnc#1220555
https://git.kernel.org/stable/c/a42ac16e6573f19c78f556ea292f5b534fcc4514
https://git.kernel.org/stable/c/a85c5c7a3aa8041777ff691400b4046e56149fd3
https://git.kernel.org/stable/c/c977426db644ba476938125597947979e8aba725
https://git.kernel.org/stable/c/e2ba996577eaea423694dc69ae43d56f1410a22b
rh#2266940
CVE-2020-36779kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2020-36779
SMASH Issue 395416
bnc#1220558
https://git.kernel.org/stable/c/2c662660ce2bd3b09dae21a9a9ac9395e1e6c00b
https://git.kernel.org/stable/c/c323b270a52a26aa8038a4d1fd9a850904a41166
https://git.kernel.org/stable/c/c7ea772c9fcf711ed566814b92eecaffc0e2bfd0
https://git.kernel.org/stable/c/d791b90f5c5e5aa8ccf9e33386c16bd2b7e333a4
rh#2266942
CVE-2020-36780kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2020-36780
SMASH Issue 395417
bnc#1220556
https://git.kernel.org/stable/c/3a4f326463117cee3adcb72999ca34a9aaafda93
https://git.kernel.org/stable/c/7e1764312440c5df9dfe6b436035a03673b0c1b9
https://git.kernel.org/stable/c/9223505e938ba3db5907e058f4209770cff2f2a7
https://git.kernel.org/stable/c/d3406ab52097328a3bc4cbe124bfd8f6d51fb86f
https://git.kernel.org/stable/c/e547640cee7981fd751d2c9cde3a61bdb678b755
rh#2266944
CVE-2020-36781kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2020-36781
SMASH Issue 395418
bnc#1220557
https://git.kernel.org/stable/c/1ecc0ebc2ebbad4a22a670a07d27a21fa0b59c77
https://git.kernel.org/stable/c/3a0cdd336d92c429b51a79bf4f64b17eafa0325d
https://git.kernel.org/stable/c/47ff617217ca6a13194fcb35c6c3a0c57c080693
https://git.kernel.org/stable/c/ff406f6cd09c273337ab4854292e4aca48f8affd
rh#2266946
CVE-2020-36782kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2020-36782
SMASH Issue 395419
bnc#1220560
https://git.kernel.org/stable/c/278e5bbdb9a94fa063c0f9bcde2479d0b8042462
https://git.kernel.org/stable/c/815859cb1d2302e74f11bf6894bceace9ca9eb4a
https://git.kernel.org/stable/c/b100650d80cd2292f6c152f5f2943b5944b3e8ce
https://git.kernel.org/stable/c/bb300acc867e937edc2a6898e92b21f88e4e4e66
https://git.kernel.org/stable/c/cc49d206414240483bb93ffa3d80243e6a776916
rh#2266948
CVE-2020-36783kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2020-36783
SMASH Issue 395420
bnc#1220561
https://git.kernel.org/stable/c/223125e37af8a641ea4a09747a6a52172fc4b903
https://git.kernel.org/stable/c/4734c4b1d9573c9d20bbc46cf37dde095ee011b8
https://git.kernel.org/stable/c/7ee35cde1e810ad6ca589980b9ec2b7b62946a5b
https://git.kernel.org/stable/c/96c4a03658d661666c360959aa80cdabfe2972ed
https://git.kernel.org/stable/c/e80ae8bde41266d3b8bf012460b6593851766006
rh#2266950
CVE-2020-36785kernel-source-rt:Not affectedmoderate5.9 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)CVE-2020-36785
SMASH Issue 395422
bnc#1220576
https://git.kernel.org/stable/c/801c1d505894008c888bc71d08d5cff5d87f8aba
https://git.kernel.org/stable/c/8267ccd7b9df7ab682043507dd682fe0621cf045
https://git.kernel.org/stable/c/ba11bbf303fafb33989e95473e409f6ab412b18d
https://git.kernel.org/stable/c/d218c7a0284f6b92a7b82d2e19706e18663b4193
rh#2266954
CVE-2020-36786kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2020-36786
SMASH Issue 395423
bnc#1220605
https://git.kernel.org/stable/c/27d2eab69f7da8e94e4751ac5c6d22d809275484
https://git.kernel.org/stable/c/4f0f37d03cde8f4341df8454f9b40a67fda94a33
https://git.kernel.org/stable/c/6045b01dd0e3cd3759eafe7f290ed04c957500b1
https://git.kernel.org/stable/c/cc4cc2fb5aaf9adb83c02211eb13b16cfcb7ba64
rh#2266956
CVE-2020-36787kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2020-36787
SMASH Issue 395424
bnc#1220616
https://git.kernel.org/stable/c/1dc1d30ac101bb8335d9852de2107af60c2580e7
https://git.kernel.org/stable/c/2964c37563e86cfdc439f217eb3c5a69adfdba6a
https://git.kernel.org/stable/c/3536169f8531c2c5b153921dc7d1ac9fd570cda7
https://git.kernel.org/stable/c/75321dc8aebe3f30eff226028fe6da340fe0bf02
https://git.kernel.org/stable/c/a59d01384c80a8a4392665802df57c3df20055f5
rh#2266958
CVE-2020-36788kernel-source-rt:Not affectedmoderate5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2020-36788
SMASH Issue 406845
bnc#1224816
https://git.kernel.org/stable/c/548f2ff8ea5e0ce767ae3418d1ec5308990be87d
https://git.kernel.org/stable/c/bcf34aa5082ee2343574bc3f4d1c126030913e54
https://git.kernel.org/stable/c/f86e19d918a85492ad1a01fcdc0ad5ecbdac6f96
rh#2282961
CVE-2020-3702kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:www.arista.com:CVE-2020-3702
CONFIRM:www.qualcomm.com:CVE-2018-13903
CVE-2020-3702
D:CVE-2020-3702
DSA-5096
L3:61810
OSS:2021/07/22/1
OSS:2022/01/25/12
SMASH Issue 266908
bdo#988044
bdo#989285
bdo#990411
bdo#993948
bdo#993978
bdo#994050
bnc#1191193
bnc#1191293
bnc#1191529
jsc#CAR-1137
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2010852
rh#2044561
rh#2053632
rh#2059923
CVE-2020-4788kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:www.ibm.com:/support/pages/node/6370729
CONFIRM:www.ibm.com:CVE-2020-4788
CVE-2020-4788
FEDORA:FEDORA-2020-4700a73bd5
FEDORA:FEDORA-2020-8c15928d23
MISC:exchange.xforce.ibmcloud.com:MLIST:[oss-security] 20201120 CVE-2020-4788: Speculation on incompletely validated data on IBM Power9
MISC:www.oracle.com:CVE-2022-21586
MLIST:[oss-security] 20201120 CVE-2020-4788: Speculation on incompletely validated data on IBM Power9
MLIST:[oss-security] 20201123 Re: CVE-2020-4788: Speculation on incompletely validated data on IBM Power9
OSS:2020/Q4/151
RH:CVE-2020-4788
RHSA-2022:1988
SMASH Issue 269117
XF:ibm-i-cve20204788-info-disc (189296)
bnc#1177666
linux.git:commit:9a32a7e78bd0cd9a9b6332cbdc345ee5ffd0c5de
linux.git:commit:dda3f4252e6c8b833a2ef164afd3da9808d0f07c
linux.git:commit:f79643787e0a0762d2409b7b8334e83f22d85695
rh#1888433
CVE-2020-6381sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6382sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6385sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6387sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6388sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6389sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6390sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6391sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6392sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6393sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6394sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6395sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6396sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6397sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6398sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6399sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6400sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6401sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6402sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6403sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6404sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6405sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6406sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6408sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6409sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6410sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6411sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6412sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6413sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6414sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6415sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6416sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6417sqlite3:Releasedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2019-19880
CONFIRM:security.netapp.com:CVE-2019-19923
CVE-2019-19880
CVE-2019-19923
CVE-2019-19926
CVE-2020-6381
CVE-2020-6382
CVE-2020-6385
CVE-2020-6387
CVE-2020-6388
CVE-2020-6389
CVE-2020-6390
CVE-2020-6391
CVE-2020-6392
CVE-2020-6393
CVE-2020-6394
CVE-2020-6395
CVE-2020-6396
CVE-2020-6397
CVE-2020-6398
CVE-2020-6399
CVE-2020-6400
CVE-2020-6401
CVE-2020-6402
CVE-2020-6403
CVE-2020-6404
CVE-2020-6405
CVE-2020-6406
CVE-2020-6408
CVE-2020-6409
CVE-2020-6410
CVE-2020-6411
CVE-2020-6412
CVE-2020-6413
CVE-2020-6414
CVE-2020-6415
CVE-2020-6416
CVE-2020-6417
D:CVE-2020-6391
DSA-4638
FEDORA:FEDORA-2020-39e0b8bd14
FEDORA:FEDORA-2020-f6271d7afa
GLSA-202003-08
MISC:chromereleases.googleblog.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6381
MISC:crbug.com:CVE-2020-6382
MISC:crbug.com:CVE-2020-6385
MISC:crbug.com:CVE-2020-6387
MISC:crbug.com:CVE-2020-6388
MISC:crbug.com:CVE-2020-6389
MISC:crbug.com:CVE-2020-6390
MISC:crbug.com:CVE-2020-6391
MISC:crbug.com:CVE-2020-6392
MISC:crbug.com:CVE-2020-6393
MISC:crbug.com:CVE-2020-6394
MISC:crbug.com:CVE-2020-6395
MISC:crbug.com:CVE-2020-6396
MISC:crbug.com:CVE-2020-6397
MISC:crbug.com:CVE-2020-6398
MISC:crbug.com:CVE-2020-6399
MISC:crbug.com:CVE-2020-6400
MISC:crbug.com:CVE-2020-6401
MISC:crbug.com:CVE-2020-6402
MISC:crbug.com:CVE-2020-6403
MISC:crbug.com:CVE-2020-6404
MISC:crbug.com:CVE-2020-6405
MISC:crbug.com:CVE-2020-6406
MISC:crbug.com:CVE-2020-6408
MISC:crbug.com:CVE-2020-6409
MISC:crbug.com:CVE-2020-6410
MISC:crbug.com:CVE-2020-6411
MISC:crbug.com:CVE-2020-6412
MISC:crbug.com:CVE-2020-6413
MISC:crbug.com:CVE-2020-6414
MISC:crbug.com:CVE-2020-6415
MISC:crbug.com:CVE-2020-6416
MISC:crbug.com:CVE-2020-6417
MISC:github.com:CVE-2019-19880
MISC:github.com:CVE-2019-19923
MISC:github.com:CVE-2019-19926
MISC:packetstormsecurity.com:CVE-2020-6388
MISC:packetstormsecurity.com:CVE-2020-6390
MISC:www.oracle.com:CVE-2019-2880
Oracle:CVE-2019-18197
RH:CVE-2019-19880
RH:CVE-2019-19923
RH:CVE-2019-19926
RH:CVE-2020-6381
RH:CVE-2020-6382
RH:CVE-2020-6385
RH:CVE-2020-6387
RH:CVE-2020-6388
RH:CVE-2020-6389
RH:CVE-2020-6390
RH:CVE-2020-6391
RH:CVE-2020-6392
RH:CVE-2020-6393
RH:CVE-2020-6394
RH:CVE-2020-6395
RH:CVE-2020-6396
RH:CVE-2020-6397
RH:CVE-2020-6398
RH:CVE-2020-6399
RH:CVE-2020-6400
RH:CVE-2020-6401
RH:CVE-2020-6402
RH:CVE-2020-6403
RH:CVE-2020-6404
RH:CVE-2020-6405
RH:CVE-2020-6406
RH:CVE-2020-6408
RH:CVE-2020-6409
RH:CVE-2020-6410
RH:CVE-2020-6411
RH:CVE-2020-6412
RH:CVE-2020-6413
RH:CVE-2020-6414
RH:CVE-2020-6415
RH:CVE-2020-6416
RH:CVE-2020-6417
RHSA-2020:0514
RHSA-2020:1810
RHSA-2020:4442
SMASH Issue 252466
SUSE:openSUSE-SU-2020:0189
SUSE:openSUSE-SU-2020:0210
SUSE:openSUSE-SU-2020:0233
UBUNTU:CVE-2019-19880
UBUNTU:CVE-2019-19923
UBUNTU:CVE-2019-19926
UBUNTU:CVE-2020-6381
UBUNTU:CVE-2020-6382
UBUNTU:CVE-2020-6385
UBUNTU:CVE-2020-6387
UBUNTU:CVE-2020-6388
UBUNTU:CVE-2020-6389
UBUNTU:CVE-2020-6390
UBUNTU:CVE-2020-6391
UBUNTU:CVE-2020-6392
UBUNTU:CVE-2020-6393
UBUNTU:CVE-2020-6394
UBUNTU:CVE-2020-6395
UBUNTU:CVE-2020-6396
UBUNTU:CVE-2020-6397
UBUNTU:CVE-2020-6398
UBUNTU:CVE-2020-6399
UBUNTU:CVE-2020-6400
UBUNTU:CVE-2020-6401
UBUNTU:CVE-2020-6402
UBUNTU:CVE-2020-6403
UBUNTU:CVE-2020-6404
UBUNTU:CVE-2020-6405
UBUNTU:CVE-2020-6406
UBUNTU:CVE-2020-6408
UBUNTU:CVE-2020-6409
UBUNTU:CVE-2020-6410
UBUNTU:CVE-2020-6411
UBUNTU:CVE-2020-6412
UBUNTU:CVE-2020-6413
UBUNTU:CVE-2020-6414
UBUNTU:CVE-2020-6415
UBUNTU:CVE-2020-6416
UBUNTU:CVE-2020-6417
USN-4298-1
USN-4298-2
bnc#1162833
rh#1770768
rh#1787032
rh#1788846
rh#1789364
rh#1801160
rh#1801161
rh#1801162
rh#1801163
rh#1801164
rh#1801165
rh#1801166
rh#1801167
rh#1801168
rh#1801169
rh#1801170
rh#1801171
rh#1801172
rh#1801173
rh#1801174
rh#1801175
rh#1801176
rh#1801177
rh#1801178
rh#1801179
rh#1801180
rh#1801181
rh#1801182
rh#1801184
rh#1801185
rh#1801186
rh#1801187
rh#1801188
rh#1801189
rh#1801190
rh#1801191
rh#1801192
rh#1801193
CVE-2020-6829mozilla-nss:Releasedcritical ()CVE-2020-12400
CVE-2020-12401
CVE-2020-12403
CVE-2020-6829
D:CVE-2020-12403
MISC:bugzilla.mozilla.org:CVE-2020-12400
MISC:bugzilla.mozilla.org:CVE-2020-12401
MISC:bugzilla.mozilla.org:CVE-2020-6829
MISC:developer.mozilla.org:CVE-2020-12403
MISC:www.mozilla.org:CVE-2020-15663
MISC:www.mozilla.org:CVE-2020-15664
RH:CVE-2020-12400
RH:CVE-2020-12401
RH:CVE-2020-12403
RH:CVE-2020-6829
RHSA-2020:4076
RHSA-2021:0538
RHSA-2021:0758
RHSA-2021:0876
RHSA-2021:1026
SMASH Issue 264605
SMASH Issue 264622
UBUNTU:CVE-2020-12400
UBUNTU:CVE-2020-12401
UBUNTU:CVE-2020-12403
UBUNTU:CVE-2020-6829
bnc#1174763
https://lists.debian.org/debian-lts-announce/2023/02/msg00021.html
https://security.netapp.com/advisory/ntap-20230324-0006/
rh#1826187
rh#1851294
rh#1853983
rh#1868931
CVE-2020-7053kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CONFIRM:bugs.launchpad.net:CVE-2020-7053
CVE-2020-7053
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:cdn.kernel.org:CVE-2020-7053
MISC:git.kernel.org:CVE-2020-7053
MISC:lore.kernel.org:CVE-2020-7053
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2020-7053
RHSA-2020:1567
RHSA-2020:1769
RHSA-2021:0856
RHSA-2021:0857
SMASH Issue 250881
UBUNTU:CVE-2020-7053
bnc#1160966
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
rh#1997467
CVE-2020-7595libxml2:Releasedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:cert-portal.siemens.com:CVE-2019-19956
CONFIRM:security.netapp.com:CVE-2019-20388
CONFIRM:us-cert.cisa.gov:CVE-2019-19956
CVE-2020-7595
FEDORA:FEDORA-2020-0c71c00af4
FEDORA:FEDORA-2020-41fe1680f6
FEDORA:FEDORA-2020-7694e8be73
GLSA-202010-04
MISC:gitlab.gnome.org:CVE-2020-7595
MISC:www.oracle.com:CVE-2015-7501
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
Oracle:CVE-2019-13117
Oracle:CVE-2019-2737
Oracle:CVE-2019-2739
Oracle:CVE-2019-2740
Oracle:CVE-2019-2758
Oracle:CVE-2019-2805
Oracle:CVE-2019-2938
Oracle:CVE-2019-2974
Oracle:CVE-2020-2574
Oracle:CVE-2020-7595
RH:CVE-2020-7595
RHSA-2020:2644
RHSA-2020:2646
RHSA-2020:3996
RHSA-2020:4479
SMASH Issue 251504
SUSE:openSUSE-SU-2020:0681
UBUNTU:CVE-2020-7595
USN-4274-1
bnc#1161517
rh#1728546
rh#1788856
rh#1799734
rh#1799786
CVE-2020-8025permissions:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L)CVE-2020-8025
RH:CVE-2020-8025
SMASH Issue 259623
SMASH Issue 263312
UBUNTU:CVE-2020-8025
bnc#1171883
rh#1919933
CVE-2020-8037tcpdump:Releasedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:support.apple.com:CVE-2020-3838
CONFIRM:support.apple.com:CVE-2020-7463
CVE-2020-8037
FEDORA:FEDORA-2020-c5e78886d6
FEDORA:FEDORA-2020-fae2e1f2bc
FULLDISC:20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina
MISC:github.com:CVE-2020-8037
MLIST:[debian-lts-announce] 20201110 [SECURITY] [DLA 2444-1] tcpdump security update
RH:CVE-2020-8037
RHSA-2021:4236
SMASH Issue 270846
UBUNTU:CVE-2020-8037
bnc#1178466
rh#1895080
CVE-2020-8169curl:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CONFIRM:cert-portal.siemens.com:CVE-2020-8286
CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CVE-2020-8169
DSA-4881
MISC:curl.haxx.se:OSS:2020/Q2/208
MISC:curl.haxx.se:OSS:2020/Q2/209
MISC:curl.se:CVE-2020-8169
MISC:github.com:OSS:2020/Q2/208
MISC:hackerone.com:CVE-2020-8169
OSS:2020/Q2/208
OSS:2020/Q3/6
OSS:2020/Q3/60
OSS:2020/Q3/8
RH:CVE-2020-8169
RHSA-2021:2471
RHSA-2021:2472
SMASH Issue 261677
SMASH Issue 261678
UBUNTU:CVE-2020-8169
bdo#965280
bdo#965281
bdo#968831
bdo#977161
bdo#977162
bdo#977163
bnc#1173026
https://www.debian.org/security/2021/dsa-4881
rh#1847915
rh#1847916
CVE-2020-8177curl:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CVE-2020-8177
DSA-4881
MISC:curl.haxx.se:OSS:2020/Q2/208
MISC:curl.haxx.se:OSS:2020/Q2/209
MISC:curl.se:CVE-2020-8177
MISC:github.com:OSS:2020/Q2/209
MISC:github.com:OSS:2020/Q3/4
MISC:github.com:OSS:2020/Q3/50
MISC:hackerone.com:CVE-2020-8177
MISC:nvd.nist.gov:OSS:2020/Q3/4
MISC:www.oracle.com:CVE-2022-21403
OSS:2020/Q2/209
OSS:2020/Q3/4
OSS:2020/Q3/45
OSS:2020/Q3/50
OSS:2020/Q3/6
OSS:2020/Q3/60
OSS:2020/Q3/8
RH:CVE-2020-8177
RHSA-2020:4599
RHSA-2020:5002
RHSA-2020:5417
SMASH Issue 261679
SMASH Issue 261680
SMASH Issue 262764
UBUNTU:CVE-2020-8177
bdo#965280
bdo#965281
bdo#968831
bdo#977161
bdo#977162
bdo#977163
bnc#1173027
https://www.debian.org/security/2021/dsa-4881
rh#1847915
CVE-2020-8231curl:Releasedlow3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CVE-2020-8231
DSA-4881
GLSA-202012-14
MISC:curl.haxx.se:OSS:2020/Q3/123
MISC:github.com:OSS:2020/Q3/123
MISC:hackerone.com:CVE-2020-8231
MISC:www.oracle.com:CVE-2022-21498
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
OSS:2020/Q3/123
Oracle:CVE-2020-8231
RH:CVE-2020-8231
RHSA-2021:1610
SMASH Issue 265013
SMASH Issue 265014
UBUNTU:CVE-2020-8231
bdo#965280
bdo#965281
bdo#968831
bdo#977161
bdo#977162
bdo#977163
bnc#1175109
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://www.debian.org/security/2021/dsa-4881
rh#1868032
CVE-2020-8277c-ares:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:nodejs.org:CVE-2020-8277
CVE-2020-8277
FEDORA:FEDORA-2020-307e873389
FEDORA:FEDORA-2020-7473744de1
FEDORA:FEDORA-2021-afed2b904e
FEDORA:FEDORA-2021-ee913722db
GLSA-202012-11
GLSA-202101-07
MISC:hackerone.com:CVE-2020-8277
MISC:www.oracle.com:CVE-2012-2098
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21498
N/A:N/A
Oracle:CVE-2020-8277
RH:CVE-2020-8277
RHSA-2020:5305
RHSA-2020:5499
RHSA-2021:0421
RHSA-2021:0551
SMASH Issue 271836
SMASH Issue 271837
bnc#1178882
rh#1898554
CVE-2020-8284curl:Releasedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2020-8284
CONFIRM:support.apple.com:CVE-2020-3838
CONFIRM:support.apple.com:CVE-2020-7463
CVE-2020-8284
DSA-4881
FEDORA:FEDORA-2020-7ab62c73bc
FEDORA:FEDORA-2020-ceaf490686
GLSA-202012-14
MISC:curl.se:MLIST:[oss-security] 20201209 [SECURITY ADVISORY] curl: trusting FTP PASV responses
MISC:github.com:MLIST:[oss-security] 20201209 [SECURITY ADVISORY] curl: trusting FTP PASV responses
MISC:hackerone.com:CVE-2020-8284
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
MLIST:[debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update
N/A:N/A
OSS:2020/Q4/197
RH:CVE-2020-8284
RHSA-2021:1610
RHSA-2021:2471
RHSA-2021:2472
SMASH Issue 272450
SMASH Issue 272451
bdo#965280
bdo#965281
bdo#968831
bdo#977161
bdo#977162
bdo#977163
bnc#1179398
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
https://www.debian.org/security/2021/dsa-4881
rh#1902667
CVE-2020-8285curl:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2020-8284
CONFIRM:support.apple.com:CVE-2020-3838
CONFIRM:support.apple.com:CVE-2020-7463
CVE-2020-8285
DSA-4881
FEDORA:FEDORA-2020-7ab62c73bc
FEDORA:FEDORA-2020-ceaf490686
FULLDISC:20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina
GLSA-202012-14
MISC:curl.se:OSS:2020/Q4/198
MISC:github.com:CVE-2020-8285
MISC:github.com:OSS:2020/Q4/198
MISC:hackerone.com:CVE-2020-8285
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update
N/A:N/A
OSS:2020/Q4/198
Oracle:CVE-2020-8285
RH:CVE-2020-8285
RHSA-2021:1610
RHSA-2021:2471
RHSA-2021:2472
SMASH Issue 272452
SMASH Issue 272453
bdo#965280
bdo#965281
bdo#968831
bdo#977161
bdo#977162
bdo#977163
bnc#1179399
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
https://www.debian.org/security/2021/dsa-4881
jsc#CAR-999
rh#1902687
CVE-2020-8286curl:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N)CONFIRM:cert-portal.siemens.com:CVE-2020-8286
CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2020-8284
CONFIRM:support.apple.com:CVE-2020-3838
CONFIRM:support.apple.com:CVE-2020-7463
CVE-2020-8286
DSA-4881
FEDORA:FEDORA-2020-7ab62c73bc
FEDORA:FEDORA-2020-ceaf490686
FULLDISC:20210427 APPLE-SA-2021-04-26-2 macOS Big Sur 11.3
FULLDISC:20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina
FULLDISC:20210427 APPLE-SA-2021-04-26-4 Security Update 2021-003 Mojave
GLSA-202012-14
MISC:curl.se:OSS:2020/Q4/199
MISC:github.com:OSS:2020/Q4/199
MISC:hackerone.com:CVE-2020-8286
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2022-21498
MLIST:[debian-lts-announce] 20201219 [SECURITY] [DLA 2500-1] curl security update
N/A:N/A
OSS:2020/Q4/199
Oracle:CVE-2020-8286
RH:CVE-2020-8286
RHSA-2021:1610
RHSA-2021:2471
RHSA-2021:2472
SMASH Issue 272731
SMASH Issue 272732
bdo#965280
bdo#965281
bdo#968831
bdo#977161
bdo#977162
bdo#977163
bnc#1179593
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DAEHE2S2QLO4AO4MEEYL75NB7SAH5PSL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NZUVSQHN2ESHMJXNQ2Z7T2EELBB5HJXG/
https://www.debian.org/security/2021/dsa-4881
rh#1906096
CVE-2020-8428kernel-source-rt:Already fixedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-9383
CVE-2020-8428
DSA-4667
DSA-4698
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:git.kernel.org:CVE-2020-8428
MISC:git.kernel.org:MLIST:[oss-security] 20200202 Re: Linux kernel: user-triggerable read-after-free crash or 1-bit infoleak oracle in open(2)
MISC:github.com:CVE-2020-8428
MISC:packetstormsecurity.com:CVE-2020-8428
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:www.openwall.com:CVE-2020-8428
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
MLIST:[oss-security] 20200129 Re: Linux kernel: user-triggerable read-after-free crash or 1-bit infoleak oracle in open(2)
MLIST:[oss-security] 20200202 Re: Linux kernel: user-triggerable read-after-free crash or 1-bit infoleak oracle in open(2)
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/Q1/41
RH:CVE-2020-8428
SMASH Issue 252052
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2020-8428
USN-4318-1
USN-4319-1
USN-4320-1
USN-4324-1
USN-4325-1
bdo#952660
bnc#1162109
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1773519
rh#1774983
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1796939
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
rh#1997467
CVE-2020-8492python3:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-8492
CVE-2020-8492
FEDORA:FEDORA-2020-6a88dad4a0
FEDORA:FEDORA-2020-8bdd3fd7a4
FEDORA:FEDORA-2020-98e0f0f11b
FEDORA:FEDORA-2020-ea5bdbcc90
GLSA-202005-09
MISC:bugs.python.org:CVE-2020-8492
MISC:github.com:CVE-2020-8492
MISC:python-security.readthedocs.io:CVE-2020-8492
MLIST:[debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
RH:CVE-2020-8492
RHSA-2020:3888
RHSA-2020:4285
RHSA-2020:4433
RHSA-2020:4641
SMASH Issue 252192
SUSE:openSUSE-SU-2020:0274
UBUNTU:CVE-2020-8492
USN-4333-1
USN-4333-2
bnc#1162367
https://lists.apache.org/thread.html/rdb31a608dd6758c6093fd645aea3fbf022dd25b37109b6aaea5bc0b5@%3Ccommits.cassandra.apache.org%3E
https://lists.apache.org/thread.html/rfec113c733162b39633fd86a2d0f34bf42ac35f711b3ec1835c774da@%3Ccommits.cassandra.apache.org%3E
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
rh#1800749
rh#1809065
CVE-2020-8647kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2020-8647
DSA-4698
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:bugzilla.kernel.org:CVE-2020-8647
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2020-8647
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:4431
RHSA-2020:4609
RHSA-2022:1209
RHSA-2022:1213
SMASH Issue 252527
SUSE:openSUSE-SU-2020:0388
UBUNTU:CVE-2020-8647
bdo#952660
bnc#1162929
linux.git:commit:513dc792d6060d5ef572e43852683097a8420f56
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1667782
rh#1707796
rh#1773519
rh#1774983
rh#1783498
rh#1795624
rh#1802563
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
CVE-2020-8648kernel-source-rt:Already fixedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-8648
CVE-2020-8648
DSA-4698
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:bugzilla.kernel.org:CVE-2020-8648
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2020-8648
RHSA-2020:4431
RHSA-2020:4609
RHSA-2021:2314
RHSA-2021:2316
RHSA-2021:3320
RHSA-2021:3522
SMASH Issue 252528
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2020-8648
USN-4342-1
USN-4344-1
USN-4345-1
USN-4346-1
bdo#952660
bnc#1162928
linux.git:commit:07e6124a1a46b4b5a9b3cacc0c306b50da87abf5
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1667782
rh#1773519
rh#1774983
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1802559
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
rh#1997467
CVE-2020-8649kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2020-8649
DSA-4698
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:bugzilla.kernel.org:CVE-2020-8649
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2020-8649
RHSA-2020:4060
RHSA-2020:4062
RHSA-2020:4431
RHSA-2020:4609
RHSA-2022:1209
RHSA-2022:1213
SMASH Issue 252529
SUSE:openSUSE-SU-2020:0388
UBUNTU:CVE-2020-8649
bdo#952660
bnc#1162931
linux.git:commit:513dc792d6060d5ef572e43852683097a8420f56
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1667782
rh#1707796
rh#1773519
rh#1774983
rh#1783498
rh#1795624
rh#1802555
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
CVE-2020-8694kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:cert-portal.siemens.com:CVE-2020-8745
CVE-2020-8694
MISC:git.kernel.org:OSS:2020/Q4/110
MISC:www.intel.com:CVE-2020-8694
MISC:www.intel.com:MLIST:[oss-security] 20201126 Xen Security Advisory 351 v2 (CVE-2020-28368) - Information leak via power sidechannel
MLIST:[debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
OSS:2020/Q4/110
RH:CVE-2020-8694
SMASH Issue 258389
SMASH Issue 258391
bnc#1170415
bnc#1178700
rh#1828580
CVE-2020-8834kernel-source-rt:Not affectedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)CONFIRM:N/A
CVE-2020-8834
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:git.kernel.org:MLIST:[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets
MISC:github.com:MLIST:[oss-security] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file
N/A
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
OSS:2020/Q2/15
OSS:2020/Q4/161
OSS:2021/Q4/14
RH:CVE-2020-8834
RHSA-2020:2854
SMASH Issue 256214
SMASH Issue 256215
SUSE:openSUSE-SU-2020:0543
UBUNTU:CVE-2020-8834
USN-4318-1
bnc#1168276
bnc#1173945
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1707796
rh#1774983
rh#1795624
rh#1819615
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
CVE-2020-8835kernel-source-rt:Already fixedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:N/A
CONFIRM:security.netapp.com:CVE-2019-20636
CVE-2020-8835
FEDORA:FEDORA-2020-4ef0bcc89c
FEDORA:FEDORA-2020-666f3b1ac3
FEDORA:FEDORA-2020-73c00eda1c
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:git.kernel.org:MLIST:[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets
MISC:github.com:MLIST:[oss-security] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file
MISC:people.canonical.com:CONFIRM:N/A
MISC:www.qualys.com:MISC:www.openwall.com:CVE-2021-33909
MISC:www.thezdi.com:MISC:www.openwall.com:CVE-2021-33909
N/A
OSS:2020/03/30/3
OSS:2020/Q1/127
OSS:2020/Q4/161
OSS:2021/07/20/1
OSS:2021/Q4/14
RH:CVE-2020-8835
SMASH Issue 255943
SMASH Issue 255944
UBUNTU:CVE-2020-8835
USN-4313-1
ZDI-20-350
bnc#1167722
bnc#1173755
rh#1817350
CVE-2020-8992kernel-source-rt:Already fixedlow2.1 (CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2020-9383
CVE-2020-8992
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MISC:patchwork.ozlabs.org:CVE-2020-8992
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2020-8992
SMASH Issue 253189
SUSE:openSUSE-SU-2020:0336
UBUNTU:CVE-2020-8992
USN-4318-1
USN-4324-1
USN-4342-1
USN-4344-1
USN-4419-1
bnc#1164069
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1667782
rh#1773519
rh#1774983
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1795624
rh#1805887
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1997467
CVE-2020-9327sqlite3:Releasedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2020-9327
CVE-2020-9327
GLSA-202003-16
MISC:www.oracle.com:CVE-2012-2098
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2015-7501
MISC:www.oracle.com:CVE-2021-3450
MISC:www.sqlite.org:CVE-2020-9327
RH:CVE-2020-9327
RHSA-2020:4442
SMASH Issue 253635
UBUNTU:CVE-2020-9327
USN-4298-1
bnc#1164719
rh#1809315
CVE-2020-9383kernel-source-rt:Already fixedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2020-9383
CVE-2020-9383
DSA-4698
L3:2
L3:56672
L3:56786
L3:57054
L3:60875
MISC:bugs.launchpad.net:CONFIRM:N/A
MISC:git.kernel.org:CVE-2020-9383
MISC:github.com:CVE-2020-9383
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
MLIST:[debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
MLIST:[debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
OSS:2020/04/06/2
OSS:2020/04/30/5
OSS:2020/06/04/4
RH:CVE-2020-9383
RHSA-2020:2104
RHSA-2020:4060
RHSA-2020:4062
SMASH Issue 253765
SUSE:openSUSE-SU-2020:0388
UBUNTU:CVE-2020-9383
USN-4342-1
USN-4344-1
USN-4345-1
USN-4346-1
bdo#952660
bnc#1161561
bnc#1164507
bnc#1165111
bnc#1167316
bnc#1186627
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1667782
rh#1707796
rh#1773519
rh#1774983
rh#1783498
rh#1795624
rh#1810685
rh#1831726
rh#1831849
rh#1832860
rh#1839634
rh#1842525
rh#1851480
CVE-2020-9391kernel-source-rt:Unsupportedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2020-9383
CVE-2020-9391
FEDORA:FEDORA-2020-3cd64d683c
MISC:bugzilla.redhat.com:MLIST:[oss-security] 20200225 CVE-2020-9391: Ignoring the top byte of addresses in brk causes heap corruption (AArch64)
MISC:git.kernel.org:MLIST:[oss-security] 20200225 CVE-2020-9391: Ignoring the top byte of addresses in brk causes heap corruption (AArch64)
MLIST:[oss-security] 20200225 CVE-2020-9391: Ignoring the top byte of addresses in brk causes heap corruption (AArch64)
OSS:2020/Q1/94
RH:CVE-2020-9391
SMASH Issue 253741
UBUNTU:CVE-2020-9391
bnc#1165015
rh#1814237
CVE-2021-0129kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N)CONFIRM:security.netapp.com:CVE-2021-0129
CONFIRM:www.intel.com:CVE-2020-26558
CVE-2021-0129
D:CVE-2021-0129
DSA-4951
GLSA-202209-16
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20210626 [SECURITY] [DLA 2692-1] bluez security update
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 300781
SMASH Issue 300782
bdo#989614
bnc#1186463
rh#1918602
rh#1965038
CVE-2021-0342kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:source.android.com:CVE-2020-27059
CVE-2021-0342
RH:CVE-2021-0342
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 275073
bnc#1180812
bnc#1180859
rh#1915799
CVE-2021-0512kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-0512
MISC:source.android.com:CVE-2021-0533
RHSA-2021:3443
RHSA-2021:3445
RHSA-2021:3446
RHSA-2021:4056
RHSA-2021:4088
RHSA-2021:4122
RHSA-2021:4750
SMASH Issue 302634
bnc#1187595
bnc#1187597
rh#1974491
CVE-2021-0605kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-0605
MISC:source.android.com:CVE-2021-0572
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 302724
SMASH Issue 302725
bnc#1187601
bnc#1187687
rh#1974823
CVE-2021-0606kernel-source-rt:Not affectedmoderate ()CVE-2021-0606
MISC:source.android.com:CVE-2021-0572
SMASH Issue 302726
SMASH Issue 302727
bnc#1187602
rh#1974827
CVE-2021-0707kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-0707
MISC:source.android.com:CVE-2021-39809
SMASH Issue 328864
bnc#1198437
bnc#1199332
rh#2123654
CVE-2021-0920kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-0920
DSA-5096
MISC:source.android.com:CVE-2021-1048
MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2022:0590
RHSA-2022:0592
RHSA-2022:0620
RHSA-2022:0622
RHSA-2022:0629
RHSA-2022:0636
RHSA-2022:0771
RHSA-2022:0772
RHSA-2022:0777
RHSA-2022:0819
RHSA-2022:0823
RHSA-2022:0825
RHSA-2022:0841
RHSA-2022:0849
RHSA-2022:0851
RHSA-2022:0958
RHSA-2022:1103
RHSA-2022:1104
RHSA-2022:1106
RHSA-2022:1107
RHSA-2022:1263
RHSA-2022:1324
RHSA-2022:1373
RHSA-2022:1417
SMASH Issue 317304
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1193731
bnc#1194463
jsc#CAR-1457
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2029923
rh#2031930
rh#2044561
rh#2053632
rh#2059923
CVE-2021-0924kernel-source-rt:Not affectedimportant ()CVE-2021-0924
MISC:source.android.com:CVE-2021-1048
SMASH Issue 317753
bnc#1193792
rh#2034699
CVE-2021-0929kernel-source-rt:Not affectedimportant ()CVE-2021-0929
MISC:source.android.com:CVE-2021-1048
SMASH Issue 317748
bnc#1193794
rh#2034702
CVE-2021-0935kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-0935
DSA-5096
L3:62097
MISC:source.android.com:CVE-2021-0941
OSS:2021/07/22/1
OSS:2021/09/15/4
OSS:2022/01/25/12
SMASH Issue 313510
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1192032
bnc#1192042
bnc#1192638
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#1999544
rh#2010970
rh#2018225
rh#2044561
rh#2053632
rh#2059923
CVE-2021-0938kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2021-0938
MISC:source.android.com:CVE-2021-0941
SMASH Issue 313508
bnc#1192039
jsc#CAR-1186
rh#2018212
CVE-2021-0939kernel-source-rt:Not affectedlow ()CVE-2021-0939
MISC:source.android.com:CVE-2021-0941
SMASH Issue 313507
bnc#1192043
CVE-2021-0941kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-0941
MISC:source.android.com:CVE-2021-0941
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 313505
bnc#1192045
bnc#1192048
rh#2018205
CVE-2021-0961kernel-source-rt:Not affectedmoderate ()CVE-2021-0961
MISC:source.android.com:CVE-2021-0971
SMASH Issue 317737
bnc#1193790
rh#2033723
CVE-2021-1043kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)CVE-2021-1043
MISC:source.android.com:CVE-2021-1045
SMASH Issue 317665
bnc#1199357
jsc#CAR-1755
CVE-2021-1048kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-1048
MISC:source.android.com:CVE-2021-1048
SMASH Issue 317289
bnc#1193729
bnc#1194457
jsc#CAR-1378
rh#2031928
CVE-2021-20177kernel-source-rt:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-20177
MISC:bugzilla.kernel.org:OSS:2021/Q1/20
MISC:git.kernel.org:OSS:2021/Q1/20
OSS:2021/Q1/20
RH:CVE-2021-20177
SMASH Issue 274991
bdo#970736
bdo#972345
bdo#977048
bdo#977615
bnc#1180765
jsc#CAR-997
rh#1914719
CVE-2021-20193tar:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2021-20193
GLSA-202105-29
MISC:git.savannah.gnu.org:CVE-2021-20193
MISC:savannah.gnu.org:CVE-2021-20193
RH:CVE-2021-20193
SMASH Issue 275732
bnc#1181131
rh#1917565
CVE-2021-20194kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-20194
CVE-2021-20194
MISC:access.redhat.com:/errata/RHSA-2021:4140
MISC:access.redhat.com:/errata/RHSA-2021:4356
RH:CVE-2021-20194
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 277515
ZDI-21-100
bnc#1181637
bnc#1182010
rh#1912683
CVE-2021-20197binutils:Releasedmoderate6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N)CONFIRM:security.netapp.com:CVE-2021-20197
CVE-2021-20197
GLSA-202208-30
L3:60708
L3:61451
MISC:access.redhat.com:/errata/RHSA-2021:4364
MISC:sourceware.org:CVE-2021-20197
RH:CVE-2021-20197
RHSA-2021:4364
SMASH Issue 276583
bnc#1181452
bnc#1185742
bnc#1189527
jsc#CAR-1439
rh#1911437
rh#1911439
rh#1911441
rh#1911444
rh#1911691
rh#1913743
rh#1947111
CVE-2021-20200kernel-source-rt:Ignorelow ()CVE-2021-20200
MISC:bugs.chromium.org:MLIST:[oss-security] 20210219 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards()
MISC:git.kernel.org:MLIST:[oss-security] 20210219 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards()
MLIST:[oss-security] 20210210 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards()
MLIST:[oss-security] 20210219 Re: CVE-2021-20200: Linux kernel: close race between munmap() and expand_upwards()/downwards()
OSS:2021/Q1/136
RH:CVE-2021-20200
SMASH Issue 277651
bnc#1182109
rh#1908249
CVE-2021-20219kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-20219
OSS:2021/Q1/221
RH:CVE-2021-20219
SMASH Issue 279934
bnc#1184397
rh#1923738
CVE-2021-20226kernel-source-rt:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-20226
CVE-2021-20226
OSS:2021/Q1/111
RH:CVE-2021-20226
SMASH Issue 274506
SMASH Issue 277302
ZDI-21-001
bnc#1180564
bnc#1181846
rh#1873476
CVE-2021-20227sqlite3:Not affectedmoderate ()CONFIRM:security.netapp.com:CVE-2021-20227
CVE-2021-20227
GLSA-202103-04
GLSA-202210-40
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2021-35666
MISC:www.sqlite.org:CVE-2021-20227
N/A:N/A
Oracle:CVE-2021-20227
RH:CVE-2021-20227
SMASH Issue 276169
SMASH Issue 277207
bnc#1181261
rh#1924886
CVE-2021-20231gnutls:Not affectedimportant7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-20231
CVE-2021-20231
FEDORA:FEDORA-2021-18bef34f05
MISC:www.gnutls.org:CVE-2021-20231
MLIST:[spark-issues] 20210413 [jira] [Created] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch
MLIST:[spark-issues] 20210417 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch
MLIST:[spark-issues] 20210423 [jira] [Resolved] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch
MLIST:[spark-issues] 20210425 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch
MLIST:[spark-issues] 20210426 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch
MLIST:[spark-issues] 20210426 [jira] [Updated] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch
MLIST:[spark-issues] 20210429 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch
MLIST:[spark-issues] 20210430 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch
RH:CVE-2021-20231
RHSA-2021:4451
SMASH Issue 279725
bnc#1183457
rh#1922276
CVE-2021-20232gnutls:Not affectedimportant7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-20231
CVE-2021-20232
FEDORA:FEDORA-2021-18bef34f05
MISC:www.gnutls.org:CVE-2021-20231
MLIST:[spark-issues] 20210413 [jira] [Created] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch
MLIST:[spark-issues] 20210417 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch
MLIST:[spark-issues] 20210423 [jira] [Resolved] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch
MLIST:[spark-issues] 20210425 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch
MLIST:[spark-issues] 20210426 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch
MLIST:[spark-issues] 20210426 [jira] [Updated] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch
MLIST:[spark-issues] 20210429 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch
MLIST:[spark-issues] 20210430 [jira] [Commented] (SPARK-35054) Getting Critical Vulnerability CVE-2021-20231 on spark 3.0.0 branch
RH:CVE-2021-20232
RHSA-2021:4451
SMASH Issue 279724
bnc#1183456
rh#1922275
CVE-2021-20239kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)CVE-2021-20239
RH:CVE-2021-20239
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 277983
bnc#1182330
rh#1923636
CVE-2021-20248rpm:Won't fixmoderate4.6 (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L)CVE-2021-20248
RH:CVE-2021-20248
SMASH Issue 279681
bnc#1183547
jsc#CAR-996
rh#1927740
CVE-2021-20249rpm:Ignoremoderate4.2 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N)CVE-2021-20249
RH:CVE-2021-20249
SMASH Issue 279683
bnc#1183544
rh#1927742
CVE-2021-20261kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-20261
MISC:git.kernel.org:OSS:2021/Q1/204
OSS:2021/Q1/204
RH:CVE-2021-20261
SMASH Issue 279574
bnc#1183400
bnc#1183402
jsc#CAR-421
rh#1932150
CVE-2021-20265kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-20265
L3:66541
L3:66770
L3:67469
MISC:git.kernel.org:CVE-2021-20265
MISC:www.oracle.com:CVE-2021-35666
RH:CVE-2021-20265
RHSA-2021:0856
RHSA-2021:0857
RHSA-2021:1288
SMASH Issue 279195
bnc#1183089
rh#1908827
CVE-2021-20266rpm:Releasedlow3.1 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-20266
D:CVE-2021-20266
FEDORA:FEDORA-2021-2383d950fd
FEDORA:FEDORA-2021-8d52a8a999
GLSA-202107-43
L3:61826
L3:62712
RH:CVE-2021-20266
RHSA-2021:4489
SMASH Issue 279682
bnc#1183632
bnc#1191360
jsc#CAR-995
rh#1927741
CVE-2021-20268kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-20268
CVE-2021-20268
MISC:lore.kernel.org:CVE-2021-20268
RH:CVE-2021-20268
SMASH Issue 279234
bnc#1183077
bnc#1183095
rh#1923816
CVE-2021-20269kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2021-20269
MISC:access.redhat.com:/errata/RHSA-2021:4404
MISC:bugzilla.redhat.com:OSS:2021/Q1/205
OSS:2021/Q1/205
RH:CVE-2021-20269
RHSA-2021:4404
SMASH Issue 279353
bnc#1189468
rh#1934261
CVE-2021-20270python-Pygments:Unsupportedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-20270
DSA-4870
DSA-4889
MLIST:[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update
RH:CVE-2021-20270
RHSA-2021:0781
RHSA-2021:3252
RHSA-2021:4139
RHSA-2021:4150
RHSA-2021:4151
SMASH Issue 279276
bnc#1183169
jsc#CAR-994
rh#1922136
CVE-2021-20271rpm:Releasedlow3.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L)CVE-2021-20271
FEDORA:FEDORA-2021-2383d950fd
FEDORA:FEDORA-2021-662680e477
FEDORA:FEDORA-2021-8d52a8a999
GLSA-202107-43
MISC:access.redhat.com:/errata/RHBA-2021:2854
MISC:access.redhat.com:/errata/RHSA-2021:2574
MISC:access.redhat.com:/errata/RHSA-2021:2791
MISC:access.redhat.com:/errata/RHSA-2021:4771
MISC:access.redhat.com:/errata/RHSA-2021:4785
MISC:access.redhat.com:/errata/RHSA-2021:4975
MISC:github.com:CVE-2021-20271
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/
MISC:www.starwindsoftware.com:CVE-2021-20271
RH:CVE-2021-20271
RHBA-2021:2854
RHSA-2021:2574
RHSA-2021:2791
RHSA-2021:4771
RHSA-2021:4785
RHSA-2021:4975
SMASH Issue 279680
bnc#1183545
jsc#CAR-1203
rh#1934125
CVE-2021-20284binutils:Unsupportedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-20284
CVE-2021-20284
GLSA-202208-30
MISC:access.redhat.com:/errata/RHSA-2021:4364
MISC:sourceware.org:CVE-2021-20284
RH:CVE-2021-20284
RHSA-2021:4364
SMASH Issue 279586
bnc#1183511
jsc#CAR-993
rh#1937784
CVE-2021-20292kernel-source-rt:Already fixedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-20292
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
RH:CVE-2021-20292
SMASH Issue 280020
bnc#1183723
jsc#CAR-1673
rh#1939686
CVE-2021-20294binutils:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
CVE-2021-20294
D:CVE-2021-20294
GLSA-202208-30
MISC:sourceware.org:CVE-2021-20294
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
RH:CVE-2021-20294
SMASH Issue 280541
bnc#1184519
jsc#CAR-992
rh#1943533
CVE-2021-20305libnettle:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-20305
D:CVE-2021-20305
DSA-4933
FEDORA:FEDORA-2021-454a0f6f76
GLSA-202105-31
RH:CVE-2021-20305
RHSA-2021:1145
RHSA-2021:1206
RHSA-2021:1245
RHSA-2021:1246
RHSA-2021:2280
RHSA-2021:2356
RHSA-2021:2758
RHSA-2021:2760
SMASH Issue 280836
bdo#985652
bdo#989631
bnc#1183835
bnc#1184401
jsc#CAR-478
rh#1942533
CVE-2021-20317kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:CVE-2022-0847
CVE-2021-20317
DSA-5096
MISC:git.kernel.org:CVE-2021-20317
MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2021:4646
RHSA-2021:4647
RHSA-2021:4648
RHSA-2021:4650
RHSA-2021:4871
RHSA-2021:4875
SMASH Issue 310782
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1191125
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2005258
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-20320kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2021-20320
MISC:lore.kernel.org:CVE-2021-20320
SMASH Issue 310338
SMASH Issue 312311
bnc#1190601
jsc#CAR-1131
rh#2010090
CVE-2021-20321kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-20321
DSA-5096
MISC:lore.kernel.org:CVE-2021-20321
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2021:5227
RHSA-2021:5241
SMASH Issue 312529
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1191647
jsc#CAR-1132
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2013242
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-20322kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)CONFIRM:security.netapp.com:CVE-2021-20322
CVE-2021-20322
DSA-5096
MISC:git.kernel.org:CVE-2021-20322
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2022:1975
RHSA-2022:1988
RHSA-2022:4829
RHSA-2022:4835
SMASH Issue 312780
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1191790
bnc#1191813
jsc#CAR-1151
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1894579
rh#1980646
rh#1997467
rh#2014230
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-21781kernel-source-rt:Releasedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2021-21781
D:CVE-2021-21781
MISC:talosintelligence.com:CVE-2021-21781
MISC:www.oracle.com:CVE-2022-21586
RHSA-2022:1988
SMASH Issue 304006
bnc#1188445
rh#1981950
CVE-2021-22543kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-22543
CVE-2021-22543
D:CVE-2021-22543
FEDORA:FEDORA-2021-95f2f1cfc7
FEDORA:FEDORA-2021-fe826f202e
MISC:github.com:MLIST:[oss-security] 20210626 Re: CVE-2021-22543 - /dev/kvm LPE
MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
MLIST:[oss-security] 20210526 CVE-2021-22543 - /dev/kvm LPE
MLIST:[oss-security] 20210526 Re: CVE-2021-22543 - /dev/kvm LPE
MLIST:[oss-security] 20210626 Re: CVE-2021-22543 - /dev/kvm LPE
OSS:2021/Q2/167
RHSA-2021:3044
RHSA-2021:3057
RHSA-2021:3088
RHSA-2021:3173
RHSA-2021:3181
RHSA-2021:3235
RHSA-2021:3363
RHSA-2021:3375
RHSA-2021:3380
RHSA-2021:3725
RHSA-2021:3766
RHSA-2021:3767
RHSA-2021:3768
RHSA-2021:3801
RHSA-2021:3802
RHSA-2021:3812
RHSA-2021:3814
RHSA-2021:3943
RHSA-2021:3987
RHSA-2021:4000
RHSA-2022:5640
SMASH Issue 300801
bnc#1186482
bnc#1186483
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4G5YBUVEPHZYXMKNGBZ3S6INFCTEEL4E/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ROQIXQB7ZAWI3KSGSHR6H5RDUWZI775S/
jsc#CAR-650
rh#1965461
CVE-2021-22555kernel-source-rt:Released, ltp:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-22555
CVE-2021-22555
MISC:git.kernel.org:CVE-2021-22555
MISC:github.com:CVE-2021-22555
MISC:packetstormsecurity.com:CVE-2021-22555
MISC:packetstormsecurity.com:CVE-2021-33909
RHSA-2021:3044
RHSA-2021:3057
RHSA-2021:3088
RHSA-2021:3173
RHSA-2021:3181
RHSA-2021:3235
RHSA-2021:3321
RHSA-2021:3327
RHSA-2021:3328
RHSA-2021:3363
RHSA-2021:3375
RHSA-2021:3380
RHSA-2021:3381
RHSA-2021:3399
RHSA-2021:3477
RHSA-2021:3522
RHSA-2021:3523
RHSA-2021:3725
RHSA-2021:3812
RHSA-2021:3814
SMASH Issue 303620
bnc#1188116
bnc#1188117
jsc#CAR-991
rh#1980101
CVE-2021-22569protobuf:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2021-22569
MISC:bugs.chromium.org:CVE-2021-22569
MISC:cloud.google.com:CVE-2021-22569
MISC:www.oracle.com:CVE-2022-21498
OSS:2022/01/12/4
OSS:2022/01/12/7
OSS:2022/Q1/29
Oracle:CVE-2021-22569
RHSA-2022:1013
RHSA-2022:4623
RHSA-2022:5532
RHSA-2022:5903
RHSA-2022:6835
RHSA-2022:7896
RHSA-2022:8761
SMASH Issue 319908
bnc#1194530
https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html
jsc#CAR-1389
rh#2039903
CVE-2021-22570protobuf:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:N/A
CONFIRM:security.netapp.com:CVE-2022-21490
CVE-2021-22570
D:CVE-2021-22570
FEDORA:FEDORA-2022-2d3e6eb9e4
FEDORA:FEDORA-2022-486d5f349d
FEDORA:FEDORA-2022-49b52819a4
FEDORA:FEDORA-2022-57923346cf
FEDORA:FEDORA-2022-d1a15f9cdb
FEDORA:FEDORA-2022-fedff53e4e
FEDORA:FEDORA-2022-ffe4a1cedd
MISC:www.oracle.com:CVE-2022-21498
Oracle:CVE-2021-22570
RHSA-2022:7464
RHSA-2022:7970
RHSA-2022:8847
RHSA-2022:8860
SMASH Issue 321783
bnc#1195258
https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html
jsc#CAR-1482
rh#2049429
CVE-2021-22600kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230110-0002/
CVE-2021-22600
DSA-5096
MISC:git.kernel.org:CVE-2021-22600
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
SMASH Issue 321782
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1195184
bnc#1195307
jsc#CAR-1511
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2044561
rh#2047912
rh#2053632
rh#2055502
rh#2059923
CVE-2021-22876curl:Releasedmoderate6.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2021-22890
CVE-2021-22876
FEDORA:FEDORA-2021-065371f385
FEDORA:FEDORA-2021-26a293c72b
FEDORA:FEDORA-2021-cab5c9befb
GLSA-202105-36
MISC:curl.se:OSS:2021/Q1/279
MISC:github.com:OSS:2021/Q1/279
MISC:hackerone.com:CVE-2021-22876
MLIST:[debian-lts-announce] 20210517 [SECURITY] [DLA 2664-1] curl security update
N/A:N/A
OSS:2021/Q1/279
RH:CVE-2021-22876
RHSA-2021:2471
RHSA-2021:2472
RHSA-2021:4511
RHSA-2022:1354
SMASH Issue 280318
SMASH Issue 280319
bdo#965280
bdo#965281
bdo#968831
bdo#977161
bdo#977162
bdo#977163
bnc#1183933
bnc#1183934
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
jsc#CAR-424
rh#1941964
CVE-2021-22890curl:Releasedlow3.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2021-22890
CVE-2021-22890
FEDORA:FEDORA-2021-065371f385
FEDORA:FEDORA-2021-26a293c72b
FEDORA:FEDORA-2021-cab5c9befb
GLSA-202105-36
MISC:curl.se:OSS:2021/Q1/280
MISC:github.com:OSS:2021/Q1/280
MISC:hackerone.com:CVE-2021-22890
N/A:N/A
OSS:2021/Q1/280
RH:CVE-2021-22890
RHSA-2021:2471
RHSA-2021:2472
SMASH Issue 280320
SMASH Issue 280321
bdo#965280
bdo#965281
bdo#968831
bdo#977161
bdo#977162
bdo#977163
bnc#1183934
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZC5BMIOKLBQJSFCHEDN2G2C2SH274BP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITVWPVGLFISU5BJC2BXBRYSDXTXE2YGC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQUIOYX2KUU6FIUZVB5WWZ6JHSSYSQWJ/
jsc#CAR-423
rh#1941965
CVE-2021-22897curl:Not affectedmoderate ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2021-22901
CVE-2021-22897
MISC:curl.se:CVE-2021-22897
MISC:github.com:CVE-2021-22897
MISC:hackerone.com:CVE-2021-22897
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
N/A:N/A
SMASH Issue 300783
bnc#1186488
rh#1964904
CVE-2021-22898curl:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CVE-2021-22898
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
DSA-5197
FEDORA:FEDORA-2021-5d21b90a30
FEDORA:FEDORA-2021-83fdddca0f
MISC:curl.se:MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again
MISC:github.com:OSS:2021/Q2/165
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2021-22898
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
MLIST:[debian-lts-announce] 20210813 [SECURITY] [DLA 2734-1] curl security update
MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
MLIST:[guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans.
MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again
N/A:N/A
OSS:2021/Q2/165
OSS:2021/Q3/27
OSS:2023/02/15/3
OSS:2023/03/20/6
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
RHSA-2021:4511
SMASH Issue 284453
SMASH Issue 284454
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1186114
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
jsc#CAR-642
rh#1964887
rh#1970902
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099300
rh#2099305
rh#2099306
CVE-2021-22901curl:Not affectedimportant ()CONFIRM:cert-portal.siemens.com:CVE-2021-22924
CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2021-22901
CONFIRM:security.netapp.com:CVE-2021-2412
CVE-2021-22901
MISC:curl.se:OSS:2021/Q2/166
MISC:github.com:OSS:2021/Q2/166
MISC:hackerone.com:CVE-2021-22901
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
N/A:N/A
OSS:2021/Q2/166
Oracle:CVE-2021-22901
RHSA-2021:2471
RHSA-2021:2472
SMASH Issue 284455
SMASH Issue 284456
bnc#1185579
bnc#1186115
rh#1963146
CVE-2021-22918libuv:Not affectedmoderate ()CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2021-22921
CVE-2021-22918
DSA-4936
MISC:hackerone.com:CVE-2021-22918
MISC:nodejs.org:CVE-2021-22921
RHSA-2021:2931
RHSA-2021:2932
RHSA-2021:3073
RHSA-2021:3074
RHSA-2021:3075
RHSA-2021:3638
RHSA-2021:3639
SMASH Issue 303414
SMASH Issue 303415
bdo#990561
bnc#1187973
https://security.gentoo.org/glsa/202401-23
rh#1979338
CVE-2021-22922curl:Released, curl-mini:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2021-22926
CVE-2021-22922
FEDORA:FEDORA-2021-5d21b90a30
GLSA-202212-01
MISC:curl.se:OSS:2021/Q3/24
MISC:github.com:OSS:2021/Q3/25
MISC:hackerone.com:CVE-2021-22922
MISC:www.oracle.com:CVE-2021-35666
MLIST:[kafka-dev] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[kafka-users] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[kafka-users] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
OSS:2021/Q3/24
RHSA-2021:3582
RHSA-2021:3903
SMASH Issue 303763
SMASH Issue 303764
bnc#1188217
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
jsc#CAR-840
rh#1981435
CVE-2021-22923curl:Released, curl-mini:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2021-22926
CVE-2021-22923
FEDORA:FEDORA-2021-5d21b90a30
GLSA-202212-01
MISC:curl.se:OSS:2021/Q3/25
MISC:github.com:OSS:2021/Q3/25
MISC:hackerone.com:CVE-2021-22923
MISC:www.oracle.com:CVE-2021-35666
OSS:2021/Q3/25
RHSA-2021:3582
RHSA-2021:3903
SMASH Issue 303765
SMASH Issue 303766
bnc#1188218
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
jsc#CAR-839
rh#1981438
CVE-2021-22924curl:Released, curl-mini:Releasedmoderate5.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)CONFIRM:cert-portal.siemens.com:CVE-2021-22924
CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2021-22926
CVE-2021-22924
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
DSA-5197
FEDORA:FEDORA-2021-5d21b90a30
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:curl.se:OSS:2021/Q3/26
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:OSS:2021/Q3/26
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2021-22924
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MLIST:[debian-lts-announce] 20210813 [SECURITY] [DLA 2734-1] curl security update
MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
MLIST:[kafka-dev] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[kafka-users] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[kafka-users] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
OSS:2021/Q3/26
OSS:2023/02/15/3
OSS:2023/03/20/6
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
RHSA-2021:3582
RHSA-2022:1354
SMASH Issue 303767
SMASH Issue 303768
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1188219
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
jsc#CAR-990
rh#1981460
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099300
rh#2099305
rh#2099306
CVE-2021-22925curl:Released, curl-mini:Releasedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2021-22926
CONFIRM:support.apple.com:CVE-2021-22925
CVE-2021-22925
FEDORA:FEDORA-2021-5d21b90a30
FULLDISC:20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6
FULLDISC:20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina
GLSA-202212-01
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:curl.se:MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again
MISC:github.com:MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again
MISC:hackerone.com:CVE-2021-22925
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
OSS:2021/Q3/27
RHSA-2021:4511
SMASH Issue 303769
SMASH Issue 303770
bnc#1188220
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
jsc#CAR-837
jsc#CAR-838
rh#1970902
CVE-2021-22926curl:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2021-22926
CONFIRM:security.netapp.com:CVE-2021-35648
CVE-2021-22926
GLSA-202212-01
MISC:hackerone.com:CVE-2021-22926
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MLIST:[kafka-dev] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[kafka-users] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[kafka-users] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
Oracle:CVE-2021-22926
SMASH Issue 304615
SMASH Issue 304616
bnc#1188510
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
rh#2016088
CVE-2021-22945curl:Not affectedmoderate6.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2021-22947
CONFIRM:support.apple.com:CVE-2022-0158
CVE-2021-22945
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
DSA-5197
FEDORA:FEDORA-2021-1d24845e93
FEDORA:FEDORA-2021-fc96a3a749
FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
GLSA-202212-01
MISC:curl.se:OSS:2021/Q3/166
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:OSS:2021/Q3/166
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2021-22945
MISC:www.oracle.com:CVE-2021-35666
OSS:2021/Q3/166
OSS:2023/02/15/3
OSS:2023/03/20/6
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
SMASH Issue 309113
SMASH Issue 309114
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1190213
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
rh#2001527
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099300
rh#2099305
rh#2099306
CVE-2021-22946curl:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2021-22947
CONFIRM:security.netapp.com:CVE-2022-21380
CONFIRM:support.apple.com:CVE-2022-0158
CVE-2021-22946
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
DSA-5197
FEDORA:FEDORA-2021-1d24845e93
FEDORA:FEDORA-2021-fc96a3a749
FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
GLSA-202212-01
MISC:curl.se:OSS:2021/Q3/167
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:OSS:2021/Q3/167
MISC:github.com:OSS:2021/Q3/168
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2021-22946
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20210930 [SECURITY] [DLA 2773-1] curl security update
MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
OSS:2021/Q3/167
OSS:2023/02/15/3
OSS:2023/03/20/6
Oracle:CVE-2021-22946
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
RHSA-2021:4059
RHSA-2022:0635
RHSA-2022:1354
SMASH Issue 309780
SMASH Issue 309781
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1190373
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
jsc#CAR-1052
rh#2003175
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099300
rh#2099305
rh#2099306
CVE-2021-22947curl:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2021-22947
CONFIRM:support.apple.com:CVE-2022-0158
CVE-2021-22947
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
DSA-5197
FEDORA:FEDORA-2021-1d24845e93
FEDORA:FEDORA-2021-fc96a3a749
FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
GLSA-202212-01
MISC:curl.se:OSS:2021/Q3/168
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:OSS:2021/Q3/168
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2021-22947
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20210930 [SECURITY] [DLA 2773-1] curl security update
MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
OSS:2021/Q3/168
OSS:2023/02/15/3
OSS:2023/03/20/6
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
RHSA-2021:4059
RHSA-2022:0635
RHSA-2022:1354
SMASH Issue 309782
SMASH Issue 309783
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1190374
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
jsc#CAR-1053
rh#2003191
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099300
rh#2099305
rh#2099306
CVE-2021-23133kernel-source-rt:Already fixedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:N/A
CONFIRM:security.netapp.com:CVE-2021-23133
CVE-2021-23133
FEDORA:FEDORA-2021-8cd093f639
FEDORA:FEDORA-2021-a963f04012
FEDORA:FEDORA-2021-e6b4847979
MISC:git.kernel.org:MLIST:[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets
MISC:github.com:MLIST:[oss-security] 20211007 CVE-2021-33035: Apache OpenOffice: Buffer overflow from a crafted DBF file
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[oss-security] 20210510 Re: CVE-2021-23133: Linux kernel: race condition in sctp sockets
OSS:2021/04/18/2
OSS:2021/Q2/32
OSS:2021/Q4/14
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 281717
SMASH Issue 282222
bnc#1184675
bnc#1185901
jsc#CAR-988
jsc#CAR-989
linux.git:commit:34e5b01186858b36c4d7c87e1a025071e8e2401f
linux.git:commit:b166a20b07382b8bc1dcee2a448715c9c2c81b5b
rh#1948772
CVE-2021-23134kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-23134
FEDORA:FEDORA-2021-05152dbcf5
FEDORA:FEDORA-2021-286375de1e
MISC:git.kernel.org:MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets
MISC:www.openwall.com:CVE-2021-23134
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[oss-security] 20210511 CVE-2021-23134: Linux kernel: UAF in nfc sockets
OSS:2021/Q2/118
SMASH Issue 283962
bnc#1186060
bnc#1186061
jsc#CAR-987
linux.git:commit:c61760e6940dd4039a7f5e84a6afc9cdbf4d82b6
rh#1959514
CVE-2021-23177libarchive:Releasedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L)CVE-2021-23177
CVE-2021-31566
MISC:access.redhat.com:CVE-2021-23177
MISC:access.redhat.com:CVE-2021-31566
MISC:github.com:CVE-2021-23177
MISC:github.com:CVE-2021-31566
MLIST:[debian-lts-announce] 20221122 [SECURITY] [DLA 3202-1] libarchive security update
RHSA-2022:0892
SMASH Issue 314413
SMASH Issue 317801
SMASH Issue 323516
bnc#1192425
bnc#1192426
bnc#1192427
bnc#1195844
jsc#CAR-1521
jsc#CAR-1956
jsc#CAR-2031
rh#2024237
rh#2024245
CVE-2021-23336python3:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H)CONFIRM:security.netapp.com:CVE-2021-23336
CONFIRM:snyk.io:CVE-2020-28473
CVE-2021-23336
D:CVE-2021-23336
FEDORA:FEDORA-2021-12df7f7382
FEDORA:FEDORA-2021-1bb399a5af
FEDORA:FEDORA-2021-2897f5366c
FEDORA:FEDORA-2021-309bc2e727
FEDORA:FEDORA-2021-3352c1c802
FEDORA:FEDORA-2021-5a09621ebb
FEDORA:FEDORA-2021-7547ad987f
FEDORA:FEDORA-2021-7c1bb32d13
FEDORA:FEDORA-2021-7d3a9004e2
FEDORA:FEDORA-2021-907f3bacae
FEDORA:FEDORA-2021-98720f3785
FEDORA:FEDORA-2021-b1843407ca
FEDORA:FEDORA-2021-b326fcb83f
FEDORA:FEDORA-2021-b6b6093b3a
FEDORA:FEDORA-2021-b76ede8f4d
FEDORA:FEDORA-2021-e22bb0e548
FEDORA:FEDORA-2021-e525e48886
FEDORA:FEDORA-2021-ef83e8525a
FEDORA:FEDORA-2021-f4fd9372c7
GLSA-202104-04
MISC:bugs.python.org:MLIST:[oss-security] 20210219 Django security releases: CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()``
MISC:github.com:CVE-2021-23336
MISC:github.com:MLIST:[oss-security] 20210219 Django security releases: CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()``
MISC:nvd.nist.gov:MLIST:[oss-security] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL
MISC:snyk.io:CVE-2021-23336
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MLIST:[airflow-users] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL
MLIST:[announce] 20210501 Apache Airflow CVE: CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL
MLIST:[debian-lts-announce] 20210219 [SECURITY] [DLA 2569-1] python-django security update
MLIST:[debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update
MLIST:[debian-lts-announce] 20210417 [SECURITY] [DLA 2628-1] python2.7 security update
MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
MLIST:[oss-security] 20210219 Django security releases: CVE-2021-23336: Web cache poisoning via ``django.utils.http.limited_parse_qsl()``
MLIST:[oss-security] 20210501 CVE-2021-28359: Apache Airflow Reflected XSS via Origin Query Argument in URL
N/A:N/A
OSS:2021/Q1/163
Oracle:CVE-2021-23336
RH:CVE-2021-23336
RHSA-2021:1633
RHSA-2021:3252
RHSA-2021:3254
RHSA-2021:4151
RHSA-2021:4162
SMASH Issue 277966
bnc#1182379
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
jsc#CAR-1483
rh#1928904
CVE-2021-23839openssl:Not affected, openssl-1_1:Not affectedmoderate ()CONFIRM:cert-portal.siemens.com:CVE-2021-25220
CONFIRM:git.openssl.org:CVE-2021-23839
CONFIRM:kb.pulsesecure.net:CVE-2021-23841
CONFIRM:security.netapp.com:CVE-2021-23839
CONFIRM:www.openssl.org:CVE-2021-23839
CVE-2021-23839
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21498
N/A:N/A
RH:CVE-2021-23839
RHSA-2021:3016
SMASH Issue 278031
bnc#1182332
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30919ab80a478f2d81f2e9acdcca3fa4740cd547
https://security.netapp.com/advisory/ntap-20240621-0006/
openssl.git:commit:d9461cbe87b91fec98c4ab99a6f47621390e4aa2
rh#1930294
CVE-2021-23840openssl:Released, openssl-1_1:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:git.openssl.org:CVE-2021-23840
CONFIRM:kb.pulsesecure.net:CVE-2021-23841
CONFIRM:kc.mcafee.com:CVE-2021-31835
CONFIRM:security.netapp.com:CVE-2021-23839
CONFIRM:www.openssl.org:CVE-2021-23839
CONFIRM:www.tenable.com:CVE-2021-23840
CONFIRM:www.tenable.com:CVE-2021-23841
CONFIRM:www.tenable.com:CVE-2021-3449
CVE-2021-23840
DSA-4855
GLSA-202103-03
L3:68186
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
N/A:N/A
Oracle:CVE-2021-23840
RH:CVE-2021-23840
RHSA-2021:1168
RHSA-2021:3016
RHSA-2021:3798
RHSA-2021:4198
RHSA-2021:4424
RHSA-2021:4613
RHSA-2021:4614
RHSA-2021:4861
RHSA-2021:4863
SMASH Issue 278032
bdo#947949
bnc#1182333
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2
https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
https://security.netapp.com/advisory/ntap-20240621-0006/
openssl.git:commit:c9fb704cf3af5524eb8e79961e31b60eee8c3c47
rh#1930324
CVE-2021-23841openssl:Released, openssl-1_1:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:CVE-2021-25220
CONFIRM:git.openssl.org:CVE-2021-23840
CONFIRM:git.openssl.org:CVE-2021-23841
CONFIRM:kb.pulsesecure.net:CVE-2021-23841
CONFIRM:security.netapp.com:CVE-2021-2154
CONFIRM:security.netapp.com:CVE-2021-23839
CONFIRM:support.apple.com:CVE-2021-23841
CONFIRM:www.openssl.org:CVE-2021-23839
CONFIRM:www.tenable.com:CVE-2021-23840
CONFIRM:www.tenable.com:CVE-2021-23841
CVE-2021-23841
DSA-4855
FULLDISC:20210526 APPLE-SA-2021-05-25-1 iOS 14.6 and iPadOS 14.6
FULLDISC:20210526 APPLE-SA-2021-05-25-2 macOS Big Sur 11.4
FULLDISC:20210526 APPLE-SA-2021-05-25-5 Safari 14.1.1
GLSA-202103-03
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21498
N/A:N/A
Oracle:CVE-2021-23841
RH:CVE-2021-23841
RHSA-2021:1168
RHSA-2021:3016
RHSA-2021:3798
RHSA-2021:4198
RHSA-2021:4424
RHSA-2021:4613
RHSA-2021:4614
RHSA-2021:4861
RHSA-2021:4863
SMASH Issue 278030
bdo#947949
bnc#1182331
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807
https://security.netapp.com/advisory/ntap-20240621-0006/
openssl.git:commit:8130d654d1de922ea224fa18ee3bc7262edc39c0
rh#1930310
CVE-2021-24031zstd:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2021-24031
MISC:github.com:CVE-2021-24031
MISC:www.facebook.com:CVE-2021-24031
RH:CVE-2021-24031
SMASH Issue 279114
bdo#981404
bnc#1183371
jsc#CAR-986
rh#1934852
CVE-2021-24032zstd:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2021-24032
MISC:github.com:CVE-2021-24032
MISC:www.facebook.com:CVE-2021-24032
RH:CVE-2021-24032
SMASH Issue 278912
bdo#982519
bnc#1183370
jsc#CAR-985
rh#1928090
CVE-2021-25217dhcp:Releasedimportant7.4 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:CVE-2021-25217
CONFIRM:cert-portal.siemens.com:CVE-2021-25220
CONFIRM:security.netapp.com:CVE-2021-25217
CVE-2021-25217
D:CVE-2021-25217
FEDORA:FEDORA-2021-08cdb4dc34
FEDORA:FEDORA-2021-8ca8263bde
L3:63286
L3:66542
L3:67383
L3:67471
MISC:downloads.isc.org:MLIST:[oss-security] 20210526 ISC has disclosed a vulnerability in ISC DHCP (CVE-2021-25217)
MISC:kb.isc.org:MLIST:[oss-security] 20210526 ISC has disclosed a vulnerability in ISC DHCP (CVE-2021-25217)
MLIST:[debian-lts-announce] 20210603 [SECURITY] [DLA 2674-1] isc-dhcp security update
MLIST:[oss-security] 20210526 ISC has disclosed a vulnerability in ISC DHCP (CVE-2021-25217)
OSS:2021/Q2/170
RHSA-2021:2357
RHSA-2021:2359
RHSA-2021:2405
RHSA-2021:2414
RHSA-2021:2415
RHSA-2021:2416
RHSA-2021:2418
RHSA-2021:2419
RHSA-2021:2420
RHSA-2021:2469
RHSA-2021:2519
RHSA-2021:2555
SMASH Issue 300591
SMASH Issue 300592
bnc#1186382
https://security.gentoo.org/glsa/202305-22
jsc#CAR-649
rh#1963258
CVE-2021-26318kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2021-26318
MISC:www.amd.com:CVE-2021-26318
SMASH Issue 312587
bnc#1191653
CVE-2021-26341kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CONFIRM:developer.arm.com:CVE-2017-5754
CONFIRM:security.netapp.com:CVE-2022-0002
CVE-2021-26341
CVE-2021-26401
CVE-2022-0001
CVE-2022-0002
CVE-2022-23960
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-23960
D:CVE-2022-32296
DSA-5096
DSA-5161
DSA-5173
DSA-5184
DSA-5378
L3:65520
MISC:developer.arm.com:CVE-2021-28664
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.amd.com:CVE-2021-26341
MISC:www.amd.com:CVE-2021-26401
MISC:www.intel.com:CVE-2022-0002
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2021/07/22/1
OSS:2022/01/25/12
OSS:2022/03/18/2
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/11/10/2
OSS:2022/Q1/171
OSS:2022/Q3/141
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
Oracle:CVE-2022-21123
RHSA-2022:1975
RHSA-2022:1988
RHSA-2022:7683
RHSA-2023:0187
RHSA-2023:0399
RHSA-2023:0400
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 312331
SMASH Issue 325598
SMASH Issue 325599
SMASH Issue 335925
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#1033297
bdo#922204
bdo#988044
bdo#989285
bdo#990279
bdo#990411
bdo#994050
bnc#1191580
bnc#1195283
bnc#1195330
bnc#1196657
bnc#1196901
bnc#1196915
bnc#1201050
https://www.kb.cert.org/vuls/id/155143
jsc#CAR-1593
jsc#CAR-1883
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1519780
rh#1832397
rh#1980646
rh#1997467
rh#2039448
rh#2044561
rh#2053632
rh#2056381
rh#2058395
rh#2058955
rh#2059923
rh#2061633
rh#2061700
rh#2061703
rh#2061712
rh#2061721
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2119127
rh#2141026
CVE-2021-26401kernel-source-rt:Releasedmoderate5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)CONFIRM:developer.arm.com:CVE-2017-5754
CONFIRM:security.netapp.com:CVE-2022-0002
CVE-2021-26341
CVE-2021-26401
CVE-2022-0001
CVE-2022-0002
CVE-2022-23960
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-23960
D:CVE-2022-32296
DSA-5096
DSA-5161
DSA-5173
DSA-5184
DSA-5378
L3:65520
MISC:developer.arm.com:CVE-2021-28664
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.amd.com:CVE-2021-26341
MISC:www.amd.com:CVE-2021-26401
MISC:www.intel.com:CVE-2022-0002
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2021/07/22/1
OSS:2022/01/25/12
OSS:2022/03/18/2
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/11/10/2
OSS:2022/Q1/171
OSS:2022/Q3/141
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
Oracle:CVE-2022-21123
RHSA-2022:1975
RHSA-2022:1988
RHSA-2022:7683
RHSA-2023:0187
RHSA-2023:0399
RHSA-2023:0400
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 312331
SMASH Issue 325453
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#1033297
bdo#922204
bdo#988044
bdo#989285
bdo#990279
bdo#990411
bdo#994050
bnc#1191580
bnc#1195283
bnc#1195330
bnc#1196657
bnc#1196901
bnc#1196915
https://www.kb.cert.org/vuls/id/155143
jsc#CAR-1593
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1519780
rh#1832397
rh#1980646
rh#1997467
rh#2039448
rh#2044561
rh#2053632
rh#2056381
rh#2058395
rh#2058955
rh#2059923
rh#2061633
rh#2061700
rh#2061703
rh#2061712
rh#2061721
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2119127
rh#2141026
CVE-2021-26708kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-26708
CVE-2021-26708
MISC:a13xp0p0v.github.io:MLIST:[oss-security] 20210409 Re: Linux kernel: Exploitable vulnerabilities in AF_VSOCK implementation
MISC:a13xp0p0v.github.io:OSS:2022/Q1/83
MISC:access.redhat.com:OSS:2022/Q1/83
MISC:cdn.kernel.org:CVE-2021-26708
MISC:git.kernel.org:MLIST:[oss-security] 20210205 Re: Linux kernel: Exploitable vulnerabilities in AF_VSOCK implementation
MISC:git.kernel.org:OSS:2022/01/18/7
MISC:git.kernel.org:OSS:2022/Q1/83
MISC:github.com:OSS:2022/01/18/7
MISC:nvd.nist.gov:MLIST:[oss-security] 20210205 Re: Linux kernel: Exploitable vulnerabilities in AF_VSOCK implementation
MISC:security-tracker.debian.org:OSS:2022/Q1/83
MISC:ubuntu.com:OSS:2022/Q1/83
MISC:www.openwall.com:CVE-2021-26708
MISC:www.openwall.com:OSS:2022/Q1/83
MISC:www.suse.com:OSS:2022/Q1/83
MLIST:[oss-security] 20210205 Re: Linux kernel: Exploitable vulnerabilities in AF_VSOCK implementation
MLIST:[oss-security] 20210409 Re: Linux kernel: Exploitable vulnerabilities in AF_VSOCK implementation
OSS:2021/02/04/5
OSS:2021/Q1/113
OSS:2021/Q2/14
OSS:2022/01/18/7
OSS:2022/01/25/14
OSS:2022/Q1/83
RH:CVE-2021-26708
RHSA-2021:1081
RHSA-2021:1093
SMASH Issue 277209
bnc#1181806
bnc#1183298
rh#1925588
CVE-2021-26930kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-26932
CVE-2021-26930
FEDORA:FEDORA-2021-7143aca8cb
FEDORA:FEDORA-2021-8d45d297c6
MISC:xenbits.xen.org:CVE-2021-26930
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update
OSS:2021/Q1/149
SMASH Issue 277322
bnc#1181843
bnc#1182294
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=871997bc9e423f05c7da7c9178e62dde5df2a7f8
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/
jsc#CAR-984
CVE-2021-26931kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-26932
CVE-2021-26931
FEDORA:FEDORA-2021-7143aca8cb
FEDORA:FEDORA-2021-8d45d297c6
MISC:xenbits.xen.org:CVE-2021-26931
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update
OSS:2021/Q1/147
SMASH Issue 277048
bnc#1181753
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3194a1746e8aabe86075fd3c5e7cf1f4632d7f16
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5a264285ed1cd32e26d9de4f3c8c6855e467fd63
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7c77474b2d22176d2bfb592ec74e0f2cb71352c9
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/
jsc#CAR-982
jsc#CAR-983
CVE-2021-26932kernel-source-rt:Releasedmoderate5.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-26932
CVE-2021-26932
FEDORA:FEDORA-2021-7143aca8cb
FEDORA:FEDORA-2021-8d45d297c6
MISC:xenbits.xen.org:CVE-2021-26932
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update
OSS:2021/Q1/146
SMASH Issue 277046
bnc#1181747
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ebee0eab08594b2bd5db716288a4f1ae5936e9bc
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/
jsc#CAR-981
CVE-2021-26934kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-26932
CVE-2021-26934
FEDORA:FEDORA-2021-47f53a940a
FEDORA:FEDORA-2021-4c819bf1ad
MISC:xenbits.xen.org:CVE-2021-26934
OSS:2021/Q1/145
SMASH Issue 277049
bnc#1181755
bnc#1185892
CVE-2021-26937screen:Unsupportedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-26937
DSA-4861
FEDORA:FEDORA-2021-5e9894a0c5
FEDORA:FEDORA-2021-9107eeb95c
GLSA-202105-11
MISC:ftp.gnu.org:CVE-2021-26937
MISC:lists.gnu.org:MLIST:[oss-security] 20210210 Re: screen crash processing combining characters
MISC:www.openwall.com:CVE-2021-26937
MLIST:[debian-lts-announce] 20210219 [SECURITY] [DLA 2570-1] screen security update
MLIST:[oss-security] 20210210 Re: screen crash processing combining characters
OSS:2021/Q1/129
RH:CVE-2021-26937
RHSA-2021:0742
RHSA-2022:1074
SMASH Issue 277539
bdo#982435
bnc#1182092
jsc#CAR-980
rh#1927062
CVE-2021-27218glib2:Releasedmoderate5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N)CONFIRM:security.netapp.com:CVE-2021-27218
CVE-2021-27218
FEDORA:FEDORA-2021-7b5e2e6844
FEDORA:FEDORA-2021-7c71cda8da
GLSA-202107-13
MISC:gitlab.gnome.org:CVE-2021-27218
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[debian-lts-announce] 20220606 [SECURITY] [DLA 3044-1] glib2.0 security update
MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
RH:CVE-2021-27218
RHSA-2021:3058
RHSA-2021:4526
SMASH Issue 277973
bnc#1182328
jsc#CAR-979
rh#1929847
CVE-2021-27219glib2:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H)CONFIRM:security.netapp.com:CVE-2021-27218
CVE-2021-21149
CVE-2021-21150
CVE-2021-21151
CVE-2021-21152
CVE-2021-21153
CVE-2021-21154
CVE-2021-21155
CVE-2021-21156
CVE-2021-21157
CVE-2021-27219
FEDORA:FEDORA-2021-7b5e2e6844
FEDORA:FEDORA-2021-7c71cda8da
FEDORA:FEDORA-2021-aa764a8531
FEDORA:FEDORA-2021-c88a96bd4b
GLSA-202104-08
GLSA-202107-13
MISC:chromereleases.googleblog.com:CVE-2021-21149
MISC:crbug.com:CVE-2021-21149
MISC:crbug.com:CVE-2021-21150
MISC:crbug.com:CVE-2021-21151
MISC:crbug.com:CVE-2021-21152
MISC:crbug.com:CVE-2021-21153
MISC:crbug.com:CVE-2021-21154
MISC:crbug.com:CVE-2021-21155
MISC:crbug.com:CVE-2021-21156
MISC:crbug.com:CVE-2021-21157
MISC:gitlab.gnome.org:CVE-2021-27219
MISC:packetstormsecurity.com:CVE-2021-21156
MLIST:[debian-lts-announce] 20220606 [SECURITY] [DLA 3044-1] glib2.0 security update
MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
RH:CVE-2021-27219
RHBA-2021:2854
RHSA-2021:2147
RHSA-2021:2170
RHSA-2021:2171
RHSA-2021:2172
RHSA-2021:2173
RHSA-2021:2174
RHSA-2021:2175
RHSA-2021:2203
RHSA-2021:2204
RHSA-2021:2467
RHSA-2021:2519
RHSA-2021:2522
RHSA-2021:4526
SMASH Issue 277974
bnc#1182362
jsc#CAR-978
rh#1929858
CVE-2021-27291python-Pygments:Unsupportedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-27291
DSA-4878
DSA-4889
FEDORA:FEDORA-2021-166dfc62b2
FEDORA:FEDORA-2021-3f975f68c8
MISC:gist.github.com:CVE-2021-27291
MISC:github.com:CVE-2021-27291
MLIST:[debian-lts-announce] 20210319 [SECURITY] [DLA 2600-1] pygments security update
MLIST:[debian-lts-announce] 20210505 [SECURITY] [DLA 2648-1] mediawiki security update
MLIST:[debian-lts-announce] 20210506 [SECURITY] [DLA 2648-2] mediawiki regression update
RH:CVE-2021-27291
RHSA-2021:0781
RHSA-2021:3252
RHSA-2021:4139
RHSA-2021:4150
RHSA-2021:4151
SMASH Issue 279986
bdo#985574
bnc#1184812
https://www.debian.org/security/2021/dsa-4878
https://www.debian.org/security/2021/dsa-4889
jsc#CAR-977
rh#1940603
CVE-2021-27363kernel-source-rt:Releasedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-27363
CVE-2021-27363
L3:60356
L3:60484
L3:60501
L3:61966
MISC:blog.grimm-co.com:CVE-2021-27363
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-27364
MISC:packetstormsecurity.com:CVE-2020-27170
MISC:www.openwall.com:CVE-2021-27363
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update
OSS:2021/Q1/196
RH:CVE-2021-27363
RHSA-2021:1069
RHSA-2021:1070
RHSA-2021:1071
RHSA-2021:1081
RHSA-2021:1093
RHSA-2021:1171
RHSA-2021:1173
RHSA-2021:1267
RHSA-2021:1272
RHSA-2021:1279
RHSA-2021:1288
RHSA-2021:1289
RHSA-2021:1295
RHSA-2021:1373
RHSA-2021:1376
RHSA-2021:1377
RHSA-2021:1379
RHSA-2021:1531
RHSA-2021:1532
SMASH Issue 278534
SMASH Issue 278536
bnc#1182713
bnc#1182715
bnc#1182716
bnc#1182717
bnc#1183120
bnc#1183816
bnc#1184307
bnc#1184343
bnc#1191932
jsc#CAR-975
jsc#CAR-976
rh#1930078
rh#1930079
rh#1930080
CVE-2021-27364kernel-source-rt:Releasedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-27363
CVE-2021-27364
L3:66541
L3:66770
L3:67469
MISC:blog.grimm-co.com:CVE-2021-27363
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-27364
MISC:packetstormsecurity.com:CVE-2020-27170
MISC:www.openwall.com:CVE-2021-27364
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update
OSS:2021/Q1/196
RH:CVE-2021-27364
RHSA-2021:1069
RHSA-2021:1070
RHSA-2021:1071
RHSA-2021:1081
RHSA-2021:1093
RHSA-2021:1171
RHSA-2021:1173
RHSA-2021:1267
RHSA-2021:1272
RHSA-2021:1279
RHSA-2021:1288
RHSA-2021:1289
RHSA-2021:1295
RHSA-2021:1373
RHSA-2021:1376
RHSA-2021:1377
RHSA-2021:1379
RHSA-2021:1531
RHSA-2021:1532
SMASH Issue 278535
bnc#1182715
bnc#1182716
bnc#1182717
jsc#CAR-974
rh#1930078
rh#1930079
rh#1930080
CVE-2021-27365kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-27363
CVE-2021-27365
L3:66541
L3:66770
L3:67469
MISC:blog.grimm-co.com:CVE-2021-27363
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-27364
MISC:packetstormsecurity.com:CVE-2020-27170
MISC:www.openwall.com:CVE-2021-27363
MISC:www.openwall.com:CVE-2021-27364
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update
OSS:2021/Q1/196
RH:CVE-2021-27365
RHSA-2021:1069
RHSA-2021:1070
RHSA-2021:1071
RHSA-2021:1081
RHSA-2021:1093
RHSA-2021:1171
RHSA-2021:1173
RHSA-2021:1267
RHSA-2021:1272
RHSA-2021:1279
RHSA-2021:1288
RHSA-2021:1289
RHSA-2021:1295
RHSA-2021:1373
RHSA-2021:1376
RHSA-2021:1377
RHSA-2021:1379
RHSA-2021:1531
RHSA-2021:1532
SMASH Issue 278532
SMASH Issue 278533
bnc#1182712
bnc#1182715
bnc#1182716
bnc#1182717
bnc#1183491
jsc#CAR-973
rh#1930078
rh#1930079
rh#1930080
CVE-2021-27645glibc:Not affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-27645
FEDORA:FEDORA-2021-2ba993d6c5
FEDORA:FEDORA-2021-6749bfcfd9
GLSA-202107-07
MISC:sourceware.org:CVE-2021-27645
MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
RH:CVE-2021-27645
RHSA-2021:4358
SMASH Issue 278526
bnc#1182733
rh#1932589
CVE-2021-27853kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)CISCO:20220927 Vulnerabilities in Layer 2 Network Security Controls Affecting Cisco Products: September 2022
CONFIRM:datatracker.ietf.org:CVE-2021-27862
CONFIRM:standards.ieee.org:CVE-2021-27861
CONFIRM:standards.ieee.org:CVE-2021-27862
CVE-2021-27853
D:CVE-2021-27853
MISC:blog.champtar.fr:CVE-2021-27862
MISC:kb.cert.org:CVE-2021-27862
SMASH Issue 343692
bnc#1182622
bnc#1203840
rh#2010795
CVE-2021-27854kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)CONFIRM:datatracker.ietf.org:CVE-2021-27862
CONFIRM:standards.ieee.org:CVE-2021-27861
CONFIRM:standards.ieee.org:CVE-2021-27862
CVE-2021-27854
D:CVE-2021-27854
MISC:blog.champtar.fr:CVE-2021-27862
MISC:kb.cert.org:CVE-2021-27862
SMASH Issue 343693
bnc#1203839
rh#2010816
CVE-2021-27861kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)CONFIRM:datatracker.ietf.org:CVE-2021-27862
CONFIRM:standards.ieee.org:CVE-2021-27861
CONFIRM:standards.ieee.org:CVE-2021-27862
CVE-2021-27861
D:CVE-2021-27861
MISC:blog.champtar.fr:CVE-2021-27862
MISC:kb.cert.org:CVE-2021-27862
SMASH Issue 343694
bnc#1203838
rh#2130301
CVE-2021-27862kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)CONFIRM:datatracker.ietf.org:CVE-2021-27862
CONFIRM:standards.ieee.org:CVE-2021-27862
CVE-2021-27862
D:CVE-2021-27862
MISC:blog.champtar.fr:CVE-2021-27862
MISC:kb.cert.org:CVE-2021-27862
SMASH Issue 278451
SMASH Issue 343695
bnc#1182623
bnc#1203837
rh#2130298
CVE-2021-27919zip:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2021-27919
FEDORA:FEDORA-2021-6a3024b3fd
FEDORA:FEDORA-2021-e71b05ba7b
GLSA-202208-02
MISC:groups.google.com:CVE-2021-27918
RH:CVE-2021-27919
SMASH Issue 279511
SMASH Issue 279512
bnc#1183334
rh#1937909
CVE-2021-28038kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-27363
CVE-2021-28038
MISC:xenbits.xen.org:CVE-2021-28038
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update
MLIST:[oss-security] 20210305 Xen Security Advisory 367 v2 (CVE-2021-28038) - Linux: netback fails to honor grant mapping errors
OSS:2021/Q1/194
SMASH Issue 279267
SMASH Issue 279302
bnc#1183022
bnc#1183069
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2991397d23ec597405b116d96de3813420bdcbc3
rh#1936565
CVE-2021-28039kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-27363
CVE-2021-28039
MISC:xenbits.xen.org:CVE-2021-28039
MLIST:[oss-security] 20210305 Xen Security Advisory 369 v2 (CVE-2021-28039) - Linux: special config may crash when trying to map foreign pages
OSS:2021/Q1/195
SMASH Issue 279268
SMASH Issue 279301
bnc#1183035
bnc#1183071
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=882213990d32fd224340a4533f6318dd152be4b2
rh#1936568
CVE-2021-28041openssh:Not affectedimportant7.1 (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-28041
CVE-2021-28041
D:CVE-2021-28041
FEDORA:FEDORA-2021-1d3698089d
FEDORA:FEDORA-2021-f68a5a75ba
GLSA-202105-35
L3:60650
MISC:github.com:CVE-2021-28041
MISC:www.openssh.com:CVE-2020-15778
MISC:www.openssh.com:CVE-2021-28041
MISC:www.openwall.com:CVE-2021-28041
N/A:N/A
RH:CVE-2021-28041
SMASH Issue 279339
bnc#1183137
bnc#1185404
rh#1935055
CVE-2021-28153glib2:Unsupportedlow3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)CONFIRM:security.netapp.com:CVE-2021-28153
CVE-2021-28153
FEDORA:FEDORA-2021-5c81cb03d0
FEDORA:FEDORA-2021-a1f51fc418
GLSA-202107-13
MISC:gitlab.gnome.org:CVE-2021-28153
MLIST:[debian-lts-announce] 20220606 [SECURITY] [DLA 3044-1] glib2.0 security update
RH:CVE-2021-28153
RHSA-2021:4385
RHSA-2022:8418
SMASH Issue 279711
bnc#1183533
jsc#CAR-1678
rh#1938291
CVE-2021-28375kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-28375
CVE-2021-28375
FEDORA:FEDORA-2021-14f6642aa6
FEDORA:FEDORA-2021-90083c9c0f
FEDORA:FEDORA-2021-bb755ed5e3
MISC:git.kernel.org:CVE-2021-28375
MISC:lore.kernel.org:CVE-2021-28375
RH:CVE-2021-28375
SMASH Issue 279802
bnc#1183596
bnc#1184955
jsc#CAR-484
rh#1939164
CVE-2021-28660kernel-source-rt:Releasedimportant8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-28660
CVE-2021-28660
FEDORA:FEDORA-2021-bb755ed5e3
MISC:git.kernel.org:CVE-2021-28660
MISC:git.kernel.org:OSS:2022/11/18/1
MISC:github.com:OSS:2022/11/18/1
MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
OSS:2022/11/18/1
OSS:2022/11/21/2
RH:CVE-2021-28660
SMASH Issue 279869
bnc#1183593
bnc#1183658
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TJPVQZPY3DHPV5I3IVNMSMO6D3PKZISX/
jsc#CAR-972
rh#1940590
CVE-2021-28688kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)CVE-2021-28688
MISC:xenbits.xenproject.org:CVE-2021-28688
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
OSS:2021/Q1/276
SMASH Issue 279927
SMASH Issue 280142
bnc#1183646
jsc#CAR-971
rh#1945663
CVE-2021-28691kernel-source-rt:Not affectedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-28691
CVE-2021-28691
D:CVE-2021-28691
GLSA-202107-30
MISC:xenbits.xenproject.org:CVE-2021-28691
OSS:2021/Q2/192
SMASH Issue 300698
SMASH Issue 300699
bnc#1186430
linux.git:commit:107866a8eb0b664675a260f1ba0655010fac1e08
rh#1970536
CVE-2021-28711kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-28711
CVE-2021-28712
CVE-2021-28713
DSA-5050
DSA-5096
MISC:xenbits.xenproject.org:CVE-2021-28713
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2021/Q4/175
OSS:2022/01/13/1
OSS:2022/01/25/12
SMASH Issue 316357
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bdo#996974
bnc#1193440
jsc#CAR-1429
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2034940
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-28712kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-28711
CVE-2021-28712
CVE-2021-28713
DSA-5050
DSA-5096
MISC:xenbits.xenproject.org:CVE-2021-28713
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2021/Q4/175
OSS:2022/01/13/1
OSS:2022/01/25/12
SMASH Issue 316357
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bdo#996974
bnc#1193440
jsc#CAR-1429
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2034940
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-28713kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-28711
CVE-2021-28712
CVE-2021-28713
DSA-5050
DSA-5096
MISC:xenbits.xenproject.org:CVE-2021-28713
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2021/Q4/175
OSS:2022/01/13/1
OSS:2022/01/25/12
SMASH Issue 316357
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bdo#996974
bnc#1193440
jsc#CAR-1429
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2034940
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-28714kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-28714
CVE-2021-28715
DSA-5050
DSA-5096
MISC:xenbits.xenproject.org:CVE-2021-28715
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2021/Q4/176
OSS:2022/01/13/1
OSS:2022/01/25/12
SMASH Issue 316358
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bdo#996974
bnc#1193442
jsc#CAR-1428
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2031199
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-28715kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-28714
CVE-2021-28715
DSA-5050
DSA-5096
MISC:xenbits.xenproject.org:CVE-2021-28715
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2021/Q4/176
OSS:2022/01/13/1
OSS:2022/01/25/12
SMASH Issue 316358
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bdo#996974
bnc#1193442
jsc#CAR-1428
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2031199
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-28831busybox:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-28831
FEDORA:FEDORA-2021-2024803354
FEDORA:FEDORA-2021-d20c8a4730
FEDORA:FEDORA-2021-e82915eee1
GLSA-202105-09
L3:60714
MISC:git.busybox.net:CVE-2021-28831
MLIST:[debian-lts-announce] 20210401 [SECURITY] [DLA 2614-1] busybox security update
RH:CVE-2021-28831
SMASH Issue 280137
bnc#1184522
bnc#1185752
jsc#CAR-970
rh#1941028
CVE-2021-28861python3:Releasedimportant7.4 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N)CVE-2021-28861
D:CVE-2021-28861
FEDORA:FEDORA-2022-01d5789c08
FEDORA:FEDORA-2022-15f1aa7dc7
FEDORA:FEDORA-2022-20116fb6aa
FEDORA:FEDORA-2022-2173709172
FEDORA:FEDORA-2022-4ac2e16969
FEDORA:FEDORA-2022-61d8e8d880
FEDORA:FEDORA-2022-79843dfb3c
FEDORA:FEDORA-2022-7ca361a226
FEDORA:FEDORA-2022-7fff0f2b0b
FEDORA:FEDORA-2022-a27e239f5a
FEDORA:FEDORA-2022-a2be4bd5d8
FEDORA:FEDORA-2022-d1682fef04
FEDORA:FEDORA-2022-f511f8f58b
FEDORA:FEDORA-2022-fde69532df
L3:64282
L3:64457
L3:64458
L3:64535
L3:64542
L3:64636
L3:65722
MISC:bugs.python.org:CVE-2021-28861
MISC:github.com:CVE-2021-28861
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/IFGV7P2PYFBMK32OKHCAC2ZPJQV5AUDF/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/OKYE2DOI2X7WZXAWTQJZAXYIWM37HDCY/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/WXF6MQ74HVIDDSR5AE2UDR24I6D4FEPC/
RHSA-2022:6766
RHSA-2022:8353
RHSA-2023:0833
RHSA-2023:2763
RHSA-2023:2764
SMASH Issue 340514
bnc#1202624
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2TRINJE3INWDVIHIABW4L2NP3RUSK7BJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LTSPFIULY2GZJN3QYNFVM4JSU6H4D6J/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OABQ5CMPQETJLFHROAXDIDXCMDTNVYG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DISZAFSIQ7IAPAEQTC7G2Z5QUA2V2PSW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HPX4XHT2FGVQYLY2STT2MRVENILNZTTU/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I3MQT5ZE3QH5PVDJMERTBOCILHK35CBE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRGKPYA5YHIXQAMRIXO5DSCX7D4UUW4Q/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QLE5INSVJUZJGY5OJXV6JREXWD7UDHYN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S7G66SRWUM36ENQ3X6LAIG7HAB27D4XJ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TZEPOPUFC42KXXSLFPZ47ZZRGPOR7SQE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X46T4EFTIBXZRYTGASBDEZGYJINH2OWV/
https://security.gentoo.org/glsa/202305-02
jsc#CAR-1977
rh#2120642
CVE-2021-28950kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-28950
DSA-5096
FEDORA:FEDORA-2021-e49da8a226
FEDORA:FEDORA-2021-f0181b8085
MISC:cdn.kernel.org:CVE-2021-28950
MISC:git.kernel.org:CVE-2021-28950
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
RH:CVE-2021-28950
RHSA-2021:1578
RHSA-2021:4140
RHSA-2021:4356
RHSA-2021:4648
RHSA-2021:4650
SMASH Issue 280165
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1184194
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1941762
rh#1949560
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-28951kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-28971
CVE-2021-28951
FEDORA:FEDORA-2021-68b0dd2373
FEDORA:FEDORA-2021-9503fffad9
FEDORA:FEDORA-2021-e636ce53df
MISC:git.kernel.org:CVE-2021-28951
RH:CVE-2021-28951
SMASH Issue 280166
bnc#1184195
rh#1941769
CVE-2021-28952kernel-source-rt:Ignoreimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-28971
CVE-2021-28952
FEDORA:FEDORA-2021-68b0dd2373
FEDORA:FEDORA-2021-9503fffad9
FEDORA:FEDORA-2021-e636ce53df
MISC:git.kernel.org:CVE-2021-28952
MISC:lore.kernel.org:CVE-2021-28952
RH:CVE-2021-28952
SMASH Issue 280167
bnc#1184197
bnc#1184199
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1941774
CVE-2021-28957python-lxml:Releasedmoderate6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)CONFIRM:security.netapp.com:CVE-2021-28957
CVE-2021-28957
DSA-4880
FEDORA:FEDORA-2021-28723f9670
FEDORA:FEDORA-2021-4cdb0f68c7
GLSA-202208-06
MISC:bugs.launchpad.net:CVE-2021-28957
MISC:github.com:CVE-2021-28957
MISC:www.oracle.com:CVE-2021-35666
MLIST:[debian-lts-announce] 20210324 [SECURITY] [DLA 2606-1] lxml security update
RH:CVE-2021-28957
RHSA-2021:3254
RHSA-2021:4151
RHSA-2021:4158
RHSA-2021:4160
RHSA-2021:4162
SMASH Issue 280170
bdo#985643
bnc#1184177
jsc#CAR-419
rh#1941534
CVE-2021-28964kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-28971
CVE-2021-28964
FEDORA:FEDORA-2021-68b0dd2373
FEDORA:FEDORA-2021-9503fffad9
FEDORA:FEDORA-2021-e636ce53df
MISC:git.kernel.org:CVE-2021-28964
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
RH:CVE-2021-28964
SMASH Issue 280191
bnc#1184193
rh#1941804
CVE-2021-28971kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-28971
CVE-2021-28971
FEDORA:FEDORA-2021-68b0dd2373
FEDORA:FEDORA-2021-9503fffad9
FEDORA:FEDORA-2021-e636ce53df
MISC:git.kernel.org:CVE-2021-28971
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
RH:CVE-2021-28971
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 280207
bnc#1184196
rh#1941784
CVE-2021-28972kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-28971
CVE-2021-28972
FEDORA:FEDORA-2021-68b0dd2373
FEDORA:FEDORA-2021-9503fffad9
FEDORA:FEDORA-2021-e636ce53df
L3:67660
MISC:git.kernel.org:CVE-2021-28972
RH:CVE-2021-28972
SMASH Issue 280206
bnc#1184198
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1941781
CVE-2021-29154kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-29154
CVE-2021-29154
FEDORA:FEDORA-2021-e71c033f88
L3:60843
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-29154
MISC:news.ycombinator.com:CVE-2021-29154
MISC:packetstormsecurity.com:CVE-2021-3493
MISC:www.openwall.com:CVE-2021-29154
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
OSS:2021/04/08/1
OSS:2021/Q2/12
RH:CVE-2021-29154
RHSA-2021:3327
RHSA-2021:3328
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 281203
SMASH Issue 281211
bnc#1184391
bnc#1184710
bnc#1186408
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=26f55a59dc65ff77cd1c4b37991e26497fc68049
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4d4d456436bfb2fe412ee2cd489f7658449b098
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5YFGIIF24475A2LNW3UWHW2SNCS3G7M/
rh#1946684
CVE-2021-29155kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2021-29155
FEDORA:FEDORA-2021-8cd093f639
FEDORA:FEDORA-2021-a963f04012
FEDORA:FEDORA-2021-e6b4847979
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-29155
MISC:www.kernel.org:CVE-2021-29155
MISC:www.openwall.com:CVE-2021-29155
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
OSS:2021/04/18/4
OSS:2021/Q2/34
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 282223
bnc#1184942
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=073815b756c51ba9d8384d924c5d1c03ca3d1ae4
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=24c109bb1537c12c02aeed2d51a347b4d6a9b76e
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6f55b2f2a1178856c19bbce2f71449926e731914
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7fedb63a8307dda0ec3b8969a3b233a1dd7ea8e0
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9601148392520e2e134936e76788fc2a6371e7be
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a6aaece00a57fa6f22575364b3903dfbccf5345d
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b658bbb844e28f1862867f37e8ca11a8e2aa94a3
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f528819334881fd622fdadeddb3f7edaed8b7c9b
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CUX2CA63453G34C6KYVBLJXJXEARZI2X/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAEQ3H6HKNO6KUCGRZVYSFSAGEUX23JL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XZASHZVCOFJ4VU2I3BN5W5EPHWJQ7QWX/
jsc#CAR-969
rh#1951595
CVE-2021-29256kernel-source-rt:Ignoreimportant8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:developer.arm.com:CVE-2021-28664
CVE-2021-29256
SMASH Issue 300624
bnc#1186494
CVE-2021-29264kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-29264
MISC:git.kernel.org:CVE-2021-29264
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
RH:CVE-2021-29264
SMASH Issue 280593
bnc#1184168
rh#1944689
CVE-2021-29265kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-29265
MISC:cdn.kernel.org:CVE-2021-29265
MISC:git.kernel.org:CVE-2021-29265
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
RH:CVE-2021-29265
SMASH Issue 280594
bnc#1184167
rh#1944695
CVE-2021-29266kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-29266
CVE-2021-29266
MISC:cdn.kernel.org:CVE-2021-29266
MISC:git.kernel.org:CVE-2021-29266
RH:CVE-2021-29266
SMASH Issue 280595
bnc#1184166
rh#1944700
CVE-2021-29646kernel-source-rt:Not affectedmoderate ()CVE-2021-29646
FEDORA:FEDORA-2021-2306e89112
FEDORA:FEDORA-2021-41fb54ae9f
FEDORA:FEDORA-2021-6b0f287b8b
MISC:cdn.kernel.org:CVE-2021-29646
MISC:git.kernel.org:CVE-2021-29646
RH:CVE-2021-29646
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 280754
bnc#1184191
rh#1945345
CVE-2021-29647kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2021-29647
FEDORA:FEDORA-2021-2306e89112
FEDORA:FEDORA-2021-41fb54ae9f
FEDORA:FEDORA-2021-6b0f287b8b
MISC:cdn.kernel.org:CVE-2021-29646
MISC:git.kernel.org:CVE-2021-29647
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
RH:CVE-2021-29647
SMASH Issue 280755
bnc#1184192
jsc#CAR-968
rh#1945361
CVE-2021-29648kernel-source-rt:Not affectedmoderate ()CVE-2021-29648
FEDORA:FEDORA-2021-2306e89112
FEDORA:FEDORA-2021-41fb54ae9f
FEDORA:FEDORA-2021-6b0f287b8b
MISC:cdn.kernel.org:CVE-2021-29646
MISC:git.kernel.org:CVE-2021-29648
RH:CVE-2021-29648
SMASH Issue 280756
bnc#1184200
rh#1945373
CVE-2021-29649kernel-source-rt:Not affectedmoderate ()CVE-2021-29649
FEDORA:FEDORA-2021-2306e89112
FEDORA:FEDORA-2021-41fb54ae9f
FEDORA:FEDORA-2021-6b0f287b8b
MISC:cdn.kernel.org:CVE-2021-29646
MISC:git.kernel.org:CVE-2021-29649
RH:CVE-2021-29649
SMASH Issue 280757
bnc#1184205
rh#1945379
CVE-2021-29650kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-29650
FEDORA:FEDORA-2021-2306e89112
FEDORA:FEDORA-2021-41fb54ae9f
FEDORA:FEDORA-2021-6b0f287b8b
MISC:cdn.kernel.org:CVE-2021-29646
MISC:git.kernel.org:CVE-2021-29650
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
RH:CVE-2021-29650
RHSA-2021:3327
RHSA-2021:3328
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 280758
bnc#1184208
jsc#CAR-482
rh#1945388
CVE-2021-29657kernel-source-rt:Not affectedimportant8.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)CONFIRM:cdn.kernel.org:CVE-2021-29657
CONFIRM:git.kernel.org:CVE-2021-29657
CVE-2021-29657
MISC:bugs.chromium.org:CVE-2021-29657
MISC:packetstormsecurity.com:CVE-2021-29657
SMASH Issue 305041
bnc#1188637
https://security.netapp.com/advisory/ntap-20210902-0008/
linux.git:commit:a58d9166a756a0f4a6618e4f593232593d6df134
rh#1995153
CVE-2021-29921python3:Not affectedimportant8.6 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)CONFIRM:security.netapp.com:CVE-2021-29921
CVE-2021-29921
MISC:bugs.python.org:CVE-2021-29921
MISC:docs.python.org:CVE-2021-29921
MISC:github.com:CVE-2020-15590
MISC:github.com:CVE-2021-29921
MISC:python-security.readthedocs.io:CVE-2021-29921
MISC:sick.codes:CVE-2021-29921
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
N/A:N/A
Oracle:CVE-2021-29921
RHSA-2021:3254
RHSA-2021:4160
RHSA-2021:4162
SMASH Issue 283522
bnc#1185706
https://security.gentoo.org/glsa/202305-02
rh#1957458
CVE-2021-30002kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-30002
MISC:cdn.kernel.org:CVE-2021-30002
MISC:git.kernel.org:CVE-2021-30002
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
RH:CVE-2021-30002
RHSA-2022:7444
RHSA-2022:7683
SMASH Issue 280605
SMASH Issue 280914
bnc#1184120
jsc#CAR-967
rh#1946279
CVE-2021-30178kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-30178
FEDORA:FEDORA-2021-57a7ba61f8
FEDORA:FEDORA-2021-8b64847a44
FEDORA:FEDORA-2021-e71c033f88
MISC:git.kernel.org:CVE-2021-30178
RH:CVE-2021-30178
SMASH Issue 281260
bnc#1184499
rh#1947139
CVE-2021-30541libxslt:Ignoreimportant ()CVE-2021-30541
CVE-2021-30559
CVE-2021-30560
CVE-2021-30561
CVE-2021-30562
CVE-2021-30563
CVE-2021-30564
DSA-5216
MISC:chromereleases.googleblog.com:CVE-2021-30564
MISC:crbug.com:CVE-2021-30541
MISC:crbug.com:CVE-2021-30559
MISC:crbug.com:CVE-2021-30560
MISC:crbug.com:CVE-2021-30561
MISC:crbug.com:CVE-2021-30562
MISC:crbug.com:CVE-2021-30563
MISC:crbug.com:CVE-2021-30564
MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update
SMASH Issue 304388
SMASH Issue 317492
bnc#1188373
rh#1982843
rh#1982844
rh#1982845
rh#1982846
rh#1982847
rh#1982848
rh#1982849
CVE-2021-30559libxslt:Ignoreimportant ()CVE-2021-30541
CVE-2021-30559
CVE-2021-30560
CVE-2021-30561
CVE-2021-30562
CVE-2021-30563
CVE-2021-30564
DSA-5216
MISC:chromereleases.googleblog.com:CVE-2021-30564
MISC:crbug.com:CVE-2021-30541
MISC:crbug.com:CVE-2021-30559
MISC:crbug.com:CVE-2021-30560
MISC:crbug.com:CVE-2021-30561
MISC:crbug.com:CVE-2021-30562
MISC:crbug.com:CVE-2021-30563
MISC:crbug.com:CVE-2021-30564
MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update
SMASH Issue 304389
SMASH Issue 317492
bnc#1188373
rh#1982843
rh#1982844
rh#1982845
rh#1982846
rh#1982847
rh#1982848
rh#1982849
CVE-2021-30560libxslt:Releasedimportant8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2021-30541
CVE-2021-30559
CVE-2021-30560
CVE-2021-30561
CVE-2021-30562
CVE-2021-30563
CVE-2021-30564
DSA-5216
L3:65331
L3:65884
L3:65885
L3:65897
MISC:chromereleases.googleblog.com:CVE-2021-30564
MISC:crbug.com:CVE-2021-30541
MISC:crbug.com:CVE-2021-30559
MISC:crbug.com:CVE-2021-30560
MISC:crbug.com:CVE-2021-30561
MISC:crbug.com:CVE-2021-30562
MISC:crbug.com:CVE-2021-30563
MISC:crbug.com:CVE-2021-30564
MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update
SMASH Issue 304384
SMASH Issue 317492
bnc#1188373
bnc#1208574
bnc#1208729
https://security.gentoo.org/glsa/202310-23
jsc#CAR-2388
rh#1982843
rh#1982844
rh#1982845
rh#1982846
rh#1982847
rh#1982848
rh#1982849
CVE-2021-30561libxslt:Ignoreimportant ()CVE-2021-30541
CVE-2021-30559
CVE-2021-30560
CVE-2021-30561
CVE-2021-30562
CVE-2021-30563
CVE-2021-30564
DSA-5216
MISC:chromereleases.googleblog.com:CVE-2021-30564
MISC:crbug.com:CVE-2021-30541
MISC:crbug.com:CVE-2021-30559
MISC:crbug.com:CVE-2021-30560
MISC:crbug.com:CVE-2021-30561
MISC:crbug.com:CVE-2021-30562
MISC:crbug.com:CVE-2021-30563
MISC:crbug.com:CVE-2021-30564
MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update
SMASH Issue 304385
SMASH Issue 317492
bnc#1188373
rh#1982843
rh#1982844
rh#1982845
rh#1982846
rh#1982847
rh#1982848
rh#1982849
CVE-2021-30562libxslt:Ignoreimportant ()CVE-2021-30541
CVE-2021-30559
CVE-2021-30560
CVE-2021-30561
CVE-2021-30562
CVE-2021-30563
CVE-2021-30564
DSA-5216
MISC:chromereleases.googleblog.com:CVE-2021-30564
MISC:crbug.com:CVE-2021-30541
MISC:crbug.com:CVE-2021-30559
MISC:crbug.com:CVE-2021-30560
MISC:crbug.com:CVE-2021-30561
MISC:crbug.com:CVE-2021-30562
MISC:crbug.com:CVE-2021-30563
MISC:crbug.com:CVE-2021-30564
MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update
SMASH Issue 304387
SMASH Issue 317492
bnc#1188373
rh#1982843
rh#1982844
rh#1982845
rh#1982846
rh#1982847
rh#1982848
rh#1982849
CVE-2021-30563libxslt:Ignoreimportant ()CVE-2021-30541
CVE-2021-30559
CVE-2021-30560
CVE-2021-30561
CVE-2021-30562
CVE-2021-30563
CVE-2021-30564
DSA-5216
MISC:chromereleases.googleblog.com:CVE-2021-30564
MISC:crbug.com:CVE-2021-30541
MISC:crbug.com:CVE-2021-30559
MISC:crbug.com:CVE-2021-30560
MISC:crbug.com:CVE-2021-30561
MISC:crbug.com:CVE-2021-30562
MISC:crbug.com:CVE-2021-30563
MISC:crbug.com:CVE-2021-30564
MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update
SMASH Issue 304386
SMASH Issue 317492
bnc#1188373
rh#1982843
rh#1982844
rh#1982845
rh#1982846
rh#1982847
rh#1982848
rh#1982849
CVE-2021-30564libxslt:Ignoreimportant ()CVE-2021-30541
CVE-2021-30559
CVE-2021-30560
CVE-2021-30561
CVE-2021-30562
CVE-2021-30563
CVE-2021-30564
DSA-5216
MISC:chromereleases.googleblog.com:CVE-2021-30564
MISC:crbug.com:CVE-2021-30541
MISC:crbug.com:CVE-2021-30559
MISC:crbug.com:CVE-2021-30560
MISC:crbug.com:CVE-2021-30561
MISC:crbug.com:CVE-2021-30562
MISC:crbug.com:CVE-2021-30563
MISC:crbug.com:CVE-2021-30564
MLIST:[debian-lts-announce] 20220909 [SECURITY] [DLA 3101-1] libxslt security update
SMASH Issue 304383
SMASH Issue 317492
bnc#1188373
rh#1982843
rh#1982844
rh#1982845
rh#1982846
rh#1982847
rh#1982848
rh#1982849
CVE-2021-31239sqlite3:Already fixedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-31239
D:CVE-2021-31239
MISC:www.sqlite.org:CVE-2022-35737
SMASH Issue 365535
bnc#1211222
https://github.com/Tsiming/Vulnerabilities/blob/main/SQLite/CVE-2021-31239
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/73XUIHJ6UT75VFPDPLJOXJON7MVIKVZI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FXFL4TDAH72PRCPD5UPZMJMKIMVOPLTI/
https://security.gentoo.org/glsa/202311-03
https://security.netapp.com/advisory/ntap-20230609-0010/
https://www.sqlite.org/forum/forumpost/d9fce1a89b
rh#2207557
CVE-2021-31440kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-31440
CVE-2021-31440
MISC:git.kernel.org:CVE-2021-31440
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 283382
ZDI-21-503
bnc#1190126
bnc#1190127
https://www.zerodayinitiative.com/advisories/ZDI-21-503/
rh#1964028
CVE-2021-31566libarchive:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)CVE-2021-23177
CVE-2021-31566
MISC:access.redhat.com:CVE-2021-23177
MISC:access.redhat.com:CVE-2021-31566
MISC:github.com:CVE-2021-23177
MISC:github.com:CVE-2021-31566
MLIST:[debian-lts-announce] 20221122 [SECURITY] [DLA 3202-1] libarchive security update
RHSA-2022:0892
SMASH Issue 314413
SMASH Issue 317800
bnc#1192426
bnc#1192427
jsc#CAR-1521
rh#2024237
rh#2024245
CVE-2021-3177python3:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-3177
CVE-2021-3177
FEDORA:FEDORA-2021-076a2dccba
FEDORA:FEDORA-2021-17668e344a
FEDORA:FEDORA-2021-3352c1c802
FEDORA:FEDORA-2021-42ba9feb47
FEDORA:FEDORA-2021-66547ff92d
FEDORA:FEDORA-2021-7547ad987f
FEDORA:FEDORA-2021-851c6e4e2d
FEDORA:FEDORA-2021-907f3bacae
FEDORA:FEDORA-2021-cc3ff94cfc
FEDORA:FEDORA-2021-ced31f3f0c
FEDORA:FEDORA-2021-d5cde50865
FEDORA:FEDORA-2021-e3a5a74610
FEDORA:FEDORA-2021-f4fd9372c7
FEDORA:FEDORA-2021-faf88b9499
GLSA-202101-18
MISC:bugs.python.org:CVE-2021-3177
MISC:github.com:CVE-2021-3177
MISC:news.ycombinator.com:CVE-2021-3177
MISC:python-security.readthedocs.io:CVE-2021-3177
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update
MLIST:[debian-lts-announce] 20220212 [SECURITY] [DLA 2919-1] python2.7 security update
MLIST:[mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
N/A:N/A
Oracle:CVE-2021-3177
RH:CVE-2021-3177
RHSA-2021:1633
RHSA-2021:1761
RHSA-2021:1879
RHSA-2021:3252
RHSA-2021:3254
RHSA-2022:5235
SMASH Issue 275777
bnc#1181126
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
jsc#CAR-966
rh#1918168
CVE-2021-3178kernel-source-rt:Ignoremoderate5.7 (CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N)CVE-2021-3178
FEDORA:FEDORA-2021-3bcc7198c8
MISC:git.kernel.org:CVE-2021-3178
MISC:patchwork.kernel.org:CVE-2021-3178
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
RH:CVE-2021-3178
SMASH Issue 275778
bnc#1181162
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5SGB7TNDVQEOJ7NVTGX56UWHDNQM5TRC/
https://patchwork.kernel.org/project/linux-nfs/patch/20210111210129.GA11652%40fieldses.org/
rh#1918179
CVE-2021-31795kernel-source-rt:Not affectedmoderate ()CVE-2021-31795
MISC:mcyoloswagham.github.io:CVE-2021-31795
SMASH Issue 282853
bnc#1185354
CVE-2021-31829kernel-source-rt:Already fixedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2021-31829
FEDORA:FEDORA-2021-5ad5249c43
FEDORA:FEDORA-2021-7c085ca697
FEDORA:FEDORA-2021-9c0276e935
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-31829
MISC:github.com:CVE-2021-31829
MISC:www.openwall.com:CVE-2021-31829
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
OSS:2021/Q2/92
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 283421
bnc#1188561
rh#1957788
CVE-2021-31916kernel-source-rt:Releasedmoderate6.8 (CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-31916
D:CVE-2021-31916
MISC:github.com:CVE-2021-31916
MISC:seclists.org:CVE-2021-31916
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 283275
bnc#1192781
rh#1946965
CVE-2021-3200libsolv:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2021-3200
L3:60837
MISC:github.com:CVE-2021-3200
MISC:www.oracle.com:CVE-2022-21498
Oracle:CVE-2021-3200
RHSA-2021:4408
RHSA-2022:5498
SMASH Issue 284558
bnc#1186229
bnc#1186393
rh#1962307
CVE-2021-32078kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CONFIRM:git.kernel.org:CVE-2021-32078
CONFIRM:github.com:CVE-2021-32078
CVE-2021-32078
MISC:kirtikumarar.com:CVE-2021-32078
SMASH Issue 302472
bnc#1187489
rh#1973436
CVE-2021-32292json-c:Not affectedcritical ()CVE-2021-32292
DSA-5486
SMASH Issue 376000
bnc#1214699
https://github.com/json-c/json-c/issues/654
https://security.netapp.com/advisory/ntap-20230929-0010/
https://www.debian.org/security/2023/dsa-5486
rh#2235514
CVE-2021-32399kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-32399
CVE-2021-32399
L3:60782
MISC:git.kernel.org:CVE-2021-32399
MISC:github.com:MLIST:[oss-security] 20210511 CVE-2021-32399 Linux device detach race condition
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[oss-security] 20210511 CVE-2021-32399 Linux device detach race condition
OSS:2021/Q2/116
RHSA-2021:2714
RHSA-2021:2715
RHSA-2021:2716
RHSA-2021:2736
RHSA-2021:3173
RHSA-2021:3181
RHSA-2021:3320
RHSA-2021:3321
RHSA-2021:3327
RHSA-2021:3328
RHSA-2021:3363
RHSA-2021:3375
RHSA-2021:3380
RHSA-2021:3381
RHSA-2021:3392
RHSA-2021:3399
RHSA-2021:3477
RHSA-2021:3522
RHSA-2021:3523
RHSA-2021:3725
RHSA-2022:0157
SMASH Issue 283935
bnc#1184611
bnc#1185898
bnc#1185899
bnc#1186136
jsc#CAR-965
rh#1970807
CVE-2021-32606kernel-source-rt:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-32606
FEDORA:FEDORA-2021-4f852b79d1
FEDORA:FEDORA-2021-8832eab899
FEDORA:FEDORA-2021-bae582b42c
MISC:cve.mitre.org:MLIST:[oss-security] 20210512 Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation
MISC:git.kernel.org:MLIST:[oss-security] 20210528 Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation
MISC:oss-security.openwall.org:MLIST:[oss-security] 20210514 Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation
MISC:www.openwall.com:CVE-2021-32606
MLIST:[oss-security] 20210512 Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation
MLIST:[oss-security] 20210514 Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation
MLIST:[oss-security] 20210528 Re: Linux kernel: net/can/isotp: race condition leads to local privilege escalation
OSS:2021/05/11/16
OSS:2021/Q2/132
OSS:2021/Q2/136
SMASH Issue 284122
bnc#1185564
bnc#1185953
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2b17c400aeb44daf041627722581ade527bb3c1d
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/73D53S4IZFPFQMRABMXXLW4AJK3EULDX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GI7Z7UBWBGD3ABNIL2DC7RQDCGA4UVQW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HD3NJBG25AADVGPRC63RX2JOQBMPSWK4/
https://security.netapp.com/advisory/ntap-20210625-0001/
rh#1959673
CVE-2021-33033kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-33033
DSA-5096
L3:60834
MISC:cdn.kernel.org:CVE-2021-29265
MISC:cdn.kernel.org:CVE-2021-33033
MISC:git.kernel.org:CVE-2021-33033
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-29154
MISC:sites.google.com:CVE-2021-33033
MISC:syzkaller.appspot.com:CVE-2021-33033
OSS:2021/04/08/1
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2021:2725
RHSA-2021:2726
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 284322
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1186109
bnc#1186283
bnc#1186390
jsc#CAR-964
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1961300
rh#1975949
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2059923
CVE-2021-33034kernel-source-rt:Releasedimportant7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H)CVE-2021-33034
FEDORA:FEDORA-2021-bae582b42c
MISC:cdn.kernel.org:CVE-2021-33034
MISC:git.kernel.org:CVE-2021-33034
MISC:sites.google.com:CVE-2021-33034
MISC:syzkaller.appspot.com:CVE-2021-33034
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
RHBA-2021:2854
RHSA-2021:2563
RHSA-2021:2570
RHSA-2021:2599
RHSA-2021:2666
RHSA-2021:2668
RHSA-2021:2718
RHSA-2021:2719
RHSA-2021:2720
RHSA-2021:2725
RHSA-2021:2726
RHSA-2021:2727
RHSA-2021:2728
RHSA-2021:2729
RHSA-2021:2730
RHSA-2021:2731
RHSA-2021:2732
RHSA-2021:2733
RHSA-2021:2734
RHSA-2021:2736
RHSA-2021:2737
SMASH Issue 284321
bnc#1186111
bnc#1186285
jsc#CAR-963
rh#1961305
CVE-2021-33061kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-33096
CVE-2021-33061
MISC:www.intel.com:CVE-2021-33096
SMASH Issue 323345
bnc#1196426
jsc#CAR-1722
linux.git:commit:008ca35f6e87be1d60b6af3d1ae247c6d5c2531d
rh#2024713
CVE-2021-33098kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-33098
CVE-2021-33098
MISC:www.intel.com:CVE-2021-33098
RHSA-2021:4356
SMASH Issue 315198
bnc#1192877
jsc#CAR-1431
rh#2068236
CVE-2021-33135kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-33135
D:CVE-2021-33135
MISC:www.intel.com:CVE-2021-33135
SMASH Issue 331674
bnc#1199515
rh#2087926
CVE-2021-33200kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-33200
CVE-2021-33200
FEDORA:FEDORA-2021-0b35886add
FEDORA:FEDORA-2021-646098b5b8
L3:68137
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-33200
MISC:www.openwall.com:CVE-2021-33200
OSS:2021/05/27/1
OSS:2021/Q2/171
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 300862
bnc#1186484
bnc#1186498
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3d0220f6861d713213b015b582e9f21e5b28d2e0
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a7036191277f9fa68d92f2071ddc38c09b1e5ee5
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=bb01a1bba579b4b1c5566af24d95f1767859771e
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LR3OKKPHIBGOMHN476CMLW2T7UG53QX/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJCABL43FT3FKRX5DBPZG25FNKR6CEK4/
jsc#CAR-651
rh#1965458
CVE-2021-3326glibc:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-3326
CVE-2021-3326
GLSA-202107-07
L3:66039
L3:67771
MISC:sourceware.org:CVE-2021-3326
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
MLIST:[oss-security] 20210128 Re: glibc iconv crash with ISO-2022-JP-3
OSS:2021/Q1/80
Oracle:CVE-2021-3326
RH:CVE-2021-3326
RHSA-2021:1585
SMASH Issue 276667
bnc#1181505
rh#1921916
CVE-2021-33294elfutils:Won't fixlow2.5 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2021-33294
L3:67082
SMASH Issue 372807
bnc#1213464
https://sourceware.org/bugzilla/show_bug.cgi?id=27501
https://sourceware.org/pipermail/elfutils-devel/2021q1/003607.html
jsc#CAR-2740
rh#2223918
CVE-2021-3345libgcrypt:Not affectedimportant ()CVE-2021-3345
MISC:bugs.gentoo.org:CVE-2021-3345
MISC:git.gnupg.org:CVE-2021-3345
MISC:gnupg.org:CVE-2021-3345
MISC:lists.gnupg.org:CVE-2021-3345
N/A:N/A
Oracle:CVE-2021-3345
RH:CVE-2021-3345
SMASH Issue 276793
bnc#1181632
rh#1923210
CVE-2021-3347kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-3347
CVE-2021-3347
DSA-4843
FEDORA:FEDORA-2021-6e805a5051
FEDORA:FEDORA-2021-879c756377
MISC:elongl.github.io:MISC:www.openwall.com:CVE-2014-3153
MISC:git.kernel.org:CVE-2021-3347
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2020-27815
MISC:github.com:MISC:www.openwall.com:CVE-2014-3153
MISC:www.openwall.com:CVE-2014-3153
MISC:www.openwall.com:CVE-2021-3347
MLIST:[debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
MLIST:[oss-security] 20210129 Re: Linux Kernel: local priv escalation via futexes
MLIST:[oss-security] 20210201 Re: Linux Kernel: local priv escalation via futexes
OSS:2020/11/30/5,
OSS:2020/12/28/1,
OSS:2021/Q1/85
RH:CVE-2021-3347
RHSA-2021:1081
RHSA-2021:1093
RHSA-2021:1272
RHSA-2021:1279
RHSA-2021:1295
RHSA-2021:1379
RHSA-2021:2099
RHSA-2021:2106
RHSA-2021:2285
RHSA-2021:2314
RHSA-2021:2316
RHSA-2021:2730
RHSA-2021:2731
RHSA-2021:2732
RHSA-2021:2733
RHSA-2021:2735
RHSA-2021:3399
RHSA-2021:3522
RHSA-2021:3523
SMASH Issue 276215
SMASH Issue 276788
bdo#970736
bdo#972345
bdo#977048
bdo#977615
bnc#1181349
bnc#1181553
jsc#CAR-962
rh#1922249
CVE-2021-3348kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3348
MISC:git.kernel.org:MLIST:[oss-security] 20210201 Re: Re: Linux kernel: linux-block: nbd: use-after-free Read in nbd_queue_rq
MISC:www.openwall.com:CVE-2021-3348
MLIST:[debian-lts-announce] 20210330 [SECURITY] [DLA 2610-1] linux-4.19 security update
MLIST:[oss-security] 20210201 Re: Re: Linux kernel: linux-block: nbd: use-after-free Read in nbd_queue_rq
OSS:2021/Q1/92
RH:CVE-2021-3348
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 276681
bnc#1181504
bnc#1181645
jsc#CAR-961
rh#1921958
CVE-2021-33560libgcrypt:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2021-33560
D:CVE-2021-33560
FEDORA:FEDORA-2021-24d4e06195
FEDORA:FEDORA-2021-31fdc84207
GLSA-202210-13
MISC:dev.gnupg.org:CVE-2021-33560
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20210624 [SECURITY] [DLA 2691-1] libgcrypt20 security update
Oracle:CVE-2021-33560
RHSA-2021:4409
SMASH Issue 301428
bnc#1187212
jsc#CAR-690
rh#1970096
CVE-2021-33574glibc:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-33574
CVE-2021-33574
D:CVE-2021-33574
FEDORA:FEDORA-2021-7ddb8b0537
FEDORA:FEDORA-2021-f29b4643c7
GLSA-202107-07
MISC:sourceware.org:CVE-2021-33574
MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
RHSA-2021:4358
SMASH Issue 300753
bnc#1186489
jsc#CAR-895
jsc#CAR-897
rh#1965408
rh#1993517
CVE-2021-33624kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:github.com:CVE-2021-33624
CONFIRM:www.openwall.com:CVE-2021-33624
CVE-2021-33624
D:CVE-2021-33624
MISC:git.kernel.org:CONFIRM:www.openwall.com:CVE-2021-33624
MISC:www.usenix.org:CVE-2021-33624
MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
OSS:2021/Q2/226
SMASH Issue 302614
bnc#1187554
jsc#CAR-720
rh#1974456
CVE-2021-33630kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-33630
OSS:2024/01/30/10
OSS:2024/01/30/3
OSS:2024/01/30/4
OSS:2024/01/30/5
OSS:2024/01/30/9
OSS:2024/01/31/2
OSS:2024/01/31/3
OSS:2024/02/02/6
OSS:2024/02/02/9
OSS:2024/02/03/1
OSS:2024/Q1/65
SMASH Issue 391669
bnc#1219402
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e8b9bfa110896f95d602d8c98d5f9d67e41d78c
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8
https://gitee.com/src-openeuler/kernel/pulls/1389
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031
jsc#CAR-3086
rh#2261974
CVE-2021-33631kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-33631
OSS:2024/01/30/10
OSS:2024/01/30/3
OSS:2024/01/30/4
OSS:2024/01/30/5
OSS:2024/01/30/9
OSS:2024/01/31/2
OSS:2024/01/31/3
OSS:2024/02/02/6
OSS:2024/02/02/9
OSS:2024/02/03/1
OSS:2024/Q1/65
SMASH Issue 391670
bnc#1219412
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e8b9bfa110896f95d602d8c98d5f9d67e41d78c
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5c099c4fdc438014d5893629e70a8ba934433ee8
https://gitee.com/src-openeuler/kernel/pulls/1389
https://gitee.com/src-openeuler/kernel/pulls/1396
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1030
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1031
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1032
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1033
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1034
https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1035
jsc#CAR-3087
rh#2261976
CVE-2021-33655kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-33655
D:CVE-2021-33655
DSA-5191
L3:64525
L3:64549
L3:64602
L3:66047
MISC:git.kernel.org:CVE-2021-33655
MISC:github.com:OSS:2022/07/02/3
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
OSS:2022/07/02/3
OSS:2022/07/19/2
OSS:2022/Q3/55
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 337631
ZDI-23-1834
bnc#1201635
bnc#1202087
jsc#CAR-1912
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26
rh#2092427
rh#2093146
rh#2104114
rh#2104423
rh#2107924
rh#2108691
CVE-2021-33656kernel-source-rt:Releasedmoderate6.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H)CVE-2021-33656
L3:64743
L3:66042
MISC:git.kernel.org:CVE-2021-33656
MISC:www.openeuler.org:CVE-2021-33656
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
OSS:2022/07/19/3
OSS:2022/Q3/56
RHSA-2023:2736
RHSA-2023:2951
RHSA-2023:4789
SMASH Issue 337630
bnc#1201636
jsc#CAR-1911
rh#2108696
CVE-2021-33909kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:cdn.kernel.org:CVE-2021-33909
CONFIRM:github.com:CVE-2021-33909
CONFIRM:psirt.global.sonicwall.com:CVE-2022-0847
CONFIRM:security.netapp.com:CVE-2021-33909
CVE-2021-33909
DSA-4941
FEDORA:FEDORA-2021-07dc0b3eb1
L3:61265
L3:61406
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2021-33910
MISC:packetstormsecurity.com:CVE-2021-33909
MISC:packetstormsecurity.com:CVE-2021-33910
MISC:www.openwall.com:CVE-2021-33909
MISC:www.openwall.com:CVE-2021-33910
MISC:www.oracle.com:CVE-2022-21403
MISC:www.qualys.com:MISC:www.openwall.com:CVE-2021-33909
MISC:www.thezdi.com:MISC:www.openwall.com:CVE-2021-33909
MLIST:[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-1] linux security update
MLIST:[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-2] linux security update
MLIST:[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update
MLIST:[oss-security] 20210722 Re: CVE-2021-33909: size_t-to-int vulnerability in Linux's filesystem layer
OSS:2021/07/20/1
OSS:2021/07/20/2
OSS:2021/08/25/10
OSS:2021/09/17/2
OSS:2021/09/17/4
OSS:2021/09/21/1
OSS:2021/Q3/176
OSS:2021/Q3/19
OSS:2021/Q3/20
Oracle:CVE-2021-33909
RHSA-2021:2714
RHSA-2021:2715
RHSA-2021:2716
RHSA-2021:2718
RHSA-2021:2719
RHSA-2021:2720
RHSA-2021:2722
RHSA-2021:2723
RHSA-2021:2725
RHSA-2021:2726
RHSA-2021:2727
RHSA-2021:2728
RHSA-2021:2729
RHSA-2021:2730
RHSA-2021:2731
RHSA-2021:2732
RHSA-2021:2733
RHSA-2021:2734
RHSA-2021:2735
RHSA-2021:2736
RHSA-2021:2737
RHSA-2021:2763
SMASH Issue 303536
SMASH Issue 303538
bnc#1188062
bnc#1188257
bnc#1188581
jsc#CAR-960
rh#1970273
CVE-2021-33910systemd:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:CVE-2022-0847
CONFIRM:security.netapp.com:CVE-2021-33910
CVE-2021-33910
D:CVE-2021-33910
DSA-4942
FEDORA:FEDORA-2021-166e461c8d
FEDORA:FEDORA-2021-2a6ba64260
GLSA-202107-48
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2021-33910
MISC:github.com:CVE-2021-33910
MISC:github.com:MLIST:[oss-security] 20210907 Re: Pop!_OS Membership to linux-distros list
MISC:packetstormsecurity.com:CVE-2021-33910
MISC:www.openwall.com:CVE-2021-33910
MISC:www.qualys.com:MISC:www.openwall.com:CVE-2021-33909
MLIST:[oss-security] 20210804 Re: Pop!_OS Membership to linux-distros list
MLIST:[oss-security] 20210817 Re: Pop!_OS Membership to linux-distros list
MLIST:[oss-security] 20210907 Re: Pop!_OS Membership to linux-distros list
OSS:2018/09/25/4
OSS:2021/07/20/2
OSS:2021/Q3/20
OSS:2021/Q3/67
Oracle:CVE-2018-16864
Oracle:CVE-2021-33909
RHSA-2021:2717
RHSA-2021:2721
RHSA-2021:2724
RHSA-2021:2736
SMASH Issue 303537
SMASH Issue 303539
bnc#1188063
jsc#CAR-836
rh#1666690
rh#1970887
CVE-2021-33928libsolv:Not affectedlow0 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)CVE-2021-33928
MISC:github.com:CVE-2021-33930
RHSA-2021:4060
RHSA-2022:5498
SMASH Issue 309027
bnc#1190148
rh#2000699
CVE-2021-33929libsolv:Not affectedlow0 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)CVE-2021-33929
MISC:github.com:CVE-2021-33930
RHSA-2021:4060
RHSA-2022:5498
SMASH Issue 309026
bnc#1190149
rh#2000703
CVE-2021-33930libsolv:Not affectedlow0 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)CVE-2021-33930
MISC:github.com:CVE-2021-33930
RHSA-2021:4060
RHSA-2022:5498
SMASH Issue 309025
bnc#1190150
rh#2000705
CVE-2021-33938libsolv:Not affectedlow0 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)CVE-2021-33938
MISC:github.com:CVE-2021-33938
RHSA-2021:4060
RHSA-2022:5498
SMASH Issue 309024
bnc#1190147
rh#2000707
CVE-2021-3411kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-3411
MISC:blog.pi3.com.pl:CVE-2021-3411
MISC:lists.openwall.net:OSS:2021/Q1/165
OSS:2021/Q1/165
RH:CVE-2021-3411
SMASH Issue 278292
SMASH Issue 278293
bnc#1182498
rh#1928236
CVE-2021-3421rpm:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2021-3421
FEDORA:FEDORA-2021-2383d950fd
FEDORA:FEDORA-2021-662680e477
FEDORA:FEDORA-2021-8d52a8a999
GLSA-202107-43
RH:CVE-2021-3421
RHSA-2021:2574
RHSA-2021:2791
SMASH Issue 279684
bnc#1183543
jsc#CAR-959
rh#1927747
CVE-2021-3426python3:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2021-3426
CVE-2021-3426
D:CVE-2021-3426
FEDORA:FEDORA-2021-067c9deff1
FEDORA:FEDORA-2021-0a8f3ffbc0
FEDORA:FEDORA-2021-1769a23935
FEDORA:FEDORA-2021-2ab6f060d9
FEDORA:FEDORA-2021-a26257ccf5
FEDORA:FEDORA-2021-a311bf10d4
FEDORA:FEDORA-2021-b6b6093b3a
GLSA-202104-04
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MLIST:[debian-lts-announce] 20210405 [SECURITY] [DLA 2619-1] python3.5 security update
Oracle:CVE-2021-3426
RH:CVE-2021-3426
RHSA-2021:3254
RHSA-2021:4160
RHSA-2021:4162
RHSA-2021:4399
SMASH Issue 279513
bnc#1183374
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
jsc#CAR-958
rh#1935913
CVE-2021-3428kernel-source-rt:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2021-3428
MISC:bugzilla.redhat.com:CVE-2021-3428
MISC:ubuntu.com:CVE-2021-3428
OSS:2021/03/17/1
OSS:2021/Q1/212
RH:CVE-2021-3428
RHSA-2021:1578
RHSA-2021:1739
SMASH Issue 279782
bnc#1183509
rh#1936786
CVE-2021-34401kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:nvidia.custhelp.com:CVE-2021-34406
CVE-2021-34401
SMASH Issue 320895
bnc#1194896
rh#2044512
CVE-2021-34402kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:nvidia.custhelp.com:CVE-2021-34406
CVE-2021-34402
SMASH Issue 320893
bnc#1194894
rh#2044518
CVE-2021-34403kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:nvidia.custhelp.com:CVE-2021-34406
CVE-2021-34403
SMASH Issue 320892
SMASH Issue 321791
bnc#1194897
rh#2044524
CVE-2021-34406kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:nvidia.custhelp.com:CVE-2021-34406
CVE-2021-34406
SMASH Issue 320889
bnc#1194893
rh#2044510
CVE-2021-3444kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-3444
CVE-2021-3444
L3:60854
MISC:git.kernel.org:CVE-2021-3444
MISC:packetstormsecurity.com:CVE-2020-27170
MISC:www.openwall.com:CVE-2021-3444
MLIST:[oss-security] 20210323 [CVE-2021-3444] Linux kernel bpf verifier incorrect mod32 truncation
OSS:2021/Q1/259
RH:CVE-2021-3444
SMASH Issue 280324
bnc#1184170
bnc#1184171
bnc#1186443
rh#1930078
rh#1930079
rh#1930080
rh#1942667
CVE-2021-3449openssl:Not affected, openssl-1_1:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CISCO:20210325 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021
CONFIRM:cert-portal.siemens.com:CVE-2021-3449
CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:git.openssl.org:CVE-2021-3449
CONFIRM:kb.pulsesecure.net:CVE-2021-3450
CONFIRM:kc.mcafee.com:CVE-2021-3149
CONFIRM:psirt.global.sonicwall.com:CVE-2021-3450
CONFIRM:security.netapp.com:CVE-2021-2154
CONFIRM:security.netapp.com:CVE-2021-3449
CONFIRM:www.openssl.org:CVE-2021-3449
CONFIRM:www.tenable.com:CVE-2021-23841
CONFIRM:www.tenable.com:CVE-2021-3449
CONFIRM:www.tenable.com:CVE-2021-3450
CVE-2021-3449
DSA-4875
FEDORA:FEDORA-2021-cbf14ab8f9
GLSA-202103-03
MISC:security.FreeBSD.org:CVE-2021-3449
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20210831 [SECURITY] [DLA 2751-1] postgresql-9.6 security update
MLIST:[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing
MLIST:[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing
MLIST:[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing
N/A:N/A
OSS:2021/Q1/266
Oracle:CVE-2021-3449
RH:CVE-2021-3449
RHSA-2021:1024
RHSA-2021:1063
RHSA-2021:1131
RHSA-2021:1189
RHSA-2021:1195
RHSA-2021:1196
RHSA-2021:1199
RHSA-2021:1200
RHSA-2021:1202
RHSA-2021:1203
SMASH Issue 280181
SMASH Issue 280182
bnc#1183852
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=fb9fa6b51defd48157eeb207f52181f735d96148
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/
https://security.netapp.com/advisory/ntap-20240621-0006/
openssl.git:commit:02b1636fe3db274497304a3e95a4e32ced7e841b
openssl.git:commit:112580c27b829b0ac0874d5c5787195f27c7952c
openssl.git:commit:2b9e2afc382490592078cdb69d06f54f0fefd4c6
openssl.git:commit:39a140597d874e554b736885ac4dea16ac40a87a
rh#1941554
CVE-2021-3450openssl:Not affected, openssl-1_1:Not affectedimportant7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)CISCO:20210325 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: March 2021
CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:git.openssl.org:CVE-2021-3450
CONFIRM:kb.pulsesecure.net:CVE-2021-3450
CONFIRM:kc.mcafee.com:CVE-2021-3149
CONFIRM:psirt.global.sonicwall.com:CVE-2021-3450
CONFIRM:security.netapp.com:CVE-2021-3449
CONFIRM:www.openssl.org:CVE-2021-3449
CONFIRM:www.tenable.com:CVE-2019-16168
CONFIRM:www.tenable.com:CVE-2021-23841
CONFIRM:www.tenable.com:CVE-2021-3450
CVE-2021-3450
FEDORA:FEDORA-2021-cbf14ab8f9
GLSA-202103-03
L3:68186
MISC:mta.openssl.org:CVE-2021-3450
MISC:security.FreeBSD.org:CVE-2021-3449
MISC:www.oracle.com:CVE-2021-3450
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[oss-security] 20210327 OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing
MLIST:[oss-security] 20210327 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing
MLIST:[oss-security] 20210328 Re: OpenSSL 1.1.1 CVE-2021-3450 CA certificate check bypass with X509_V_FLAG_X509_STRICT, CVE-2021-3449 NULL pointer deref in signature_algorithms processing
N/A:N/A
OSS:2021/Q1/266
Oracle:CVE-2021-3450
RH:CVE-2021-3450
RHSA-2021:1024
RHSA-2021:1189
RHSA-2021:1195
RHSA-2021:1196
RHSA-2021:1199
RHSA-2021:1200
RHSA-2021:1202
RHSA-2021:1203
SMASH Issue 280179
SMASH Issue 280180
bnc#1183851
rh#1941547
CVE-2021-34556kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2021-34556
D:CVE-2021-34556
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-34556
MISC:www.openwall.com:CVE-2021-34556
MISC:www.openwall.com:CVE-2021-35477
OSS:2021/Q3/63
SMASH Issue 305424
bnc#1188983
jsc#CAR-848
rh#1989212
CVE-2021-34693kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2021-34693
D:CVE-2021-34693
DSA-4941
MISC:github.com:MLIST:[oss-security] 20210615 CVE-2021-34693: Infoleak in CAN BCM protocol in Linux kernel
MISC:lore.kernel.org:CVE-2021-34693
MLIST:[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-1] linux security update
MLIST:[debian-lts-announce] 20210720 [SECURITY] [DLA 2713-2] linux security update
MLIST:[debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update
MLIST:[oss-security] 20210615 CVE-2021-34693: Infoleak in CAN BCM protocol in Linux kernel
OSS:2021/Q2/218
SMASH Issue 302295
bnc#1187452
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5e87ddbe3942e27e939bdc02deb8579b0cbd8ecc
https://lore.kernel.org/netdev/trinity-87eaea25-2a7d-4aa9-92a5-269b822e5d95-1623609211076%403c-app-gmx-bs04/T/
jsc#CAR-957
rh#1972265
CVE-2021-3483kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-3483
CVE-2021-3483
MISC:git.kernel.org:MLIST:[oss-security] 20210407 CVE-2021-3483: Linux kernel: a use-after-free bug in nosy driver
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[oss-security] 20210407 CVE-2021-3483: Linux kernel: a use-after-free bug in nosy driver
OSS:2021/Q2/10
RH:CVE-2021-3483
SMASH Issue 281204
SMASH Issue 281205
bnc#1184393
bnc#1186401
jsc#CAR-956
rh#1948045
CVE-2021-34866kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-34866
CVE-2021-34866
SMASH Issue 312594
ZDI-21-1148
bnc#1191645
bnc#1191646
https://www.zerodayinitiative.com/advisories/ZDI-21-1148/
rh#2000457
CVE-2021-3487binutils:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3487
FEDORA:FEDORA-2021-7ca24ddc86
FEDORA:FEDORA-2021-9bd201dd4d
FEDORA:FEDORA-2021-d23d016509
GLSA-202208-30
RH:CVE-2021-3487
RHSA-2021:4364
SMASH Issue 281603
bnc#1184620
jsc#CAR-1013
rh#1947111
CVE-2021-3489kernel-source-rt:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-3489
D:CVE-2021-3489
MISC:git.kernel.org:MLIST:[oss-security] CVE-2021-3489 - Linux kernel eBPF RINGBUF map oversized allocation
MLIST:[oss-security] CVE-2021-3489 - Linux kernel eBPF RINGBUF map oversized allocation
OSS:2021/Q2/124
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 283443
SMASH Issue 283444
ZDI-21-590
bnc#1185640
bnc#1185856
rh#1959559
ubuntu.com:CVE-2021-3491
CVE-2021-3490kernel-source-rt:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-3490
D:CVE-2021-3490
MISC:git.kernel.org:MLIST:[oss-security] CVE-2021-3490 - Linux kernel eBPF bitwise ops ALU32 bounds tracking
MLIST:[oss-security] CVE-2021-3490 - Linux kernel eBPF bitwise ops ALU32 bounds tracking
OSS:2021/Q2/125
SMASH Issue 283445
SMASH Issue 283446
ZDI-21-606
bnc#1185641
bnc#1185796
rh#1959556
ubuntu.com:CVE-2021-3491
CVE-2021-3491kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-3491
D:CVE-2021-3491
MISC:git.kernel.org:MLIST:[oss-security] CVE-2021-3491 - Linux kernel io_uring PROVIDE_BUFFERS MAX_RW_COUNT bypass
MLIST:[oss-security] CVE-2021-3491 - Linux kernel io_uring PROVIDE_BUFFERS MAX_RW_COUNT bypass
OSS:2021/Q2/127
SMASH Issue 283448
SMASH Issue 283449
ZDI-21-589
bnc#1185642
bnc#1187090
linux.git:commit:d1f82808877bb10d3deee7cf3374a4eb3fb582db
rh#1959565
ubuntu.com:CVE-2021-3491
CVE-2021-3492kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3492
MISC:git.launchpad.net:MISC:www.openwall.com:CVE-2021-3492
MISC:packetstormsecurity.com:CVE-2021-3492
MISC:ubuntu.com:CVE-2021-3492
MISC:www.openwall.com:CVE-2021-3492
MISC:www.zerodayinitiative.com:CVE-2021-3492
OSS:2021/Q2/25
SMASH Issue 282189
bnc#1184944
rh#1950499
CVE-2021-3493kernel-source-rt:Not affectedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-3493
D:CVE-2021-3493
MISC:git.kernel.org:CVE-2021-3493
MISC:packetstormsecurity.com:CVE-2021-3493
MISC:ubuntu.com:CVE-2021-3492
MISC:www.openwall.com:CVE-2021-3493
OSS:2021/04/16/1
OSS:2021/Q2/24
SMASH Issue 282190
bnc#1184900
rh#1950506
CVE-2021-34981kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)CVE-2021-34981
L3:62278
L3:64525
L3:64549
L3:66054
SMASH Issue 313300
SMASH Issue 313608
ZDI-21-1223
bnc#1191961
bnc#1192595
bnc#1193499
https://www.zerodayinitiative.com/advisories/ZDI-21-1223/
jsc#CAR-1181
rh#2017077
CVE-2021-3501kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-3501
CVE-2021-3501
MISC:git.kernel.org:CVE-2021-3501
RHSA-2021:2165
RHSA-2021:2168
RHSA-2021:2169
RHSA-2021:2522
SMASH Issue 282978
bnc#1185380
rh#1950136
CVE-2021-35039kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:cdn.kernel.org:CVE-2021-35039
CONFIRM:github.com:CVE-2021-35039
CVE-2021-35039
D:CVE-2021-35039
MISC:www.openwall.com:CVE-2021-35039
MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
MLIST:[oss-security] 20210706 CVE-2021-35039: Linux kernel loading unsigned kernel modules via init_module syscall
OSS:2021/Q3/6
SMASH Issue 303531
bnc#1188080
bnc#1188126
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0c18f29aae7ce3dadd26d8ee3505d07cc982df75
https://security.netapp.com/advisory/ntap-20210813-0004/
jsc#CAR-955
rh#1980069
CVE-2021-3506kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-3506
CVE-2021-3506
MISC:git.kernel.org:MLIST:[oss-security] 20210508 Re: Linux kernel: f2fs: out-of-bounds memory access bug
MISC:www.mail-archive.com:CVE-2021-3506
MISC:www.openwall.com:CVE-2021-3506
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[oss-security] 20210508 Re: Linux kernel: f2fs: out-of-bounds memory access bug
OSS:2021/Q2/107
SMASH Issue 282255
bnc#1184999
jsc#CAR-1003
rh#1944298
CVE-2021-3516libxml2:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-3516
CVE-2021-3516
D:CVE-2021-3516
FEDORA:FEDORA-2021-b950000d2b
FEDORA:FEDORA-2021-e3ed1ba38b
GLSA-202107-05
MISC:gitlab.gnome.org:CVE-2021-3516
MISC:www.oracle.com:CVE-2022-21403
MLIST:[debian-lts-announce] 20210510 [SECURITY] [DLA 2653-1] libxml2 security update
RHBA-2021:2854
RHSA-2021:2569
RHSA-2022:1389
RHSA-2022:1390
SMASH Issue 282976
bnc#1185409
jsc#CAR-954
rh#1954225
CVE-2021-3517libxml2:Releasedimportant8.6 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)CONFIRM:security.netapp.com:CVE-2021-3517
CONFIRM:security.netapp.com:CVE-2021-35603
CVE-2021-3517
FEDORA:FEDORA-2021-b950000d2b
FEDORA:FEDORA-2021-e3ed1ba38b
GLSA-202107-05
L3:60727
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[debian-lts-announce] 20210510 [SECURITY] [DLA 2653-1] libxml2 security update
Oracle:CVE-2021-3517
Oracle:CVE-2021-3518
RHBA-2021:2854
RHSA-2021:2569
RHSA-2022:1389
RHSA-2022:1390
SMASH Issue 282977
bnc#1185410
bnc#1185811
jsc#CAR-953
rh#1954232
CVE-2021-3518libxml2:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-3517
CONFIRM:support.apple.com:CVE-2020-36331
CONFIRM:support.apple.com:CVE-2021-3518
CVE-2021-3518
FEDORA:FEDORA-2021-b950000d2b
FEDORA:FEDORA-2021-e3ed1ba38b
FULLDISC:20210723 APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7
FULLDISC:20210723 APPLE-SA-2021-07-21-2 macOS Big Sur 11.5
FULLDISC:20210723 APPLE-SA-2021-07-21-5 watchOS 7.6
FULLDISC:20210723 APPLE-SA-2021-07-21-6 tvOS 14.7
GLSA-202107-05
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
MLIST:[debian-lts-announce] 20210510 [SECURITY] [DLA 2653-1] libxml2 security update
Oracle:CVE-2021-3518
RHBA-2021:2854
RHSA-2021:2569
RHSA-2022:1389
RHSA-2022:1390
SMASH Issue 282975
bnc#1185408
jsc#CAR-952
rh#1954242
CVE-2021-3520lz4:Releasedimportant8.6 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)CONFIRM:security.netapp.com:CVE-2021-3520
CVE-2021-3520
DSA-4919
MISC:access.redhat.com:/errata/RHBA-2021:2854
MISC:access.redhat.com:/errata/RHSA-2021:2575
MISC:access.redhat.com:/errata/RHSA-2022:1345
MISC:access.redhat.com:/errata/RHSA-2022:5606
MISC:access.redhat.com:/errata/RHSA-2022:6407
MISC:access.redhat.com:/security/cve/CVE-2021-3520
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21498
N/A:N/A
Oracle:CVE-2021-3520
RHBA-2021:2854
RHSA-2021:2575
RHSA-2022:1345
RHSA-2022:5606
RHSA-2022:6407
SMASH Issue 283025
bdo#987856
bnc#1185438
jsc#CAR-951
rh#1954559
CVE-2021-3521rpm:Unsupportedmoderate4.4 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:H/A:N)CVE-2021-3521
D:CVE-2021-3521
GLSA-202210-22
MISC:access.redhat.com:/errata/RHSA-2022:0254
MISC:access.redhat.com:/errata/RHSA-2022:0368
MISC:access.redhat.com:/errata/RHSA-2022:0634
MISC:access.redhat.com:CVE-2021-3521
MISC:github.com:CVE-2021-3521
Oracle:CVE-2021-3521
RHSA-2022:0254
RHSA-2022:0368
RHSA-2022:0634
SMASH Issue 311327
bnc#1191175
jsc#CAR-1094
rh#1941098
CVE-2021-3530binutils:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2021-3530
CVE-2021-3530
GLSA-202208-30
MISC:src.fedoraproject.org:CVE-2021-3530
SMASH Issue 283368
bnc#1185597
rh#1956423
CVE-2021-35331tcl:Ignoreimportant ()CVE-2021-35331
D:CVE-2021-35331
MISC:core.tcl-lang.org:CVE-2021-35331
MISC:github.com:CVE-2021-35331
MISC:sqlite.org:CVE-2021-35331
SMASH Issue 303487
CVE-2021-3537libxml2:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-3517
CVE-2021-3537
FEDORA:FEDORA-2021-b950000d2b
FEDORA:FEDORA-2021-e3ed1ba38b
GLSA-202107-05
L3:60741
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20210510 [SECURITY] [DLA 2653-1] libxml2 security update
Oracle:CVE-2021-3537
RHBA-2021:2854
RHSA-2021:2569
RHSA-2022:1389
RHSA-2022:1390
SMASH Issue 283523
bnc#1185698
bnc#1185879
jsc#CAR-950
rh#1956522
CVE-2021-3541libxml2:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-3541
CVE-2021-3541
MISC:www.oracle.com:CVE-2022-21403
RHBA-2021:2854
RHSA-2021:2569
RHSA-2022:1389
RHSA-2022:1390
SMASH Issue 284196
bnc#1186015
jsc#CAR-723
rh#1950515
CVE-2021-3542kernel-source-rt:Releasedimportant6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-42739
CVE-2021-3542
CVE-2021-42739
D:CVE-2021-42739
DSA-5096
FEDORA:FEDORA-2021-7de33b7016
FEDORA:FEDORA-2021-8364530ebf
FEDORA:FEDORA-2021-fdef34e26f
MISC:git.kernel.org:CVE-2021-42739
MISC:lore.kernel.org:CVE-2021-42739
MISC:seclists.org:CVE-2021-42739
MISC:www.oracle.com:CVE-2022-21586
MISC:www.starwindsoftware.com:CVE-2021-42739
MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2022:0063
RHSA-2022:0065
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 281716
SMASH Issue 283854
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1184673
bnc#1186063
bnc#1192036
https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ%40mwanda/
jsc#CAR-1185
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1951739
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-3543kernel-source-rt:Not affectedimportant ()CVE-2021-3543
MISC:lore.kernel.org:CVE-2021-3543
RHSA-2021:2168
RHSA-2021:2169
SMASH Issue 284320
SMASH Issue 284469
bnc#1185091
rh#1953022
CVE-2021-35465gcc:Not affected, gcc7:Unsupportedlow ()CONFIRM:developer.arm.com:CVE-2021-35465
CVE-2021-35465
D:CVE-2021-35465
MISC:developer.arm.com:CVE-2021-28664
SMASH Issue 307823
bnc#1189751
CVE-2021-35477kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)CVE-2021-35477
D:CVE-2021-35477
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-34556
MISC:www.openwall.com:CVE-2021-34556
MISC:www.openwall.com:CVE-2021-35477
OSS:2021/Q3/63
SMASH Issue 305425
bnc#1188985
jsc#CAR-849
rh#1989216
CVE-2021-3549binutils:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-3549
GLSA-202208-30
L3:60836
SMASH Issue 284281
bnc#1186116
bnc#1186392
jsc#CAR-609
rh#1960717
CVE-2021-3564kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3564
MISC:access.redhat.com:/errata/RHSA-2021:4140
MISC:access.redhat.com:/errata/RHSA-2021:4356
MISC:access.redhat.com:/errata/RHSA-2022:0620
MISC:access.redhat.com:/errata/RHSA-2022:0622
MISC:access.redhat.com:/security/cve/CVE-2021-3564
MISC:www.openwall.com:CVE-2021-3564
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
MLIST:[debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
MLIST:[oss-security] 20210525 CVE-2021-3564 Linux Bluetooth device initialization implementation bug
MLIST:[oss-security] 20210601 Re: CVE-2021-3564 Linux Bluetooth device initialization implementation bug
OSS:2021/Q2/160
RHSA-2021:4140
RHSA-2021:4356
RHSA-2022:0620
RHSA-2022:0622
SMASH Issue 300669
bnc#1186207
linux.git:commit:579028dec182c026b9a85725682f1dfbdc825eaa
linux.git:commit:6a137caec23aeb9e036cdfd8a46dd8a366460e5d
rh#1964139
CVE-2021-3570linuxptp:Releasedimportant8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-3570
DSA-4938
FEDORA:FEDORA-2021-1b42c2f458
FEDORA:FEDORA-2021-a5b584004c
MLIST:[debian-lts-announce] 20210731 [SECURITY] [DLA 2723-1] linuxptp security update
OSS:2021/Q3/4
RHSA-2021:2657
RHSA-2021:2658
RHSA-2021:2659
RHSA-2021:2660
SMASH Issue 302807
SMASH Issue 302808
bdo#990748
bnc#1187646
jsc#CAR-858
rh#1966240
CVE-2021-3571linuxptp:Not affectedimportant7.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2021-3571
FEDORA:FEDORA-2021-1b42c2f458
FEDORA:FEDORA-2021-a5b584004c
OSS:2021/Q3/4
RHSA-2021:4321
SMASH Issue 302809
SMASH Issue 302810
bnc#1187647
rh#1966241
CVE-2021-3572python3:Releasedmoderate4.5 (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N)CVE-2021-3572
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
Oracle:CVE-2021-3572
RHSA-2021:3254
RHSA-2021:4160
RHSA-2021:4162
RHSA-2021:4455
SMASH Issue 301019
bnc#1186819
https://security.netapp.com/advisory/ntap-20240621-0006/
jsc#CAR-1547
rh#1962856
CVE-2021-3573kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-3573
D:CVE-2021-3573
DSA-5096
L3:61097
L3:61125
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-3573
MISC:github.com:OSS:2023/Q3/0
MISC:www.openwall.com:CVE-2021-3573
OSS:2021/06/08/2
OSS:2021/07/22/1
OSS:2021/Q2/188
OSS:2021/Q3/28
OSS:2022/01/25/12
OSS:2023/07/02/1
RHSA-2021:4140
RHSA-2021:4356
RHSA-2022:0620
RHSA-2022:0622
SMASH Issue 301015
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1186666
bnc#1187054
bnc#1187889
bnc#1187934
bnc#1187999
bnc#1188613
jsc#CAR-842
linux.git:commit:58ce6d5b271ab25fb2056f84a8e5546945eb5fc9
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
linux.git:commit:e04480920d1eec9c061841399aa6f35b6f987d8b
rh#1966578
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2059923
CVE-2021-3580libnettle:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-3580
CVE-2021-3580
D:CVE-2021-3580
MLIST:[debian-lts-announce] 20210918 [SECURITY] [DLA 2760-1] nettle security update
RHSA-2021:4451
SMASH Issue 301375
bdo#985652
bdo#989631
bnc#1187060
https://security.gentoo.org/glsa/202401-24
jsc#CAR-835
rh#1967983
CVE-2021-3587kernel-source-rt:Already fixedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3587
CVE-2021-38208
MISC:cdn.kernel.org:CVE-2021-38208
MISC:cve.mitre.org:MLIST:[oss-security] 20210817 Re: Linux kernel: nfc: null ptr dereference in llcp_sock_getname
MISC:github.com:CVE-2021-38208
MLIST:[oss-security] 20210817 Re: Linux kernel: nfc: null ptr dereference in llcp_sock_getname
OSS:2021/Q2/187
OSS:2021/Q2/189
OSS:2021/Q3/104
OSS:2021/Q3/105
OSS:2021/Q3/117
SMASH Issue 301352
bnc#1186665
bnc#1187055
jsc#CAR-949
rh#1968057
rh#1992810
CVE-2021-35942glibc:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2021-35942
CONFIRM:sourceware.org:CVE-2021-35942
CVE-2021-35942
GLSA-202208-24
MISC:sourceware.org:CVE-2021-35942
MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
RHSA-2021:4358
SMASH Issue 303290
bnc#1187911
jsc#CAR-755
rh#1977975
CVE-2021-3600kernel-source-rt:Already fixedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-3600
OSS:2021/Q2/228
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 302816
bnc#1187721
bnc#1187724
https://git.kernel.org/linus/e88b2c6e5a4d9ce30d75391e4d950da74bb2bd90
https://ubuntu.com/security/notices/USN-5003-1
jsc#CAR-1637
rh#1981954
CVE-2021-3601openssl:Not affected, openssl-1_1:Not affectedlow3.3 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N)CVE-2021-3601
SMASH Issue 302306
bnc#1189259
rh#1970201
CVE-2021-36084libselinux:Not affectedmoderate ()CVE-2021-36084
MISC:bugs.chromium.org:CVE-2021-36084
MISC:github.com:CVE-2021-36084
RHSA-2021:4513
SMASH Issue 303334
bnc#1187966
rh#1979662
CVE-2021-36085libselinux:Not affectedmoderate ()CVE-2021-36085
MISC:bugs.chromium.org:CVE-2021-36085
MISC:github.com:CVE-2021-36085
RHSA-2021:4513
SMASH Issue 303333
bnc#1187965
rh#1979664
CVE-2021-36086libselinux:Not affectedlow ()CVE-2021-36086
MISC:bugs.chromium.org:CVE-2021-36086
MISC:github.com:CVE-2021-36086
RHSA-2021:4513
SMASH Issue 303332
bnc#1187964
rh#1979666
CVE-2021-36087checkpolicy:Not affected, libselinux:Not affected, libsemanage:Not affected, libsepol:Not affected, policycoreutils:Not affectedlow ()CVE-2021-36087
FEDORA:FEDORA-2021-67efe88c29
MISC:bugs.chromium.org:CVE-2021-36087
MISC:github.com:CVE-2021-36087
MISC:lore.kernel.org:CVE-2021-36087
RHSA-2021:4513
SMASH Issue 303331
bnc#1187928
rh#1979668
CVE-2021-3609kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-3609
CVE-2021-3609
L3:61640
MISC:access.redhat.com:/errata/RHSA-2021:3044
MISC:access.redhat.com:/errata/RHSA-2021:3057
MISC:access.redhat.com:/errata/RHSA-2021:3088
MISC:access.redhat.com:/errata/RHSA-2021:3235
MISC:access.redhat.com:/errata/RHSA-2021:3363
MISC:access.redhat.com:/errata/RHSA-2021:3375
MISC:access.redhat.com:/errata/RHSA-2021:3380
MISC:access.redhat.com:/errata/RHSA-2021:3442
MISC:access.redhat.com:/errata/RHSA-2021:3444
MISC:access.redhat.com:/security/cve/CVE-2021-3609
MISC:github.com:CVE-2021-3609
MISC:github.com:OSS:2021/Q2/224
OSS:2021/06/19/1
OSS:2021/Q2/224
RHSA-2021:3044
RHSA-2021:3057
RHSA-2021:3088
RHSA-2021:3235
RHSA-2021:3363
RHSA-2021:3375
RHSA-2021:3380
RHSA-2021:3442
RHSA-2021:3444
SMASH Issue 301820
SMASH Issue 302539
bnc#1187215
bnc#1188323
bnc#1190389
jsc#CAR-841
rh#1971651
CVE-2021-3612kernel-source-rt:Releasedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CONFIRM:security.netapp.com:CVE-2021-3612
CVE-2021-3612
FEDORA:FEDORA-2021-a95108d156
MISC:lore.kernel.org:CVE-2021-3612
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 302657
bnc#1187585
rh#1974079
CVE-2021-3635kernel-source-rt:Already fixedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3635
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 305898
bnc#1189169
rh#1976946
CVE-2021-36368openssh:Won't fixlow0 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N)CONFIRM:bugzilla.mindrot.org:CVE-2021-36368
CVE-2021-36368
D:CVE-2021-36368
MISC:docs.ssh-mitm.at:CVE-2021-36368
MISC:github.com:CVE-2021-36368
MISC:security-tracker.debian.org:CVE-2021-36368
MISC:www.openssh.com:CVE-2020-15778
SMASH Issue 326103
SMASH Issue 340561
bnc#1202652
rh#2086690
CVE-2021-3640kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-45868
CVE-2021-3640
D:CVE-2021-3573
D:CVE-2021-3640
DSA-5096
MISC:access.redhat.com:/errata/RHSA-2022:7444
MISC:access.redhat.com:/errata/RHSA-2022:7683
MISC:access.redhat.com:/errata/RHSA-2022:7933
MISC:access.redhat.com:/errata/RHSA-2022:8267
MISC:access.redhat.com:/security/cve/CVE-2021-3640
MISC:git.kernel.org:CVE-2021-3640
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-3573
MISC:github.com:OSS:2023/Q3/0
MISC:lkml.org:/lkml/2021/8/28/238
MISC:ubuntu.com:CVE-2021-3640
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/06/08/2
OSS:2021/07/22/1
OSS:2021/Q3/28
OSS:2022/01/25/12
OSS:2023/07/02/1
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 303981
SMASH Issue 303982
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1188172
bnc#1188613
bnc#1191530
jsc#CAR-947
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-3648binutils:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2021-3648
SMASH Issue 304015
bnc#1188374
rh#1982320
CVE-2021-3653kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-3653
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-3653
MISC:github.com:MISC:www.openwall.com:CVE-2021-3653
MISC:packetstormsecurity.com:CVE-2021-33909
MISC:www.openwall.com:CVE-2021-3653
MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
OSS:2021/08/16/1
OSS:2021/Q3/102
RHSA-2021:3547
RHSA-2021:3548
RHSA-2021:3676
RHSA-2021:3767
RHSA-2021:3801
RHSA-2021:3802
RHSA-2021:3812
RHSA-2021:3904
RHSA-2021:3909
RHSA-2021:3987
RHSA-2021:4692
RHSA-2021:4768
SMASH Issue 307075
SMASH Issue 307076
bdo#993948
bdo#993978
bnc#1189399
bnc#1189420
jsc#CAR-894
linux.git:commit:02a3715449a0edf06a37efe3862bc7732099a220
linux.git:commit:0f923e07124df069ba68d8bb12324398f4b6b709
linux.git:commit:faf6b755629627f19feafa75b32e81cd7738f12d
rh#1983686
CVE-2021-3655kernel-source-rt:Releasedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2021-3655
D:CVE-2021-3655
MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
SMASH Issue 304618
bnc#1188563
jsc#CAR-1224
rh#1984024
CVE-2021-3656kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-3656
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-3653
MISC:github.com:MISC:www.openwall.com:CVE-2021-3653
MISC:www.openwall.com:CVE-2021-3653
OSS:2021/08/16/1
OSS:2021/Q3/102
RHSA-2021:3676
RHSA-2021:3801
RHSA-2021:3802
RHSA-2021:3812
RHSA-2021:3904
RHSA-2021:3909
RHSA-2021:3987
RHSA-2021:4056
RHSA-2021:4088
SMASH Issue 307077
SMASH Issue 307078
bdo#993948
bdo#993978
bnc#1189400
bnc#1189418
jsc#CAR-893
linux.git:commit:02a3715449a0edf06a37efe3862bc7732099a220
linux.git:commit:c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
linux.git:commit:faf6b755629627f19feafa75b32e81cd7738f12d
rh#1983988
CVE-2021-3659kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3659
MISC:access.redhat.com:CVE-2021-3659
MISC:git.kernel.org:CVE-2021-33033
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 305262
bnc#1188876
jsc#CAR-908
rh#1975949
CVE-2021-3669kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3669
MISC:access.redhat.com:/errata/RHSA-2022:1975
MISC:access.redhat.com:/errata/RHSA-2022:1988
MISC:access.redhat.com:CVE-2021-3669
MISC:bugzilla.redhat.com:CVE-2021-3669
MISC:security-tracker.debian.org:CVE-2021-3669
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 305426
bnc#1188986
jsc#CAR-1136
rh#1986473
CVE-2021-36690sqlite3:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:support.apple.com:CVE-2022-1725
CONFIRM:support.apple.com:CVE-2022-26744
CONFIRM:support.apple.com:CVE-2022-32911
CVE-2021-36690
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-11 tvOS 16
FULLDISC:20221030 APPLE-SA-2022-10-27-13 watchOS 9
FULLDISC:20221030 APPLE-SA-2022-10-27-3 Additional information for APPLE-SA-2022-09-12-1 iOS 16
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
L3:63842
L3:65975
MISC:sqlite.com:CVE-2021-36690
MISC:www.oracle.com:CVE-2022-21403
MISC:www.sqlite.org:CVE-2021-36690
SMASH Issue 307939
bnc#1189802
bnc#1201952
jsc#CAR-948
CVE-2021-3672c-ares:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CVE-2021-3672
DSA-4954
MISC:c-ares.haxx.se:CVE-2021-3672
MISC:github.com:OSS:2021/Q3/84
MISC:www.oracle.com:CVE-2022-21586
OSS:2021/Q3/84
RHSA-2021:3280
RHSA-2021:3281
RHSA-2021:3623
RHSA-2021:3638
RHSA-2021:3639
RHSA-2021:3666
RHSA-2022:2043
SMASH Issue 305288
bdo#992053
bnc#1188881
https://security.gentoo.org/glsa/202401-02
jsc#CAR-845
rh#1988342
CVE-2021-36770perl:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:github.com:CVE-2021-36770
CONFIRM:metacpan.org:CVE-2021-36770
CONFIRM:news.cpanel.com:CVE-2021-36770
CONFIRM:security.netapp.com:CVE-2021-36770
CVE-2021-36770
FEDORA:FEDORA-2021-44c65203cc
FEDORA:FEDORA-2021-92e07de1dd
MISC:security-tracker.debian.org:CVE-2021-36770
Oracle:CVE-2021-36770
SMASH Issue 304526
bnc#1188467
rh#1983786
CVE-2021-3679kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3679
DSA-4978
MISC:git.kernel.org:CVE-2021-3679
MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 305631
bdo#993948
bdo#993978
bnc#1189057
jsc#CAR-857
rh#1989165
CVE-2021-36976libarchive:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:support.apple.com:CVE-2021-36976
CONFIRM:support.apple.com:CVE-2022-0158
CVE-2021-36976
FEDORA:FEDORA-2022-9bb794c5f5
FULLDISC:20220314 APPLE-SA-2022-03-14-1 iOS 15.4 and iPadOS 15.4
FULLDISC:20220314 APPLE-SA-2022-03-14-2 watchOS 8.5
FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
GLSA-202208-26
MISC:bugs.chromium.org:CVE-2021-36976
MISC:github.com:CVE-2021-36976
SMASH Issue 304599
bnc#1188572
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SE5NJQNM22ZE5Z55LPAGCUHSBQZBKMKC/
jsc#CAR-1004
rh#1984646
CVE-2021-3711openssl:Released, openssl-1_1:Releasedcritical9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:git.openssl.org:CVE-2021-3711
CONFIRM:security.netapp.com:CVE-2021-35648
CONFIRM:security.netapp.com:CVE-2021-3712
CONFIRM:www.openssl.org:CVE-2021-3712
CONFIRM:www.tenable.com:CVE-2021-3712
CVE-2021-3711
DSA-4963
GLSA-202209-02
GLSA-202210-02
L3:61987
L3:64702
L3:68186
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
MLIST:[tomcat-dev] 20210825 OpenSSL security announcement - do we need a Tomcat Native release?
MLIST:[tomcat-dev] 20210826 Re: OpenSSL security announcement - do we need a Tomcat Native release?
OSS:2021/08/26/2
OSS:2021/Q3/130
Oracle:CVE-2021-3711
Oracle:CVE-2021-3712
SMASH Issue 307461
bnc#1189520
bnc#1192100
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20240621-0006/
jsc#CAR-939
openssl.git:commit:36cf45ef3ba71e44a8be06ee81cb31aa02cb0010
rh#1995623
rh#1995634
CVE-2021-3712openssl:Released, openssl-1_1:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:cert-portal.siemens.com:CVE-2021-3712
CONFIRM:git.openssl.org:CVE-2021-3712
CONFIRM:kc.mcafee.com:CVE-2021-31835
CONFIRM:security.netapp.com:CVE-2021-3712
CONFIRM:www.openssl.org:CVE-2021-3712
CONFIRM:www.tenable.com:CVE-2021-3712
CVE-2021-3712
DSA-4963
GLSA-202209-02
GLSA-202210-02
L3:68186
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
MLIST:[debian-lts-announce] 20210926 [SECURITY] [DLA 2766-1] openssl security update
MLIST:[debian-lts-announce] 20210930 [SECURITY] [DLA 2774-1] openssl1.0 security update
MLIST:[tomcat-dev] 20210825 OpenSSL security announcement - do we need a Tomcat Native release?
MLIST:[tomcat-dev] 20210826 Re: OpenSSL security announcement - do we need a Tomcat Native release?
OSS:2021/08/26/2
OSS:2021/Q3/130
Oracle:CVE-2021-3712
RHSA-2021:4613
RHSA-2021:4614
RHSA-2021:4861
RHSA-2021:4863
RHSA-2021:5226
RHSA-2022:0064
SMASH Issue 307462
bnc#1189521
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12
https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20240621-0006/
jsc#CAR-940
openssl.git:commit:030c5aba94788f152f9ceef3549815df45bef702
openssl.git:commit:1747d4658b3830951068a6a6c1fa2b45c4731fb3
openssl.git:commit:1f365708a3318a5f1a395f90c38b584a58d37fb9
openssl.git:commit:7c038a6bcd98d4bbfd2c2892a87a1138d2f7c5f3
openssl.git:commit:918430ba80d94ec8f05383b43b1872b1ebb13e1a
openssl.git:commit:95f8c1e142df835d03b5b62521383a462fc5470d
openssl.git:commit:98624776c4d501c8badd6f772ab7048ac9191cb9
openssl.git:commit:ad6ac17489241574136b7d035f01f6175dd9c941
openssl.git:commit:b2b3b9c9936b91315adc0f3254879cb2fd5ca2bd
openssl.git:commit:d2015a783e64613d8e4a142fa05048d1863df944
rh#1995634
CVE-2021-3714kernel-source-rt:Won't fixmoderate5.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N)CVE-2021-3714
MISC:access.redhat.com:CVE-2021-3714
MISC:arxiv.org:CVE-2021-3714
SMASH Issue 327734
bnc#1202680
jsc#CAR-1981
rh#1931327
CVE-2021-3715kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-3715
L3:61659
MISC:git.kernel.org:OSS:2021/Q3/154
MISC:github.com:CVE-2021-3715
OSS:2021/09/07/1
OSS:2021/Q3/154
RHSA-2020:4431
RHSA-2020:4609
RHSA-2021:3438
RHSA-2021:3439
RHSA-2021:3441
RHSA-2021:3442
RHSA-2021:3443
RHSA-2021:3444
RHSA-2021:3445
RHSA-2021:3446
RHSA-2021:3477
RHSA-2022:7173
SMASH Issue 309163
bnc#1190349
bnc#1190350
bnc#1190456
jsc#CAR-1051
rh#1993988
CVE-2021-37159kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-37159
CVE-2021-37159
MISC:www.oracle.com:CVE-2022-21586
MISC:www.spinics.net:CVE-2021-37159
MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 304799
bnc#1188601
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a6ecfb39ba9d7316057cea823b196b734f6b18ca
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dcb713d53e2eadf42b878c12a471e74dc6ed3145
jsc#CAR-1005
rh#1985353
CVE-2021-3732kernel-source-rt:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2021-3732
MISC:git.kernel.org:CVE-2021-3732
MISC:github.com:CVE-2021-3732
MISC:ubuntu.com:CVE-2021-3732
RHSA-2021:4140
RHSA-2021:4356
SMASH Issue 307801
bdo#993948
bdo#993978
bnc#1189706
jsc#CAR-1058
rh#1995249
CVE-2021-37322binutils:Already fixedmoderate4.5 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L)CVE-2021-37322
D:CVE-2021-37322
MISC:gcc.gnu.org:CVE-2021-37322
SMASH Issue 315352
bnc#1192900
rh#2031177
CVE-2021-3733python3:Unsupportedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2021-3733
CVE-2021-3733
MISC:bugs.python.org:CVE-2021-3733
MISC:github.com:CVE-2021-3733
MISC:ubuntu.com:CVE-2021-3733
RHSA-2021:3254
RHSA-2021:4057
RHSA-2021:4160
RHSA-2022:1663
RHSA-2022:1764
RHSA-2022:1821
SMASH Issue 306136
SMASH Issue 307812
bnc#1189287
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
jsc#CAR-1006
rh#1995234
CVE-2021-3736kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2021-3736
MISC:access.redhat.com:CVE-2021-3736
MISC:github.com:CVE-2021-3736
SMASH Issue 314138
bnc#1192345
rh#1995570
CVE-2021-3737python3:Unsupportedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-3737
CVE-2021-3737
MISC:bugs.python.org:CVE-2021-3737
MISC:github.com:CVE-2021-3737
MISC:python-security.readthedocs.io:CVE-2021-3737
MISC:ubuntu.com:CVE-2021-3737
MISC:www.oracle.com:CVE-2022-21586
Oracle:CVE-2021-3737
RHSA-2021:4160
RHSA-2022:1663
RHSA-2022:1764
RHSA-2022:1821
RHSA-2022:1986
SMASH Issue 306132
SMASH Issue 308388
bnc#1189241
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
jsc#CAR-936
rh#1995162
CVE-2021-3739kernel-source-rt:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-3739
CVE-2021-3739
MISC:git.kernel.org:CVE-2021-3739
MISC:github.com:CVE-2021-3739
MISC:ubuntu.com:CVE-2021-3739
OSS:2021/08/25/3
OSS:2021/Q3/131
SMASH Issue 308408
bdo#993948
bdo#993978
bnc#1189832
jsc#CAR-935
rh#1997958
CVE-2021-3743kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-3743
CVE-2021-3743
MISC:access.redhat.com:/errata/RHSA-2022:1975
MISC:access.redhat.com:/errata/RHSA-2022:1988
MISC:access.redhat.com:/security/cve/CVE-2021-3743
MISC:git.kernel.org:CVE-2021-3743
MISC:github.com:CVE-2021-3743
MISC:lists.openwall.net:CVE-2021-3743
MISC:www.oracle.com:CVE-2022-21586
OSS:2021/08/27/2
OSS:2021/Q3/136
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 308486
bdo#993948
bdo#993978
bnc#1189883
jsc#CAR-937
rh#1997961
CVE-2021-3744kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2019-18808
CVE-2021-3744
DSA-5096
FEDORA:FEDORA-2021-79cbbefebe
FEDORA:FEDORA-2021-9dd76a1ed0
FEDORA:FEDORA-2021-ffda3d6fa1
MISC:access.redhat.com:/errata/RHSA-2022:1975
MISC:access.redhat.com:/errata/RHSA-2022:1988
MISC:access.redhat.com:/security/cve/CVE-2021-3744
MISC:github.com:CVE-2021-3744
MISC:kernel.googlesource.com:CVE-2021-3744
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/7BLLVKYAIETEORUPTFO3TR3C33ZPFXQM/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/LAT3RERO6QBKSPJBNNRWY3D4NCGTFOS7/
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/SYKURLXBB2555ASWMPDNMBUPD6AG2JKQ/
MISC:seclists.org:CVE-2021-3744
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2021/09/14/1
OSS:2021/Q3/164
OSS:2022/01/25/12
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 308493
SMASH Issue 308494
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1189884
jsc#CAR-938
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2000627
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-3752kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-3752
CVE-2021-3752
DSA-5096
MISC:lore.kernel.org:CVE-2021-3752
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2021/09/15/4
OSS:2021/Q3/169
OSS:2022/01/25/12
RHSA-2022:0620
RHSA-2022:0622
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 308793
SMASH Issue 308794
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1190023
bnc#1190432
https://lore.kernel.org/lkml/20211115165435.133245729%40linuxfoundation.org/
jsc#CAR-1135
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#1999544
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-3753kernel-source-rt:Releasedlow2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)CONFIRM:security.netapp.com:CVE-2021-3753
CVE-2021-3753
MISC:git.kernel.org:OSS:2021/09/01/4
MISC:github.com:OSS:2021/Q3/146
OSS:2021/09/01/4
OSS:2021/Q3/146
SMASH Issue 308795
SMASH Issue 308796
bdo#993948
bdo#993978
bnc#1190025
jsc#CAR-1012
rh#1999589
CVE-2021-3755rsync:Ignorelow0 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2021-3755
SMASH Issue 308816
bnc#1190045
rh#1999680
CVE-2021-37576kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-37576
D:CVE-2021-37576
DSA-4978
MISC:git.kernel.org:MLIST:[oss-security] 20210727 Re: Linux kernel: powerpc: KVM guest to host memory corruption
MISC:lore.kernel.org:CVE-2021-37576
MLIST:[oss-security] 20210727 Re: Linux kernel: powerpc: KVM guest to host memory corruption
OSS:2021/Q3/50
RHSA-2021:3436
RHSA-2021:3442
RHSA-2021:3443
RHSA-2021:3444
RHSA-2021:3446
RHSA-2021:3447
RHSA-2021:3725
RHSA-2021:3766
RHSA-2021:3768
RHSA-2021:3801
RHSA-2021:3812
RHSA-2021:3814
RHSA-2021:3987
RHSA-2021:4000
SMASH Issue 305200
bdo#993948
bdo#993978
bnc#1188838
bnc#1188842
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WDFA7DSQIPM7XPNXJBXFWXHJFVUBCAG6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2YZ2DNURMYYVDT2NYAFDESJC35KCUDS/
https://security.netapp.com/advisory/ntap-20210917-0005/
jsc#CAR-834
rh#1986506
CVE-2021-3759kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3759
MISC:access.redhat.com:CVE-2021-3759
MISC:lore.kernel.org:CVE-2021-3759
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 308860
bnc#1190115
jsc#CAR-1007
rh#1999675
CVE-2021-3760kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-3760
CVE-2021-3760
DSA-5096
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2021/Q4/55
OSS:2022/01/25/12
SMASH Issue 308868
SMASH Issue 308869
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1190067
jsc#CAR-1226
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2000585
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-37600util-linux:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2021-37600
D:CVE-2021-37600
MISC:github.com:CVE-2021-37600
SMASH Issue 305296
bnc#1188921
https://lists.debian.org/debian-lts-announce/2024/04/msg00005.html
https://security.gentoo.org/glsa/202401-08
https://security.netapp.com/advisory/ntap-20210902-0002/
jsc#CAR-846
rh#1987320
CVE-2021-3764kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3764
DSA-5096
MISC:access.redhat.com:CVE-2021-3764
MISC:github.com:CVE-2021-3744
MISC:security-tracker.debian.org:CVE-2021-3764
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 309862
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1190534
jsc#CAR-1067
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2059923
CVE-2021-3770vim:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:huntr.dev:CVE-2021-3770
CONFIRM:security.netapp.com:CVE-2021-3770
CVE-2021-3770
FEDORA:FEDORA-2021-4a43cbe0b4
FEDORA:FEDORA-2021-5fa81a2b04
FEDORA:FEDORA-2021-e982f972f2
GLSA-202208-32
MISC:github.com:MLIST:[oss-security] 20210930 3 new CVE's in vim
MLIST:[oss-security] 20210930 3 new CVE's in vim
OSS:2021/Q3/192
SMASH Issue 309124
bnc#1190379
rh#2001929
CVE-2021-3772kernel-source-rt:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-3772
CVE-2021-3772
DSA-5096
L3:62841
MISC:access.redhat.com:/errata/RHSA-2022:1975
MISC:access.redhat.com:/errata/RHSA-2022:1988
MISC:access.redhat.com:/security/cve/CVE-2021-3772
MISC:git.kernel.org:CVE-2021-3772
MISC:ubuntu.com:CVE-2021-3772
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 309286
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1190351
bnc#1196715
jsc#CAR-1228
linux.git:commit:32f8807a48ae55be0e76880cfe8607a18b5bb0df
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1984024
rh#1997467
rh#2000694
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-3773kernel-obs-build:Analysis, kernel-rt:Analysis, kernel-rt_debug:Analysis, kernel-source-rt:Analysis, kernel-syms-rt:Analysismoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2021-3773
MISC:www.oracle.com:CVE-2022-21586
OSS:2021/Q3/159
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 308503
SMASH Issue 309115
bnc#1189897
rh#2004949
CVE-2021-3778vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:huntr.dev:CVE-2021-3778
CONFIRM:security.netapp.com:CVE-2021-3778
CVE-2021-3778
FEDORA:FEDORA-2021-6988830606
FEDORA:FEDORA-2021-84f4cf3244
FEDORA:FEDORA-2021-968f57ec98
GLSA-202208-32
MISC:github.com:MLIST:[oss-security] 20210930 3 new CVE's in vim
MLIST:[debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
MLIST:[oss-security] 20210930 3 new CVE's in vim
RHSA-2021:4517
SMASH Issue 310107
bnc#1190533
rh#2004621
CVE-2021-3796vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:huntr.dev:CVE-2021-3796
CONFIRM:security.netapp.com:CVE-2021-3796
CVE-2021-3796
D:CVE-2021-3796
FEDORA:FEDORA-2021-6988830606
FEDORA:FEDORA-2021-84f4cf3244
FEDORA:FEDORA-2021-968f57ec98
GLSA-202208-32
MISC:github.com:MLIST:[oss-security] 20210930 3 new CVE's in vim
MLIST:[debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
MLIST:[oss-security] 20210930 3 new CVE's in vim
OSS:2021/Q3/192
RHSA-2021:4517
SMASH Issue 310113
bnc#1190570
jsc#CAR-1069
rh#2004728
CVE-2021-3800glib2:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2021-3800
CVE-2021-3800
MISC:access.redhat.com:CVE-2021-3800
MISC:git.savannah.gnu.org:OSS:2017/06/23/8
MISC:gitlab.gnome.org:CVE-2021-3800
MLIST:[debian-lts-announce] 20220915 [SECURITY] [DLA 3110-1] glib2.0 security update
OSS:2014/07/14/1
OSS:2017/06/23/8
OSS:2022/Q1/80
RHSA-2021:4385
SMASH Issue 311784
bnc#1191489
rh#1938284
CVE-2021-38160kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:cdn.kernel.org:CVE-2021-33909
CONFIRM:security.netapp.com:CVE-2021-38203
CVE-2021-38160
D:CVE-2021-38160
DSA-4978
L3:61611
MISC:github.com:CVE-2021-38160
MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
SMASH Issue 305969
bdo#993948
bdo#993978
bnc#1190117
bnc#1190118
bnc#1190263
https://access.redhat.com/security/cve/cve-2021-38160
jsc#CAR-1059
rh#1991722
CVE-2021-38166kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-38166
CVE-2021-38166
D:CVE-2021-38166
DSA-4978
FEDORA:FEDORA-2021-b22606e88b
FEDORA:FEDORA-2021-f35f45a76f
MISC:git.kernel.org:CVE-2021-38166
MISC:lore.kernel.org:CVE-2021-38166
SMASH Issue 305976
bdo#993948
bdo#993978
bnc#1189233
rh#1993190
CVE-2021-38185cpio:Releasedimportant8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2021-38185
D:CVE-2021-38185
MISC:git.savannah.gnu.org:CVE-2021-38185
MISC:github.com:CVE-2021-38185
MISC:lists.gnu.org:CVE-2021-38185
RHSA-2022:1991
SMASH Issue 305980
bnc#1189206
https://lists.debian.org/debian-lts-announce/2023/06/msg00007.html
jsc#CAR-860
rh#1991731
CVE-2021-38198kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-38198
L3:61441
MISC:cdn.kernel.org:CVE-2021-38198
MISC:github.com:CVE-2021-38198
SMASH Issue 306047
bnc#1189262
bnc#1189278
bnc#1189487
jsc#CAR-862
rh#1992264
CVE-2021-38199kernel-source-rt:Already fixedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:cdn.kernel.org:CVE-2021-33909
CVE-2021-38199
MISC:github.com:CVE-2021-38199
SMASH Issue 306046
bdo#993948
bdo#993978
bnc#1189265
jsc#CAR-863
rh#1992271
CVE-2021-38200kernel-source-rt:Not affectedmoderate ()CVE-2021-38200
MISC:cdn.kernel.org:CVE-2021-38207
MISC:github.com:CVE-2021-38200
SMASH Issue 306045
bnc#1189276
rh#1992276
CVE-2021-38201kernel-source-rt:Not affectedimportant ()CONFIRM:cdn.kernel.org:CVE-2021-33909
CONFIRM:security.netapp.com:CVE-2021-38203
CVE-2021-38201
MISC:github.com:CVE-2021-38201
RHSA-2021:3440
RHSA-2021:3447
SMASH Issue 306044
bnc#1189288
rh#1992731
CVE-2021-38202kernel-source-rt:Not affectedimportant ()CONFIRM:cdn.kernel.org:CVE-2021-33909
CVE-2021-38202
MISC:github.com:CVE-2021-38202
SMASH Issue 306043
bnc#1189289
rh#1992741
CVE-2021-38203kernel-source-rt:Not affectedmoderate ()CONFIRM:cdn.kernel.org:CVE-2021-33909
CONFIRM:security.netapp.com:CVE-2021-38203
CVE-2021-38203
MISC:github.com:CVE-2021-38203
SMASH Issue 306042
bnc#1189290
rh#1992745
CVE-2021-38204kernel-source-rt:Releasedmoderate4.2 (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-38204
MISC:cdn.kernel.org:CVE-2021-38204
MISC:github.com:CVE-2021-38204
SMASH Issue 306041
bnc#1189291
rh#1992754
CVE-2021-38205kernel-source-rt:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2021-38205
MISC:cdn.kernel.org:CVE-2021-38205
MISC:github.com:CVE-2021-38205
MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
SMASH Issue 306040
bnc#1189292
jsc#CAR-871
rh#1992774
CVE-2021-38206kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-38206
MISC:cdn.kernel.org:CVE-2021-38207
MISC:github.com:CVE-2021-38206
SMASH Issue 306039
bnc#1189296
jsc#CAR-872
rh#1992779
CVE-2021-38207kernel-source-rt:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-38207
MISC:cdn.kernel.org:CVE-2021-38207
MISC:github.com:CVE-2021-38207
SMASH Issue 306038
bnc#1189298
jsc#CAR-873
rh#1992798
CVE-2021-38208kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3587
CVE-2021-38208
MISC:cdn.kernel.org:CVE-2021-38208
MISC:cve.mitre.org:MLIST:[oss-security] 20210817 Re: Linux kernel: nfc: null ptr dereference in llcp_sock_getname
MISC:github.com:CVE-2021-38208
MLIST:[oss-security] 20210817 Re: Linux kernel: nfc: null ptr dereference in llcp_sock_getname
OSS:2021/Q2/187
OSS:2021/Q2/189
OSS:2021/Q3/104
OSS:2021/Q3/105
OSS:2021/Q3/117
SMASH Issue 301352
SMASH Issue 306037
bnc#1186665
bnc#1187055
jsc#CAR-949
rh#1968057
rh#1992810
CVE-2021-38209kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2021-38209
MISC:cdn.kernel.org:CVE-2021-38209
MISC:github.com:CVE-2021-38209
SMASH Issue 306036
bnc#1189393
jsc#CAR-892
rh#1992815
CVE-2021-3826binutils:Ignoremoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H)CVE-2021-3826
FEDORA:FEDORA-2022-19538a3732
FEDORA:FEDORA-2022-667ee398b1
FEDORA:FEDORA-2022-8e1df11a7a
FEDORA:FEDORA-2022-affcf9eea6
FEDORA:FEDORA-2022-c9a1fd5370
MISC:gcc.gnu.org:CVE-2021-3826
RHSA-2023:3269
SMASH Issue 341159
bnc#1202969
https://gcc.gnu.org/git/?p=gcc.git%3Ba=commit%3Bh=5481040197402be6dfee265bd2ff5a4c88e30505
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4MYLS3VR4OPL5ECRWOR4ZHMGXUSCJFZY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6AKZ2DTS3ATVN5PANNVLKLE5OP4OF25Q/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7MTEHT3G6YKJ7F7MSGWYSI4UM3XBAYXZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AXFC74WRZ2Q7F2TSUKPYNIL7ZPBWYI6L/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H424YXGW7OKXS2NCAP35OP6Y4P4AW6VG/
jsc#CAR-2060
rh#2122627
CVE-2021-38300kernel-source-rt:Not affectedimportant ()CONFIRM:cdn.kernel.org:CVE-2021-38300
CONFIRM:git.kernel.org:CVE-2021-38300
CONFIRM:security.netapp.com:CVE-2021-38300
CVE-2021-38300
D:CVE-2021-38300
DSA-5096
MISC:www.openwall.com:CVE-2021-38300
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2021/Q3/170
OSS:2022/01/25/12
SMASH Issue 309865
bdo#988044
bdo#989285
bdo#990411
bdo#994050
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2002750
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-3847kernel-source-rt:Won't fixmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-3847
DSA-5402
MISC:bugs.launchpad.net:MLIST:[oss-security] 20160224 User Namespaces Overlayfs Xattr Setgid Privilege Escalation: Overlayfs
OSS:2021/10/14/3
OSS:2021/10/18/1
OSS:2021/Q4/33
SMASH Issue 312626
bnc#1191694
jsc#CAR-1139
rh#2009704
rh#2159505
CVE-2021-38604glibc:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-38604
CVE-2021-38604
FEDORA:FEDORA-2021-16dc1f33af
GLSA-202208-24
MISC:blog.tuxcare.com:CVE-2021-38604
MISC:sourceware.org:CVE-2021-38604
MISC:www.oracle.com:CVE-2022-21586
SMASH Issue 307148
bnc#1189426
jsc#CAR-896
rh#1965408
rh#1993517
CVE-2021-3864kernel-source-rt:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-3864
DSA-5096
L3:62774
L3:63354
L3:63732
L3:63772
L3:63817
L3:64525
L3:64526
L3:64549
MISC:access.redhat.com:CVE-2021-3864
MISC:lore.kernel.org:CVE-2021-3864
MISC:security-tracker.debian.org:CVE-2021-3864
OSS:2021/07/22/1
OSS:2021/10/20/2
OSS:2022/01/25/12
OSS:2022/11/30/1
OSS:2022/Q4/163
Oracle:CVE-2022-0492
SMASH Issue 311607
SMASH Issue 312222
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1191281
bnc#1192449
bnc#1196384
bnc#1199680
bnc#1201500
bnc#1201712
bnc#1201860
https://lore.kernel.org/all/20211221021744.864115-1-longman%40redhat.com/
https://lore.kernel.org/all/20211226150310.GA992%401wt.eu/
https://lore.kernel.org/lkml/20211228170910.623156-1-wander%40redhat.com/
jsc#CAR-1234
linux.git:commit:04aa64375f48a5d430b5550d9271f8428883e550
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2015046
rh#2029923
rh#2044561
rh#2051505
rh#2053632
rh#2059923
rh#2147572
CVE-2021-3872vim:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:huntr.dev:CVE-2021-3778
CONFIRM:huntr.dev:CVE-2021-3796
CONFIRM:huntr.dev:CVE-2021-3872
CONFIRM:huntr.dev:CVE-2021-3903
CONFIRM:huntr.dev:CVE-2021-3984
CONFIRM:huntr.dev:CVE-2021-4019
CONFIRM:huntr.dev:CVE-2021-4069
CONFIRM:security.netapp.com:CVE-2021-3778
CONFIRM:security.netapp.com:CVE-2021-3796
CVE-2021-3872
D:CVE-2021-3778
D:CVE-2021-3796
D:CVE-2021-3872
D:CVE-2021-4019
FEDORA:FEDORA-2021-469afb66c9
FEDORA:FEDORA-2021-541ddd1f94
FEDORA:FEDORA-2021-6988830606
FEDORA:FEDORA-2021-84f4cf3244
FEDORA:FEDORA-2021-968f57ec98
FEDORA:FEDORA-2021-a5e55a9e02
FEDORA:FEDORA-2021-af135cabe2
FEDORA:FEDORA-2021-b0ac29efb1
GLSA-202208-32
L3:61812
L3:62281
L3:62355
L3:62356
L3:62635
L3:62636
L3:63347
MISC:github.com:CVE-2021-3872
MISC:github.com:CVE-2021-3903
MISC:github.com:CVE-2021-3984
MISC:github.com:CVE-2021-4019
MISC:github.com:CVE-2021-4069
MISC:github.com:MLIST:[oss-security] 20210930 3 new CVE's in vim
MLIST:[debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
MLIST:[oss-security] 20210930 3 new CVE's in vim
OSS:2021/Q3/192
OSS:2022/01/15/1
OSS:2022/Q1/40
RHSA-2021:4517
RHSA-2022:0366
SMASH Issue 310103
SMASH Issue 312873
bnc#1190533
bnc#1191295
bnc#1191893
bnc#1193526
bnc#1193870
bnc#1193872
bnc#1195687
bnc#1195688
bnc#1199666
jsc#CAR-1066
jsc#CAR-1069
jsc#CAR-1179
jsc#CAR-1197
jsc#CAR-1295
jsc#CAR-1296
jsc#CAR-1308
rh#2004621
rh#2004728
rh#2016056
rh#2018558
rh#2028122
rh#2028212
rh#2029513
CVE-2021-3875vim:Releasedimportant7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)CONFIRM:huntr.dev:CVE-2021-3875
CVE-2021-3875
D:CVE-2021-3875
FEDORA:FEDORA-2021-6988830606
FEDORA:FEDORA-2021-84f4cf3244
GLSA-202208-32
L3:62100
L3:62844
L3:64527
L3:65303
MISC:github.com:CVE-2021-3875
OSS:2022/01/15/1
OSS:2022/Q1/40
SMASH Issue 312730
bnc#1191770
bnc#1192641
bnc#1196720
jsc#CAR-1148
rh#2014661
rh#2018558
CVE-2021-3892kernel-source-rt:Already fixedmoderate5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3892
SMASH Issue 313722
bnc#1192261
rh#2014623
CVE-2021-3894kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2021-3894
CVE-2022-0322
D:CVE-2022-0322
DSA-5096
MISC:git.kernel.org:CVE-2022-0322
MISC:www.oracle.com:CVE-2022-21586
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 321260
SMASH Issue 322486
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1194985
bnc#1195489
jsc#CAR-1516
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2014970
rh#2042822
rh#2044561
rh#2053632
rh#2059923
CVE-2021-3896kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3896
CVE-2021-43389
DSA-5096
MISC:cdn.kernel.org:CVE-2021-43056
MISC:git.kernel.org:CVE-2021-43389
MISC:lore.kernel.org:CVE-2021-43389
MISC:seclists.org:CVE-2021-43389
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2021/11/05/1
OSS:2021/Q4/100
OSS:2022/01/25/12
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 313334
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1191958
jsc#CAR-1227
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2013180
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-3903vim:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L)CONFIRM:huntr.dev:CVE-2021-3903
CVE-2021-3903
FEDORA:FEDORA-2021-a5e55a9e02
FEDORA:FEDORA-2021-af135cabe2
FEDORA:FEDORA-2021-b0ac29efb1
L3:62281
MISC:github.com:CVE-2021-3903
MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
OSS:2022/01/15/1
SMASH Issue 313699
bnc#1192167
jsc#CAR-1197
rh#2018558
CVE-2021-3923kernel-source-rt:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2021-3923
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 361177
bnc#1209778
https://lore.kernel.org/all/20220204100036.GA12348@kili/
rh#2019643
CVE-2021-3927vim:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L)CONFIRM:huntr.dev:CVE-2021-3927
CVE-2021-3927
FEDORA:FEDORA-2021-58ab85548d
FEDORA:FEDORA-2021-b0ac29efb1
FEDORA:FEDORA-2021-cfadac570a
GLSA-202208-32
MISC:github.com:CVE-2021-3927
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
OSS:2022/01/15/1
OSS:2022/Q1/40
SMASH Issue 314328
bnc#1192481
jsc#CAR-1236
rh#2021290
CVE-2021-3928vim:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L)CONFIRM:huntr.dev:CVE-2021-3928
CVE-2021-3928
FEDORA:FEDORA-2021-58ab85548d
FEDORA:FEDORA-2021-b0ac29efb1
FEDORA:FEDORA-2021-cfadac570a
GLSA-202208-32
L3:63555
MISC:github.com:CVE-2021-3928
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
OSS:2022/01/15/1
OSS:2022/Q1/40
SMASH Issue 314327
bnc#1192478
bnc#1200668
jsc#CAR-1235
rh#2021292
CVE-2021-39537ncurses:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:support.apple.com:CVE-2022-1720
CONFIRM:support.apple.com:CVE-2022-1725
CONFIRM:support.apple.com:CVE-2022-32894
CVE-2021-39537
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
FULLDISC:20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
MISC:cvsweb.netbsd.org:CVE-2021-39537
MISC:lists.gnu.org:CVE-2021-39537
SMASH Issue 310505
bnc#1190793
https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html
https://security.netapp.com/advisory/ntap-20230427-0012/
jsc#CAR-1201
rh#2006978
CVE-2021-39636kernel-source-rt:Not affectedmoderate ()CVE-2021-39636
MISC:source.android.com:CVE-2021-39657
SMASH Issue 317659
bnc#1193812
rh#2068577
CVE-2021-39648kernel-source-rt:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)CVE-2021-39648
MISC:source.android.com:CVE-2021-39657
SMASH Issue 317647
bnc#1193861
jsc#CAR-1515
rh#2068259
CVE-2021-39656kernel-source-rt:Not affectedmoderate ()CVE-2021-39656
MISC:source.android.com:CVE-2021-39657
SMASH Issue 317640
bnc#1193862
CVE-2021-39657kernel-source-rt:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-39657
MISC:source.android.com:CVE-2021-39657
SMASH Issue 317639
bnc#1193864
jsc#CAR-1510
CVE-2021-3968vim:Releasedimportant ()CONFIRM:huntr.dev:CVE-2021-3968
CVE-2021-3968
FEDORA:FEDORA-2021-5cd9df120e
FEDORA:FEDORA-2021-b0ac29efb1
GLSA-202208-32
L3:65211
L3:65301
L3:65303
MISC:github.com:CVE-2021-3968
OSS:2022/01/15/1
OSS:2022/Q1/40
SMASH Issue 315394
bnc#1192902
rh#2025056
CVE-2021-39685kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-39685
DSA-5096
MISC:source.android.com:CVE-2021-39709
OSS:2021/07/22/1
OSS:2021/Q4/164
OSS:2022/01/25/12
SMASH Issue 317621
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bdo#996974
bnc#1193802
bnc#1194459
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2036100
rh#2044561
rh#2053632
rh#2059923
CVE-2021-39686kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-39686
DSA-5096
MISC:source.android.com:CVE-2021-39709
OSS:2021/07/22/1
OSS:2022/01/25/12
SMASH Issue 325614
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1196954
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2059923
rh#2063219
CVE-2021-39698kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-39698
DSA-5096
L3:65426
MISC:source.android.com:CVE-2021-39709
OSS:2021/07/22/1
OSS:2022/01/25/12
SMASH Issue 325615
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1196956
bnc#1196959
jsc#CAR-1586
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2059923
rh#2063228
CVE-2021-39711kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2021-39711
MISC:source.android.com:CVE-2021-39793
SMASH Issue 326482
bnc#1197219
rh#2106098
CVE-2021-39713kernel-source-rt:Not affectedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-39713
DSA-5096
L3:63158
L3:63335
L3:64525
L3:64549
MISC:packetstormsecurity.com:CVE-2022-29581
MISC:source.android.com:CVE-2021-39793
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2021/07/22/1
OSS:2022/01/25/12
OSS:2022/11/30/1
OSS:2022/Q4/163
SMASH Issue 325616
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1196973
bnc#1197211
bnc#1198799
bnc#1199614
jsc#CAR-1698
linux.git:commit:04aa64375f48a5d430b5550d9271f8428883e550
linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb
linux.git:commit:33172ab50a53578a95691310f49567c9266968b0
linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827
linux.git:commit:42baefac638f06314298087394b982ead9ec444b
linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd
linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d
linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638
linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888
linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809
rh#1980646
rh#1997467
rh#2029923
rh#2044561
rh#2053632
rh#2059923
rh#2063236
rh#2147572
CVE-2021-39714kernel-source-rt:Not affectedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-39714
MISC:source.android.com:CVE-2021-39793
MISC:source.android.com:CVE-2022-20408
SMASH Issue 326480
bnc#1197214
bnc#1197218
jsc#CAR-1597
rh#2106094
CVE-2021-39715kernel-source-rt:Not affectedmoderate ()CVE-2021-39715
MISC:source.android.com:CVE-2021-39793
SMASH Issue 326479
bnc#1197210
rh#2106104
CVE-2021-39725kernel-source-rt:Not affectedmoderate ()CVE-2021-39725
MISC:source.android.com:CVE-2021-39793
SMASH Issue 326469
bnc#1197206
CVE-2021-3973vim:Releasedcritical ()CONFIRM:huntr.dev:CVE-2021-3973
CVE-2021-3973
FEDORA:FEDORA-2021-5cd9df120e
FEDORA:FEDORA-2021-b0ac29efb1
GLSA-202208-32
L3:65211
L3:65301
L3:65303
MISC:github.com:CVE-2021-3973
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
OSS:2022/01/15/1
OSS:2022/Q1/40
SMASH Issue 315393
bnc#1192903
rh#2025059
CVE-2021-39735kernel-source-rt:Not affectedmoderate ()CVE-2021-39735
MISC:source.android.com:CVE-2021-39793
SMASH Issue 326460
bnc#1197205
CVE-2021-3974vim:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:huntr.dev:CVE-2021-3974
CVE-2021-3974
FEDORA:FEDORA-2021-5cd9df120e
FEDORA:FEDORA-2021-b0ac29efb1
GLSA-202208-32
L3:64932
L3:65211
L3:65303
MISC:github.com:CVE-2021-3974
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
OSS:2022/01/15/1
OSS:2022/Q1/40
SMASH Issue 315400
bnc#1192904
jsc#CAR-1275
rh#2025061
CVE-2021-39792kernel-source-rt:Not affectedlow ()CVE-2021-39792
MISC:source.android.com:CVE-2021-39793
SMASH Issue 326457
bnc#1197203
CVE-2021-39800kernel-source-rt:Not affectedlow ()CVE-2021-39800
MISC:source.android.com:CVE-2021-39809
SMASH Issue 328856
bnc#1198444
CVE-2021-39801kernel-source-rt:Not affectedimportant ()CVE-2021-39801
MISC:source.android.com:CVE-2021-39809
SMASH Issue 328855
bnc#1198443
CVE-2021-39802kernel-source-rt:Not affectedimportant ()CVE-2021-39802
MISC:source.android.com:CVE-2021-39809
SMASH Issue 328854
bnc#1198445
CVE-2021-3984vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2021-3984
CVE-2021-3984
MISC:github.com:CVE-2021-3984
RHSA-2022:0366
SMASH Issue 316126
bnc#1193298
jsc#CAR-1296
rh#2028122
CVE-2021-3995util-linux:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20221209-0002/
CVE-2021-3995
CVE-2021-3996
DSA-5055
FULLDISC:20221208 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328)
MISC:access.redhat.com:CVE-2021-3996
MISC:bugzilla.redhat.com:CVE-2021-3995
MISC:github.com:OSS:2022/Q1/66
MISC:mirrors.edge.kernel.org:CVE-2021-3996
MISC:packetstormsecurity.com:/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
MISC:www.qualys.com:OSS:2022/11/30/2
OSS:2022/01/24/2
OSS:2022/11/30/2
OSS:2022/Q1/66
SMASH Issue 321257
SMASH Issue 321258
bnc#1194976
https://security.gentoo.org/glsa/202401-08
rh#2024628
rh#2024631
CVE-2021-3996util-linux:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20221209-0002/
CVE-2021-3995
CVE-2021-3996
DSA-5055
FULLDISC:20221208 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328)
MISC:access.redhat.com:CVE-2021-3996
MISC:bugzilla.redhat.com:CVE-2021-3995
MISC:github.com:OSS:2022/Q1/66
MISC:mirrors.edge.kernel.org:CVE-2021-3996
MISC:packetstormsecurity.com:/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
MISC:www.qualys.com:OSS:2022/11/30/2
OSS:2022/01/24/2
OSS:2022/11/30/2
OSS:2022/Q1/66
SMASH Issue 321256
SMASH Issue 321258
bnc#1194976
https://security.gentoo.org/glsa/202401-08
rh#2024628
rh#2024631
CVE-2021-3997systemd:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3997
D:CVE-2021-3997
MISC:access.redhat.com:CVE-2021-3997
MISC:github.com:CVE-2021-3997
MISC:github.com:OSS:2022/Q1/18
OSS:2022/01/10/2
OSS:2022/Q1/18
SMASH Issue 319295
SMASH Issue 319296
bnc#1194178
https://security.gentoo.org/glsa/202305-15
rh#2024639
CVE-2021-3998glibc:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2021-3998
CVE-2021-3998
MISC:access.redhat.com:CVE-2021-3998
MISC:security-tracker.debian.org:CVE-2021-3998
MISC:sourceware.org:CVE-2021-3998
OSS:2022/01/24/4
OSS:2022/Q1/68
SMASH Issue 320032
bnc#1194620
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=84d2d0fe20bdf94feed82b21b4d7d136db471f03
https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ee8d5e33adb284601c00c94687bc907e10aec9bb
rh#2024633
CVE-2021-3999glibc:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-3999
CVE-2021-3999
L3:64698
MISC:access.redhat.com:/errata/RHSA-2022:0896
MISC:access.redhat.com:CVE-2021-3999
MISC:security-tracker.debian.org:CVE-2021-3999
MISC:sourceware.org:/git/gitweb.cgi
MISC:sourceware.org:CVE-2021-3999
MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
OSS:2022/01/24/4
OSS:2022/Q1/68
RHSA-2022:0896
SMASH Issue 320033
bnc#1194640
jsc#CAR-1456
rh#2024637
CVE-2021-4001kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-4001
MISC:git.kernel.org:CVE-2021-4001
SMASH Issue 315528
bnc#1192990
bnc#1192991
jsc#CAR-1276
rh#2025645
CVE-2021-4002kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)CVE-2021-4002
D:CVE-2021-4002
DSA-5096
MISC:git.kernel.org:CVE-2021-4002
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2021/11/25/1
OSS:2021/Q4/133
OSS:2022/01/25/12
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 315498
SMASH Issue 315550
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1192946
bnc#1192973
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2025726
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-40153squashfs:Unsupportedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N)CVE-2021-40153
CVE-2021-41072
D:CVE-2021-40153
D:CVE-2021-41072
DSA-4967
DSA-4987
MISC:bugs.launchpad.net:CVE-2021-40153
MISC:github.com:CVE-2021-40153
MISC:github.com:CVE-2021-41072
MLIST:[debian-lts-announce] 20211020 [SECURITY] [DLA 2789-1] squashfs-tools security update
SMASH Issue 308509
SMASH Issue 310108
bdo#994262
bnc#1189936
bnc#1190531
https://lists.debian.org/debian-lts-announce/2021/08/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSMRKVJMJFX3MB7D3PXJSYY3TLZROE5S/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAOZ4BKWAC4Y3U2K5MMW3S77HWWXHQDL/
https://security.gentoo.org/glsa/202305-29
https://www.debian.org/security/2021/dsa-4967
https://www.debian.org/security/2021/dsa-4987
jsc#CAR-1065
jsc#CAR-942
rh#1998621
rh#2004957
CVE-2021-4019vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2021-4019
CVE-2021-4019
D:CVE-2021-4019
MISC:github.com:CVE-2021-4019
RHSA-2022:0366
SMASH Issue 316098
bnc#1193294
jsc#CAR-1295
rh#2028212
CVE-2021-4023kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-4023
SMASH Issue 315872
bnc#1193107
rh#2026484
CVE-2021-4028kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20221228-0002/
CVE-2021-4028
MISC:access.redhat.com:CVE-2021-4028
MISC:git.kernel.org:CVE-2021-4028
MISC:lkml.org:CVE-2021-4028
RHSA-2022:0590
RHSA-2022:0629
RHSA-2022:0636
RHSA-2022:0771
RHSA-2022:0772
RHSA-2022:0777
RHSA-2022:0823
RHSA-2022:0851
RHSA-2022:0958
RHSA-2022:1185
RHSA-2022:1198
RHSA-2022:1199
RHSA-2022:1263
RHSA-2022:1324
RHSA-2022:1373
RHSA-2022:1535
RHSA-2022:1550
RHSA-2022:1555
RHSA-2022:2186
RHSA-2022:2188
RHSA-2022:2189
RHSA-2022:2211
RHSA-2022:4896
SMASH Issue 315947
bnc#1193167
bnc#1193529
rh#2027201
CVE-2021-4032kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-4032
MISC:git.kernel.org:CVE-2021-4032
MISC:lkml.org:CVE-2021-4032
SMASH Issue 315980
bnc#1193187
rh#2027403
CVE-2021-4037kernel-source-rt:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)CVE-2021-4037
DSA-5257
MISC:access.redhat.com:CVE-2021-4037
MISC:bugzilla.redhat.com:CVE-2021-4037
MISC:git.kernel.org:CVE-2021-4037
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/Q4/30
RHSA-2022:1975
RHSA-2022:1988
RHSA-2022:4829
RHSA-2022:4835
SMASH Issue 316070
ZDI-22-1462
bnc#1198702
linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f
linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc
linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f
linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f
linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6
rh#1599161
rh#2027239
rh#2044863
rh#2123056
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2139586
rh#2139598
CVE-2021-4044openssl:Not affected, openssl-1_1:Not affectedimportant ()CONFIRM:git.openssl.org:CVE-2021-4044
CONFIRM:security.netapp.com:CVE-2021-4044
CONFIRM:www.openssl.org:CVE-2021-4044
CVE-2021-4044
SMASH Issue 317413
bnc#1193740
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=758754966791c537ea95241438454aa86f91f256
openssl.git:commit:0fcf2351ecff5db21cba431704e4da631b74904a
openssl.git:commit:6894e20b50c1204bfc990093b4e7ccd10f92865d
openssl.git:commit:752aa4a6f0f3098258fb6be5592fd18929da59c0
openssl.git:commit:c1c1bb7c5e2baa109baec62d2af09d24caae5557
rh#2033761
CVE-2021-40490kernel-source-rt:Releasedmoderate6.1 (CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-40490
CVE-2021-40490
D:CVE-2021-40490
DSA-4978
FEDORA:FEDORA-2021-4ca1b080bb
FEDORA:FEDORA-2021-60f1d2eba1
MISC:git.kernel.org:CVE-2021-40490
MLIST:[debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
SMASH Issue 309071
bdo#993948
bdo#993978
bnc#1190159
jsc#CAR-1011
rh#2001951
CVE-2021-40528libgcrypt:Already fixedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2021-40528
GLSA-202210-13
MISC:eprint.iacr.org:CVE-2021-40530
MISC:git.gnupg.org:CVE-2021-40528
MISC:ibm.github.io:CVE-2021-40530
Oracle:CVE-2021-40528
RHSA-2022:5311
SMASH Issue 309149
bnc#1190239
jsc#CAR-1038
rh#2002816
CVE-2021-4069vim:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)CONFIRM:huntr.dev:CVE-2021-4069
CVE-2021-4069
FEDORA:FEDORA-2021-541ddd1f94
FEDORA:FEDORA-2021-b0ac29efb1
MISC:github.com:CVE-2021-4069
SMASH Issue 316361
bnc#1193466
jsc#CAR-1308
rh#2029513
CVE-2021-4083kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-4083
CVE-2021-4083
DSA-5096
MISC:git.kernel.org:CVE-2021-4083
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2022:0820
RHSA-2022:0821
RHSA-2022:0823
RHSA-2022:0851
RHSA-2022:0925
RHSA-2022:0958
RHSA-2022:1103
RHSA-2022:1104
RHSA-2022:1107
RHSA-2022:1185
RHSA-2022:1198
RHSA-2022:1199
RHSA-2022:1263
RHSA-2022:1324
RHSA-2022:1373
RHSA-2022:1413
RHSA-2022:1418
RHSA-2022:1455
RHSA-2022:1975
RHSA-2022:1988
RHSA-2022:2189
RHSA-2022:4896
SMASH Issue 317361
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1193727
bnc#1194460
jsc#CAR-1379
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2029923
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-4090kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-4090
CVE-2021-4090
D:CVE-2021-4090
MISC:lore.kernel.org:CVE-2021-4090
SMASH Issue 317066
bnc#1193663
rh#2025101
CVE-2021-4093kernel-source-rt:Not affectedimportant ()CVE-2021-4093
MISC:bugs.chromium.org:CVE-2021-4093
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 317122
bnc#1193716
rh#2028584
CVE-2021-4095kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-4095
D:CVE-2021-4095
FEDORA:FEDORA-2022-0816754490
FEDORA:FEDORA-2022-8efcea6e67
MISC:access.redhat.com:OSS:2021/Q4/157
MISC:git.kernel.org:OSS:2022/01/17/1
MISC:patchwork.kernel.org:OSS:2021/Q4/157
MISC:patchwork.kernel.org:OSS:2022/01/17/1
OSS:2021/Q4/157
OSS:2022/01/17/1
SMASH Issue 317123
bnc#1193769
rh#2031194
CVE-2021-41072squashfs:Unsupportedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N)CVE-2021-40153
CVE-2021-41072
D:CVE-2021-40153
D:CVE-2021-41072
DSA-4967
DSA-4987
MISC:bugs.launchpad.net:CVE-2021-40153
MISC:github.com:CVE-2021-40153
MISC:github.com:CVE-2021-41072
MLIST:[debian-lts-announce] 20211020 [SECURITY] [DLA 2789-1] squashfs-tools security update
SMASH Issue 308509
SMASH Issue 309949
bdo#994262
bnc#1189936
bnc#1190531
https://lists.debian.org/debian-lts-announce/2021/08/msg00030.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GSMRKVJMJFX3MB7D3PXJSYY3TLZROE5S/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAOZ4BKWAC4Y3U2K5MMW3S77HWWXHQDL/
https://security.gentoo.org/glsa/202305-29
https://www.debian.org/security/2021/dsa-4967
https://www.debian.org/security/2021/dsa-4987
jsc#CAR-1065
jsc#CAR-942
rh#1998621
rh#2004957
CVE-2021-41073kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-41073
CVE-2021-41073
D:CVE-2021-41073
DSA-4978
FEDORA:FEDORA-2021-884d245ef8
FEDORA:FEDORA-2021-e0d6215753
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2021-41073
MISC:github.com:OSS:2022/Q2/169
MISC:www.openwall.com:CVE-2021-41073
OSS:2021/Q3/181
OSS:2022/06/04/4
OSS:2022/Q2/169
SMASH Issue 310391
bdo#993948
bdo#993978
bnc#1190664
rh#2007567
CVE-2021-4122cryptsetup:Not affectedmoderate5.9 (CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N)CVE-2021-4122
DSA-5070
MISC:access.redhat.com:CVE-2021-4122
MISC:access.redhat.com:OSS:2022/Q1/34
MISC:bugzilla.redhat.com:CVE-2021-4122
MISC:gitlab.com:CVE-2021-4122
MISC:mirrors.edge.kernel.org:CVE-2021-4122
OSS:2022/Q1/34
RHSA-2022:0370
SMASH Issue 319781
SMASH Issue 319782
bdo#1003686
bdo#949336
bnc#1194469
rh#2032401
CVE-2021-4135kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2021-4135
DSA-5096
MISC:git.kernel.org:CVE-2021-4135
OSS:2021/07/22/1
OSS:2022/01/25/12
SMASH Issue 317979
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1193927
jsc#CAR-1394
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2026786
rh#2044561
rh#2053632
rh#2059923
CVE-2021-4136vim:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:huntr.dev:CVE-2021-4136
CONFIRM:support.apple.com:CVE-2018-25032
CONFIRM:support.apple.com:CVE-2022-0158
CONFIRM:support.apple.com:CVE-2022-26704
CVE-2021-4136
D:CVE-2021-4136
FEDORA:FEDORA-2022-48b86d586f
FEDORA:FEDORA-2022-a3d70b50f0
FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
FULLDISC:20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
GLSA-202208-32
L3:64932
L3:65211
L3:65301
L3:65303
MISC:github.com:CVE-2021-4136
OSS:2022/01/15/1
OSS:2022/Q1/40
SMASH Issue 317952
bnc#1193905
rh#2034720
CVE-2021-4148kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-4148
MISC:lkml.org:CVE-2021-4148
SMASH Issue 318526
bnc#1193983
rh#2026487
CVE-2021-4149kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-4149
MISC:lkml.org:CVE-2021-4149
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
SMASH Issue 318525
bnc#1194001
jsc#CAR-1393
rh#2026485
CVE-2021-4150kernel-source-rt:Not affectedmoderate ()CVE-2021-4150
MISC:lkml.org:CVE-2021-4150
SMASH Issue 318524
bnc#1193994
rh#2025938
CVE-2021-4154kernel-source-rt:Releasedimportant8.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-4154
CVE-2021-4154
MISC:cloud.google.com:CVE-2021-4154
MISC:git.kernel.org:CVE-2021-4154
RHSA-2022:0186
RHSA-2022:0187
RHSA-2022:0231
RHSA-2022:0819
RHSA-2022:0825
RHSA-2022:0841
RHSA-2022:0849
SMASH Issue 317818
SMASH Issue 318587
bnc#1193842
bnc#1194461
jsc#CAR-1380
rh#2034514
CVE-2021-4155kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2021-4155
DSA-5096
MISC:access.redhat.com:OSS:2022/Q1/17
MISC:git.kernel.org:OSS:2022/Q1/17
MISC:security-tracker.debian.org:CVE-2021-4155
OSS:2021/07/22/1
OSS:2022/01/10/1
OSS:2022/01/25/12
OSS:2022/Q1/17
RHSA-2022:0176
RHSA-2022:0186
RHSA-2022:0187
RHSA-2022:0188
RHSA-2022:0231
RHSA-2022:0232
RHSA-2022:0335
RHSA-2022:0344
RHSA-2022:0529
RHSA-2022:0530
RHSA-2022:0531
RHSA-2022:0533
RHSA-2022:0540
RHSA-2022:0590
RHSA-2022:0592
RHSA-2022:0620
RHSA-2022:0622
RHSA-2022:0629
RHSA-2022:0636
RHSA-2022:0712
RHSA-2022:0718
RHSA-2022:0958
RHSA-2022:1263
RHSA-2022:1417
SMASH Issue 319525
SMASH Issue 319526
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bdo#996974
bnc#1194272
jsc#CAR-1522
linux.git:commit:4d1b97f9ce7c0d2af2bb85b12d48e6902172a28e
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2034813
rh#2044561
rh#2053632
rh#2059923
CVE-2021-4157kernel-source-rt:Releasedlow3.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L)CONFIRM:security.netapp.com:CVE-2021-4157
CVE-2021-4157
D:CVE-2021-4157
MISC:lore.kernel.org:CVE-2021-4157
MISC:www.oracle.com:CVE-2022-21586
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 318614
bnc#1194013
rh#2034342
CVE-2021-4159kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2021-4159
D:CVE-2021-4159
MISC:access.redhat.com:CVE-2021-4159
MISC:git.kernel.org:CVE-2021-4159
MISC:security-tracker.debian.org:CVE-2021-4159
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
SMASH Issue 319410
SMASH Issue 319411
bnc#1194227
jsc#CAR-1358
rh#2036024
CVE-2021-4160openssl-1_1:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:cert-portal.siemens.com:CVE-2021-25220
CONFIRM:git.openssl.org:CVE-2021-4160
CONFIRM:www.openssl.org:CVE-2021-4160
CVE-2021-4160
DSA-5103
GLSA-202210-02
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
Oracle:CVE-2021-4160
SMASH Issue 322087
bdo#989604
bnc#1195379
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3bf7b73ea7123045b8f972badc67ed6878e6c37f
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6fc1aaaf303185aa5e483e06bdfae16daa9193a7
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb
https://security.netapp.com/advisory/ntap-20240621-0006/
rh#2048651
CVE-2021-41617openssh:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-41617
CVE-2021-41617
D:CVE-2021-41617
DSA-5586
FEDORA:FEDORA-2021-1f7339271d
FEDORA:FEDORA-2021-f8df0f8563
FEDORA:FEDORA-2021-fa0e94198f
L3:62175
L3:64523
L3:66086
MISC:www.openssh.com:CVE-2020-15778
MISC:www.openssh.com:CVE-2021-41617
MISC:www.openwall.com:CVE-2021-41617
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MISC:www.starwindsoftware.com:CVE-2021-41617
OSS:2021/09/26/1
Oracle:CVE-2021-41617
RHSA-2021:4782
RHSA-2022:2013
SMASH Issue 310923
bdo#1033166
bdo#995130
bnc#1190975
bnc#1193033
https://lists.debian.org/debian-lts-announce/2023/12/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6XJIONMHMKZDTMH6BQR5TNLF2WDCGWED/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVI7RWM2JLNMWTOFK6BDUSGNOIPZYPUT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W44V2PFQH5YLRN6ZJTVRKAD7CU6CYYET/
https://www.debian.org/security/2023/dsa-5586
https://www.tenable.com/plugins/nessus/154174
jsc#CAR-1092
rh#2008291
CVE-2021-4166vim:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L)CONFIRM:huntr.dev:CVE-2021-4166
CONFIRM:support.apple.com:CVE-2018-25032
CONFIRM:support.apple.com:CVE-2022-0158
CONFIRM:support.apple.com:CVE-2022-26704
CVE-2021-4166
FEDORA:FEDORA-2022-48b86d586f
FEDORA:FEDORA-2022-a3d70b50f0
FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
FULLDISC:20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
GLSA-202208-32
MISC:github.com:CVE-2021-4166
OSS:2022/01/15/1
OSS:2022/Q1/40
SMASH Issue 318841
bnc#1194093
jsc#CAR-1356
rh#2035928
CVE-2021-4173vim:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H)CONFIRM:huntr.dev:CVE-2021-4173
CONFIRM:support.apple.com:CVE-2018-25032
CONFIRM:support.apple.com:CVE-2022-0158
CONFIRM:support.apple.com:CVE-2022-26704
CVE-2021-4173
FEDORA:FEDORA-2022-48b86d586f
FEDORA:FEDORA-2022-a3d70b50f0
FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
FULLDISC:20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
GLSA-202208-32
MISC:github.com:CVE-2021-4173
OSS:2022/01/15/1
OSS:2022/Q1/40
SMASH Issue 319171
bnc#1194108
rh#2035930
CVE-2021-41864kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:cdn.kernel.org:CVE-2021-41864
CONFIRM:security.netapp.com:CVE-2021-41864
CVE-2021-41864
D:CVE-2021-41864
DSA-5096
FEDORA:FEDORA-2021-79cbbefebe
FEDORA:FEDORA-2021-9dd76a1ed0
FEDORA:FEDORA-2021-ffda3d6fa1
MISC:git.kernel.org:CVE-2021-41864
MISC:github.com:CVE-2021-41864
MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 311579
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1191317
bnc#1191318
bnc#1191530
jsc#CAR-1100
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2010463
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-4187vim:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H)CONFIRM:huntr.dev:CVE-2021-4187
CONFIRM:support.apple.com:CVE-2018-25032
CONFIRM:support.apple.com:CVE-2022-0158
CONFIRM:support.apple.com:CVE-2022-26704
CVE-2021-4187
FEDORA:FEDORA-2022-48b86d586f
FEDORA:FEDORA-2022-a3d70b50f0
FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
FULLDISC:20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
GLSA-202208-32
MISC:github.com:CVE-2021-4187
OSS:2022/01/15/1
OSS:2022/Q1/40
SMASH Issue 319269
bnc#1194301
rh#2036129
CVE-2021-4189python3:Already fixedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CONFIRM:security.netapp.com:CVE-2021-4189
CVE-2021-4189
MISC:access.redhat.com:CVE-2021-4189
MISC:bugs.python.org:CVE-2021-4189
MISC:github.com:CVE-2021-4189
MISC:python-security.readthedocs.io:CVE-2021-4189
MISC:security-tracker.debian.org:CVE-2021-4189
RHSA-2021:3254
RHSA-2022:1663
RHSA-2022:1821
RHSA-2022:1986
SMASH Issue 319261
bnc#1194146
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
jsc#CAR-1357
rh#2036020
CVE-2021-4192vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:huntr.dev:CVE-2021-4192
CONFIRM:support.apple.com:CVE-2018-25032
CONFIRM:support.apple.com:CVE-2022-0158
CONFIRM:support.apple.com:CVE-2022-26704
CVE-2021-4192
D:CVE-2021-4192
FEDORA:FEDORA-2022-48b86d586f
FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
FULLDISC:20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
GLSA-202208-32
MISC:github.com:CVE-2021-4192
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
OSS:2022/01/15/1
OSS:2022/Q1/40
RHSA-2022:0366
SMASH Issue 319345
bnc#1194217
jsc#CAR-1391
rh#2039685
CVE-2021-4193vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2021-4193
CONFIRM:support.apple.com:CVE-2018-25032
CONFIRM:support.apple.com:CVE-2022-0158
CONFIRM:support.apple.com:CVE-2022-26704
CVE-2021-4193
D:CVE-2021-4193
FEDORA:FEDORA-2022-48b86d586f
FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
FULLDISC:20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
GLSA-202208-32
MISC:github.com:CVE-2021-4193
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
OSS:2022/01/15/1
OSS:2022/Q1/40
RHSA-2022:0366
SMASH Issue 319344
bnc#1194216
jsc#CAR-1392
rh#2039687
CVE-2021-4197kernel-source-rt:Releasedmoderate6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N)CONFIRM:security.netapp.com:CVE-2021-4197
CVE-2021-4197
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5127
DSA-5161
DSA-5173
DSA-5184
MISC:anatomic.rip:OSS:2024/Q2/172
MISC:blog.exodusintel.com:OSS:2024/Q2/172
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:git.kernel.org:OSS:2024/Q2/172
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:github.com:OSS:2022/Q3/101
MISC:lore.kernel.org:CVE-2021-4197
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:ruia-ruia.github.io:OSS:2022/Q3/101
MISC:www.oracle.com:CVE-2022-21586
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/04/22/3
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/101
OSS:2022/Q3/141
OSS:2024/04/24/3
OSS:2024/Q2/172
Oracle:CVE-2022-21123
RHSA-2022:1975
RHSA-2022:1988
RHSA-2022:5626
RHSA-2022:5633
SMASH Issue 319448
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1194302
https://bugs.chromium.org/p/project-zero/issues/detail?id=2504
jsc#CAR-1517
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2035652
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2078456
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2021-41990strongswan:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:CVE-2021-41991
CONFIRM:www.strongswan.org:CVE-2021-41990
CONFIRM:www.strongswan.org:CVE-2021-41991
CVE-2021-41990
CVE-2021-41991
DSA-4989
FEDORA:FEDORA-2021-0b37146973
FEDORA:FEDORA-2021-95fab6a482
FEDORA:FEDORA-2021-b3df83339e
MISC:github.com:CVE-2021-41991
MLIST:[debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update
SMASH Issue 311831
SMASH Issue 311832
bnc#1191367
jsc#CAR-1121
rh#2015610
rh#2015613
CVE-2021-41991strongswan:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:CVE-2021-41991
CONFIRM:www.strongswan.org:CVE-2021-41990
CONFIRM:www.strongswan.org:CVE-2021-41991
CVE-2021-41990
CVE-2021-41991
DSA-4989
FEDORA:FEDORA-2021-0b37146973
FEDORA:FEDORA-2021-95fab6a482
FEDORA:FEDORA-2021-b3df83339e
MISC:github.com:CVE-2021-41991
MLIST:[debian-lts-announce] 20211019 [SECURITY] [DLA 2788-1] strongswan security update
SMASH Issue 311830
SMASH Issue 311832
SMASH Issue 312010
bnc#1191367
bnc#1191435
jsc#CAR-1121
jsc#CAR-1122
rh#2015610
rh#2015613
CVE-2021-42008kernel-source-rt:Releasedimportant8.8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-42008
CVE-2021-42008
D:CVE-2021-42008
MISC:cdn.kernel.org:CVE-2021-42008
MISC:git.kernel.org:CVE-2021-42008
MISC:www.youtube.com:CVE-2021-42008
MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
SMASH Issue 311719
bnc#1191315
bnc#1191660
jsc#CAR-1229
rh#2010970
CVE-2021-4202kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-4202
CVE-2021-4202
D:CVE-2021-4202
DSA-5096
MISC:git.kernel.org:CVE-2021-4202
MISC:github.com:OSS:2022/06/07/2
OSS:2021/07/22/1
OSS:2022/01/25/12
OSS:2022/06/01/2
OSS:2022/06/04/2
OSS:2022/06/07/2
SMASH Issue 319778
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1194529
bnc#1194533
jsc#CAR-1518
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2036682
rh#2044561
rh#2053632
rh#2059923
CVE-2021-4203kernel-source-rt:Releasedmoderate5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L)CONFIRM:security.netapp.com:CVE-2021-4203
CVE-2021-4203
D:CVE-2021-4203
DSA-5096
MISC:bugs.chromium.org:CVE-2021-4203
MISC:git.kernel.org:CVE-2021-4203
MISC:lore.kernel.org:CVE-2021-4203
MISC:www.oracle.com:CVE-2022-21586
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2022:1975
RHSA-2022:1988
RHSA-2022:5626
RHSA-2022:5633
SMASH Issue 319780
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1194535
jsc#CAR-1390
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2036934
rh#2044561
rh#2053632
rh#2059923
CVE-2021-4204kernel-source-rt:Not affected, ltp:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20221228-0003/
CVE-2021-4204
MISC:access.redhat.com:CVE-2021-4204
MISC:github.com:OSS:2022/06/07/2
MISC:security-tracker.debian.org:CVE-2021-4204
OSS:2022/01/11/4
OSS:2022/06/01/2
OSS:2022/06/04/2
OSS:2022/06/07/2
OSS:2022/Q1/22
SMASH Issue 319206
bnc#1194111
rh#2039178
CVE-2021-4209gnutls:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-4209
CVE-2021-4209
MISC:access.redhat.com:CVE-2021-4209
MISC:gitlab.com:CVE-2021-4209
SMASH Issue 323952
bnc#1196167
jsc#CAR-1543
rh#2044156
CVE-2021-4214libpng16:Ignorelow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2021-4214
CVE-2021-4214
MISC:access.redhat.com:CVE-2021-4214
MISC:github.com:CVE-2021-4214
MISC:security-tracker.debian.org:CVE-2021-4214
SMASH Issue 321667
bnc#1195401
jsc#CAR-1491
rh#2043393
CVE-2021-4217unzip:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2021-4217
MISC:access.redhat.com:CVE-2021-4217
MISC:bugs.launchpad.net:CVE-2021-4217
SMASH Issue 321826
bnc#1196175
rh#2044583
CVE-2021-4218kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-4218
MISC:access.redhat.com:CVE-2021-4218
MISC:bugs.centos.org:CVE-2021-4218
SMASH Issue 322272
bnc#1195374
rh#2048359
CVE-2021-42252kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-42252
MISC:cdn.kernel.org:CVE-2021-42252
MISC:git.kernel.org:CVE-2021-42252
SMASH Issue 309961
SMASH Issue 312272
bnc#1190479
bnc#1192444
jsc#CAR-1231
rh#2013097
CVE-2021-42327kernel-source-rt:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-42327
FEDORA:FEDORA-2021-a093973910
MISC:git.kernel.org:CVE-2021-42327
MISC:www.mail-archive.com:CVE-2021-42327
SMASH Issue 313292
bnc#1191949
bnc#1225423
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f23750b5b3d98653b31d4469592935ef6364ad67
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDEW4APTYKJK365HC2JZIVXYUV7ZRN7/
https://security.netapp.com/advisory/ntap-20211118-0005/
https://www.mail-archive.com/amd-gfx%40lists.freedesktop.org/msg69080.html
linux.git:commit:3f4e54bd312d3dafb59daf2b97ffa08abebe60f5
linux.git:commit:839e59a34394905fef73093e8605f50a9eb6d802
rh#2016692
CVE-2021-42373busybox:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-42377
CVE-2021-42373
CVE-2021-42374
CVE-2021-42375
CVE-2021-42376
CVE-2021-42377
CVE-2021-42378
CVE-2021-42379
CVE-2021-42380
CVE-2021-42381
CVE-2021-42382
CVE-2021-42383
CVE-2021-42384
CVE-2021-42385
CVE-2021-42386
D:CVE-2021-42373
D:CVE-2021-42374
D:CVE-2021-42375
D:CVE-2021-42376
D:CVE-2021-42377
D:CVE-2021-42378
D:CVE-2021-42379
D:CVE-2021-42380
D:CVE-2021-42381
FEDORA:FEDORA-2021-5a95823596
FEDORA:FEDORA-2021-c52c0fe490
N/A:N/A
SMASH Issue 315036
SMASH Issue 315365
bnc#1192869
https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
jsc#CAR-1324
rh#2023876
rh#2023881
rh#2023888
rh#2023891
rh#2023895
rh#2023900
rh#2023904
rh#2023912
rh#2023927
rh#2023929
rh#2023931
rh#2023933
rh#2023936
rh#2023938
CVE-2021-42374busybox:Releasedmoderate5.7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-42377
CVE-2021-42373
CVE-2021-42374
CVE-2021-42375
CVE-2021-42376
CVE-2021-42377
CVE-2021-42378
CVE-2021-42379
CVE-2021-42380
CVE-2021-42381
CVE-2021-42382
CVE-2021-42383
CVE-2021-42384
CVE-2021-42385
CVE-2021-42386
D:CVE-2021-42373
D:CVE-2021-42374
D:CVE-2021-42375
D:CVE-2021-42376
D:CVE-2021-42377
D:CVE-2021-42378
D:CVE-2021-42379
D:CVE-2021-42380
D:CVE-2021-42381
FEDORA:FEDORA-2021-5a95823596
FEDORA:FEDORA-2021-c52c0fe490
N/A:N/A
SMASH Issue 315038
SMASH Issue 315365
bnc#1192869
https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
jsc#CAR-1324
rh#2023876
rh#2023881
rh#2023888
rh#2023891
rh#2023895
rh#2023900
rh#2023904
rh#2023912
rh#2023927
rh#2023929
rh#2023931
rh#2023933
rh#2023936
rh#2023938
CVE-2021-42375busybox:Releasedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-42377
CVE-2021-42373
CVE-2021-42374
CVE-2021-42375
CVE-2021-42376
CVE-2021-42377
CVE-2021-42378
CVE-2021-42379
CVE-2021-42380
CVE-2021-42381
CVE-2021-42382
CVE-2021-42383
CVE-2021-42384
CVE-2021-42385
CVE-2021-42386
D:CVE-2021-42373
D:CVE-2021-42374
D:CVE-2021-42375
D:CVE-2021-42376
D:CVE-2021-42377
D:CVE-2021-42378
D:CVE-2021-42379
D:CVE-2021-42380
D:CVE-2021-42381
FEDORA:FEDORA-2021-5a95823596
FEDORA:FEDORA-2021-c52c0fe490
N/A:N/A
SMASH Issue 315039
SMASH Issue 315365
bnc#1192869
https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
jsc#CAR-1324
rh#2023876
rh#2023881
rh#2023888
rh#2023891
rh#2023895
rh#2023900
rh#2023904
rh#2023912
rh#2023927
rh#2023929
rh#2023931
rh#2023933
rh#2023936
rh#2023938
CVE-2021-42376busybox:Releasedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-42377
CVE-2021-42373
CVE-2021-42374
CVE-2021-42375
CVE-2021-42376
CVE-2021-42377
CVE-2021-42378
CVE-2021-42379
CVE-2021-42380
CVE-2021-42381
CVE-2021-42382
CVE-2021-42383
CVE-2021-42384
CVE-2021-42385
CVE-2021-42386
D:CVE-2021-42373
D:CVE-2021-42374
D:CVE-2021-42375
D:CVE-2021-42376
D:CVE-2021-42377
D:CVE-2021-42378
D:CVE-2021-42379
D:CVE-2021-42380
D:CVE-2021-42381
FEDORA:FEDORA-2021-5a95823596
FEDORA:FEDORA-2021-c52c0fe490
N/A:N/A
SMASH Issue 315040
SMASH Issue 315365
bnc#1192869
https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
jsc#CAR-1324
rh#2023876
rh#2023881
rh#2023888
rh#2023891
rh#2023895
rh#2023900
rh#2023904
rh#2023912
rh#2023927
rh#2023929
rh#2023931
rh#2023933
rh#2023936
rh#2023938
CVE-2021-42377busybox:Releasedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-42377
CVE-2021-42373
CVE-2021-42374
CVE-2021-42375
CVE-2021-42376
CVE-2021-42377
CVE-2021-42378
CVE-2021-42379
CVE-2021-42380
CVE-2021-42381
CVE-2021-42382
CVE-2021-42383
CVE-2021-42384
CVE-2021-42385
CVE-2021-42386
D:CVE-2021-42373
D:CVE-2021-42374
D:CVE-2021-42375
D:CVE-2021-42376
D:CVE-2021-42377
D:CVE-2021-42378
D:CVE-2021-42379
D:CVE-2021-42380
D:CVE-2021-42381
FEDORA:FEDORA-2021-5a95823596
FEDORA:FEDORA-2021-c52c0fe490
N/A:N/A
SMASH Issue 315041
SMASH Issue 315365
bnc#1192869
https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
jsc#CAR-1324
rh#2023876
rh#2023881
rh#2023888
rh#2023891
rh#2023895
rh#2023900
rh#2023904
rh#2023912
rh#2023927
rh#2023929
rh#2023931
rh#2023933
rh#2023936
rh#2023938
CVE-2021-42378busybox:Releasedmoderate6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-42377
CVE-2021-42373
CVE-2021-42374
CVE-2021-42375
CVE-2021-42376
CVE-2021-42377
CVE-2021-42378
CVE-2021-42379
CVE-2021-42380
CVE-2021-42381
CVE-2021-42382
CVE-2021-42383
CVE-2021-42384
CVE-2021-42385
CVE-2021-42386
D:CVE-2021-42373
D:CVE-2021-42374
D:CVE-2021-42375
D:CVE-2021-42376
D:CVE-2021-42377
D:CVE-2021-42378
D:CVE-2021-42379
D:CVE-2021-42380
D:CVE-2021-42381
FEDORA:FEDORA-2021-5a95823596
FEDORA:FEDORA-2021-c52c0fe490
N/A:N/A
SMASH Issue 315042
SMASH Issue 315365
bnc#1192869
https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
jsc#CAR-1324
rh#2023876
rh#2023881
rh#2023888
rh#2023891
rh#2023895
rh#2023900
rh#2023904
rh#2023912
rh#2023927
rh#2023929
rh#2023931
rh#2023933
rh#2023936
rh#2023938
CVE-2021-42379busybox:Releasedmoderate6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-42377
CVE-2021-42373
CVE-2021-42374
CVE-2021-42375
CVE-2021-42376
CVE-2021-42377
CVE-2021-42378
CVE-2021-42379
CVE-2021-42380
CVE-2021-42381
CVE-2021-42382
CVE-2021-42383
CVE-2021-42384
CVE-2021-42385
CVE-2021-42386
D:CVE-2021-42373
D:CVE-2021-42374
D:CVE-2021-42375
D:CVE-2021-42376
D:CVE-2021-42377
D:CVE-2021-42378
D:CVE-2021-42379
D:CVE-2021-42380
D:CVE-2021-42381
FEDORA:FEDORA-2021-5a95823596
FEDORA:FEDORA-2021-c52c0fe490
N/A:N/A
SMASH Issue 315043
SMASH Issue 315365
bnc#1192869
https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
jsc#CAR-1324
rh#2023876
rh#2023881
rh#2023888
rh#2023891
rh#2023895
rh#2023900
rh#2023904
rh#2023912
rh#2023927
rh#2023929
rh#2023931
rh#2023933
rh#2023936
rh#2023938
CVE-2021-42380busybox:Releasedmoderate6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-42377
CVE-2021-42373
CVE-2021-42374
CVE-2021-42375
CVE-2021-42376
CVE-2021-42377
CVE-2021-42378
CVE-2021-42379
CVE-2021-42380
CVE-2021-42381
CVE-2021-42382
CVE-2021-42383
CVE-2021-42384
CVE-2021-42385
CVE-2021-42386
D:CVE-2021-42373
D:CVE-2021-42374
D:CVE-2021-42375
D:CVE-2021-42376
D:CVE-2021-42377
D:CVE-2021-42378
D:CVE-2021-42379
D:CVE-2021-42380
D:CVE-2021-42381
FEDORA:FEDORA-2021-5a95823596
FEDORA:FEDORA-2021-c52c0fe490
N/A:N/A
SMASH Issue 315044
SMASH Issue 315365
bnc#1192869
https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
jsc#CAR-1324
rh#2023876
rh#2023881
rh#2023888
rh#2023891
rh#2023895
rh#2023900
rh#2023904
rh#2023912
rh#2023927
rh#2023929
rh#2023931
rh#2023933
rh#2023936
rh#2023938
CVE-2021-42381busybox:Releasedmoderate6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-42377
CVE-2021-42373
CVE-2021-42374
CVE-2021-42375
CVE-2021-42376
CVE-2021-42377
CVE-2021-42378
CVE-2021-42379
CVE-2021-42380
CVE-2021-42381
CVE-2021-42382
CVE-2021-42383
CVE-2021-42384
CVE-2021-42385
CVE-2021-42386
D:CVE-2021-42373
D:CVE-2021-42374
D:CVE-2021-42375
D:CVE-2021-42376
D:CVE-2021-42377
D:CVE-2021-42378
D:CVE-2021-42379
D:CVE-2021-42380
D:CVE-2021-42381
FEDORA:FEDORA-2021-5a95823596
FEDORA:FEDORA-2021-c52c0fe490
N/A:N/A
SMASH Issue 315045
SMASH Issue 315365
bnc#1192869
https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
jsc#CAR-1324
rh#2023876
rh#2023881
rh#2023888
rh#2023891
rh#2023895
rh#2023900
rh#2023904
rh#2023912
rh#2023927
rh#2023929
rh#2023931
rh#2023933
rh#2023936
rh#2023938
CVE-2021-42382busybox:Releasedmoderate6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-42377
CVE-2021-42373
CVE-2021-42374
CVE-2021-42375
CVE-2021-42376
CVE-2021-42377
CVE-2021-42378
CVE-2021-42379
CVE-2021-42380
CVE-2021-42381
CVE-2021-42382
CVE-2021-42383
CVE-2021-42384
CVE-2021-42385
CVE-2021-42386
D:CVE-2021-42373
D:CVE-2021-42374
D:CVE-2021-42375
D:CVE-2021-42376
D:CVE-2021-42377
D:CVE-2021-42378
D:CVE-2021-42379
D:CVE-2021-42380
D:CVE-2021-42381
FEDORA:FEDORA-2021-5a95823596
FEDORA:FEDORA-2021-c52c0fe490
N/A:N/A
SMASH Issue 315046
SMASH Issue 315365
bnc#1192869
https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
jsc#CAR-1324
rh#2023876
rh#2023881
rh#2023888
rh#2023891
rh#2023895
rh#2023900
rh#2023904
rh#2023912
rh#2023927
rh#2023929
rh#2023931
rh#2023933
rh#2023936
rh#2023938
CVE-2021-42383busybox:Releasedmoderate6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-42377
CVE-2021-42373
CVE-2021-42374
CVE-2021-42375
CVE-2021-42376
CVE-2021-42377
CVE-2021-42378
CVE-2021-42379
CVE-2021-42380
CVE-2021-42381
CVE-2021-42382
CVE-2021-42383
CVE-2021-42384
CVE-2021-42385
CVE-2021-42386
D:CVE-2021-42373
D:CVE-2021-42374
D:CVE-2021-42375
D:CVE-2021-42376
D:CVE-2021-42377
D:CVE-2021-42378
D:CVE-2021-42379
D:CVE-2021-42380
D:CVE-2021-42381
FEDORA:FEDORA-2021-5a95823596
FEDORA:FEDORA-2021-c52c0fe490
N/A:N/A
SMASH Issue 315047
SMASH Issue 315365
bnc#1192869
https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
jsc#CAR-1324
rh#2023876
rh#2023881
rh#2023888
rh#2023891
rh#2023895
rh#2023900
rh#2023904
rh#2023912
rh#2023927
rh#2023929
rh#2023931
rh#2023933
rh#2023936
rh#2023938
CVE-2021-42384busybox:Releasedmoderate6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-42377
CVE-2021-42373
CVE-2021-42374
CVE-2021-42375
CVE-2021-42376
CVE-2021-42377
CVE-2021-42378
CVE-2021-42379
CVE-2021-42380
CVE-2021-42381
CVE-2021-42382
CVE-2021-42383
CVE-2021-42384
CVE-2021-42385
CVE-2021-42386
D:CVE-2021-42373
D:CVE-2021-42374
D:CVE-2021-42375
D:CVE-2021-42376
D:CVE-2021-42377
D:CVE-2021-42378
D:CVE-2021-42379
D:CVE-2021-42380
D:CVE-2021-42381
FEDORA:FEDORA-2021-5a95823596
FEDORA:FEDORA-2021-c52c0fe490
N/A:N/A
SMASH Issue 315048
SMASH Issue 315365
bnc#1192869
https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
jsc#CAR-1324
rh#2023876
rh#2023881
rh#2023888
rh#2023891
rh#2023895
rh#2023900
rh#2023904
rh#2023912
rh#2023927
rh#2023929
rh#2023931
rh#2023933
rh#2023936
rh#2023938
CVE-2021-42385busybox:Releasedmoderate6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-42377
CVE-2021-42373
CVE-2021-42374
CVE-2021-42375
CVE-2021-42376
CVE-2021-42377
CVE-2021-42378
CVE-2021-42379
CVE-2021-42380
CVE-2021-42381
CVE-2021-42382
CVE-2021-42383
CVE-2021-42384
CVE-2021-42385
CVE-2021-42386
D:CVE-2021-42373
D:CVE-2021-42374
D:CVE-2021-42375
D:CVE-2021-42376
D:CVE-2021-42377
D:CVE-2021-42378
D:CVE-2021-42379
D:CVE-2021-42380
D:CVE-2021-42381
FEDORA:FEDORA-2021-5a95823596
FEDORA:FEDORA-2021-c52c0fe490
N/A:N/A
SMASH Issue 315049
SMASH Issue 315365
bnc#1192869
https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
jsc#CAR-1324
rh#2023876
rh#2023881
rh#2023888
rh#2023891
rh#2023895
rh#2023900
rh#2023904
rh#2023912
rh#2023927
rh#2023929
rh#2023931
rh#2023933
rh#2023936
rh#2023938
CVE-2021-42386busybox:Releasedmoderate6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-42377
CVE-2021-42373
CVE-2021-42374
CVE-2021-42375
CVE-2021-42376
CVE-2021-42377
CVE-2021-42378
CVE-2021-42379
CVE-2021-42380
CVE-2021-42381
CVE-2021-42382
CVE-2021-42383
CVE-2021-42384
CVE-2021-42385
CVE-2021-42386
D:CVE-2021-42373
D:CVE-2021-42374
D:CVE-2021-42375
D:CVE-2021-42376
D:CVE-2021-42377
D:CVE-2021-42378
D:CVE-2021-42379
D:CVE-2021-42380
D:CVE-2021-42381
FEDORA:FEDORA-2021-5a95823596
FEDORA:FEDORA-2021-c52c0fe490
N/A:N/A
SMASH Issue 315050
SMASH Issue 315365
bnc#1192869
https://claroty.com/team82/research/unboxing-busybox-14-vulnerabilities-uncovered-by-claroty-jfrog
jsc#CAR-1324
rh#2023876
rh#2023881
rh#2023888
rh#2023891
rh#2023895
rh#2023900
rh#2023904
rh#2023912
rh#2023927
rh#2023929
rh#2023931
rh#2023933
rh#2023936
rh#2023938
CVE-2021-42574vim:Ignoreimportant8.3 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H)CERT-VN:VU#999008
CVE-2021-42574
CVE-2021-42694
D:CVE-2021-42574
D:CVE-2021-42694
FEDORA:FEDORA-2021-0578e23912
FEDORA:FEDORA-2021-443139f67c
FEDORA:FEDORA-2021-7ad3a01f6a
GLSA-202210-09
MISC:blog.rust-lang.org:MLIST:[oss-security] 20211101 Trojan Source Attacks
MISC:cwe.mitre.org:CVE-2021-42694
MISC:trojansource.codes:CVE-2021-42694
MISC:www.scyon.nl:CVE-2021-42694
MISC:www.starwindsoftware.com:CVE-2021-42574
MISC:www.unicode.org:CVE-2021-42574
MISC:www.unicode.org:CVE-2021-42694
MLIST:[oss-security] 20211101 CVE-2021-42574: rustc 1.56.0 and bidirectional-override codepoints in source code
MLIST:[oss-security] 20211101 Re: CVE-2021-42574: rustc 1.56.0 and bidirectional-override codepoints in source code
MLIST:[oss-security] 20211101 Trojan Source Attacks
MLIST:[oss-security] 20211102 Re: CVE-2021-42574: rustc 1.56.0 and bidirectional-override codepoints in source code
MLIST:[oss-security] 20211102 Re: Trojan Source Attacks
OSS:2021/Q4/75
OSS:2021/Q4/80
RHSA-2021:4033
RHSA-2021:4034
RHSA-2021:4035
RHSA-2021:4036
RHSA-2021:4037
RHSA-2021:4038
RHSA-2021:4039
RHSA-2021:4585
RHSA-2021:4586
RHSA-2021:4587
RHSA-2021:4588
RHSA-2021:4589
RHSA-2021:4590
RHSA-2021:4591
RHSA-2021:4592
RHSA-2021:4593
RHSA-2021:4594
RHSA-2021:4595
RHSA-2021:4596
RHSA-2021:4598
RHSA-2021:4599
RHSA-2021:4600
RHSA-2021:4601
RHSA-2021:4602
RHSA-2021:4649
RHSA-2021:4669
RHSA-2021:4694
RHSA-2021:4723
RHSA-2021:4724
RHSA-2021:4729
RHSA-2021:4730
RHSA-2021:4743
SMASH Issue 312846
SMASH Issue 312847
bnc#1191820
bnc#1192244
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
rh#2005819
rh#2015365
CVE-2021-42694vim:Ignoreimportant ()CERT-VN:VU#999008
CVE-2021-42574
CVE-2021-42694
D:CVE-2021-42574
D:CVE-2021-42694
FEDORA:FEDORA-2021-0578e23912
FEDORA:FEDORA-2021-443139f67c
FEDORA:FEDORA-2021-7ad3a01f6a
GLSA-202210-09
MISC:blog.rust-lang.org:MLIST:[oss-security] 20211101 Trojan Source Attacks
MISC:cwe.mitre.org:CVE-2021-42694
MISC:trojansource.codes:CVE-2021-42694
MISC:www.scyon.nl:CVE-2021-42694
MISC:www.starwindsoftware.com:CVE-2021-42574
MISC:www.unicode.org:CVE-2021-42574
MISC:www.unicode.org:CVE-2021-42694
MLIST:[oss-security] 20211101 CVE-2021-42574: rustc 1.56.0 and bidirectional-override codepoints in source code
MLIST:[oss-security] 20211101 Re: CVE-2021-42574: rustc 1.56.0 and bidirectional-override codepoints in source code
MLIST:[oss-security] 20211101 Trojan Source Attacks
MLIST:[oss-security] 20211102 Re: CVE-2021-42574: rustc 1.56.0 and bidirectional-override codepoints in source code
MLIST:[oss-security] 20211102 Re: Trojan Source Attacks
OSS:2021/Q4/75
OSS:2021/Q4/80
RHSA-2021:4033
RHSA-2021:4034
RHSA-2021:4035
RHSA-2021:4036
RHSA-2021:4037
RHSA-2021:4038
RHSA-2021:4039
RHSA-2021:4585
RHSA-2021:4586
RHSA-2021:4587
RHSA-2021:4588
RHSA-2021:4589
RHSA-2021:4590
RHSA-2021:4591
RHSA-2021:4592
RHSA-2021:4593
RHSA-2021:4594
RHSA-2021:4595
RHSA-2021:4596
RHSA-2021:4598
RHSA-2021:4599
RHSA-2021:4600
RHSA-2021:4601
RHSA-2021:4602
RHSA-2021:4649
RHSA-2021:4669
RHSA-2021:4694
RHSA-2021:4723
RHSA-2021:4724
RHSA-2021:4729
RHSA-2021:4730
RHSA-2021:4743
SMASH Issue 312847
SMASH Issue 313459
bnc#1191820
bnc#1192244
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IH2RG5YTR6ZZOLUV3EUPZEIJR7XHJLVD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LQNTFF24ROHLVPLUOEISBN3F7QM27L4U/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUPA37D57VPTDLSXOOGF4UXUEADOC4PQ/
rh#2005819
rh#2015365
CVE-2021-42739kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-42739
CVE-2021-3542
CVE-2021-42739
D:CVE-2021-42739
DSA-5096
FEDORA:FEDORA-2021-7de33b7016
FEDORA:FEDORA-2021-8364530ebf
FEDORA:FEDORA-2021-fdef34e26f
MISC:git.kernel.org:CVE-2021-42739
MISC:lore.kernel.org:CVE-2021-42739
MISC:seclists.org:CVE-2021-42739
MISC:www.oracle.com:CVE-2022-21586
MISC:www.starwindsoftware.com:CVE-2021-42739
MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2022:0063
RHSA-2022:0065
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 281716
SMASH Issue 313154
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1184673
bnc#1186063
bnc#1192036
https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ%40mwanda/
jsc#CAR-1185
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1951739
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-43056kernel-source-rt:Releasedmoderate6.8 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)CVE-2021-43056
D:CVE-2021-43056
FEDORA:FEDORA-2021-4320606094
FEDORA:FEDORA-2021-4fed2b55c4
FEDORA:FEDORA-2021-ed8c2e1098
MISC:cdn.kernel.org:CVE-2021-43056
MISC:git.kernel.org:CVE-2021-43056
MISC:git.kernel.org:MLIST:[oss-security] 20211028 Re: Linux kernel: powerpc: KVM guest can trigger host crash on Power8
MISC:lore.kernel.org:CVE-2021-43056
MLIST:[oss-security] 20211028 Re: Linux kernel: powerpc: KVM guest can trigger host crash on Power8
OSS:2021/Q4/67
RHSA-2022:1988
SMASH Issue 313706
bnc#1192107
jsc#CAR-1225
rh#2017073
CVE-2021-43057kernel-source-rt:Not affectedimportant ()CVE-2021-43057
D:CVE-2021-43057
MISC:bugs.chromium.org:CVE-2021-43057
MISC:cdn.kernel.org:CVE-2021-43057
MISC:git.kernel.org:CVE-2021-43057
SMASH Issue 313716
bnc#1192260
https://security.netapp.com/advisory/ntap-20211125-0001/
rh#2019163
CVE-2021-43085openssl:Not affected, openssl-1_1:Not affectedlow ()CVE-2021-43085
MISC:github.com:CVE-2021-43085
SMASH Issue 327184
bnc#1197505
rh#2069364
CVE-2021-43267kernel-source-rt:Not affectedcritical9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-43267
CVE-2021-43267
FEDORA:FEDORA-2021-a093973910
FEDORA:FEDORA-2021-bdd146e463
MISC:cdn.kernel.org:CVE-2021-43267
MISC:github.com:CVE-2021-43267
OSS:2022/02/10/1
OSS:2022/Q1/130
RHSA-2021:4644
RHSA-2021:4645
RHSA-2021:4646
RHSA-2021:4647
RHSA-2021:4648
RHSA-2021:4650
RHSA-2021:4750
SMASH Issue 314118
bnc#1192341
linux.git:commit:271351d255b09e39c7f6437738cba595f9b235be
linux.git:commit:9aa422ad326634b76309e8ff342c246800621216
rh#2020362
CVE-2021-43389kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3896
CVE-2021-43389
DSA-5096
MISC:cdn.kernel.org:CVE-2021-43056
MISC:git.kernel.org:CVE-2021-43389
MISC:lore.kernel.org:CVE-2021-43389
MISC:seclists.org:CVE-2021-43389
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2021/11/05/1
OSS:2021/Q4/100
OSS:2022/01/25/12
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 313334
SMASH Issue 314288
SMASH Issue 314326
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1191958
jsc#CAR-1227
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2013180
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-43396glibc:Ignorelow3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)CVE-2021-43396
MISC:blog.tuxcare.com:CVE-2021-43396
MISC:sourceware.org:CVE-2021-43396
MISC:www.oracle.com:CVE-2022-21586
SMASH Issue 314285
bnc#1192397
https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=ff012870b2c02a62598c04daa1e54632e020fd7d
jsc#CAR-1233
rh#2020652
CVE-2021-43519lua53:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2021-43519
FEDORA:FEDORA-2022-473560d1a6
FEDORA:FEDORA-2022-e6b2bd5b50
MISC:lua-users.org:CVE-2021-43519
RHSA-2023:0957
RHSA-2023:1211
SMASH Issue 314538
bnc#1192613
jsc#CAR-1247
rh#2047672
CVE-2021-43527mozilla-nss:Releasedimportant8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:cert-portal.siemens.com:CVE-2021-43527
CONFIRM:security.netapp.com:CVE-2021-43527
CVE-2021-43527
D:CVE-2021-43527
DSA-5016
GLSA-202212-05
L3:68187
MISC:bugzilla.mozilla.org:CVE-2021-43527
MISC:ftp.mozilla.org:CVE-2021-43527
MISC:www.mozilla.org:CVE-2021-43527
MISC:www.mozilla.org:OSS:2021/Q4/138
MISC:www.oracle.com:CVE-2022-21498
MISC:www.starwindsoftware.com:CVE-2021-43527
OSS:2021/Q4/138
Oracle:CVE-2021-43527
RHSA-2021:4903
RHSA-2021:4904
RHSA-2021:4907
RHSA-2021:4909
RHSA-2021:4919
RHSA-2021:4932
RHSA-2021:4933
RHSA-2021:4946
RHSA-2021:4953
RHSA-2021:4954
RHSA-2021:4969
RHSA-2021:4994
RHSA-2021:5006
RHSA-2021:5035
SMASH Issue 315950
SMASH Issue 315951
bnc#1193170
jsc#CAR-1438
rh#2024370
rh#2088353
CVE-2021-43618gmp:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-43618
CVE-2021-43618
D:CVE-2021-43618
FULLDISC:20221016 Re: over 2000 packages depend on abort()ing libgmp
MISC:gmplib.org:CVE-2021-43618
MLIST:[debian-lts-announce] 20211202 [SECURITY] [DLA 2837-1] gmp security update
OSS:2022/10/13/3
OSS:2022/Q4/21
SMASH Issue 314975
bdo#994405
bnc#1192717
https://security.gentoo.org/glsa/202309-13
jsc#CAR-1251
rh#2024904
CVE-2021-43818python-lxml:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N)CONFIRM:github.com:CVE-2021-43818
CONFIRM:security.netapp.com:CVE-2021-43818
CVE-2021-43818
DSA-5043
FEDORA:FEDORA-2021-6e8fb79f90
FEDORA:FEDORA-2021-9f9e7c5c4f
FEDORA:FEDORA-2022-7129fbaeed
FEDORA:FEDORA-2022-96c79bf003
GLSA-202208-06
MISC:github.com:CVE-2021-43818
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20211230 [SECURITY] [DLA 2871-1] lxml security update
RHSA-2022:1664
RHSA-2022:1763
RHSA-2022:1764
RHSA-2022:1821
RHSA-2022:1932
RHSA-2022:5498
SMASH Issue 317292
bdo#1001885
bnc#1193752
jsc#CAR-1340
rh#2032569
CVE-2021-43975kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-43976
CVE-2021-43975
DSA-5096
FEDORA:FEDORA-2021-c09b851eb0
FEDORA:FEDORA-2021-eab8c5a263
MISC:git.kernel.org:CVE-2021-43975
MISC:lore.kernel.org:CVE-2021-43975
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
SMASH Issue 315180
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1192845
jsc#CAR-1273
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2024989
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-43976kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-43976
CVE-2021-43976
DSA-5092
DSA-5096
FEDORA:FEDORA-2021-c09b851eb0
FEDORA:FEDORA-2021-eab8c5a263
MISC:patchwork.kernel.org:CVE-2021-43976
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 315179
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1192847
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=04d80663f67ccef893061b49ec8a42ff7045ae84
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X24M7KDC4OJOZNS3RDSYC7ELNELOLQ2N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YODMYMGZYDXQKGJGX7TJG4XV4L5YLLBD/
https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+%40Zekuns-MBP-16.fios-router.home/
jsc#CAR-1274
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2025003
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-4439kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2021-4439
SMASH Issue 411611
bnc#1226670
https://git.kernel.org/stable/c/1f3e2e97c003f80c4b087092b225c8787ff91e4d
https://git.kernel.org/stable/c/24219a977bfe3d658687e45615c70998acdbac5a
https://git.kernel.org/stable/c/285e9210b1fab96a11c0be3ed5cea9dd48b6ac54
https://git.kernel.org/stable/c/7d91adc0ccb060ce564103315189466eb822cc6a
https://git.kernel.org/stable/c/7f221ccbee4ec662e2292d490a43ce6c314c4594
https://git.kernel.org/stable/c/9b6b2db77bc3121fe435f1d4b56e34de443bec75
https://git.kernel.org/stable/c/cc20226e218a2375d50dd9ac14fb4121b43375ff
https://git.kernel.org/stable/c/e8b8de17e164c9f1b7777f1c6f99d05539000036
rh#2293302
CVE-2021-4440kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2021-4440
SMASH Issue 412076
bnc#1227069
https://git.kernel.org/stable/c/1424ab4bb386df9cc590c73afa55f13e9b00dea2
rh#2294289
CVE-2021-44568libsolv:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2021-44568
CVE-2021-44569
CVE-2021-44570
CVE-2021-44571
CVE-2021-44573
CVE-2021-44574
CVE-2021-44575
CVE-2021-44576
CVE-2021-44577
FEDORA:FEDORA-2022-f8921a3891
MISC:github.com:CVE-2021-44568
MISC:github.com:CVE-2021-44569
MISC:github.com:CVE-2021-44570
MISC:github.com:CVE-2021-44571
MISC:github.com:CVE-2021-44573
MISC:github.com:CVE-2021-44574
MISC:github.com:CVE-2021-44575
MISC:github.com:CVE-2021-44576
MISC:github.com:CVE-2021-44577
RHSA-2022:5498
SMASH Issue 324458
SMASH Issue 324473
bnc#1196288
rh#2056775
rh#2056777
rh#2056780
rh#2056782
rh#2056783
rh#2056791
rh#2056792
rh#2056794
rh#2057178
CVE-2021-44569libsolv:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2021-44568
CVE-2021-44569
CVE-2021-44570
CVE-2021-44571
CVE-2021-44573
CVE-2021-44574
CVE-2021-44575
CVE-2021-44576
CVE-2021-44577
FEDORA:FEDORA-2022-f8921a3891
MISC:github.com:CVE-2021-44568
MISC:github.com:CVE-2021-44569
MISC:github.com:CVE-2021-44570
MISC:github.com:CVE-2021-44571
MISC:github.com:CVE-2021-44573
MISC:github.com:CVE-2021-44574
MISC:github.com:CVE-2021-44575
MISC:github.com:CVE-2021-44576
MISC:github.com:CVE-2021-44577
RHSA-2022:5498
SMASH Issue 324458
SMASH Issue 324465
bnc#1196288
rh#2056775
rh#2056777
rh#2056780
rh#2056782
rh#2056783
rh#2056791
rh#2056792
rh#2056794
rh#2057178
CVE-2021-44570libsolv:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2021-44568
CVE-2021-44569
CVE-2021-44570
CVE-2021-44571
CVE-2021-44573
CVE-2021-44574
CVE-2021-44575
CVE-2021-44576
CVE-2021-44577
FEDORA:FEDORA-2022-f8921a3891
MISC:github.com:CVE-2021-44568
MISC:github.com:CVE-2021-44569
MISC:github.com:CVE-2021-44570
MISC:github.com:CVE-2021-44571
MISC:github.com:CVE-2021-44573
MISC:github.com:CVE-2021-44574
MISC:github.com:CVE-2021-44575
MISC:github.com:CVE-2021-44576
MISC:github.com:CVE-2021-44577
RHSA-2022:5498
SMASH Issue 324458
SMASH Issue 324464
bnc#1196288
rh#2056775
rh#2056777
rh#2056780
rh#2056782
rh#2056783
rh#2056791
rh#2056792
rh#2056794
rh#2057178
CVE-2021-44571libsolv:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2021-44568
CVE-2021-44569
CVE-2021-44570
CVE-2021-44571
CVE-2021-44573
CVE-2021-44574
CVE-2021-44575
CVE-2021-44576
CVE-2021-44577
FEDORA:FEDORA-2022-f8921a3891
MISC:github.com:CVE-2021-44568
MISC:github.com:CVE-2021-44569
MISC:github.com:CVE-2021-44570
MISC:github.com:CVE-2021-44571
MISC:github.com:CVE-2021-44573
MISC:github.com:CVE-2021-44574
MISC:github.com:CVE-2021-44575
MISC:github.com:CVE-2021-44576
MISC:github.com:CVE-2021-44577
RHSA-2022:5498
SMASH Issue 324458
SMASH Issue 324463
bnc#1196288
rh#2056775
rh#2056777
rh#2056780
rh#2056782
rh#2056783
rh#2056791
rh#2056792
rh#2056794
rh#2057178
CVE-2021-44573libsolv:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2021-44568
CVE-2021-44569
CVE-2021-44570
CVE-2021-44571
CVE-2021-44573
CVE-2021-44574
CVE-2021-44575
CVE-2021-44576
CVE-2021-44577
FEDORA:FEDORA-2022-f8921a3891
MISC:github.com:CVE-2021-44568
MISC:github.com:CVE-2021-44569
MISC:github.com:CVE-2021-44570
MISC:github.com:CVE-2021-44571
MISC:github.com:CVE-2021-44573
MISC:github.com:CVE-2021-44574
MISC:github.com:CVE-2021-44575
MISC:github.com:CVE-2021-44576
MISC:github.com:CVE-2021-44577
RHSA-2022:5498
SMASH Issue 324458
SMASH Issue 324462
bnc#1196288
rh#2056775
rh#2056777
rh#2056780
rh#2056782
rh#2056783
rh#2056791
rh#2056792
rh#2056794
rh#2057178
CVE-2021-44574libsolv:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2021-44568
CVE-2021-44569
CVE-2021-44570
CVE-2021-44571
CVE-2021-44573
CVE-2021-44574
CVE-2021-44575
CVE-2021-44576
CVE-2021-44577
FEDORA:FEDORA-2022-f8921a3891
MISC:github.com:CVE-2021-44568
MISC:github.com:CVE-2021-44569
MISC:github.com:CVE-2021-44570
MISC:github.com:CVE-2021-44571
MISC:github.com:CVE-2021-44573
MISC:github.com:CVE-2021-44574
MISC:github.com:CVE-2021-44575
MISC:github.com:CVE-2021-44576
MISC:github.com:CVE-2021-44577
RHSA-2022:5498
SMASH Issue 324458
SMASH Issue 324461
bnc#1196288
rh#2056775
rh#2056777
rh#2056780
rh#2056782
rh#2056783
rh#2056791
rh#2056792
rh#2056794
rh#2057178
CVE-2021-44575libsolv:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2021-44568
CVE-2021-44569
CVE-2021-44570
CVE-2021-44571
CVE-2021-44573
CVE-2021-44574
CVE-2021-44575
CVE-2021-44576
CVE-2021-44577
FEDORA:FEDORA-2022-f8921a3891
MISC:github.com:CVE-2021-44568
MISC:github.com:CVE-2021-44569
MISC:github.com:CVE-2021-44570
MISC:github.com:CVE-2021-44571
MISC:github.com:CVE-2021-44573
MISC:github.com:CVE-2021-44574
MISC:github.com:CVE-2021-44575
MISC:github.com:CVE-2021-44576
MISC:github.com:CVE-2021-44577
RHSA-2022:5498
SMASH Issue 324458
SMASH Issue 324460
bnc#1196288
rh#2056775
rh#2056777
rh#2056780
rh#2056782
rh#2056783
rh#2056791
rh#2056792
rh#2056794
rh#2057178
CVE-2021-44576libsolv:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2021-44568
CVE-2021-44569
CVE-2021-44570
CVE-2021-44571
CVE-2021-44573
CVE-2021-44574
CVE-2021-44575
CVE-2021-44576
CVE-2021-44577
FEDORA:FEDORA-2022-f8921a3891
MISC:github.com:CVE-2021-44568
MISC:github.com:CVE-2021-44569
MISC:github.com:CVE-2021-44570
MISC:github.com:CVE-2021-44571
MISC:github.com:CVE-2021-44573
MISC:github.com:CVE-2021-44574
MISC:github.com:CVE-2021-44575
MISC:github.com:CVE-2021-44576
MISC:github.com:CVE-2021-44577
RHSA-2022:5498
SMASH Issue 324458
SMASH Issue 324459
bnc#1196288
rh#2056775
rh#2056777
rh#2056780
rh#2056782
rh#2056783
rh#2056791
rh#2056792
rh#2056794
rh#2057178
CVE-2021-44577libsolv:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2021-44568
CVE-2021-44569
CVE-2021-44570
CVE-2021-44571
CVE-2021-44573
CVE-2021-44574
CVE-2021-44575
CVE-2021-44576
CVE-2021-44577
FEDORA:FEDORA-2022-f8921a3891
MISC:github.com:CVE-2021-44568
MISC:github.com:CVE-2021-44569
MISC:github.com:CVE-2021-44570
MISC:github.com:CVE-2021-44571
MISC:github.com:CVE-2021-44573
MISC:github.com:CVE-2021-44574
MISC:github.com:CVE-2021-44575
MISC:github.com:CVE-2021-44576
MISC:github.com:CVE-2021-44577
RHSA-2022:5498
SMASH Issue 324458
bnc#1196288
rh#2056775
rh#2056777
rh#2056780
rh#2056782
rh#2056783
rh#2056791
rh#2056792
rh#2056794
rh#2057178
CVE-2021-44647lua53:Not affectedmoderate ()CVE-2021-44647
D:CVE-2021-44647
FEDORA:FEDORA-2022-473560d1a6
MISC:access.redhat.com:CVE-2021-44647
MISC:lua-users.org:CVE-2021-44647
SMASH Issue 320015
bnc#1194575
https://security.gentoo.org/glsa/202305-23
rh#2044415
CVE-2021-44733kernel-source-rt:Releasedmoderate4.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L)CONFIRM:security.netapp.com:CVE-2021-45469
CVE-2021-44733
DSA-5096
MISC:git.kernel.org:CVE-2021-44733
MISC:github.com:CVE-2021-44733
MISC:lore.kernel.org:CVE-2021-44733
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 317533
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1193767
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dfd0743f1d9ea76931510ed150334d571fbab49d
https://lore.kernel.org/lkml/20211215092501.1861229-1-jens.wiklander%40linaro.org/
jsc#CAR-1514
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2030747
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-44879kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:cdn.kernel.org:CVE-2021-44879
CVE-2021-44879
MISC:bugzilla.kernel.org:OSS:2022/Q1/136
MISC:git.kernel.org:OSS:2022/Q1/136
MISC:lore.kernel.org:CVE-2021-44879
OSS:2022/Q1/136
SMASH Issue 323636
bnc#1195987
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
https://lore.kernel.org/linux-f2fs-devel/20211206144421.3735-3-chao%40kernel.org/T/
jsc#CAR-1603
rh#2054135
CVE-2021-44964lua53:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-44964
MISC:github.com:CVE-2021-44964
MISC:lua-users.org:CVE-2021-44964
RHSA-2023:0957
RHSA-2023:1211
SMASH Issue 326197
bnc#1197165
rh#2064772
CVE-2021-45079strongswan:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L)CVE-2021-45079
D:CVE-2021-45079
DSA-5056
MISC:www.strongswan.org:CVE-2021-45079
SMASH Issue 319785
SMASH Issue 319786
bnc#1194471
jsc#CAR-1388
rh#2042047
CVE-2021-45095kernel-source-rt:Releasedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2021-45095
D:CVE-2021-45095
DSA-5050
DSA-5096
MISC:git.kernel.org:CVE-2021-45095
MISC:github.com:CVE-2021-45095
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/13/1
OSS:2022/01/25/12
SMASH Issue 317794
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bdo#996974
bnc#1193867
jsc#CAR-1509
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2035338
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-45100kernel-source-rt:Not affectedimportant ()CONFIRM:security.netapp.com:CVE-2021-45100
CVE-2021-45100
MISC:github.com:CVE-2021-45100
MISC:marc.info:CVE-2021-45100
SMASH Issue 317789
bnc#1193865
rh#2035345
CVE-2021-45346sqlite3:Ignorelow3.1 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)CONFIRM:security.netapp.com:CVE-2021-45346
CVE-2021-45346
D:CVE-2021-45346
MISC:github.com:CVE-2021-45346
MISC:sqlite.org:CVE-2021-45346
MISC:www.sqlite.org:CVE-2021-45346
SMASH Issue 323752
bnc#1196611
rh#2054793
CVE-2021-45402kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L)CVE-2021-45402
MISC:git.kernel.org:CVE-2021-45402
SMASH Issue 323625
bnc#1196130
rh#2054865
CVE-2021-45469kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-45469
CVE-2021-45469
DSA-5050
DSA-5096
FEDORA:FEDORA-2021-a7a558062e
FEDORA:FEDORA-2021-c387682aa1
MISC:bugzilla.kernel.org:CVE-2021-45469
MISC:git.kernel.org:CVE-2021-45469
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2021/12/25/1
OSS:2021/Q4/179
OSS:2022/01/13/1
OSS:2022/01/25/12
SMASH Issue 318807
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bdo#996974
bnc#1194060
bnc#1194462
jsc#CAR-1381
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2035817
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-45480kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-45480
DSA-5050
DSA-5096
MISC:cdn.kernel.org:CVE-2021-45480
MISC:github.com:CVE-2021-45480
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/13/1
OSS:2022/01/25/12
SMASH Issue 318830
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bdo#996974
bnc#1194090
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2035946
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2021-45485kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Releasedlow3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)CONFIRM:security.netapp.com:CVE-2021-45485
CVE-2021-45485
D:CVE-2021-45485
MISC:arxiv.org:CVE-2021-45489
MISC:cdn.kernel.org:CVE-2021-38205
MISC:git.kernel.org:CVE-2021-45485
MISC:www.oracle.com:CVE-2022-21586
RHSA-2022:1975
RHSA-2022:1988
RHSA-2022:6983
RHSA-2022:6991
SMASH Issue 318835
bnc#1194094
jsc#CAR-1396
rh#2039911
CVE-2021-45486kernel-source:Released, kernel-source-azure:Released, kernel-source-rt:Releasedlow3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2021-45486
D:CVE-2021-45486
MISC:arxiv.org:CVE-2021-45489
MISC:cdn.kernel.org:CVE-2021-33034
MISC:git.kernel.org:CVE-2021-45486
MISC:www.oracle.com:CVE-2022-21586
RHSA-2022:1975
RHSA-2022:1988
RHSA-2022:6983
RHSA-2022:6991
SMASH Issue 318834
bnc#1194087
jsc#CAR-1367
rh#2039914
CVE-2021-45868kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-45868
CVE-2021-45868
D:CVE-2021-45868
L3:66496
L3:67104
MISC:bugzilla.kernel.org:CVE-2021-45868
MISC:cdn.kernel.org:CVE-2021-45868
MISC:git.kernel.org:CVE-2021-45868
MISC:git.kernel.org:OSS:2022/03/17/2
MISC:oss-security.openwall.org:MLIST:[oss-security] 20210504 21Nails: Multiple vulnerabilities in Exim
OSS:2022/03/17/1
OSS:2022/03/17/2
SMASH Issue 326638
bnc#1197366
jsc#CAR-1682
rh#2065662
CVE-2021-45960expat:Releasedmoderate6.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H)CONFIRM:security.netapp.com:CVE-2021-45960
CONFIRM:www.tenable.com:CVE-2022-23990
CVE-2021-45960
DSA-5073
GLSA-202209-24
MISC:bugzilla.mozilla.org:CVE-2021-45960
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:github.com:CVE-2021-45960
OSS:2022/01/17/3
Oracle:CVE-2022-23990
RHSA-2022:0951
RHSA-2022:1069
RHSA-2022:7144
SMASH Issue 319382
bdo#1002994
bdo#1003474
bnc#1194251
jsc#CAR-1359
rh#2044451
rh#2044455
rh#2044457
rh#2044464
rh#2044467
rh#2044479
rh#2044484
rh#2044488
rh#2044613
rh#2048356
CVE-2021-45985lua53:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2021-45985
D:CVE-2021-45985
SMASH Issue 362875
bnc#1210274
http://lua-users.org/lists/lua-l/2021-12/msg00019.html
https://github.com/lua/lua/commit/cf613cdc6fa367257fc61c256f63d917350858b5
https://www.lua.org/bugs.html#5.4.3-11
rh#2185579
CVE-2021-46059vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2021-46059
MISC:huntr.dev:CVE-2021-46059
OSS:2022/Q1/40
SMASH Issue 319842
bnc#1194556
jsc#CAR-1395
rh#2039850
CVE-2021-46143expat:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2021-46143
CONFIRM:www.tenable.com:CVE-2022-23990
CVE-2021-46143
D:CVE-2021-46143
DSA-5073
GLSA-202209-24
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:github.com:CVE-2021-46143
OSS:2022/01/17/3
Oracle:CVE-2022-23990
RHSA-2022:0951
RHSA-2022:1069
RHSA-2022:7144
RHSA-2022:7692
SMASH Issue 319700
bdo#1002994
bdo#1003474
bnc#1194362
jsc#CAR-1372
rh#2044451
rh#2044455
rh#2044457
rh#2044464
rh#2044467
rh#2044479
rh#2044484
rh#2044488
rh#2044613
rh#2048356
CVE-2021-46195binutils:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2021-46195
MISC:gcc.gnu.org:CVE-2021-46195
RHSA-2022:8415
SMASH Issue 320483
bnc#1194783
rh#2046300
CVE-2021-46283kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46283
DSA-5096
MISC:cdn.kernel.org:CVE-2021-38207
MISC:git.kernel.org:CVE-2021-46283
MISC:syzkaller.appspot.com:CVE-2021-46283
OSS:2021/07/22/1
OSS:2022/01/25/12
SMASH Issue 319976
SMASH Issue 320048
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1194518
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2039811
rh#2044561
rh#2053632
rh#2059923
CVE-2021-46778kernel-source-rt:Ignoremoderate5.3 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N)CVE-2021-46778
MISC:www.amd.com:CVE-2021-46778
SMASH Issue 339296
bnc#1202291
rh#2114996
CVE-2021-46828libtirpc:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-46828
CVE-2021-46828
D:CVE-2021-46828
DSA-5200
GLSA-202210-33
L3:63849
L3:64826
L3:65541
MISC:git.linux-nfs.org:CVE-2021-46828
MLIST:[debian-lts-announce] 20220812 [SECURITY] [DLA 3071-1] libtirpc security update
RHBA-2022:2065
RHSA-2022:8400
SMASH Issue 337821
SMASH Issue 337822
bdo#1015873
bnc#1201680
bnc#1201970
jsc#CAR-1917
rh#2109352
CVE-2021-46848libtasn1:Releasedcritical9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H)CONFIRM:security.netapp.com:CVE-2021-46848
CVE-2021-46848
FEDORA:FEDORA-2022-061f857481
FEDORA:FEDORA-2022-19056934a7
FEDORA:FEDORA-2022-3c933ffaca
FEDORA:FEDORA-2022-3f9ee1ad91
L3:64548
L3:64601
L3:65170
MISC:bugs.gentoo.org:CVE-2021-46848
MISC:gitlab.com:CVE-2021-46848
MLIST:[debian-lts-announce] 20230109 [SECURITY] [DLA 3263-1] libtasn1-6 security update
Oracle:CVE-2021-46848
RHSA-2023:0116
RHSA-2023:0343
SMASH Issue 346096
bnc#1204690
jsc#CAR-2143
rh#2140058
CVE-2021-46905kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2021-46905
SMASH Issue 395120
bnc#1220418
https://git.kernel.org/stable/c/0c71d4c89559f72cec2592d078681a843bce570e
https://git.kernel.org/stable/c/0f000005da31f6947f843ce6b3e3a960540c6e00
https://git.kernel.org/stable/c/24b699bea7553fc0b98dad9d864befb6005ac7f1
https://git.kernel.org/stable/c/2ad5692db72874f02b9ad551d26345437ea4f7f3
https://git.kernel.org/stable/c/41c44e1f3112d7265dae522c026399b2a42d19ef
https://git.kernel.org/stable/c/5871761c5f0f20d6e98bf3b6bd7486d857589554
https://git.kernel.org/stable/c/5c17cfe155d21954b4c7e2a78fa771cebcd86725
https://git.kernel.org/stable/c/90642ee9eb581a13569b1c0bd57e85d962215273
https://git.kernel.org/stable/c/d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e
rh#2266253
CVE-2021-46907kernel-source-rt:Not affectedlow0 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N)CVE-2021-46907
SMASH Issue 395251
bnc#1220422
https://git.kernel.org/stable/c/04c4f2ee3f68c9a4bf1653d15f1a9a435ae33f7a
https://git.kernel.org/stable/c/7f64753835a78c7d2cc2932a5808ef3b7fd4c050
https://git.kernel.org/stable/c/ce541d7b59566a0d94c7c99bfb5d34b050e6af70
rh#2266406
CVE-2021-46908kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2021-46908
SMASH Issue 395252
bnc#1220425
https://git.kernel.org/stable/c/4ccdc6c6cae38b91c871293fb0ed8c6845a61b51
https://git.kernel.org/stable/c/4f3ff11204eac0ee23acf64deecb3bad7b0db0c6
https://git.kernel.org/stable/c/9601148392520e2e134936e76788fc2a6371e7be
rh#2266407
CVE-2021-46909kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46909
SMASH Issue 395253
bnc#1220442
https://git.kernel.org/stable/c/1fc087fdb98d556b416c82ed6e3964a30885f47a
https://git.kernel.org/stable/c/2643da6aa57920d9159a1a579fb04f89a2b0d29a
https://git.kernel.org/stable/c/30e3b4f256b4e366a61658c294f6a21b8626dda7
https://git.kernel.org/stable/c/532747fd5c7aaa17ee5cf79f3e947c31eb0e35cf
https://git.kernel.org/stable/c/871b569a3e67f570df9f5ba195444dc7c621293b
https://git.kernel.org/stable/c/c3efce8cc9807339633ee30e39882f4c8626ee1d
jsc#CAR-3143
rh#2266408
CVE-2021-46910kernel-source-rt:Not affectedmoderate ()CVE-2021-46910
SMASH Issue 395254
bnc#1220446
https://git.kernel.org/stable/c/5965ac11b1d5fcb38464728931649cd9df79c7c9
https://git.kernel.org/stable/c/d624833f5984d484c5e3196f34b926f9e71dafee
rh#2266414
CVE-2021-46911kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2021-46911
SMASH Issue 395255
bnc#1220400
https://git.kernel.org/stable/c/1a73e427b824133940c2dd95ebe26b6dce1cbf10
https://git.kernel.org/stable/c/8348665d4181c68b0ca1205b48e1753d78bc810f
https://git.kernel.org/stable/c/8d5a9dbd2116a852f8f0f91f6fbc42a0afe1091f
rh#2266422
CVE-2021-46912kernel-source-rt:Not affectedmoderate ()CVE-2021-46912
SMASH Issue 395256
bnc#1220461
https://git.kernel.org/stable/c/1ccdf1bed140820240e383ba0accc474ffc7f006
https://git.kernel.org/stable/c/35d7491e2f77ce480097cabcaf93ed409e916e12
https://git.kernel.org/stable/c/97684f0970f6e112926de631fdd98d9693c7e5c1
rh#2266421
CVE-2021-46913kernel-source-rt:Not affectedmoderate ()CVE-2021-46913
SMASH Issue 395257
bnc#1220462
https://git.kernel.org/stable/c/47d8de3c226574a3ddb8b87d0c152028d1bafef4
https://git.kernel.org/stable/c/4d8f9065830e526c83199186c5f56a6514f457d2
https://git.kernel.org/stable/c/e51ff3ffc316377cca21de8b80404eed0c37b3c3
rh#2266386
CVE-2021-46914kernel-source-rt:Not affectedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46914
SMASH Issue 395258
bnc#1220465
https://git.kernel.org/stable/c/be07581aacae7cd0a073afae8e8862032f794309
https://git.kernel.org/stable/c/debb9df311582c83fe369baa35fa4b92e8a9c58a
https://git.kernel.org/stable/c/f1b4be4a753caa4056496f679d70550d0c11a264
rh#2266427
CVE-2021-46916kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46916
SMASH Issue 395260
bnc#1220435
https://git.kernel.org/stable/c/31166efb1cee348eb6314e9c0095d84cbeb66b9d
https://git.kernel.org/stable/c/758d19098df4b0bbca9f40d6ae6c82c9c18b9bba
rh#2266371
CVE-2021-46917kernel-source-rt:Not affectedlow3.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L)CVE-2021-46917
SMASH Issue 395261
bnc#1220432
https://git.kernel.org/stable/c/e5eb9757fe4c2392e069246ae78badc573af1833
https://git.kernel.org/stable/c/ea9aadc06a9f10ad20a90edc0a484f1147d88a7a
https://git.kernel.org/stable/c/f7dc8f5619165e1fa3383d0c2519f502d9e2a1a9
rh#2266376
CVE-2021-46918kernel-source-rt:Not affectedmoderate ()CVE-2021-46918
SMASH Issue 395262
bnc#1220429
https://git.kernel.org/stable/c/6df0e6c57dfc064af330071f372f11aa8c584997
https://git.kernel.org/stable/c/c84b8982d7aa9b4717dc36a1c6cbc93ee153b500
rh#2266373
CVE-2021-46919kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46919
SMASH Issue 395263
bnc#1220414
https://git.kernel.org/stable/c/05b7791c4c4aa8304368fdc55ae911f6b34e7281
https://git.kernel.org/stable/c/0fff71c5a311e1264988179f7dcc217fda15fadd
https://git.kernel.org/stable/c/4ecf25595273203010bc8318c4aee60ad64037ae
rh#2266397
CVE-2021-46920kernel-source-rt:Not affectedlow1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2021-46920
SMASH Issue 395264
bnc#1220426
https://git.kernel.org/stable/c/02981a44a0e402089775416371bd2e0c935685f8
https://git.kernel.org/stable/c/a5ad12d5d69c63af289a37f05187a0c6fe93553d
https://git.kernel.org/stable/c/ea941ac294d75d0ace50797aebf0056f6f8f7a7f
rh#2266398
CVE-2021-46922kernel-source-rt:Not affectedmoderate ()CVE-2021-46922
SMASH Issue 395277
bnc#1220475
https://git.kernel.org/stable/c/39c8d760d44cb3fa0d67e8cd505df81cf4d80999
https://git.kernel.org/stable/c/9d5171eab462a63e2fbebfccf6026e92be018f20
https://git.kernel.org/stable/c/bf84ef2dd2ccdcd8f2658476d34b51455f970ce4
rh#2266457
CVE-2021-46923kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2021-46923
SMASH Issue 395278
bnc#1220457
https://git.kernel.org/stable/c/012e332286e2bb9f6ac77d195f17e74b2963d663
https://git.kernel.org/stable/c/47b5d0a7532d39e42a938f81e3904268145c341d
rh#2266312
CVE-2021-46926kernel-source-rt:Not affectedmoderate ()CVE-2021-46926
SMASH Issue 395281
bnc#1220478
https://git.kernel.org/stable/c/385f287f9853da402d94278e59f594501c1d1dad
https://git.kernel.org/stable/c/cce476954401e3421afafb25bbaa926050688b1d
rh#2266370
CVE-2021-46927kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46927
SMASH Issue 395282
bnc#1220443
https://git.kernel.org/stable/c/3a0152b219523227c2a62a0a122cf99608287176
https://git.kernel.org/stable/c/90d2beed5e753805c5eab656b8d48257638fe543
rh#2266365
CVE-2021-46928kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46928
SMASH Issue 395283
bnc#1220480
https://git.kernel.org/stable/c/484730e5862f6b872dca13840bed40fd7c60fa26
https://git.kernel.org/stable/c/d01e9ce1af6116f812491d3d3873d204f10ae0b8
https://git.kernel.org/stable/c/e96373f0a5f484bc1e193f9951dcb3adf24bf3f7
rh#2266453
CVE-2021-46929kernel-source-rt:Already fixedimportant7.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)CVE-2021-46929
L3:68095
L3:68137
SMASH Issue 395284
bnc#1220482
bnc#1222400
https://git.kernel.org/stable/c/5ec7d18d1813a5bead0b495045606c93873aecbb
https://git.kernel.org/stable/c/75799e71df1da11394740b43ae5686646179561d
https://git.kernel.org/stable/c/769d14abd35e0e153b5149c3e1e989a9d719e3ff
https://git.kernel.org/stable/c/831de271452b87657fcf8d715ee20519b79caef5
https://git.kernel.org/stable/c/8873140f95d4977bf37e4cf0d5c5e3f6e34cdd3e
https://git.kernel.org/stable/c/af6e6e58f7ebf86b4e7201694b1e4f3a62cbc3ec
rh#2266357
CVE-2021-46931kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46931
SMASH Issue 395286
bnc#1220486
https://git.kernel.org/stable/c/07f13d58a8ecc3baf9a488588fb38c5cb0db484f
https://git.kernel.org/stable/c/73665165b64a8f3c5b3534009a69be55bb744f05
https://git.kernel.org/stable/c/918fc3855a6507a200e9cf22c20be852c0982687
rh#2266337
CVE-2021-46933kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2021-46933
SMASH Issue 395288
bnc#1220487
https://git.kernel.org/stable/c/1c4ace3e6b8575745c50dca9e76e0021e697d645
https://git.kernel.org/stable/c/240fc586e83d645912accce081a48aa63a45f6ee
https://git.kernel.org/stable/c/33f6a0cbb7772146e1c11f38028fffbfed14728b
https://git.kernel.org/stable/c/52500239e3f2d6fc77b6f58632a9fb98fe74ac09
https://git.kernel.org/stable/c/b1e0887379422975f237d43d8839b751a6bcf154
https://git.kernel.org/stable/c/cc8c8028c21b2a3842a1e98e99e55028df275919
https://git.kernel.org/stable/c/ebef2aa29f370b5096c16020c104e393192ef684
https://git.kernel.org/stable/c/f976dd7011150244a7ba820f2c331e9fb253befa
rh#2266448
CVE-2021-46935kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46935
SMASH Issue 395290
bnc#1220438
https://git.kernel.org/stable/c/103b16a8c51f96d5fe063022869ea906c256e5da
https://git.kernel.org/stable/c/17691bada6b2f1d5f1c0f6d28cd9d0727023b0ff
https://git.kernel.org/stable/c/1cb8444f3114f0bb2f6e3bcadcf09aa4a28425d4
https://git.kernel.org/stable/c/2d2df539d05205fd83c404d5f2dff48d36f9b495
https://git.kernel.org/stable/c/7c7064402609aeb6fb11be1b4ec10673ff17b593
https://git.kernel.org/stable/c/cfd0d84ba28c18b531648c9d4a35ecca89ad9901
rh#2266436
CVE-2021-46937kernel-source-rt:Not affectedmoderate ()CVE-2021-46937
SMASH Issue 395292
bnc#1220488
https://git.kernel.org/stable/c/ebb3f994dd92f8fb4d70c7541091216c1e10cb71
https://git.kernel.org/stable/c/ffe4a1ba1a82c416a6b3a09d46594f6a885ae141
rh#2266378
CVE-2021-46938kernel-source-rt:Not affectedimportant ()CVE-2021-46938
SMASH Issue 395345
bnc#1220554
https://git.kernel.org/stable/c/1cb02dc76f4c0a2749a02b26469512d6984252e9
https://git.kernel.org/stable/c/6086f957416a6e87236c06079fcaba7a3998aeca
https://git.kernel.org/stable/c/772b9f59657665af3b68d24d12b9d172d31f0dfb
https://git.kernel.org/stable/c/8ae0185255eaf05bd66f4215c81e99bf01140fd9
https://git.kernel.org/stable/c/8e947c8f4a5620df77e43c9c75310dc510250166
https://git.kernel.org/stable/c/a992a283c0b77d0a7c2c348add0e6a21fb1dab67
https://git.kernel.org/stable/c/b42c0a33dfdd451d9be62dd5de58c39f2750b6e3
https://git.kernel.org/stable/c/d757bf4c69cda3c3ab7f775dfabbf5a80e2f6f9d
rh#2266499
CVE-2021-46939kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46939
SMASH Issue 395346
bnc#1220580
https://git.kernel.org/stable/c/1fca00920327be96f3318224f502e4d5460f9545
https://git.kernel.org/stable/c/2a1bd74b8186d7938bf004f5603f25b84785f63e
https://git.kernel.org/stable/c/6e2418576228eeb12e7ba82edb8f9500623942ff
https://git.kernel.org/stable/c/859b47a43f5a0e5b9a92b621dc6ceaad39fb5c8b
https://git.kernel.org/stable/c/91ca6f6a91f679c8645d7f3307e03ce86ad518c4
https://git.kernel.org/stable/c/a33614d52e97fc8077eb0b292189ca7d964cc534
https://git.kernel.org/stable/c/aafe104aa9096827a429bc1358f8260ee565b7cc
https://git.kernel.org/stable/c/c64da3294a7d59a4bf6874c664c13be892f15f44
https://git.kernel.org/stable/c/d43d56dbf452ccecc1ec735cd4b6840118005d7c
rh#2266497
CVE-2021-46940kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46940
SMASH Issue 395347
bnc#1220624
https://git.kernel.org/stable/c/13a779de4175df602366d129e41782ad7168cef0
https://git.kernel.org/stable/c/337b1546cde87fb8588ddaedf0201b769baa572a
https://git.kernel.org/stable/c/dbdf22fc825fdb1d97f23230064e0f9819471628
https://git.kernel.org/stable/c/ea6803ff2cd1a2d7d880256bf562172b708a76ff
rh#2266494
CVE-2021-46942kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46942
SMASH Issue 395349
bnc#1220602
https://git.kernel.org/stable/c/734551df6f9bedfbefcd113ede665945e9de0b99
https://git.kernel.org/stable/c/cb5e0b3d0f993a6268c1a2c7ede2f9aa0c17ef68
rh#2266507
CVE-2021-46943kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46943
SMASH Issue 395350
bnc#1220583
https://git.kernel.org/stable/c/34892ea938387d83ffcfb7775ec55f0f80767916
https://git.kernel.org/stable/c/6fb617e37a39db0a3eca4489431359d0bdf3b9bc
https://git.kernel.org/stable/c/a03fb1e8a110658215a4cefc3e2ad53279e496a6
https://git.kernel.org/stable/c/ad91849996f9dd79741a961fd03585a683b08356
https://git.kernel.org/stable/c/c6b81b897f6f9445d57f8d47c4e060ec21556137
rh#2266490
CVE-2021-46944kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46944
SMASH Issue 395351
bnc#1220566
https://git.kernel.org/stable/c/14d0e99c3ef6b0648535a31bf2eaabb4eff97b9e
https://git.kernel.org/stable/c/3630901933afba1d16c462b04d569b7576339223
https://git.kernel.org/stable/c/517f6f570566a863c2422b843c8b7d099474f6a9
https://git.kernel.org/stable/c/74ba0adb5e983503b18a96121d965cad34ac7ce3
https://git.kernel.org/stable/c/ff792ae52005c85a2d829c153e08d99a356e007d
rh#2266488
CVE-2021-46945kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2021-46945
SMASH Issue 395352
bnc#1220504
https://git.kernel.org/stable/c/1e9ea8f4637026b8e965128953f2da061ccae9c4
https://git.kernel.org/stable/c/64e1eebe2131183174f4fbb6b1491355f96c6cde
https://git.kernel.org/stable/c/ac2f7ca51b0929461ea49918f27c11b680f28995
rh#2266486
CVE-2021-46946kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2021-46946
SMASH Issue 395353
bnc#1220636
https://git.kernel.org/stable/c/098b257563b959f4ca6c1d82fde0ee727792cb19
https://git.kernel.org/stable/c/539ba4ebc467260225898e67ea53cbb73308f894
https://git.kernel.org/stable/c/7687f5aba0f50c7ff8040e506bae184e59c8e7b8
https://git.kernel.org/stable/c/9c61387630a54e35b96a90608aafd369ffb86f39
https://git.kernel.org/stable/c/a149d2a5cabbf6507a7832a1c4fd2593c55fd450
https://git.kernel.org/stable/c/d2e121be8d318524a61e13ca15b5bfab2d0b63c7
https://git.kernel.org/stable/c/e18d76a12b34791bc0318a0e0c0fa5863cd8dabf
https://git.kernel.org/stable/c/e70db6e43286a17c3dfc840fcee662de183b6a81
https://git.kernel.org/stable/c/f42789ee5f96743cdb5f69445cab3609458733f7
rh#2266484
CVE-2021-46947kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46947
SMASH Issue 395354
bnc#1220614
https://git.kernel.org/stable/c/99ba0ea616aabdc8e26259fd722503e012199a76
https://git.kernel.org/stable/c/ebeac958b690123a0b40aa61f688f2f170035fad
rh#2266481
CVE-2021-46948kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46948
SMASH Issue 395355
bnc#1220642
https://git.kernel.org/stable/c/35c7a83ad1bb1d48ae249346e61b1132bcbf9052
https://git.kernel.org/stable/c/83b09a1807415608b387c7bc748d329fefc5617e
https://git.kernel.org/stable/c/bf2b941d0a6f2d3b9f5fa3c4c21bdd54f71ce253
https://git.kernel.org/stable/c/e531db1ea6f98c9612cb2de093a107c7eadfb96c
rh#2266479
CVE-2021-46949kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46949
SMASH Issue 395356
bnc#1220645
https://git.kernel.org/stable/c/5b1faa92289b53cad654123ed2bc8e10f6ddd4ac
https://git.kernel.org/stable/c/98d91180748986bfb6dfb3e72765f3225719a647
https://git.kernel.org/stable/c/a1570985ec04116cc665b760faf666a104154170
https://git.kernel.org/stable/c/fb791572d6747ef385f628450f8d57cd132e6e5a
rh#2266477
CVE-2021-46950kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)CVE-2021-46950
SMASH Issue 395357
bnc#1220662
https://git.kernel.org/stable/c/12216d0919b64ee2ea5dc7a50e455670f44383d5
https://git.kernel.org/stable/c/2417b9869b81882ab90fd5ed1081a1cb2d4db1dd
https://git.kernel.org/stable/c/538244fba59fde17186322776247cd9c05be86dd
https://git.kernel.org/stable/c/59452e551784b7a57a45d971727e9db63b192515
https://git.kernel.org/stable/c/661061a45e32d8b2cc0e306da9f169ad44011382
https://git.kernel.org/stable/c/6920cef604fa57f9409e3960413e9cc11f5c5a40
https://git.kernel.org/stable/c/a6e17cab00fc5bf85472434c52ac751426257c6f
rh#2266504
CVE-2021-46951kernel-source-rt:Already fixedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46951
SMASH Issue 395358
bnc#1220615
https://git.kernel.org/stable/c/2f12258b5224cfaa808c54fd29345f3c1cbfca76
https://git.kernel.org/stable/c/3818b753277f5ca0c170bf5b98e0a5a225542fcb
https://git.kernel.org/stable/c/48cff270b037022e37835d93361646205ca25101
https://git.kernel.org/stable/c/60a01ecc9f68067e4314a0b55148e39e5d58a51b
https://git.kernel.org/stable/c/ac07c557ca12ec9276c0375517bac7ae5be4e50c
rh#2266475
CVE-2021-46952kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46952
SMASH Issue 395359
bnc#1220600
https://git.kernel.org/stable/c/2f3380121d49e829fb73ba86240c181bc32ad897
https://git.kernel.org/stable/c/3d0163821c035040a46d816a42c0780f0f0a30a8
https://git.kernel.org/stable/c/96fa26b74cdcf9f5c98996bf36bec9fb5b19ffe2
https://git.kernel.org/stable/c/c09f11ef35955785f92369e25819bf0629df2e59
rh#2266510
CVE-2021-46953kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46953
SMASH Issue 395360
bnc#1220599
https://git.kernel.org/stable/c/1ecd5b129252249b9bc03d7645a7bda512747277
https://git.kernel.org/stable/c/42e69521ee1fa5abf21f478d147d06bbfe6bf6a8
https://git.kernel.org/stable/c/504632a3577a049dd9bb7aabae5b4476f9c586b4
https://git.kernel.org/stable/c/596e079c362ac17ed02aa1b99fdc444d62072a01
https://git.kernel.org/stable/c/7b2162db1498c71962a4bb2f776fa4e76d4d305b
https://git.kernel.org/stable/c/c3385a9122f8db15b453e07bfc88117fce7f3724
https://git.kernel.org/stable/c/e0f2d86481eaa83df33b0793f75212919db7a19d
rh#2266471
CVE-2021-46954kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46954
SMASH Issue 395361
bnc#1220511
https://git.kernel.org/stable/c/018bb8da5b5888e19585f9b802f036afe643fcef
https://git.kernel.org/stable/c/31fe34a0118e0acc958c802e830ad5d37ef6b1d3
https://git.kernel.org/stable/c/8e6dfb7beeb6489ac1365b8a71052e737f5da76e
rh#2266501
CVE-2021-46956kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46956
SMASH Issue 395363
bnc#1220516
https://git.kernel.org/stable/c/310efc95c72c13faf855c692d19cd4d054d827c8
https://git.kernel.org/stable/c/5116e79fc6e6725b8acdad8b7e928a83ab7b47e6
https://git.kernel.org/stable/c/9b9d60c0eb8ada99cce2a9ab5c15dffc523b01ae
https://git.kernel.org/stable/c/c79c5e0178922a9e092ec8fed026750f39dcaef4
https://git.kernel.org/stable/c/d19555ff225d0896a33246a49279e6d578095f15
rh#2266466
CVE-2021-46957kernel-source-rt:Not affectedmoderate ()CVE-2021-46957
SMASH Issue 395364
bnc#1220518
https://git.kernel.org/stable/c/b1ebaa0e1318494a7637099a26add50509e37964
https://git.kernel.org/stable/c/fd0f06590d35c99f98d12c7984897ec4201a6263
rh#2266463
CVE-2021-46958kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46958
SMASH Issue 395365
bnc#1220521
https://git.kernel.org/stable/c/061dde8245356d8864d29e25207aa4daa0be4d3c
https://git.kernel.org/stable/c/633f7f216663587f17601eaa1cf2ac3d5654874c
https://git.kernel.org/stable/c/a4794be7b00b7eda4b45fffd283ab7d76df7e5d6
https://git.kernel.org/stable/c/e2da98788369bfba1138bada72765c47989a4338
rh#2266461
CVE-2021-46959kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-46959
SMASH Issue 395862
bnc#1220734
https://git.kernel.org/stable/c/001c8e83646ad3b847b18f6ac55a54367d917d74
https://git.kernel.org/stable/c/28a5529068c51cdf0295ab1e11a99a3a909a03e4
https://git.kernel.org/stable/c/62bb2c7f2411a0045c24831f11ecacfc35610815
https://git.kernel.org/stable/c/794aaf01444d4e765e2b067cba01cc69c1c68ed9
https://git.kernel.org/stable/c/8735248ebb918d25427965f0db07939ed0473ec6
https://git.kernel.org/stable/c/8bf96425c90f5c1dcf3b7b9df568019a1d4b8a0e
https://git.kernel.org/stable/c/8e029707f50a82c53172359c686b2536ab54e58c
https://git.kernel.org/stable/c/c7fabe372a9031acd00498bc718ce27c253abfd1
https://git.kernel.org/stable/c/cee78aa24578edac8cf00513dca618c0acc17cd7
rh#2267198
CVE-2021-46960kernel-source-rt:Already fixedlow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2021-46960
SMASH Issue 395366
bnc#1220528
https://git.kernel.org/stable/c/83728cbf366e334301091d5b808add468ab46b27
https://git.kernel.org/stable/c/93f3339b22ba17e66f0808737467b70ba087eaec
https://git.kernel.org/stable/c/aaa0faa5c28a91c362352d6b35dc3ed10df56fb0
https://git.kernel.org/stable/c/b399c1a3ea0b9d10047ff266d65533df7f15532f
https://git.kernel.org/stable/c/e486f8397f3f14a7cadc166138141fdb14379a54
https://git.kernel.org/stable/c/e94851629c49c65b4fbb29a5725ddfd7988f8f20
https://git.kernel.org/stable/c/f59a9242942fef0de7b926e438ba4eae65d4b4dd
rh#2266822
CVE-2021-46962kernel-source-rt:Already fixedmoderate ()CVE-2021-46962
SMASH Issue 395368
bnc#1220532
https://git.kernel.org/stable/c/0d8941b9b2d3e7b3481fdf43b1a6189d162175b7
https://git.kernel.org/stable/c/25ac6ce65f1ab458982d15ec1caf441acd37106a
https://git.kernel.org/stable/c/d6e7fda496978f2763413b5523557b38dc2bf6c2
https://git.kernel.org/stable/c/e29c84857e2d51aa017ce04284b962742fb97d9e
https://git.kernel.org/stable/c/ebe0f12cf4c044f812c6d17011531582f9ac8bb3
rh#2266818
CVE-2021-46964kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46964
SMASH Issue 395370
bnc#1220538
https://git.kernel.org/stable/c/0f86d66b38501e3ac66cf2d9f9f8ad6838bad0e6
https://git.kernel.org/stable/c/4ecd42dec858b6632c5f024fe13e9ad6c30f2734
https://git.kernel.org/stable/c/f02d4086a8f36a0e1aaebf559b54cf24a177a486
rh#2266814
CVE-2021-46965kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2021-46965
SMASH Issue 395371
bnc#1220510
https://git.kernel.org/stable/c/34ec706bf0b7c4ca249a729c1bcb91f706c7a7be
https://git.kernel.org/stable/c/4d786870e3262ec098a3b4ed10b895176bc66ecb
https://git.kernel.org/stable/c/4e4ebb827bf09311469ffd9d0c14ed40ed9747aa
https://git.kernel.org/stable/c/683313993dbe1651c7aa00bb42a041d70e914925
rh#2266812
CVE-2021-46966kernel-source-rt:Already fixedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-46966
SMASH Issue 395372
bnc#1220572
https://git.kernel.org/stable/c/1d53ca5d131074c925ce38361fb0376d3bf7e394
https://git.kernel.org/stable/c/62dc2440ebb552aa0d7f635e1697e077d9d21203
https://git.kernel.org/stable/c/72814a94c38a33239793f7622cec6ace1e540c4b
https://git.kernel.org/stable/c/8b04d57f30caf76649d0567551589af9a66ca9be
https://git.kernel.org/stable/c/90575d1d9311b753cf1718f4ce9061ddda7dfd23
https://git.kernel.org/stable/c/a5b26a2e362f572d87e9fd35435680e557052a17
https://git.kernel.org/stable/c/b7a5baaae212a686ceb812c32fceed79c03c0234
https://git.kernel.org/stable/c/e483bb9a991bdae29a0caa4b3a6d002c968f94aa
https://git.kernel.org/stable/c/f16737caf41fc06cfe6e49048becb09657074d4b
rh#2266808
CVE-2021-46967kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46967
SMASH Issue 395373
bnc#1220527
https://git.kernel.org/stable/c/3a3e0fad16d40a2aa68ddf7eea4acdf48b22dd44
https://git.kernel.org/stable/c/3b8b6399666a29daa30b0bb3f5c9e3fc81c5a6a6
https://git.kernel.org/stable/c/93dbbf20e3ffad14f04227a0b7105f6e6f0387ce
https://git.kernel.org/stable/c/940230a5c31e2714722aee04c521a21f484b4df7
rh#2266804
CVE-2021-46968kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2021-46968
SMASH Issue 395374
bnc#1220689
https://git.kernel.org/stable/c/026499a9c2e002e621ad568d1378324ae97e5524
https://git.kernel.org/stable/c/055a063a18bcd19b93709e3eac8078d6b2f04599
https://git.kernel.org/stable/c/70fac8088cfad9f3b379c9082832b4d7532c16c2
https://git.kernel.org/stable/c/971dc8706cee47393d393905d294ea47e39503d3
rh#2266802
CVE-2021-46969kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2021-46969
SMASH Issue 395375
bnc#1220694
https://git.kernel.org/stable/c/0ecc1c70dcd32c0f081b173a1a5d89952686f271
https://git.kernel.org/stable/c/a99b661c3187365f81026d89b1133a76cd2652b3
rh#2266798
CVE-2021-46970kernel-source-rt:Not affectedlow ()CVE-2021-46970
SMASH Issue 395376
bnc#1220601
https://git.kernel.org/stable/c/0fccbf0a3b690b162f53b13ed8bc442ea33437dc
https://git.kernel.org/stable/c/abd1510c08a13c88d24b622a83c82e87ff1d3135
https://git.kernel.org/stable/c/ed541cff35cbdb695f0c98ef506dd7218883fc07
rh#2266835
CVE-2021-46971kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-46971
SMASH Issue 395377
bnc#1220697
https://git.kernel.org/stable/c/08ef1af4de5fe7de9c6d69f1e22e51b66e385d9b
https://git.kernel.org/stable/c/4348d3b5027bc3ff6336368b6c60605d4ef8e1ce
https://git.kernel.org/stable/c/b246759284d6a2bc5b6f1009caeeb3abce2ec9ff
https://git.kernel.org/stable/c/c7b0208ee370b89d20486fae71cd9abb759819c1
https://git.kernel.org/stable/c/f5809ca4c311b71bfaba6d13f4e39eab0557895e
jsc#CAR-3162
rh#2266833
CVE-2021-46972kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46972
SMASH Issue 395378
bnc#1220609
https://git.kernel.org/stable/c/71d58457a8afc650da5d3292a7f7029317654d95
https://git.kernel.org/stable/c/cf3e3330bc5719fa9d658e3e2f596bde89344a94
https://git.kernel.org/stable/c/d587cfaef72b1b6f4b2774827123bce91f497cc8
https://git.kernel.org/stable/c/eaab1d45cdb4bb0c846bd23c3d666d5b90af7b41
rh#2266831
CVE-2021-46973kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2021-46973
SMASH Issue 395379
bnc#1220699
https://git.kernel.org/stable/c/03c649dee8b1eb5600212a249542a70f47a5ab40
https://git.kernel.org/stable/c/47a017f33943278570c072bc71681809b2567b3a
https://git.kernel.org/stable/c/48ec949ac979b4b42d740f67b6177797af834f80
https://git.kernel.org/stable/c/ea474054c2cc6e1284604b21361f475c7cc8c0a0
rh#2266828
CVE-2021-46974kernel-source-rt:Already fixedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)CVE-2021-46974
SMASH Issue 395380
bnc#1220700
https://git.kernel.org/stable/c/0e2dfdc74a7f4036127356d42ea59388f153f42c
https://git.kernel.org/stable/c/2cfa537674cd1051a3b8111536d77d0558f33d5d
https://git.kernel.org/stable/c/4d542ddb88fb2f39bf7f14caa2902f3e8d06f6ba
https://git.kernel.org/stable/c/53e0db429b37a32b8fc706d0d90eb4583ad13848
https://git.kernel.org/stable/c/6eba92a4d4be8feb4dc33976abac544fa99d6ecc
https://git.kernel.org/stable/c/7cf64d8679ca1cb20cf57d6a88bfee79a0922a66
https://git.kernel.org/stable/c/b9b34ddbe2076ade359cd5ce7537d5ed019e9807
rh#2266826
CVE-2021-46975kernel-source-rt:Not affectedlow3.2 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N)CVE-2021-46975
SMASH Issue 395381
bnc#1220505
https://git.kernel.org/stable/c/2671fa4dc0109d3fb581bc3078fdf17b5d9080f6
https://git.kernel.org/stable/c/671c54ea8c7ff47bd88444f3fffb65bf9799ce43
https://git.kernel.org/stable/c/68122479c128a929f8f7bdd951cfdc8dd0e75b8f
https://git.kernel.org/stable/c/9b288479f7a901a14ce703938596438559d7df55
https://git.kernel.org/stable/c/baea536cf51f8180ab993e374cb134b5edad25e2
https://git.kernel.org/stable/c/d3598eb3915cc0c0d8cab42f4a6258ff44c4033e
https://git.kernel.org/stable/c/da50f56e826e1db141693297afb99370ebc160dd
https://git.kernel.org/stable/c/fbf85a34ce17c4cf0a37ee253f4c582bbfb8231b
rh#2266824
CVE-2021-46976kernel-source-rt:Not affectedmoderate ()CVE-2021-46976
SMASH Issue 395425
bnc#1220621
https://git.kernel.org/stable/c/402be8a101190969fc7ff122d07e262df86e132b
https://git.kernel.org/stable/c/608441de3976c526b02af4d7063093c8adf351e3
https://git.kernel.org/stable/c/805c990a9c54b9451d3daff640b850909c31ab9d
https://git.kernel.org/stable/c/f7520970d5353cb1fa4d9089a1b23669c5da97fe
rh#2266928
CVE-2021-46977kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46977
SMASH Issue 395426
bnc#1220606
https://git.kernel.org/stable/c/31f29749ee970c251b3a7e5b914108425940d089
https://git.kernel.org/stable/c/5104d7ffcf24749939bea7fdb5378d186473f890
https://git.kernel.org/stable/c/5adcdeb57007ccf8ab7ac20bf787ffb6fafb1a94
https://git.kernel.org/stable/c/e3ea1895df719c4ef87862501bb10d95f4177bed
rh#2266924
CVE-2021-46978kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46978
SMASH Issue 395427
bnc#1220610
https://git.kernel.org/stable/c/200a45649ab7361bc80c70aebf7165b64f9a6c9f
https://git.kernel.org/stable/c/bd0e8455b85b651a4c77de9616e307129b15aaa7
https://git.kernel.org/stable/c/c8bf64e3fb77cc19bad146fbe26651985b117194
https://git.kernel.org/stable/c/f5c7e8425f18fdb9bdb7d13340651d7876890329
rh#2266919
CVE-2021-46979kernel-source-rt:Not affectedmoderate ()CVE-2021-46979
SMASH Issue 395428
bnc#1220623
https://git.kernel.org/stable/c/11e1cae5da4096552f7c091476cbadbc0d1817da
https://git.kernel.org/stable/c/901f84de0e16bde10a72d7eb2f2eb73fcde8fa1a
https://git.kernel.org/stable/c/ab6c935ba3a04317632f3b8b68675bdbaf395303
rh#2266917
CVE-2021-46980kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46980
SMASH Issue 395429
bnc#1220663
https://git.kernel.org/stable/c/1f4642b72be79757f050924a9b9673b6a02034bc
https://git.kernel.org/stable/c/5e9c6f58b01e6fdfbc740390c01f542a35c97e57
https://git.kernel.org/stable/c/a453bfd7ef15fd9d524004d3ca7b05353a302911
https://git.kernel.org/stable/c/e5366bea0277425e1868ba20eeb27c879d5a6e2d
rh#2266914
CVE-2021-46981kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46981
SMASH Issue 395430
bnc#1220611
https://git.kernel.org/stable/c/1c4962df938891af9ab4775f5224ef8601764107
https://git.kernel.org/stable/c/54b78ba7e96e5fe1edb8054e375d31a6c0dc60dc
https://git.kernel.org/stable/c/79ebe9110fa458d58f1fceb078e2068d7ad37390
https://git.kernel.org/stable/c/b31d237796fd618379ec8e0f4de3370b5e4aeee7
https://git.kernel.org/stable/c/cde4b55cfb24522dcbba80bbdb0c082303e76c43
rh#2266911
CVE-2021-46982kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46982
SMASH Issue 395431
bnc#1220617
https://git.kernel.org/stable/c/5639b73fd3bc6fc8ca72e3a9ac15aacaabd7ebff
https://git.kernel.org/stable/c/64acb100fe3beb5d20184d0ae3307235bd3555c4
https://git.kernel.org/stable/c/936158b15e2648253afb824d252c910c496d34b5
https://git.kernel.org/stable/c/a949dc5f2c5cfe0c910b664650f45371254c0744
rh#2266908
CVE-2021-46983kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46983
SMASH Issue 395432
bnc#1220639
https://git.kernel.org/stable/c/17fb6dfa5162b89ecfa07df891a53afec321abe8
https://git.kernel.org/stable/c/5bdb34466ad8370546dfa0497594fb1d6f2fed90
https://git.kernel.org/stable/c/64f3410c7bfc389b1a58611d0799f4a36ce4b6b5
https://git.kernel.org/stable/c/8cc365f9559b86802afc0208389f5c8d46b4ad61
rh#2266906
CVE-2021-46984kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46984
SMASH Issue 395433
bnc#1220631
https://git.kernel.org/stable/c/0b6b4b90b74c27bea968c214d820ba4254b903a5
https://git.kernel.org/stable/c/2ef3c76540c49167a0bc3d5f80d00fd1fc4586df
https://git.kernel.org/stable/c/54dbe2d2c1fcabf650c7a8b747601da355cd7f9f
https://git.kernel.org/stable/c/a287cd84e047045f5a4d4da793414e848de627c6
https://git.kernel.org/stable/c/efed9a3337e341bd0989161b97453b52567bc59d
rh#2266750
CVE-2021-46985kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46985
SMASH Issue 395434
bnc#1220620
https://git.kernel.org/stable/c/0c8bd174f0fc131bc9dfab35cd8784f59045da87
https://git.kernel.org/stable/c/5ab9857dde7c3ea3faef6b128d718cf8ba98721b
https://git.kernel.org/stable/c/6901a4f795e0e8d65ae779cb37fc22e0bf294712
https://git.kernel.org/stable/c/69cc821e89ce572884548ac54c4f80eec7a837a5
https://git.kernel.org/stable/c/a7e17a8d421ae23c920240625b4413c7b94d94a4
https://git.kernel.org/stable/c/c5c8f6ffc942cf42f990f22e35bcf4cbe9d8c2fb
https://git.kernel.org/stable/c/dafd4c0b5e835db020cff11c74b4af9493a58e72
https://git.kernel.org/stable/c/e2381174daeae0ca35eddffef02dcc8de8c1ef8a
rh#2266904
CVE-2021-46986kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2021-46986
SMASH Issue 395435
bnc#1220701
https://git.kernel.org/stable/c/1ea775021282d90e1d08d696b7ab54aa75d688e5
https://git.kernel.org/stable/c/b4b8e9601d7ee8806d2687f081a42485d27674a1
https://git.kernel.org/stable/c/bb9c74a5bd1462499fe5ccb1e3c5ac40dcfa9139
https://git.kernel.org/stable/c/bc0cdd72493236fb72b390ad38ce581e353c143c
rh#2266902
CVE-2021-46987kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46987
SMASH Issue 395436
bnc#1220704
https://git.kernel.org/stable/c/96157707c0420e3d3edfe046f1cc797fee117ade
https://git.kernel.org/stable/c/d5347827d0b4b2250cbce6eccaa1c81dc78d8651
https://git.kernel.org/stable/c/f9baa501b4fd6962257853d46ddffbc21f27e344
rh#2266752
CVE-2021-46990kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46990
SMASH Issue 395439
bnc#1220743
https://git.kernel.org/stable/c/0b4eb172cc12dc102cd0ad013e53ee4463db9508
https://git.kernel.org/stable/c/0c25a7bb697f2e6ee65b6d63782f675bf129511a
https://git.kernel.org/stable/c/2db22ba4e0e103f00e0512e0ecce36ac78c644f8
https://git.kernel.org/stable/c/5bc00fdda1e934c557351a9c751a205293e68cbf
https://git.kernel.org/stable/c/8382b15864e5014261b4f36c2aa89723612ee058
https://git.kernel.org/stable/c/aec86b052df6541cc97c5fca44e5934cbea4963b
https://git.kernel.org/stable/c/d2e3590ca39ccfd8a5a46d8c7f095cb6c7b9ae92
https://git.kernel.org/stable/c/dd0d6117052faace5440db20fc37175efe921c7d
https://git.kernel.org/stable/c/ee4b7aab93c2631c3bb0753023c5dda592bb666b
rh#2266896
CVE-2021-46993kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2021-46993
SMASH Issue 395442
bnc#1220622
https://git.kernel.org/stable/c/3da3f804b82a0a382d523a21acf4cf3bb35f936d
https://git.kernel.org/stable/c/42ee47c7e3569d9a0e2cb5053c496d97d380472f
https://git.kernel.org/stable/c/687f523c134b7f0bd040ee1230f6d17990d54172
https://git.kernel.org/stable/c/6d2f8909a5fabb73fe2a63918117943986c39b6c
https://git.kernel.org/stable/c/f7347c85490b92dd144fa1fba9e1eca501656ab3
jsc#CAR-3153
rh#2266888
CVE-2021-46994kernel-source-rt:Not affectedmoderate ()CVE-2021-46994
SMASH Issue 395443
bnc#1220654
https://git.kernel.org/stable/c/03c427147b2d3e503af258711af4fc792b89b0af
https://git.kernel.org/stable/c/6f8f1c27b577de15f69fefce3c502bb6300d825c
https://git.kernel.org/stable/c/e1e10a390fd9479209c4d834d916ca5e6d5d396b
https://git.kernel.org/stable/c/eecb4df8ec9f896b19ee05bfa632ac6c1dcd8f21
rh#2266885
CVE-2021-46995kernel-source-rt:Not affectedmoderate ()CVE-2021-46995
SMASH Issue 395444
bnc#1220655
https://git.kernel.org/stable/c/15f8f96ec7fc35024d4e03296e4d838fcea33d83
https://git.kernel.org/stable/c/4cc7faa406975b460aa674606291dea197c1210c
rh#2266883
CVE-2021-46996kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46996
SMASH Issue 395445
bnc#1220652
https://git.kernel.org/stable/c/2c784a500f5edd337258b0fdb2f31bc9abde1a23
https://git.kernel.org/stable/c/59fa98bfa1f4013d658d990cac88c87b46ff410c
https://git.kernel.org/stable/c/85dfd816fabfc16e71786eda0a33a7046688b5b0
https://git.kernel.org/stable/c/dd3bebf515f336214a91994348a2b86b9a1d3d7f
rh#2266881
CVE-2021-46997kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46997
SMASH Issue 395446
bnc#1220748
https://git.kernel.org/stable/c/4d6a38da8e79e94cbd1344aa90876f0f805db705
https://git.kernel.org/stable/c/51524fa8b5f7b879ba569227738375d283b79382
https://git.kernel.org/stable/c/d8d52005f57bbb4a4ec02f647e2555d327135c68
https://git.kernel.org/stable/c/e67a83f078005461b59b4c776e6b5addd11725fa
rh#2266879
CVE-2021-46998kernel-source-rt:Already fixedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-46998
SMASH Issue 395447
bnc#1220625
https://git.kernel.org/stable/c/25a87b1f566b5eb2af2857a928f0e2310d900976
https://git.kernel.org/stable/c/643001b47adc844ae33510c4bb93c236667008a3
https://git.kernel.org/stable/c/6892396ebf04ea2c021d80e10f4075e014cd7cc3
https://git.kernel.org/stable/c/7afdd6aba95c8a526038e7abe283eeac3e4320f1
https://git.kernel.org/stable/c/d90529392aaf498dafa95d212295d64b2cea4e24
https://git.kernel.org/stable/c/f7f6f07774091a6ddd98500b85386c3c6afb30d3
rh#2266877
CVE-2021-46999kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-46999
SMASH Issue 395448
bnc#1220667
https://git.kernel.org/stable/c/0bfd913c2121b3d553bfd52810fe6061d542d625
https://git.kernel.org/stable/c/35b4f24415c854cd718ccdf38dbea6297f010aae
https://git.kernel.org/stable/c/61b877bad9bb0d82b7d8841be50872557090a704
https://git.kernel.org/stable/c/b1b31948c0af44628e43353828453461bb74098f
https://git.kernel.org/stable/c/d624f2991b977821375fbd56c91b0c91d456a697
https://git.kernel.org/stable/c/f01988ecf3654f805282dce2d3bb9afe68d2691e
rh#2266874
CVE-2021-47000kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47000
SMASH Issue 395449
bnc#1220669
https://git.kernel.org/stable/c/0a219432127d396120fc88cabd82785e0ff72a2f
https://git.kernel.org/stable/c/1775c7ddacfcea29051c67409087578f8f4d751b
https://git.kernel.org/stable/c/22fa4c8288f1ec40f6d62d7a32c57ac176f9f0bc
https://git.kernel.org/stable/c/2ad8af2b70e986284050213230428b823b950a38
https://git.kernel.org/stable/c/bf45c9fe99aa8003d2703f1bd353f956dea47e40
rh#2266871
CVE-2021-47002kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47002
SMASH Issue 395451
bnc#1220676
https://git.kernel.org/stable/c/1e10f58f1c9a6b667b045513c7a4e6111c24fe7c
https://git.kernel.org/stable/c/b9f83ffaa0c096b4c832a43964fe6bff3acffe10
https://git.kernel.org/stable/c/c664aaec9aee544538a78ba4893a44bc73a6d742
rh#2266867
CVE-2021-47003kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47003
SMASH Issue 395452
bnc#1220677
https://git.kernel.org/stable/c/2280b4cc29d8cdd2be3d1b2d1ea4f958e2131c97
https://git.kernel.org/stable/c/28ac8e03c43dfc6a703aa420d18222540b801120
https://git.kernel.org/stable/c/5756f757c72501ef1a16f5f63f940623044180e9
https://git.kernel.org/stable/c/7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa
rh#2266865
CVE-2021-47004kernel-source-rt:Not affectedmoderate ()CVE-2021-47004
SMASH Issue 395453
bnc#1220653
https://git.kernel.org/stable/c/105155a8146ddb54c119d8318964eef3859d109d
https://git.kernel.org/stable/c/1e116f87825f01a6380286472196882746b16f63
https://git.kernel.org/stable/c/211372b2571520e394b56b431a0705586013b3ff
https://git.kernel.org/stable/c/61461fc921b756ae16e64243f72af2bfc2e620db
rh#2266863
CVE-2021-47006kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47006
SMASH Issue 395455
bnc#1220751
https://git.kernel.org/stable/c/3ed8832aeaa9a37b0fc386bb72ff604352567c80
https://git.kernel.org/stable/c/555a70f7fff03bd669123487905c47ae27dbdaac
https://git.kernel.org/stable/c/630146203108bf6b8934eec0dfdb3e46dcb917de
https://git.kernel.org/stable/c/7eeacc6728c5478e3c01bc82a1f08958eaa12366
https://git.kernel.org/stable/c/a506bd5756290821a4314f502b4bafc2afcf5260
https://git.kernel.org/stable/c/a9938d6d78a238d6ab8de57a4d3dcf77adceb9bb
https://git.kernel.org/stable/c/dabe299425b1a53a69461fed7ac8922ea6733a25
https://git.kernel.org/stable/c/ed1f67465327cec4457bb988775245b199da86e6
rh#2266857
CVE-2021-47007kernel-source-rt:Not affectedmoderate ()CVE-2021-47007
SMASH Issue 395456
bnc#1220691
https://git.kernel.org/stable/c/1c20a4896409f5ca1c770e1880c33d0a28a8b10f
https://git.kernel.org/stable/c/3ab0598e6d860ef49d029943ba80f627c15c15d6
https://git.kernel.org/stable/c/822054e5026c43b1dd60cf387dd999e95ee2ecc2
https://git.kernel.org/stable/c/860afd680d9cc1dabd61cda3cd246f60aa1eb705
rh#2266854
CVE-2021-47008kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)CVE-2021-47008
SMASH Issue 395457
bnc#1220596
https://git.kernel.org/stable/c/a3ba26ecfb569f4aa3f867e80c02aa65f20aadad
https://git.kernel.org/stable/c/fb9e14f4f8217a0980f8da2c8ff70dee058cbe47
https://git.kernel.org/stable/c/fd722a57fe0b80133dacae4e1c852ee4212f9b2e
rh#2266851
CVE-2021-47009kernel-source-rt:Not affectedmoderate ()CVE-2021-47009
SMASH Issue 395458
bnc#1220733
https://git.kernel.org/stable/c/1c4031014106aff48e1e686e40101c31eab5d44c
https://git.kernel.org/stable/c/31c9a4b24d86cbb36ff0d7a085725a3b4f0138c8
https://git.kernel.org/stable/c/3e24fbd37e72e8a67b74991970fecc82d14f57af
https://git.kernel.org/stable/c/83a775d5f9bfda95b1c295f95a3a041a40c7f321
rh#2266756
CVE-2021-47010kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)CVE-2021-47010
SMASH Issue 395459
bnc#1220791
https://git.kernel.org/stable/c/6c1ea8bee75df8fe2184a50fcd0f70bf82986f42
https://git.kernel.org/stable/c/8d432592f30fcc34ef5a10aac4887b4897884493
https://git.kernel.org/stable/c/9884f745108f7d25b189bbcd6754e284fb29ab68
https://git.kernel.org/stable/c/992de06308d9a9584d59b96d294ac676f924e437
https://git.kernel.org/stable/c/e7d7bedd507bb732e600403b7a96f9fe48d0ca31
https://git.kernel.org/stable/c/efe1532a6e1a8e3c343d04fff510f0ed80328f9c
rh#2266849
CVE-2021-47011kernel-source-rt:Not affectedmoderate ()CVE-2021-47011
SMASH Issue 395460
bnc#1220793
https://git.kernel.org/stable/c/31df8bc4d3feca9f9c6b2cd06fd64a111ae1a0e6
https://git.kernel.org/stable/c/89b1ed358e01e1b0417f5d3b0082359a23355552
https://git.kernel.org/stable/c/9f38f03ae8d5f57371b71aa6b4275765b65454fd
https://git.kernel.org/stable/c/c3ae6a3f3ca4f02f6ccddf213c027302586580d0
rh#2266847
CVE-2021-47014kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2021-47014
SMASH Issue 395463
bnc#1220630
https://git.kernel.org/stable/c/0648941f4c8bbf8b4b6c0b270889ae7aa769b921
https://git.kernel.org/stable/c/f77bd544a6bbe69aa50d9ed09f13494cf36ff806
rh#2266738
CVE-2021-47015kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47015
SMASH Issue 395464
bnc#1220794
https://git.kernel.org/stable/c/3fbc5bc651d688fbea2a59cdc91520a2f5334d0a
https://git.kernel.org/stable/c/4fcaad2b7dac3f16704f8118c7e481024ddbd3ed
https://git.kernel.org/stable/c/b1523e4ba293b2a32d9fabaf70c1dcaa6e3e2847
https://git.kernel.org/stable/c/bbd6f0a948139970f4a615dff189d9a503681a39
https://git.kernel.org/stable/c/e187ef83c04a5d23e68d39cfdff1a1931e29890c
rh#2266760
CVE-2021-47016kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47016
SMASH Issue 395863
bnc#1220760
https://git.kernel.org/stable/c/1dfb26df15fc7036a74221d43de7427f74293dae
https://git.kernel.org/stable/c/43262178c043032e7c42d00de44c818ba05f9967
https://git.kernel.org/stable/c/5d34225169346cab5145978d153b9ce90e9ace21
https://git.kernel.org/stable/c/73fdeb612d25b5e105c219e05434285a45d23576
https://git.kernel.org/stable/c/f6a90818a32058fca62cda3a2027a6a2364e1878
jsc#CAR-3169
rh#2267200
CVE-2021-47017kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47017
SMASH Issue 395465
bnc#1220678
https://git.kernel.org/stable/c/3b1ac40c6012140828caa79e592a438a18ebf71b
https://git.kernel.org/stable/c/5e413c0831ff4700d1739db3fa3ae9f859744676
https://git.kernel.org/stable/c/8392df5d7e0b6a7d21440da1fc259f9938f4dec3
https://git.kernel.org/stable/c/8bb054fb336f4250002fff4e0b075221c05c3c65
rh#2266588
CVE-2021-47018kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)CVE-2021-47018
SMASH Issue 395466
bnc#1220774
https://git.kernel.org/stable/c/4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd
https://git.kernel.org/stable/c/9ccba66d4d2aff9a3909aa77d57ea8b7cc166f3c
https://git.kernel.org/stable/c/a84df7c80bdac598d6ac9268ae578da6928883e8
https://git.kernel.org/stable/c/abb07dc5e8b61ab7b1dde20dd73aa01a3aeb183f
rh#2266594
CVE-2021-47019kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47019
SMASH Issue 395467
bnc#1220629
https://git.kernel.org/stable/c/b13cbc536990ff609afa878b6211cd6f6265ba60
https://git.kernel.org/stable/c/fe3fccde8870764ba3e60610774bd7bc9f8faeff
rh#2266597
CVE-2021-47020kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2021-47020
SMASH Issue 395864
bnc#1220785
https://git.kernel.org/stable/c/2f17ac005b320c85d686088cfd4c2e7017912b88
https://git.kernel.org/stable/c/342260fe821047c3d515e3d28085d73fbdce3e80
https://git.kernel.org/stable/c/48f17f96a81763c7c8bf5500460a359b9939359f
https://git.kernel.org/stable/c/7c468deae306d0cbbd539408c26cfec04c66159a
https://git.kernel.org/stable/c/870533403ffa28ff63e173045fc5369365642002
https://git.kernel.org/stable/c/effd2bd62b416f6629e18e3ce077c60de14cfdea
rh#2267202
CVE-2021-47021kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47021
SMASH Issue 395468
bnc#1220634
https://git.kernel.org/stable/c/81483309ce861a9fa7835322787f68a443fea364
https://git.kernel.org/stable/c/d754c80ae82a662e692a82faad71b8c218cb7f52
https://git.kernel.org/stable/c/e9d32af478cfc3744a45245c0b126738af4b3ac4
rh#2266961
CVE-2021-47022kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47022
SMASH Issue 395469
bnc#1220635
https://git.kernel.org/stable/c/107bcbb219ac84d885ac63b25246f8d33212bc47
https://git.kernel.org/stable/c/4fa28c807da54c1d720b3cc12e48eb9bea1e2c8f
https://git.kernel.org/stable/c/6c5b2b0c6e5a6ce2d8f9f85b8b72bfad60eaa506
https://git.kernel.org/stable/c/8ab31da7b89f71c4c2defcca989fab7b42f87d71
rh#2266963
CVE-2021-47023kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47023
SMASH Issue 395470
bnc#1220786
https://git.kernel.org/stable/c/0ce6052802be2cb61a57b753e41301339c88c839
https://git.kernel.org/stable/c/333980481b99edb24ebd5d1a53af70a15d9146de
https://git.kernel.org/stable/c/9d1ba11fabdd8f25abb24272ef1621417981320b
https://git.kernel.org/stable/c/b5bba6ede42693f50ce1c9944315cefed7491061
rh#2266965
CVE-2021-47025kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47025
SMASH Issue 395472
bnc#1220788
https://git.kernel.org/stable/c/5cad9e2caa9613fdcd246bd4ebf0ffbec1cba2ca
https://git.kernel.org/stable/c/b34ea31fe013569d42b7e8681ef3f717f77c5b72
rh#2266969
CVE-2021-47026kernel-source-rt:Not affectedmoderate ()CVE-2021-47026
SMASH Issue 395473
bnc#1220685
https://git.kernel.org/stable/c/676171f9405dcaa45a33d18241c32f387dbaae39
https://git.kernel.org/stable/c/7f4a8592ff29f19c5a2ca549d0973821319afaad
https://git.kernel.org/stable/c/b64415c6b3476cf9fa4d0aea3807065b8403a937
https://git.kernel.org/stable/c/d3cca8067d43dfee4a3535c645b55f618708dccb
rh#2266971
CVE-2021-47027kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47027
SMASH Issue 395474
bnc#1220633
https://git.kernel.org/stable/c/a46b536cd60c0dbd4bf767c62a8774dec52bf099
https://git.kernel.org/stable/c/e230f0c44f011f3270680a506b19b7e84c5e8923
rh#2266973
CVE-2021-47028kernel-source-rt:Not affectedlow ()CVE-2021-47028
SMASH Issue 395475
bnc#1220686
https://git.kernel.org/stable/c/4bd926e5ca88eac4d95eacb806b229f8729bc62e
https://git.kernel.org/stable/c/dfc8a71448c7d4fec38fb22bdc8a76d79c14b6da
https://git.kernel.org/stable/c/f43b941fd61003659a3f0e039595e5e525917aa8
rh#2266975
CVE-2021-47029kernel-source-rt:Not affectedlow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47029
SMASH Issue 395476
bnc#1220650
https://git.kernel.org/stable/c/2554b9cb4b5e097c6071ec3ed5bc7c665c477ca7
https://git.kernel.org/stable/c/c996f0346e40e3b1ac2ebaf0681df898fb157f60
rh#2266977
CVE-2021-47030kernel-source-rt:Not affectedmoderate ()CVE-2021-47030
SMASH Issue 395477
bnc#1220656
https://git.kernel.org/stable/c/49cc85059a2cb656f96ff3693f891e8fe8f669a9
https://git.kernel.org/stable/c/54b989653c5531bc4416ced33f146b9cb633d978
rh#2266980
CVE-2021-47031kernel-source-rt:Not affectedlow ()CVE-2021-47031
SMASH Issue 395478
bnc#1220657
https://git.kernel.org/stable/c/4811226374453607175ea057777faa7e7f752204
https://git.kernel.org/stable/c/782b3e86ea970e899f8e723db9f64708a15ca30e
rh#2266982
CVE-2021-47032kernel-source-rt:Not affectedlow ()CVE-2021-47032
SMASH Issue 395479
bnc#1220658
https://git.kernel.org/stable/c/4a9dcd6efb2a268fc5707dcfb3b0c412975c4462
https://git.kernel.org/stable/c/4e7914ce23306b28d377ec395e00e5fde0e6f96e
https://git.kernel.org/stable/c/7dcf3c04f0aca746517a77433b33d40868ca4749
https://git.kernel.org/stable/c/e2cdc9cb33c5963efe1a7c022753386f9463d1b7
rh#2266984
CVE-2021-47033kernel-source-rt:Not affectedlow ()CVE-2021-47033
SMASH Issue 395480
bnc#1220659
https://git.kernel.org/stable/c/75bc5f779a7664d1fc19cb915039439c6e58bb94
https://git.kernel.org/stable/c/821ae236ccea989a1fcc6abfc4d5b74ad4ba39d2
https://git.kernel.org/stable/c/a025277a80add18c33d01042525a74fe5b875f25
https://git.kernel.org/stable/c/ebee7885bb12a8fe2c2f9bac87dbd87a05b645f9
rh#2266988
CVE-2021-47034kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47034
SMASH Issue 395481
bnc#1220687
https://git.kernel.org/stable/c/01ac203e2119d8922126886ddea309fb676f955f
https://git.kernel.org/stable/c/73f9dccb29e4f82574bec2765c0090cdb0404301
https://git.kernel.org/stable/c/84c0762633f2a7ac8399e6b97d3b9bb8e6e1d50f
https://git.kernel.org/stable/c/b3d5d0983388d6c4fb35f7d722556d5595f167a7
https://git.kernel.org/stable/c/b8b2f37cf632434456182e9002d63cbc4cccc50c
https://git.kernel.org/stable/c/e40c52ee67b155ad59f59e73ea136d02685f0e0d
rh#2266990
CVE-2021-47035kernel-source-rt:Not affectedmoderate ()CVE-2021-47035
SMASH Issue 395482
bnc#1220688
https://git.kernel.org/stable/c/25faff78138933244c678c7fc78f7c0340fa04a0
https://git.kernel.org/stable/c/66c24699f266ff310381a9552d3576eea8ad6e20
https://git.kernel.org/stable/c/89bd620798704a8805fc9db0d71d7f812cf5b3d2
https://git.kernel.org/stable/c/c848416cc05afc1589edba04fe00b85c2f797ee3
https://git.kernel.org/stable/c/eea53c5816889ee8b64544fa2e9311a81184ff9c
rh#2266992
CVE-2021-47036kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2021-47036
SMASH Issue 395483
bnc#1220671
https://git.kernel.org/stable/c/18f25dc399901426dff61e676ba603ff52c666f7
https://git.kernel.org/stable/c/450687386cd16d081b58cd7a342acff370a96078
rh#2266994
CVE-2021-47037kernel-source-rt:Not affectedmoderate ()CVE-2021-47037
SMASH Issue 395484
bnc#1220752
https://git.kernel.org/stable/c/62413972f5266568848a36fd15160397b211fa74
https://git.kernel.org/stable/c/6893df3753beafa5f7351228a9dd8157a57d7492
https://git.kernel.org/stable/c/96fadf7e8ff49fdb74754801228942b67c3eeebd
rh#2266996
CVE-2021-47038kernel-source-rt:Not affectedmoderate ()CVE-2021-47038
SMASH Issue 395485
bnc#1220753
https://git.kernel.org/stable/c/17486960d79b900c45e0bb8fbcac0262848582ba
https://git.kernel.org/stable/c/332e69eb3bd90370f2d9f2c2ca7974ff523dea17
https://git.kernel.org/stable/c/7cc0ba67883c6c8d3bddb283f56c167fc837a555
https://git.kernel.org/stable/c/fee71f480bc1dec5f6ae3b0b185ff12a62bceabc
rh#2266998
CVE-2021-47039kernel-source-rt:Not affectedmoderate ()CVE-2021-47039
SMASH Issue 395486
bnc#1220647
https://git.kernel.org/stable/c/07f86aa8f4fe077be1b018cc177eb8c6573e5671
https://git.kernel.org/stable/c/1ffec389a6431782a8a28805830b6fae9bf00af1
https://git.kernel.org/stable/c/2a3a8bbca28b899806844c00d49ed1b7ccb50957
rh#2267001
CVE-2021-47040kernel-source-rt:Not affectedmoderate6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H)CVE-2021-47040
SMASH Issue 395487
bnc#1220754
https://git.kernel.org/stable/c/38134ada0ceea3e848fe993263c0ff6207fd46e7
https://git.kernel.org/stable/c/51bf90901952aaac564bbdb36b2b503050c53dd9
https://git.kernel.org/stable/c/84b8c266c4bfe9ed5128e13253c388deb74b1b03
https://git.kernel.org/stable/c/cbbc13b115b8f18e0a714d89f87fbdc499acfe2d
rh#2267003
CVE-2021-47042kernel-source-rt:Not affectedmoderate ()CVE-2021-47042
SMASH Issue 395489
bnc#1220756
https://git.kernel.org/stable/c/296443139f893b554dddd56a99ba8471ab5802d4
https://git.kernel.org/stable/c/616cf23b6cf40ad6f03ffbddfa1b6c4eb68d8ae1
rh#2267008
CVE-2021-47043kernel-source-rt:Not affectedmoderate ()CVE-2021-47043
SMASH Issue 395490
bnc#1220757
https://git.kernel.org/stable/c/00b68a7478343afdf83f30c43e64db5296057030
https://git.kernel.org/stable/c/5a465c5391a856a0c1e9554964d660676c35d1b2
https://git.kernel.org/stable/c/711acdf0228dc71601247f28b56f13e850e395c8
https://git.kernel.org/stable/c/940d01eceb3a7866fbfca136a55a5625fc75a565
rh#2267010
CVE-2021-47044kernel-source-rt:Not affectedmoderate ()CVE-2021-47044
SMASH Issue 395491
bnc#1220759
https://git.kernel.org/stable/c/2f3eab368e313dba35fc2f51ede778bf7b030b54
https://git.kernel.org/stable/c/39a2a6eb5c9b66ea7c8055026303b3aa681b49a5
https://git.kernel.org/stable/c/805cea93e66ca7deaaf6ad3b67224ce47c104c2f
https://git.kernel.org/stable/c/80862cbf76c2646f709a57c4517aefe0b094c774
rh#2267012
CVE-2021-47045kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47045
SMASH Issue 395492
bnc#1220640
https://git.kernel.org/stable/c/8dd1c125f7f838abad009b64bff5f0a11afe3cb6
https://git.kernel.org/stable/c/9bdcfbed2a9fe24d2c7eaa1bad7c705e18de8cc7
https://git.kernel.org/stable/c/a09677de458d500b00701f6036baa423d9995408
rh#2266724
CVE-2021-47046kernel-source-rt:Not affectedmoderate ()CVE-2021-47046
SMASH Issue 395493
bnc#1220758
https://git.kernel.org/stable/c/080bd41d6478a64edf96704fddcda52b1fd5fed7
https://git.kernel.org/stable/c/403c4528e5887af3deb9838cb77a557631d1e138
https://git.kernel.org/stable/c/6a58310d5d1e5b02d0fc9b393ba540c9367bced5
https://git.kernel.org/stable/c/8e6fafd5a22e7a2eb216f5510db7aab54cc545c1
rh#2267014
CVE-2021-47047kernel-source-rt:Not affectedmoderate ()CVE-2021-47047
SMASH Issue 395494
bnc#1220761
https://git.kernel.org/stable/c/126bdb606fd2802454e6048caef1be3e25dd121e
https://git.kernel.org/stable/c/5980a3b9c933408bc22b0e349b78c3ebd7cbf880
https://git.kernel.org/stable/c/bad5a23cf2b477fa78b85fd392736dae09a1e818
https://git.kernel.org/stable/c/c26c026eb496261dbc0adbf606cc81989cd2038c
rh#2266758
CVE-2021-47048kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47048
SMASH Issue 395495
bnc#1220577
https://git.kernel.org/stable/c/1231279389b5e638bc3b66b9741c94077aed4b5a
https://git.kernel.org/stable/c/23269ac9f123eca3aea7682d3345c02e71ed696c
https://git.kernel.org/stable/c/a2c5bedb2d55dd27c642c7b9fb6886d7ad7bdb58
https://git.kernel.org/stable/c/d67e0d6bd92ebbb0294e7062bbf5cdc773764e62
rh#2266614
CVE-2021-47049kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47049
SMASH Issue 395496
bnc#1220692
https://git.kernel.org/stable/c/2728f289b3270b0e273292b46c534421a33bbfd5
https://git.kernel.org/stable/c/3e9bf43f7f7a46f21ec071cb47be92d0874c48da
https://git.kernel.org/stable/c/d5c7b42c9f56ca46b286daa537d181bd7f69214f
https://git.kernel.org/stable/c/f37dd5d1b5d38a79a4f7b8dd7bbb705505f05560
rh#2267016
CVE-2021-47050kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47050
SMASH Issue 395497
bnc#1220762
https://git.kernel.org/stable/c/59e27d7c94aa02da039b000d33c304c179395801
https://git.kernel.org/stable/c/71bcc1b4a1743534d8abdcb57ff912e6bc390438
https://git.kernel.org/stable/c/a74cb41af7dbe019e4096171f8bc641c7ce910ad
https://git.kernel.org/stable/c/e16acc3a37f09e18835dc5d8014942c2ef6ca957
rh#2266735
CVE-2021-47051kernel-source-rt:Not affectedmoderate ()CVE-2021-47051
SMASH Issue 395498
bnc#1220764
https://git.kernel.org/stable/c/4a01ad002d2e03c399af536562693752af7c81b1
https://git.kernel.org/stable/c/6a2b5cee0d31ab6cc51030c441135b0e31217282
https://git.kernel.org/stable/c/a03675497970a93fcf25d81d9d92a59c2d7377a7
https://git.kernel.org/stable/c/b8207bfc539cd07d15e753ff2d179c5b61c673b1
https://git.kernel.org/stable/c/ce02e58ddf8658a4c3bed2296f32a5873b3f7cce
rh#2266728
CVE-2021-47052kernel-source-rt:Not affectedmoderate ()CVE-2021-47052
SMASH Issue 395499
bnc#1220765
https://git.kernel.org/stable/c/0e596b3734649041ed77edc86a23c0442bbe062b
https://git.kernel.org/stable/c/854b7737199848a91f6adfa0a03cf6f0c46c86e8
https://git.kernel.org/stable/c/b7bd0657c2036add71981d88a7fae50188150b6e
https://git.kernel.org/stable/c/dfd6443bf49ac17adf882ca46c40c506a0284bd6
rh#2266722
CVE-2021-47053kernel-source-rt:Not affectedmoderate ()CVE-2021-47053
SMASH Issue 395500
bnc#1220766
https://git.kernel.org/stable/c/2c67a9333da9d0a3b87310e0d116b7c9070c7b00
https://git.kernel.org/stable/c/50274b01ac1689b1a3f6bc4b5b3dbf361a55dd3a
https://git.kernel.org/stable/c/c633e025bd04f54d7b33331cfcdb71354b08ce59
https://git.kernel.org/stable/c/d3d702084d125689edb2b9395c707e09b471352e
rh#2266720
CVE-2021-47055kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47055
SMASH Issue 395866
bnc#1220768
https://git.kernel.org/stable/c/077259f5e777c3c8821f6b41dee709fcda27306b
https://git.kernel.org/stable/c/1e97743fd180981bef5f01402342bb54bf1c6366
https://git.kernel.org/stable/c/5880afefe0cb9b2d5e801816acd58bfe91a96981
https://git.kernel.org/stable/c/75ed985bd6c8ac1d4e673e93ea9d96c9908c1d37
https://git.kernel.org/stable/c/7b6552719c0ccbbea29dde4be141da54fdb5877e
https://git.kernel.org/stable/c/9625b00cac6630479c0ff4b9fafa88bee636e1f0
https://git.kernel.org/stable/c/a08799d3e8c8088640956237c183f83463c39668
https://git.kernel.org/stable/c/f4d28d8b9b0e7c4ae04214b8d7e0b0466ec6bcaf
https://git.kernel.org/stable/c/f73b29819c6314c0ba8b7d5892dfb03487424bee
rh#2267185
CVE-2021-47056kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47056
SMASH Issue 395867
bnc#1220769
https://git.kernel.org/stable/c/05ec8192ee4bfdf2a8894a68350dac9f1a155fa6
https://git.kernel.org/stable/c/09d16cee6285d37cc76311c29add6d97a7e4acda
https://git.kernel.org/stable/c/1ea500ce6f7c9106e4a561d28e69215f3d451818
https://git.kernel.org/stable/c/1f50392650ae794a1aea41c213c6a3e1c824413c
https://git.kernel.org/stable/c/20fd40fc6f2c2b41dc6f637f88d494b14e9c21f1
https://git.kernel.org/stable/c/446045cf682af12d9294765f6c46084b374b5654
https://git.kernel.org/stable/c/8609f5cfdc872fc3a462efa6a3eca5cb1e2f6446
https://git.kernel.org/stable/c/f4c4e07140687f42bfa40e091bb4a55d7960ce4d
rh#2267183
CVE-2021-47057kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47057
SMASH Issue 395868
bnc#1220780
https://git.kernel.org/stable/c/617ec35ed51f731a593ae7274228ef2cfc9cb781
https://git.kernel.org/stable/c/6516cb852d704ff8d615de1f93cd443a99736c3d
https://git.kernel.org/stable/c/98b5ef3e97b16eaeeedb936f8bda3594ff84a70e
https://git.kernel.org/stable/c/e1f2d739849c3239df1ea3f97d40bade4b808410
rh#2267181
CVE-2021-47058kernel-source-rt:Already fixedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H)CVE-2021-47058
SMASH Issue 395869
bnc#1220779
https://git.kernel.org/stable/c/2dc1554d5f0fdaf47cc5bea442b84b9226fea867
https://git.kernel.org/stable/c/b9e569ae1da3a113b3acee8703c94777fd20938a
https://git.kernel.org/stable/c/c764e375ae647832de1ee73d43a4bb3ef8a8f43d
https://git.kernel.org/stable/c/d8897f7b2283a500666c85ef06e820df38ed7b52
https://git.kernel.org/stable/c/e41a962f82e7afb5b1ee644f48ad0b3aee656268
https://git.kernel.org/stable/c/eb949f891226c012138ffd9df90d1e509f428ae6
rh#2267179
CVE-2021-47059kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47059
SMASH Issue 395870
bnc#1220781
https://git.kernel.org/stable/c/1dbc6a1e25be8575d6c4114d1d2b841a796507f7
https://git.kernel.org/stable/c/1f12aaf07f61122cf5074d29714ee26f8d44b0e7
https://git.kernel.org/stable/c/50e7b39b808430ad49a637dc6fb72ca93b451b13
https://git.kernel.org/stable/c/ca065a93699f8cf3f42c60eefed73086007e928e
rh#2267177
CVE-2021-47062kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47062
SMASH Issue 395873
bnc#1220747
https://git.kernel.org/stable/c/ba7bf5d6336aa9c0d977b161bfa420c56d46ee40
https://git.kernel.org/stable/c/bd0cced2ae93195668f983d443f7f17e8efd24d2
https://git.kernel.org/stable/c/c36b16d29f3af5f32fc1b2a3401bf48f71cabee1
rh#2267171
CVE-2021-47063kernel-source-rt:Already fixedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47063
SMASH Issue 395874
bnc#1220777
https://git.kernel.org/stable/c/18149b420c9bd93c443e8d1f48a063d71d9f6aa1
https://git.kernel.org/stable/c/4d906839d321c2efbf3fed4bc31ffd9ff55b75c0
https://git.kernel.org/stable/c/98d7d76a74e48ec3ddf2e23950adff7edcab9327
https://git.kernel.org/stable/c/ce450934a00cf896e648fde08d0bd1426653d7a2
rh#2267169
CVE-2021-47064kernel-source-rt:Not affectedlow3.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2021-47064
SMASH Issue 395875
bnc#1220741
https://git.kernel.org/stable/c/91b9548d413fda488ea853cd1b9f59b572db3a0c
https://git.kernel.org/stable/c/9b68ce2856dadc0e1cb6fd21fbeb850da49efd08
https://git.kernel.org/stable/c/9fa26701cd1fc4d932d431971efc5746325bdfce
https://git.kernel.org/stable/c/b4403cee6400c5f679e9c4a82b91d61aa961eccf
rh#2267167
CVE-2021-47065kernel-source-rt:Already fixedmoderate6.3 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H)CVE-2021-47065
SMASH Issue 395876
bnc#1220749
https://git.kernel.org/stable/c/2ff25985ea9ccc6c9af2c77b0b49045adcc62e0e
https://git.kernel.org/stable/c/5f3dbced8eaa5c9ed7d6943f3fea99f235a6516a
https://git.kernel.org/stable/c/6b5aa0cf321c25f41e09a61c83ee4dc7ab9549cb
https://git.kernel.org/stable/c/95fb153c6027924cda3422120169d1890737f3a0
https://git.kernel.org/stable/c/9cd09722e18a08b6a3d68b8bccfac39ddc22434c
rh#2267165
CVE-2021-47066kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H)CVE-2021-47066
SMASH Issue 395877
bnc#1220782
https://git.kernel.org/stable/c/29ffa50f33de824b5491f8239c88c4a0efdd03af
https://git.kernel.org/stable/c/53f8208e11abd6dde9480dfcb97fecdb1bc2ac18
https://git.kernel.org/stable/c/cab2e8e5997b592fdb7d02cf2387b4b8e3057174
https://git.kernel.org/stable/c/ceaf2966ab082bbc4d26516f97b3ca8a676e2af8
rh#2267162
CVE-2021-47067kernel-source-rt:Not affectedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47067
SMASH Issue 395878
bnc#1220750
https://git.kernel.org/stable/c/a1ad124c836816fac8bd5e461d36eaf33cee4e24
https://git.kernel.org/stable/c/dc4452867200fa94589b382740952b58aa1c3e6c
https://git.kernel.org/stable/c/ef85bb582c41524e9e68dfdbde48e519dac4ab3d
https://git.kernel.org/stable/c/ff39adf5d31c72025bba799aec69c5c86d81d549
rh#2267192
CVE-2021-47068kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47068
L3:68040
SMASH Issue 395879
bnc#1220739
bnc#1221130
https://git.kernel.org/stable/c/18175fe17ae043a0b81e5d511f8817825784c299
https://git.kernel.org/stable/c/18ae4a192a4496e48a5490b52812645d2413307c
https://git.kernel.org/stable/c/26157c82ba756767b2bd66d28a71b1bc454447f6
https://git.kernel.org/stable/c/374cdde4dcc9c909a60713abdbbf96d5e3e09f91
https://git.kernel.org/stable/c/48fba458fe54cc2a980a05c13e6c19b8b2cfb610
https://git.kernel.org/stable/c/6b7021ed36dabf29e56842e3408781cd3b82ef6e
https://git.kernel.org/stable/c/c61760e6940dd4039a7f5e84a6afc9cdbf4d82b6
https://git.kernel.org/stable/c/ccddad6dd28530e716448e594c9ca7c76ccd0570
https://git.kernel.org/stable/c/e32352070bcac22be6ed8ab635debc280bb65b8c
rh#2267190
CVE-2021-47069kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47069
SMASH Issue 396007
bnc#1220826
https://git.kernel.org/stable/c/4528c0c323085e645b8765913b4a7fd42cf49b65
https://git.kernel.org/stable/c/807fa14536b26803b858da878b643be72952a097
https://git.kernel.org/stable/c/a11ddb37bf367e6b5239b95ca759e5389bb46048
rh#2267513
CVE-2021-47070kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2021-47070
SMASH Issue 396008
bnc#1220829
https://git.kernel.org/stable/c/0b0226be3a52dadd965644bc52a807961c2c26df
https://git.kernel.org/stable/c/5f59240cf25b2f7a0fdffc2701482a70310fec07
rh#2267516
CVE-2021-47071kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2021-47071
SMASH Issue 396009
bnc#1220846
https://git.kernel.org/stable/c/3ee098f96b8b6c1a98f7f97915f8873164e6af9d
https://git.kernel.org/stable/c/53486c467e356e06aa37047c984fccd64d78c827
https://git.kernel.org/stable/c/cdd91637d4ef33e2be19a8e16e72e7d00c996d76
https://git.kernel.org/stable/c/d84b5e912212b05f6b5bde9f682046accfbe0354
rh#2267373
CVE-2021-47072kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47072
SMASH Issue 396010
bnc#1220847
https://git.kernel.org/stable/c/54a40fc3a1da21b52dbf19f72fdc27a2ec740760
https://git.kernel.org/stable/c/6d0924c5b742036b4f20a0ffdf2b6cf3f963f5f6
rh#2267370
CVE-2021-47073kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47073
SMASH Issue 396011
bnc#1220850
https://git.kernel.org/stable/c/0cf036a0d325200e6c27b90908e51195bbc557b1
https://git.kernel.org/stable/c/3a53587423d25c87af4b4126a806a0575104b45e
https://git.kernel.org/stable/c/6fa78a6b9a3beb676a010dc489c1257f7e432525
https://git.kernel.org/stable/c/75cfc833da4a2111106d4c134e93e0c7f41e35e7
https://git.kernel.org/stable/c/8d746ea7c687bab060a2c05a35c449302406cd52
rh#2267518
CVE-2021-47075kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2021-47075
SMASH Issue 396013
bnc#1220856
https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb
https://git.kernel.org/stable/c/afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a
https://git.kernel.org/stable/c/fec356a61aa3d3a66416b4321f1279e09e0f256f
jsc#CAR-3178
rh#2267523
CVE-2021-47077kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47077
SMASH Issue 396015
bnc#1220861
https://git.kernel.org/stable/c/11014efcec378bb0050a6cf08eaf375e3693400a
https://git.kernel.org/stable/c/73578af92a0fae6609b955fcc9113e50e413c80f
https://git.kernel.org/stable/c/a6362a737572f66051deb7637f3f77ddf7a4402f
rh#2267527
CVE-2021-47079kernel-source-rt:Not affectedmoderate ()CVE-2021-47079
SMASH Issue 396017
bnc#1220841
https://git.kernel.org/stable/c/beab753fe3b4e087411a850a64c6cd748544d8a1
https://git.kernel.org/stable/c/ff67dbd554b2aaa22be933eced32610ff90209dd
rh#2267531
CVE-2021-47080kernel-source-rt:Not affectedmoderate ()CVE-2021-47080
SMASH Issue 396018
bnc#1220842
https://git.kernel.org/stable/c/54d87913f147a983589923c7f651f97de9af5be1
https://git.kernel.org/stable/c/66ab7fcdac34b890017f04f391507ef5b2b89a13
https://git.kernel.org/stable/c/e6871b4270c05f8b212e7d98aee82b357972c80a
rh#2267533
CVE-2021-47081kernel-source-rt:Not affectedmoderate ()CVE-2021-47081
SMASH Issue 396019
bnc#1220844
https://git.kernel.org/stable/c/115726c5d312b462c9d9931ea42becdfa838a076
https://git.kernel.org/stable/c/b49f5af30b0e4064fbd91e83823a4bfcb2c7a3e7
rh#2267535
CVE-2021-47084kernel-source-rt:Not affectedmoderate4.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2021-47084
SMASH Issue 396230
bnc#1220922
https://git.kernel.org/stable/c/3e0588c291d6ce225f2b891753ca41d45ba42469
https://git.kernel.org/stable/c/450121075a6a6f1d50f97225d3396315309d61a1
https://git.kernel.org/stable/c/896193a02a2981e60c40d4614fd095ce92135ccd
https://git.kernel.org/stable/c/8a1a314965a17c62084a056b4f2cb7a770854c90
https://git.kernel.org/stable/c/b5b193d0c67180fefdc664650138e3b7959df615
https://git.kernel.org/stable/c/cb6c99aedd2c843056a598a8907a6128cb07603b
https://git.kernel.org/stable/c/eaa816a86e629cbcc0a94f38391fee09231628c7
https://git.kernel.org/stable/c/ef5f7bfa19e3fc366f4c6d1a841ceaddf7a9f5d4
rh#2267941
CVE-2021-47085kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47085
SMASH Issue 396231
bnc#1220951
https://git.kernel.org/stable/c/03d00f7f1815ec00dab5035851b3de83afd054a8
https://git.kernel.org/stable/c/371a874ea06f147d6ca30be43dad33683965eba6
https://git.kernel.org/stable/c/7dd52af1eb5798f590d9d9e1c56ed8f5744ee0ca
https://git.kernel.org/stable/c/83ba6ec97c74fb1a60f7779a26b6a94b28741d8a
https://git.kernel.org/stable/c/a5c6a13e9056d87805ba3042c208fbd4164ad22b
https://git.kernel.org/stable/c/a7b0ae2cc486fcb601f9f9d87d98138cc7b7f7f9
https://git.kernel.org/stable/c/b2f37aead1b82a770c48b5d583f35ec22aabb61e
https://git.kernel.org/stable/c/b68f41c6320b2b7fbb54a95f07a69f3dc7e56c59
rh#2267940
CVE-2021-47086kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47086
SMASH Issue 396232
bnc#1220952
https://git.kernel.org/stable/c/0bbdd62ce9d44f3a22059b3d20a0df977d9f6d59
https://git.kernel.org/stable/c/311601f114859d586d5ef8833d60d3aa23282161
https://git.kernel.org/stable/c/48c76fc53582e7f13c1e0b11c916e503256c4d0b
https://git.kernel.org/stable/c/52ad5da8e316fa11e3a50b3f089aa63e4089bf52
https://git.kernel.org/stable/c/53ccdc73eedaf0e922c45b569b797d2796fbaafa
https://git.kernel.org/stable/c/75a2f31520095600f650597c0ac41f48b5ba0068
https://git.kernel.org/stable/c/982b6ba1ce626ef87e5c29f26f2401897554f235
https://git.kernel.org/stable/c/b10c7d745615a092a50c2e03ce70446d2bec2aca
rh#2267939
CVE-2021-47087kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2021-47087
SMASH Issue 396233
bnc#1220954
https://git.kernel.org/stable/c/18549bf4b21c739a9def39f27dcac53e27286ab5
https://git.kernel.org/stable/c/806142c805cacd098e61bdc0f72c778a2389fe4a
https://git.kernel.org/stable/c/91e94e42f6fc49635f1a16d8ae3f79552bcfda29
https://git.kernel.org/stable/c/ad338d825e3f7b96ee542bf313728af2d19fe9ad
rh#2267938
CVE-2021-47088kernel-source-rt:Not affectedimportant ()CVE-2021-47088
SMASH Issue 396234
bnc#1220956
https://git.kernel.org/stable/c/330c6117a82c16a9a365a51cec5c9ab30b13245c
https://git.kernel.org/stable/c/34796417964b8d0aef45a99cf6c2d20cebe33733
rh#2267937
CVE-2021-47089kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47089
SMASH Issue 396235
bnc#1220958
https://git.kernel.org/stable/c/0129ab1f268b6cf88825eae819b9b84aa0a85634
https://git.kernel.org/stable/c/2f06c8293d27f6337f907042c602c9c953988c48
rh#2267936
CVE-2021-47090kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47090
SMASH Issue 396236
bnc#1220948
https://git.kernel.org/stable/c/1f207076740101fed87074a6bc924dbe806f08a5
https://git.kernel.org/stable/c/2a57d83c78f889bf3f54eede908d0643c40d5418
https://git.kernel.org/stable/c/c691e7575eff76e563b0199c23ec46bd454f43e3
rh#2267935
CVE-2021-47091kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47091
SMASH Issue 396237
bnc#1220959
https://git.kernel.org/stable/c/87a270625a89fc841f1a7e21aae6176543d8385c
https://git.kernel.org/stable/c/ac61b9c6c0549aaeb98194cf429d93c41bfe5f79
https://git.kernel.org/stable/c/c1d1ec4db5f7264cfc21993e59e8f2dcecf4b44f
rh#2267934
CVE-2021-47092kernel-source-rt:Not affectedlow3.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L)CVE-2021-47092
SMASH Issue 396238
bnc#1220950
https://git.kernel.org/stable/c/a80dfc025924024d2c61a4c1b8ef62b2fce76a04
https://git.kernel.org/stable/c/e4e4e7cb229821cd215031abc47efdab5486a67c
rh#2267932
CVE-2021-47093kernel-source-rt:Not affectedmoderate6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H)CVE-2021-47093
SMASH Issue 396239
bnc#1220978
https://git.kernel.org/stable/c/26a8b09437804fabfb1db080d676b96c0de68e7c
https://git.kernel.org/stable/c/7a37f2e370699e2feca3dca6c8178c71ceee7e8a
https://git.kernel.org/stable/c/9ca1324755f1f8629a370af5cc315b175331f5d1
rh#2267931
CVE-2021-47094kernel-source-rt:Not affectedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H)CVE-2021-47094
SMASH Issue 396240
bnc#1221551
bnc#1222401
https://git.kernel.org/stable/c/3a0f64de479cae75effb630a2e0a237ca0d0623c
https://git.kernel.org/stable/c/d884eefd75cc54887bc2e9e724207443525dfb2c
rh#2267929
CVE-2021-47095kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47095
SMASH Issue 396241
bnc#1220979
https://git.kernel.org/stable/c/1f6ab847461ce7dd89ae9db2dd4658c993355d7c
https://git.kernel.org/stable/c/34f35f8f14bc406efc06ee4ff73202c6fd245d15
https://git.kernel.org/stable/c/77a7311ca167aa5b7055c549a940a56e73ee5f29
https://git.kernel.org/stable/c/8efd6a3391f7b0b19fb0c38e50add06ca30c94af
rh#2267928
CVE-2021-47096kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2021-47096
SMASH Issue 396242
bnc#1220981
https://git.kernel.org/stable/c/39a8fc4971a00d22536aeb7d446ee4a97810611b
https://git.kernel.org/stable/c/b398fcbe4de1e1100867fdb6f447c6fbc8fe7085
rh#2267927
CVE-2021-47097kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47097
SMASH Issue 396243
bnc#1220982
https://git.kernel.org/stable/c/1d72d9f960ccf1052a0630a68c3d358791dbdaaa
https://git.kernel.org/stable/c/676c572439e58b7ee6b7ca3f1e5595382921045c
https://git.kernel.org/stable/c/a7f95328c6f0afffdc4555f16e3bbab8bbf0d9be
https://git.kernel.org/stable/c/dfd5b60b5342b6b505a104e48f08ad9b9bdbbd7b
rh#2267925
CVE-2021-47098kernel-source-rt:Not affectedmoderate ()CVE-2021-47098
SMASH Issue 396244
bnc#1220983
https://git.kernel.org/stable/c/55840b9eae5367b5d5b29619dc2fb7e4596dba46
https://git.kernel.org/stable/c/d105f30bea9104c590a9e5b495cb8a49bdfe405f
rh#2267920
CVE-2021-47099kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47099
SMASH Issue 396245
bnc#1220955
https://git.kernel.org/stable/c/9695b7de5b4760ed22132aca919570c0190cb0ce
https://git.kernel.org/stable/c/d2269ae48598e05b59ec9ea9e6e44fd33941130d
rh#2267919
CVE-2021-47102kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47102
SMASH Issue 396248
bnc#1221009
https://git.kernel.org/stable/c/2efc2256febf214e7b2bdaa21fe6c3c3146acdcb
https://git.kernel.org/stable/c/5c553a0cd1263e4da5f220d80fa713fc3959c1d0
rh#2267915
CVE-2021-47104kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2021-47104
SMASH Issue 396253
bnc#1220960
https://git.kernel.org/stable/c/0aaec9c5f60754b56f84460ea439b8c5e91f4caa
https://git.kernel.org/stable/c/1ced0a3015a95c6a6db45e37250912c4c86697ab
https://git.kernel.org/stable/c/76b648063eb36c72dfc0a6896de8a0a7d2c7841c
https://git.kernel.org/stable/c/79dcbd8176152b860028b62f81a635d987365752
https://git.kernel.org/stable/c/7cf6466e00a77b0a914b7b2c28a1fc7947d55e59
https://git.kernel.org/stable/c/aefcc25f3a0cd28a87d11d41d30419a12cd26a34
https://git.kernel.org/stable/c/bee90911e0138c76ee67458ac0d58b38a3190f65
https://git.kernel.org/stable/c/d53456492b5d02033c73dfa0f3b94c86337791ba
rh#2267828
CVE-2021-47105kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47105
SMASH Issue 396254
bnc#1220961
https://git.kernel.org/stable/c/ad6d20da2cfbe14b7b1200d15f39e65988b0b9e8
https://git.kernel.org/stable/c/afe8a3ba85ec2a6b6849367e25c06a2f8e0ddd05
jsc#CAR-3193
rh#2267912
CVE-2021-47106kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2021-47106
SMASH Issue 396255
bnc#1220962
https://git.kernel.org/stable/c/0f7d9b31ce7abdbb29bf018131ac920c9f698518
https://git.kernel.org/stable/c/9d558e5f0d6fdd0a568f73dceb0b40c4f5012e5a
rh#2267829
CVE-2021-47107kernel-source-rt:Not affectedmoderate6.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2021-47107
SMASH Issue 396256
bnc#1220965
https://git.kernel.org/stable/c/53b1119a6e5028b125f431a0116ba73510d82a72
https://git.kernel.org/stable/c/9e291a6a28d32545ed2fd959a8165144d1724df1
https://git.kernel.org/stable/c/eabc0aab98e5218ceecd82069b0d6fdfff5ee885
rh#2267911
CVE-2021-47108kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47108
SMASH Issue 396257
bnc#1220986
https://git.kernel.org/stable/c/3b8e19a0aa3933a785be9f1541afd8d398c4ec69
https://git.kernel.org/stable/c/71d07ebc5000b9c1d140e99e7493b0bafa954776
rh#2267910
CVE-2021-47110kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47110
SMASH Issue 397844
bnc#1221532
https://git.kernel.org/stable/c/1df2dc09926f61319116c80ee85701df33577d70
https://git.kernel.org/stable/c/3b0becf8b1ecf642a9edaf4c9628ffc641e490d6
https://git.kernel.org/stable/c/9084fe1b3572664ad276f427dce575f580c9799a
https://git.kernel.org/stable/c/c02027b5742b5aa804ef08a4a9db433295533046
rh#2269873
CVE-2021-47111kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47111
SMASH Issue 397845
bnc#1221536
https://git.kernel.org/stable/c/107866a8eb0b664675a260f1ba0655010fac1e08
https://git.kernel.org/stable/c/6b53db8c4c14b4e7256f058d202908b54a7b85b4
https://git.kernel.org/stable/c/caec9bcaeb1a5f03f2d406305355c853af10c13e
rh#2269871
CVE-2021-47112kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47112
SMASH Issue 397846
bnc#1221541
https://git.kernel.org/stable/c/38b858da1c58ad46519a257764e059e663b59ff2
https://git.kernel.org/stable/c/7620a669111b52f224d006dea9e1e688e2d62c54
https://git.kernel.org/stable/c/8b79feffeca28c5459458fe78676b081e87c93a4
https://git.kernel.org/stable/c/d1629b5b925de9b27979e929dae7fcb766daf6b6
rh#2269869
CVE-2021-47114kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47114
SMASH Issue 397848
bnc#1221548
https://git.kernel.org/stable/c/0a31dd6fd2f4e7db538fb6eb1f06973d81f8dd3b
https://git.kernel.org/stable/c/33e03adafb29eedae1bae9cdb50c1385279fcf65
https://git.kernel.org/stable/c/624fa7baa3788dc9e57840ba5b94bc22b03cda57
https://git.kernel.org/stable/c/6bba4471f0cc1296fe3c2089b9e52442d3074b2e
https://git.kernel.org/stable/c/a1700479524bb9cb5e8ae720236a6fabd003acae
https://git.kernel.org/stable/c/c8d5faee46242c3f33b8a71a4d7d52214785bfcc
https://git.kernel.org/stable/c/cc2edb99ea606a45182b5ea38cc8f4e583aa0774
https://git.kernel.org/stable/c/cec4e857ffaa8c447f51cd8ab4e72350077b6770
rh#2269865
CVE-2021-47115kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47115
SMASH Issue 397849
bnc#1221572
https://git.kernel.org/stable/c/0c4559736d9a4ec1ca58ba98ca34e7c4da4c422b
https://git.kernel.org/stable/c/39c15bd2e5d11bcf7f4c3dba2aad9e1e110a5d94
https://git.kernel.org/stable/c/48ee0db61c8299022ec88c79ad137f290196cac2
https://git.kernel.org/stable/c/4ac06a1e013cf5fdd963317ffd3b968560f33bba
https://git.kernel.org/stable/c/5d4c4b06ed9fb7a69d0b2e2a73fc73226d25ab70
https://git.kernel.org/stable/c/93e4ac2a9979a9a4ecc158409ed9c3044dc0ae1f
https://git.kernel.org/stable/c/eb6875d48590d8e564092e831ff07fa384d7e477
https://git.kernel.org/stable/c/ffff05b9ee5c74c04bba2801c1f99b31975d74d9
rh#2269863
CVE-2021-47116kernel-source-rt:Not affectedmoderate ()CVE-2021-47116
SMASH Issue 397850
bnc#1221574
https://git.kernel.org/stable/c/04fb2baa0b147f51db065a1b13a11954abe592d0
https://git.kernel.org/stable/c/2050c6e5b161e5e25ce3c420fef58b24fa388a49
https://git.kernel.org/stable/c/a8867f4e3809050571c98de7a2d465aff5e4daf5
rh#2269861
CVE-2021-47117kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47117
SMASH Issue 397851
bnc#1221575
https://git.kernel.org/stable/c/082cd4ec240b8734a82a89ffb890216ac98fec68
https://git.kernel.org/stable/c/48105dc98c9ca35af418746277b087cb2bc6df7c
https://git.kernel.org/stable/c/569496aa3776eea1ff0d49d0174ac1b7e861e107
https://git.kernel.org/stable/c/5b3a9a2be59478b013a430ac57b0f3d65471b071
https://git.kernel.org/stable/c/920697b004e49cb026e2e15fe91be065bf0741b7
https://git.kernel.org/stable/c/d3b668b96ad3192c0581a248ae2f596cd054792a
https://git.kernel.org/stable/c/d8116743ef5432336289256b2f7c117299213eb9
https://git.kernel.org/stable/c/e33bafad30d34cfa5e9787cb099cab05e2677fcb
rh#2269859
CVE-2021-47118kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47118
SMASH Issue 397852
bnc#1221605
https://git.kernel.org/stable/c/0711f0d7050b9e07c44bc159bbc64ac0a1022c7f
https://git.kernel.org/stable/c/2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff
https://git.kernel.org/stable/c/4dbd8808a591b49b717862e6e0081bcf14a87788
https://git.kernel.org/stable/c/7178be006d495ffb741c329012da289b62dddfe6
https://git.kernel.org/stable/c/764c2e892d1fe895392aff62fb353fdce43bb529
https://git.kernel.org/stable/c/b8ff869f20152fbe66b6c2e2715d26a2f9897cca
https://git.kernel.org/stable/c/d106f05432e60f9f62d456ef017687f5c73cb414
https://git.kernel.org/stable/c/f86c80515a8a3703e0ca2e56deb50fc2879c5ea4
rh#2269856
CVE-2021-47119kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47119
SMASH Issue 397853
bnc#1221608
https://git.kernel.org/stable/c/01d349a481f0591230300a9171330136f9159bcd
https://git.kernel.org/stable/c/1385b23396d511d5233b8b921ac3058b3f86a5e1
https://git.kernel.org/stable/c/afd09b617db3786b6ef3dc43e28fe728cfea84df
rh#2269854
CVE-2021-47120kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47120
SMASH Issue 397854
bnc#1221606
https://git.kernel.org/stable/c/368c5d45a87e1bcc7f1e98e0c255c37b7b12c5d6
https://git.kernel.org/stable/c/4b4f6cecca446abcb686c6e6c451d4f1ec1a7497
https://git.kernel.org/stable/c/9cf27473f21913a3eaf4702dd2a25415afd5f33f
https://git.kernel.org/stable/c/b5d013c4c76b276890135b5d32803c4c63924b77
rh#2269850
CVE-2021-47121kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47121
SMASH Issue 397855
bnc#1221535
https://git.kernel.org/stable/c/46403c1f80b0d3f937ff9c4f5edc63bb64bc5051
https://git.kernel.org/stable/c/4d94f530cd24c85aede6e72b8923f371b45d6886
https://git.kernel.org/stable/c/7f5d86669fa4d485523ddb1d212e0a2d90bd62bb
https://git.kernel.org/stable/c/81afc61cb6e2b553f2c5f992fa79e0ae73857141
https://git.kernel.org/stable/c/9ea0ab48e755d8f29fe89eb235fb86176fdb597f
https://git.kernel.org/stable/c/cc302e30a504e6b60a9ac8df7988646f46cd0294
https://git.kernel.org/stable/c/dde8686985ec24d6b00487080a906609bd613ea1
https://git.kernel.org/stable/c/e8b37f5009ea7095529790f022859711e6939c76
rh#2269848
CVE-2021-47122kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47122
SMASH Issue 397856
bnc#1221537
https://git.kernel.org/stable/c/3be863c11cab725add9fef4237ed4e232c3fc3bb
https://git.kernel.org/stable/c/4bca2034b41c15b62d47a19158bb76235fd4455d
https://git.kernel.org/stable/c/6a0e317f61094d377335547e015dd2ff12caf893
https://git.kernel.org/stable/c/9348c1f10932f13b299cbc8b1bd5f780751fae49
https://git.kernel.org/stable/c/af2806345a37313f01b1c9f15e046745b8ee2daa
https://git.kernel.org/stable/c/b042e2b2039565eb8f0eb51c14fbe1ef463c8cd8
https://git.kernel.org/stable/c/b53558a950a89824938e9811eddfc8efcd94e1bb
https://git.kernel.org/stable/c/f52f4fd67264c70cd0b4ba326962ebe12d9cba94
rh#2269845
CVE-2021-47123kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47123
SMASH Issue 397857
bnc#1221547
bnc#1221758
https://git.kernel.org/stable/c/1f64f5e903b9d1d157875721e02adadc9d6f0a5d
https://git.kernel.org/stable/c/447c19f3b5074409c794b350b10306e1da1ef4ba
rh#2269843
CVE-2021-47124kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47124
SMASH Issue 397858
bnc#1221549
https://git.kernel.org/stable/c/0b2a990e5d2f76d020cb840c456e6ec5f0c27530
https://git.kernel.org/stable/c/6f5d7a45f58d3abe3a936de1441b8d6318f978ff
https://git.kernel.org/stable/c/876808dba2ff7509bdd7f230c4f374a0caf4f410
https://git.kernel.org/stable/c/a298232ee6b9a1d5d732aa497ff8be0d45b5bd82
https://git.kernel.org/stable/c/ff4a96ba5c8f9b266706280ff8021d2ef3f17e86
rh#2269841
CVE-2021-47125kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47125
SMASH Issue 397859
bnc#1221554
https://git.kernel.org/stable/c/2411c02d03892a5057499f8102d0cc1e0f852416
https://git.kernel.org/stable/c/944d671d5faa0d78980a3da5c0f04960ef1ad893
rh#2269839
CVE-2021-47127kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47127
SMASH Issue 397861
bnc#1221558
https://git.kernel.org/stable/c/1d34fa4fcf06649036ba0c97854fcf7a741ee18c
https://git.kernel.org/stable/c/e102db780e1c14f10c70dafa7684af22a745b51d
rh#2269834
CVE-2021-47128kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47128
SMASH Issue 397862
bnc#1221559
https://git.kernel.org/stable/c/acc43fc6cf0d50612193813c5906a1ab9d433e1e
https://git.kernel.org/stable/c/ff40e51043af63715ab413995ff46996ecf9583f
https://git.kernel.org/stable/c/ff5039ec75c83d2ed5b781dc7733420ee8c985fc
rh#2269831
CVE-2021-47130kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47130
SMASH Issue 397864
bnc#1221552
https://git.kernel.org/stable/c/8a452d62e7cea3c8a2676a3b89a9118755a1a271
https://git.kernel.org/stable/c/bcd9a0797d73eeff659582f23277e7ab6e5f18f3
https://git.kernel.org/stable/c/c440cd080761b18a52cac20f2a42e5da1e3995af
rh#2269826
CVE-2021-47132kernel-source-rt:Not affectedmoderate6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2021-47132
SMASH Issue 397866
bnc#1221550
https://git.kernel.org/stable/c/b5941f066b4ca331db225a976dae1d6ca8cf0ae3
https://git.kernel.org/stable/c/b9c78b1a95966a7bd2ddae05b73eafc0cda4fba3
rh#2269818
CVE-2021-47133kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47133
SMASH Issue 397867
bnc#1221542
https://git.kernel.org/stable/c/29beadea66a226d744d5ffdcde6b984623053d24
https://git.kernel.org/stable/c/5ad755fd2b326aa2bc8910b0eb351ee6aece21b1
rh#2269816
CVE-2021-47134kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47134
SMASH Issue 397868
bnc#1221540
https://git.kernel.org/stable/c/5148066edbdc89c6fe5bc419c31a5c22e5f83bdb
https://git.kernel.org/stable/c/668a84c1bfb2b3fd5a10847825a854d63fac7baa
https://git.kernel.org/stable/c/8a7e8b4e5631a03ea2fee27957857a56612108ca
rh#2269814
CVE-2021-47135kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47135
SMASH Issue 397869
bnc#1221560
https://git.kernel.org/stable/c/6919e8a24e70b6ba148fe07f44f835bcdd1a8d02
https://git.kernel.org/stable/c/d874e6c06952382897d35bf4094193cd44ae91bd
rh#2269812
CVE-2021-47136kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2021-47136
SMASH Issue 398783
bnc#1221931
https://git.kernel.org/stable/c/86ab133b695ed7ba1f8786b12f4ca43137ad8c18
https://git.kernel.org/stable/c/9453d45ecb6c2199d72e73c993e9d98677a2801b
https://git.kernel.org/stable/c/ac493452e937b8939eaf2d24cac51a4804b6c20e
rh#2271498
CVE-2021-47137kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2021-47137
SMASH Issue 398784
bnc#1221932
https://git.kernel.org/stable/c/46dd4abced3cb2c912916f4a5353e0927db0c4a2
https://git.kernel.org/stable/c/5ac72351655f8b033a2935646f53b7465c903418
https://git.kernel.org/stable/c/8bb1077448d43a871ed667520763e3b9f9b7975d
https://git.kernel.org/stable/c/c7718ee96dbc2f9c5fc3b578abdf296dd44b9c20
jsc#CAR-3248
rh#2271499
CVE-2021-47138kernel-source-rt:Already fixedmoderate4.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2021-47138
SMASH Issue 398785
bnc#1221934
https://git.kernel.org/stable/c/02f03883fdb10ad7e66717c70ea163a8d27ae6e7
https://git.kernel.org/stable/c/0bf49b3c8d8b3a43ce09f1b2db70e5484d31fcdf
https://git.kernel.org/stable/c/285207a558ab456aa7d8aa877ecc7e91fcc51710
https://git.kernel.org/stable/c/88c380df84fbd03f9b137c2b9d0a44b9f2f553b0
rh#2271484
CVE-2021-47139kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47139
SMASH Issue 398786
bnc#1221935
https://git.kernel.org/stable/c/0921a0620b5077796fddffb22a8e6bc635a4bb50
https://git.kernel.org/stable/c/a289a7e5c1d49b7d47df9913c1cc81fb48fab613
https://git.kernel.org/stable/c/a663c1e418a3b5b8e8edfad4bc8e7278c312d6fc
rh#2271483
CVE-2021-47140kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47140
SMASH Issue 398787
bnc#1221930
https://git.kernel.org/stable/c/d6177a6556f853785867e2ec6d5b7f4906f0d809
https://git.kernel.org/stable/c/f3f2cf46291a693eab21adb94171b0128c2a9ec1
rh#2271482
CVE-2021-47141kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47141
SMASH Issue 398788
bnc#1221949
https://git.kernel.org/stable/c/5218e919c8d06279884aa0baf76778a6817d5b93
https://git.kernel.org/stable/c/5278c75266c5094d3c0958793bf12fc90300e580
https://git.kernel.org/stable/c/821149ee88c206fa37e79c1868cc270518484876
https://git.kernel.org/stable/c/da21a35c00ff1a1794d4f166d3b3fa8db4d0f6fb
rh#2271481
CVE-2021-47142kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47142
SMASH Issue 398789
bnc#1221952
https://git.kernel.org/stable/c/0707c3fea8102d211631ba515ef2159707561b0d
https://git.kernel.org/stable/c/1e5c37385097c35911b0f8a0c67ffd10ee1af9a2
https://git.kernel.org/stable/c/3293cf3513d69f00c14d43e2020826d45ea0e46a
https://git.kernel.org/stable/c/7398c2aab4da960761ec182d04d6d5abbb4a226e
https://git.kernel.org/stable/c/952ab3f9f48eb0e8050596d41951cf516be6b122
https://git.kernel.org/stable/c/a849e218556f932576c0fb1c5a88714b61709a17
https://git.kernel.org/stable/c/d4ea141fd4b40636a8326df5a377d9c5cf9b3faa
https://git.kernel.org/stable/c/f98cdf084405333ee2f5be548a91b2d168e49276
rh#2271480
CVE-2021-47144kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47144
SMASH Issue 398791
bnc#1221989
https://git.kernel.org/stable/c/599e5d61ace952b0bb9bd942b198bbd0cfded1d7
https://git.kernel.org/stable/c/95a4ec905e51a30c64cf2d78b04a7acbeae5ca94
https://git.kernel.org/stable/c/9fdb8ed37a3a44f9c49372b69f87fd5f61cb3240
https://git.kernel.org/stable/c/dde2656e0bbb2ac7d83a7bd95a8d5c3c95bbc009
https://git.kernel.org/stable/c/fa7e6abc75f3d491bc561734312d065dc9dc2a77
rh#2271478
CVE-2021-47147kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47147
SMASH Issue 398794
bnc#1221975
https://git.kernel.org/stable/c/0e38e702f1152479e6afac34f151dbfd99417f99
https://git.kernel.org/stable/c/9c1bb37f8cad5e2ee1933fa1da9a6baa7876a8e4
rh#2271496
CVE-2021-47148kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47148
SMASH Issue 398795
bnc#1221976
https://git.kernel.org/stable/c/389146bc6d2bbb20714d06624b74856320ce40f7
https://git.kernel.org/stable/c/e5cc361e21648b75f935f9571d4003aaee480214
rh#2271495
CVE-2021-47149kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47149
SMASH Issue 398796
bnc#1221972
https://git.kernel.org/stable/c/22049c3d40f08facd1867548716a484dad6b3251
https://git.kernel.org/stable/c/52202be1cd996cde6e8969a128dc27ee45a7cb5e
https://git.kernel.org/stable/c/6dbf1101594f7c76990b63c35b5a40205a914b6b
https://git.kernel.org/stable/c/71723a796ab7881f491d663c6cd94b29be5fba50
https://git.kernel.org/stable/c/7883d3895d0fbb0ba9bff0f8665f99974b45210f
https://git.kernel.org/stable/c/b92170e209f7746ed72eaac98f2c2f4b9af734e6
https://git.kernel.org/stable/c/c4f1c23edbe921ab2ecd6140d700e756cd44c5f7
https://git.kernel.org/stable/c/f14bf57a08779a5dee9936f63ada0149ea89c5e6
rh#2271488
CVE-2021-47151kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47151
SMASH Issue 398798
bnc#1221971
https://git.kernel.org/stable/c/4e3cea8035b6f1b9055e69cc6ebf9fa4e50763ae
https://git.kernel.org/stable/c/93d1dbe7043b3c9492bdf396b2e98a008435b55b
https://git.kernel.org/stable/c/a00593737f8bac2c9e97b696e7ff84a4446653e8
rh#2271485
CVE-2021-47152kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47152
SMASH Issue 398799
bnc#1221968
https://git.kernel.org/stable/c/18e7f0580da15cac1e79d73683ada5a9e70980f8
https://git.kernel.org/stable/c/29249eac5225429b898f278230a6ca2baa1ae154
https://git.kernel.org/stable/c/3267a061096efc91eda52c2a0c61ba76e46e4b34
rh#2271475
CVE-2021-47153kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47153
SMASH Issue 398800
bnc#1221969
https://git.kernel.org/stable/c/04cc05e3716ae31b17ecdab7bc55c8170def1b8b
https://git.kernel.org/stable/c/09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3
https://git.kernel.org/stable/c/1f583d3813f204449037cd2acbfc09168171362a
https://git.kernel.org/stable/c/b523feb7e8e44652f92f3babb953a976e7ccbbef
https://git.kernel.org/stable/c/c70e1ba2e7e65255a0ce004f531dd90dada97a8c
https://git.kernel.org/stable/c/dfa8929e117b0228a7765f5c3f5988a4a028f3c6
https://git.kernel.org/stable/c/e4d8716c3dcec47f1557024add24e1f3c09eb24b
https://git.kernel.org/stable/c/f9469082126cebb7337db3992d143f5e4edfe629
rh#2271476
CVE-2021-47161kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47161
SMASH Issue 398814
bnc#1221966
https://git.kernel.org/stable/c/00450ed03a17143e2433b461a656ef9cd17c2f1d
https://git.kernel.org/stable/c/10a089bae827ec30ad9b6cb7048020a62fae0cfa
https://git.kernel.org/stable/c/12391be4724acc9269e1845ccbd881df37de4b56
https://git.kernel.org/stable/c/15d1cc4b4b585f9a2ce72c52cca004d5d735bdf1
https://git.kernel.org/stable/c/680ec0549a055eb464dce6ffb4bfb736ef87236e
https://git.kernel.org/stable/c/fe6921e3b8451a537e01c031b8212366bb386e3e
rh#2271460
CVE-2021-47164kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47164
SMASH Issue 398808
bnc#1221978
https://git.kernel.org/stable/c/2e4b0b95a489259f9d35a3db17023061f8f3d587
https://git.kernel.org/stable/c/83026d83186bc48bb41ee4872f339b83f31dfc55
https://git.kernel.org/stable/c/bdfd3593a8248eea6ecfcbf7b47b56b86515672d
rh#2271451
CVE-2021-47165kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47165
SMASH Issue 398806
bnc#1221965
https://git.kernel.org/stable/c/4ce2bf20b4a6e307e114847d60b2bf40a6a1fac0
https://git.kernel.org/stable/c/7cfc4ea78fc103ea51ecbacd9236abb5b1c490d2
https://git.kernel.org/stable/c/b4298d33c1fcce511ffe84d8d3de07e220300f9b
https://git.kernel.org/stable/c/b4b91033a0b11fe9ade58156cd9168f89f4a8c1a
https://git.kernel.org/stable/c/d66083c0d6f5125a4d982aa177dd71ab4cd3d212
https://git.kernel.org/stable/c/e256a0eb43e17209e347409a80805b1659398d68
rh#2271448
CVE-2021-47166kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47166
L3:68117
L3:68118
L3:68119
L3:68120
L3:68123
L3:68126
L3:68151
SMASH Issue 398816
bnc#1221998
https://git.kernel.org/stable/c/0d0ea309357dea0d85a82815f02157eb7fcda39f
https://git.kernel.org/stable/c/2fe1cac336b55a1f79e603e9ce3552c3623e90eb
https://git.kernel.org/stable/c/40f139a6d50c232c0d1fd1c5e65a845c62db0ede
https://git.kernel.org/stable/c/7087db95c0a06ab201b8ebfac6a7ec1e34257997
https://git.kernel.org/stable/c/785917316b25685c9b3a2a88f933139f2de75e33
https://git.kernel.org/stable/c/b291baae24f876acd5a5dd57d0bb2bbac8a68b0c
https://git.kernel.org/stable/c/c757c1f1e65d89429db1409429436cf40d47c008
https://git.kernel.org/stable/c/e8b8418ce14ae66ee55179901edd12191ab06a9e
rh#2271443
CVE-2021-47167kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47167
L3:68117
L3:68118
L3:68119
L3:68120
L3:68123
L3:68126
L3:68151
SMASH Issue 398817
bnc#1221991
https://git.kernel.org/stable/c/15ac6f14787649e8ebd75c142e2c5d2a243c8490
https://git.kernel.org/stable/c/1fc5f4eb9d31268ac3ce152d74ad5501ad24ca3e
https://git.kernel.org/stable/c/56517ab958b7c11030e626250c00b9b1a24b41eb
https://git.kernel.org/stable/c/ee21cd3aa8548e0cbc8c67a80b62113aedd2d101
rh#2271433
CVE-2021-47168kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47168
SMASH Issue 398818
bnc#1222002
https://git.kernel.org/stable/c/769b01ea68b6c49dc3cde6adf7e53927dacbd3a8
https://git.kernel.org/stable/c/945ebef997227ca8c20bad7f8a8358c8ee57a84a
https://git.kernel.org/stable/c/9b367fe770b1b80d7bf64ed0d177544a44405f6e
https://git.kernel.org/stable/c/9d280ab53df1d4a1043bd7a9e7c6a2f9cfbfe040
https://git.kernel.org/stable/c/b287521e9e94bb342ebe5fd8c3fd7db9aef4e6f1
https://git.kernel.org/stable/c/d34fb628f6ef522f996205a9e578216bbee09e84
https://git.kernel.org/stable/c/e411df81cd862ef3d5b878120b2a2fef0ca9cdb1
https://git.kernel.org/stable/c/f299522eda1566cbfbae4b15c82970fc41b03714
rh#2271432
CVE-2021-47169kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47169
SMASH Issue 398819
bnc#1222000
https://git.kernel.org/stable/c/016002848c82eeb5d460489ce392d91fe18c475c
https://git.kernel.org/stable/c/1cc57cb32c84e059bd158494f746b665fc14d1b1
https://git.kernel.org/stable/c/1e04d5d5fe5e76af68f834e1941fcbfa439653be
https://git.kernel.org/stable/c/35265552c7fe9553c75e324c80f45e28ff14eb6e
https://git.kernel.org/stable/c/6a931ceb0b9401fe18d0c500e08164bf9cc7be4b
https://git.kernel.org/stable/c/915452f40e2f495e187276c4407a4f567ec2307e
https://git.kernel.org/stable/c/9b07b6973f7359e2dd6a9fe6db0c142634c823b7
https://git.kernel.org/stable/c/c697244ce940ec07e2d745ccb63ca97fc0266fbc
rh#2271471
CVE-2021-47170kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47170
SMASH Issue 398820
bnc#1222004
https://git.kernel.org/stable/c/2ab21d6e1411999b5fb43434f421f00bf50002eb
https://git.kernel.org/stable/c/2c835fede13e03f2743a333e4370b5ed2db91e83
https://git.kernel.org/stable/c/4f2629ea67e7225c3fd292c7fe4f5b3c9d6392de
https://git.kernel.org/stable/c/8d83f109e920d2776991fa142bb904d985dca2ed
https://git.kernel.org/stable/c/9f7cb3f01a10d9064cf13b3d26fb7e7a5827d098
rh#2271470
CVE-2021-47171kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47171
SMASH Issue 398821
bnc#1221994
https://git.kernel.org/stable/c/200dbfcad8011e50c3cec269ed7b980836eeb1fa
https://git.kernel.org/stable/c/22c840596af0c09068b6cf948616e6496e59e07f
https://git.kernel.org/stable/c/46a8b29c6306d8bbfd92b614ef65a47c900d8e70
https://git.kernel.org/stable/c/635ac38b36255d3cfb8312cf7c471334f4d537e0
https://git.kernel.org/stable/c/70c886ac93f87ae7214a0c69151a28a8075dd95b
https://git.kernel.org/stable/c/9e6a3eccb28779710cbbafc4f4258d92509c6d07
https://git.kernel.org/stable/c/9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc
https://git.kernel.org/stable/c/b95fb96e6339e34694dd578fb6bde3575b01af17
rh#2271469
CVE-2021-47172kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47172
SMASH Issue 398822
bnc#1221992
https://git.kernel.org/stable/c/26da8040eccc6c6b0e415e9a3baf72fd39eb2fdc
https://git.kernel.org/stable/c/f2a772c51206b0c3f262e4f6a3812c89a650191b
https://git.kernel.org/stable/c/f49149964d2423fb618fb6b755bb1eaa431cca2c
https://git.kernel.org/stable/c/f70122825076117787b91e7f219e21c09f11a5b9
rh#2271468
CVE-2021-47173kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47173
SMASH Issue 398809
bnc#1221993
https://git.kernel.org/stable/c/36b5ff1db1a4ef4fdbc2bae364344279f033ad88
https://git.kernel.org/stable/c/386918878ce4cd676e4607233866e03c9399a46a
https://git.kernel.org/stable/c/5394ae9d8c7961dd93807fdf1b12a1dde96b0a55
https://git.kernel.org/stable/c/5f46b2410db2c8f26b8bb91b40deebf4ec184391
https://git.kernel.org/stable/c/7889c70e6173ef358f3cd7578db127a489035a42
https://git.kernel.org/stable/c/a3c3face38cb49932c62adcc1289914f1c742096
https://git.kernel.org/stable/c/bcb30cc8f8befcbdbcf7a016e4dfd4747c54a364
https://git.kernel.org/stable/c/dcb4b8ad6a448532d8b681b5d1a7036210b622de
rh#2271467
CVE-2021-47174kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47174
SMASH Issue 398823
bnc#1221990
https://git.kernel.org/stable/c/727a2b4fc951ee69847d4904d98961856ea9fbe6
https://git.kernel.org/stable/c/b1f45a26bd322525c14edd9504f6d46dfad679a4
https://git.kernel.org/stable/c/f0b3d338064e1fe7531f0d2977e35f3b334abfb4
rh#2271466
CVE-2021-47175kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47175
SMASH Issue 398824
bnc#1222003
https://git.kernel.org/stable/c/7a1bdec12e43e29cc34a4394590337069d8812ce
https://git.kernel.org/stable/c/e6294c06e7c62ffdd5bf3df696d3a4fcbb753d3c
https://git.kernel.org/stable/c/e70f7a11876a1a788ceadf75e9e5f7af2c868680
rh#2271465
CVE-2021-47176kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47176
SMASH Issue 398811
bnc#1221996
https://git.kernel.org/stable/c/6a16810068e70959bc1df686424aa35ce05578f1
https://git.kernel.org/stable/c/a16be88a3d7e5efcb59a15edea87a8bd369630c6
https://git.kernel.org/stable/c/aa8579bc084673c651204f7cd0d6308a47dffc16
https://git.kernel.org/stable/c/c0c8a8397fa8a74d04915f4d3d28cb4a5d401427
rh#2271463
CVE-2021-47177kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47177
SMASH Issue 398825
bnc#1221997
https://git.kernel.org/stable/c/044bbe8b92ab4e542de7f6c93c88ea65cccd8e29
https://git.kernel.org/stable/c/0ee74d5a48635c848c20f152d0d488bf84641304
https://git.kernel.org/stable/c/22da9f4978381a99f1abaeaf6c9b83be6ab5ddd8
https://git.kernel.org/stable/c/2ec5e9bb6b0560c90d315559c28a99723c80b996
https://git.kernel.org/stable/c/ca466561eef36d1ec657673e3944eb6340bddb5b
https://git.kernel.org/stable/c/f01134321d04f47c718bb41b799bcdeda27873d2
rh#2271462
CVE-2021-47178kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47178
SMASH Issue 398805
bnc#1221995
https://git.kernel.org/stable/c/70ca3c57ff914113f681e657634f7fbfa68e1ad1
https://git.kernel.org/stable/c/a20b6eaf4f35046a429cde57bee7eb5f13d6857f
https://git.kernel.org/stable/c/a222d2794c53f8165de20aa91b39e35e4b72bce9
rh#2271461
CVE-2021-47179kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47179
L3:68117
L3:68118
L3:68119
L3:68120
L3:68123
L3:68126
L3:68151
SMASH Issue 398826
bnc#1222001
https://git.kernel.org/stable/c/39785761feadf261bc5101372b0b0bbaf6a94494
https://git.kernel.org/stable/c/42637ca25c7d7b5a92804a679af5192e8c1a9f48
https://git.kernel.org/stable/c/4e1ba532dbc1a0e19fc2458d74ab8d98680c4e42
https://git.kernel.org/stable/c/a421d218603ffa822a0b8045055c03eae394a7eb
https://git.kernel.org/stable/c/aba3c7795f51717ae316f3566442dee7cc3eeccb
https://git.kernel.org/stable/c/b090d110e66636bca473fd8b98d5c97b555a965a
https://git.kernel.org/stable/c/f9890652185b72b8de9ebeb4406037640b6e1b53
rh#2271459
CVE-2021-47180kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47180
SMASH Issue 398827
bnc#1221999
https://git.kernel.org/stable/c/0365701bc44e078682ee1224866a71897495c7ef
https://git.kernel.org/stable/c/2c2fb2df46ea866b49fea5ec7112ec3cd4896c74
https://git.kernel.org/stable/c/448a1cb12977f52142e6feb12022c59662d88dc1
https://git.kernel.org/stable/c/4a621621c7af3cec21c47c349b30cd9c3cea11c8
https://git.kernel.org/stable/c/65234f50a90b64b335cbb9164b8a98c2a0d031dd
https://git.kernel.org/stable/c/af2a4426baf71163c0c354580ae98c7888a9aba7
https://git.kernel.org/stable/c/b34cb7ac32cc8e5471dc773180ea9ae676b1a745
https://git.kernel.org/stable/c/e0652f8bb44d6294eeeac06d703185357f25d50b
rh#2271458
CVE-2021-47181kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47181
SMASH Issue 401354
bnc#1222660
https://git.kernel.org/stable/c/06cfb4cb2241e704d72e3045cf4d7dfb567fbce0
https://git.kernel.org/stable/c/14651496a3de6807a17c310f63c894ea0c5d858e
https://git.kernel.org/stable/c/1ba7605856e05fa991d4654ac69e5ace66c767b9
https://git.kernel.org/stable/c/28be095eb612a489705d38c210afaf1103c5f4f8
https://git.kernel.org/stable/c/3ee15f1af17407be381bcf06a78fa60b471242dd
https://git.kernel.org/stable/c/679eee466d0f9ffa60a2b0c6ec19be5128927f04
https://git.kernel.org/stable/c/b3f43659eb0b9af2e6ef18a8d829374610b19e7a
https://git.kernel.org/stable/c/f87a79c04a33ab4e5be598c7b0867e6ef193d702
rh#2274628
CVE-2021-47183kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47183
SMASH Issue 401332
bnc#1222664
https://git.kernel.org/stable/c/1854f53ccd88ad4e7568ddfafafffe71f1ceb0a6
https://git.kernel.org/stable/c/28de48a7cea495ab48082d9ff4ef63f7cb4e563a
rh#2274626
CVE-2021-47184kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47184
SMASH Issue 401331
bnc#1222666
https://git.kernel.org/stable/c/37d9e304acd903a445df8208b8a13d707902dea6
https://git.kernel.org/stable/c/78f2a9e831f9610e3655a0be5e675e1aa2472089
https://git.kernel.org/stable/c/87c421ab4a43433cb009fea44bbbc77f46913e1d
https://git.kernel.org/stable/c/c30162da91327e4cdf7cd03079f096bb3654738c
https://git.kernel.org/stable/c/e91e8427a1e1633a0261e3bb0201c836ac5b3890
https://git.kernel.org/stable/c/f866513ead4370402428ef724b03c3312295c178
rh#2274625
CVE-2021-47185kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47185
SMASH Issue 401367
bnc#1222669
https://git.kernel.org/stable/c/0380f643f3a7a61b0845cdc738959c2ad5735d61
https://git.kernel.org/stable/c/3968ddcf05fb4b9409cd1859feb06a5b0550a1c1
https://git.kernel.org/stable/c/4c1623651a0936ee197859824cdae6ebbd04d3ed
https://git.kernel.org/stable/c/4f300f47dbcf9c3d4b2ea76c8554c8f360400725
https://git.kernel.org/stable/c/5c34486f04700f1ba04907231dce0cc2705c2d7d
https://git.kernel.org/stable/c/77e9fed33056f2a88eba9dd4d2d5412f0c7d1f41
https://git.kernel.org/stable/c/b1ffc16ec05ae40d82b6e373322d62e9d6b54fbc
https://git.kernel.org/stable/c/d491c84df5c469dd9621863b6a770b3428137063
rh#2274624
CVE-2021-47186kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47186
SMASH Issue 401368
bnc#1222702
https://git.kernel.org/stable/c/3e6db079751afd527bf3db32314ae938dc571916
https://git.kernel.org/stable/c/9404c4145542c23019a80ab1bb2ecf73cd057b10
https://git.kernel.org/stable/c/a7d91625863d4ffed63b993b5e6dc1298b6430c9
rh#2274623
CVE-2021-47187kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47187
SMASH Issue 401352
bnc#1222703
https://git.kernel.org/stable/c/118c826ef8b43efe0fda8faf419673707ee8c5e5
https://git.kernel.org/stable/c/3f1dcaff642e75c1d2ad03f783fa8a3b1f56dd50
https://git.kernel.org/stable/c/a14d7038ea201c5526375becfc43b9ba281b1e82
https://git.kernel.org/stable/c/e52fecdd0c142b95c720683885b06ee3f0e065c8
rh#2274622
CVE-2021-47189kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47189
SMASH Issue 401369
bnc#1222706
https://git.kernel.org/stable/c/45da9c1767ac31857df572f0a909fbe88fd5a7e9
https://git.kernel.org/stable/c/47e6f9f69153247109042010f3a77579e9dc61ff
https://git.kernel.org/stable/c/637d652d351fd4f263ef302dc52f3971d314e500
https://git.kernel.org/stable/c/670f6b3867c8f0f11e5097f353b164cecfec6179
https://git.kernel.org/stable/c/6adbc07ebcaf8bead08b21687d49e0fc94400987
https://git.kernel.org/stable/c/804a9d239ae9cbe88e861a7cd62319cc6ec7b136
https://git.kernel.org/stable/c/bd660a20fea3ec60a49709ef5360f145ec0fe779
https://git.kernel.org/stable/c/ed058d735a70f4b063323f1a7bb33cda0f987513
rh#2274620
CVE-2021-47192kernel-source-rt:Not affectedmoderate ()CVE-2021-47192
SMASH Issue 401339
bnc#1222867
https://git.kernel.org/stable/c/4edd8cd4e86dd3047e5294bbefcc0a08f66a430f
https://git.kernel.org/stable/c/a792e0128d232251edb5fdf42fb0f9fbb0b44a73
https://git.kernel.org/stable/c/bcc0e3175a976b7fa9a353960808adb0bb49ead8
https://git.kernel.org/stable/c/edd783162bf2385b43de6764f2d4c6e9f4f6be27
rh#2274617
CVE-2021-47193kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47193
SMASH Issue 401337
bnc#1222879
https://git.kernel.org/stable/c/269a4311b15f68d24e816f43f123888f241ed13d
https://git.kernel.org/stable/c/51e6ed83bb4ade7c360551fa4ae55c4eacea354b
rh#2274616
CVE-2021-47194kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47194
SMASH Issue 401329
bnc#1222829
https://git.kernel.org/stable/c/0738cdb636c21ab552eaecf905efa4a6070e3ebc
https://git.kernel.org/stable/c/4e458abbb4a523f1413bfe15c079cf4e24c15b21
https://git.kernel.org/stable/c/52affc201fc22a1ab9a59ef0ed641a9adfcb8d13
https://git.kernel.org/stable/c/563fbefed46ae4c1f70cffb8eb54c02df480b2c2
https://git.kernel.org/stable/c/5a9b671c8d74a3e1b999e7a0c7f366079bcc93dd
https://git.kernel.org/stable/c/7b97b5776daa0b39dbdadfea176f9cc0646d4a66
https://git.kernel.org/stable/c/8f06bb8c216bcd172394f61e557727e691b4cb24
https://git.kernel.org/stable/c/b8a045e2a9b234cfbc06cf36923886164358ddec
rh#2274615
CVE-2021-47195kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47195
SMASH Issue 401358
bnc#1222832
https://git.kernel.org/stable/c/37330f37f6666c7739a44b2b6b95b047ccdbed2d
https://git.kernel.org/stable/c/6c53b45c71b4920b5e62f0ea8079a1da382b9434
rh#2274614
CVE-2021-47196kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47196
SMASH Issue 401366
bnc#1222773
https://git.kernel.org/stable/c/6cd7397d01c4a3e09757840299e4f114f0aa5fa0
https://git.kernel.org/stable/c/b70e072feffa0ba5c41a99b9524b9878dee7748e
rh#2274613
CVE-2021-47197kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47197
SMASH Issue 401333
bnc#1222776
https://git.kernel.org/stable/c/2ae38157080616a13a9fe3f0b4b6ec0070aa408a
https://git.kernel.org/stable/c/471c492890557bd58f73314bb4ad85d5a8fd5026
https://git.kernel.org/stable/c/76ded29d3fcda4928da8849ffc446ea46871c1c2
rh#2274612
CVE-2021-47198kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47198
SMASH Issue 401326
bnc#1222883
https://git.kernel.org/stable/c/79b20beccea3a3938a8500acef4e6b9d7c66142f
https://git.kernel.org/stable/c/dbebf865b3239595c1d4dba063b122862583b52a
rh#2274611
CVE-2021-47199kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47199
SMASH Issue 401356
bnc#1222785
https://git.kernel.org/stable/c/486e8de6e233ff2999493533c6259d1cb538653b
https://git.kernel.org/stable/c/806401c20a0f9c51b6c8fd7035671e6ca841f6c2
rh#2274610
CVE-2021-47200kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47200
SMASH Issue 401351
bnc#1222838
https://git.kernel.org/stable/c/4f8e469a2384dfa4047145b0093126462cbb6dc0
https://git.kernel.org/stable/c/8244a3bc27b3efd057da154b8d7e414670d5044f
rh#2274609
CVE-2021-47202kernel-source-rt:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47202
SMASH Issue 401373
bnc#1222878
https://git.kernel.org/stable/c/0750f769b95841b34a9fe8c418dd792ff526bf86
https://git.kernel.org/stable/c/6a315471cb6a07f651e1d3adc8962730f4fcccac
https://git.kernel.org/stable/c/828f4c31684da94ecf0b44a2cbd35bbede04f0bd
https://git.kernel.org/stable/c/96cfe05051fd8543cdedd6807ec59a0e6c409195
https://git.kernel.org/stable/c/ef2590a5305e0b8e9342f84c2214aa478ee7f28e
rh#2274607
CVE-2021-47203kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47203
SMASH Issue 401371
bnc#1222881
https://git.kernel.org/stable/c/16bcbfb56d759c25665f786e33ec633b9508a08f
https://git.kernel.org/stable/c/814d3610c4ce86e8cf285b2cdac0057a42e82de5
https://git.kernel.org/stable/c/99154581b05c8fb22607afb7c3d66c1bace6aa5d
https://git.kernel.org/stable/c/ad4776b5eb2e58af1226847fcd3b4f6d051674dd
https://git.kernel.org/stable/c/b291d147d0268e93ad866f8bc820ea14497abc9b
https://git.kernel.org/stable/c/c097bd5a59162156d9c2077a2f58732ffbaa9fca
https://git.kernel.org/stable/c/ec70d80a8642900086447ba0cdc79e3f44d42e8f
https://git.kernel.org/stable/c/f05a0191b90156e539cccc189b9d87ca2a4d9305
rh#2274634
CVE-2021-47205kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47205
SMASH Issue 401374
SMASH Issue 401375
bnc#1222888
https://git.kernel.org/stable/c/9bec2b9c6134052994115d2d3374e96f2ccb9b9d
https://git.kernel.org/stable/c/b5dd513daa70ee8f6d281a20bd28485ee9bb7db2
rh#2274632
CVE-2021-47206kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47206
SMASH Issue 401349
bnc#1222894
https://git.kernel.org/stable/c/065334f6640d074a1caec2f8b0091467a22f9483
https://git.kernel.org/stable/c/2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100
https://git.kernel.org/stable/c/28e016e02118917e50a667bc72fb80098cf2b460
https://git.kernel.org/stable/c/2f18f97a1a787154a372c0738f1576f14b693d91
https://git.kernel.org/stable/c/951b8239fd24678b56c995c5c0456ab12e059d19
https://git.kernel.org/stable/c/9eff2b2e59fda25051ab36cd1cb5014661df657b
https://git.kernel.org/stable/c/bb6ed2e05eb6e8619b30fa854f9becd50c11723f
https://git.kernel.org/stable/c/f98986b7acb4219f95789095eced93ed69d81d35
rh#2274631
CVE-2021-47207kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47207
SMASH Issue 401327
bnc#1222790
https://git.kernel.org/stable/c/16721797dcef2c7c030ffe73a07f39a65f9323c3
https://git.kernel.org/stable/c/1ac6cd87d8ddd36c43620f82c4d65b058f725f0f
https://git.kernel.org/stable/c/3e28e083dcdf03a18a083f8a47b6bb6b1604b5be
https://git.kernel.org/stable/c/542fa721594a02d2aee0370a764d306ef48d030c
https://git.kernel.org/stable/c/a0d21bb3279476c777434c40d969ea88ca64f9aa
https://git.kernel.org/stable/c/ab4c1ebc40f699f48346f634d7b72b9c5193f315
https://git.kernel.org/stable/c/c6d2cefdd05c4810c416fb8d384b5c377bd977bc
https://git.kernel.org/stable/c/cb09c760c201f82df83babc92a5ffea0a01807fc
rh#2274630
CVE-2021-47209kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47209
SMASH Issue 401336
bnc#1222796
https://git.kernel.org/stable/c/512e21c150c1c3ee298852660f3a796e267e62ec
https://git.kernel.org/stable/c/b027789e5e50494c2325cc70c8642e7fd6059479
rh#2274577
CVE-2021-47210kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47210
SMASH Issue 401341
bnc#1222901
https://git.kernel.org/stable/c/2a897d384513ba7f7ef05611338b9a6ec6aeac00
https://git.kernel.org/stable/c/2c71811c963b6c310a29455d521d31a7ea6c5b5e
https://git.kernel.org/stable/c/30dcfcda8992dc42f18e7d35b6a1fa72372d382d
https://git.kernel.org/stable/c/b7a0a63f3fed57d413bb857de164ea9c3984bc4e
https://git.kernel.org/stable/c/eff8b7628410cb2eb562ca0d5d1f12e27063733e
rh#2274576
CVE-2021-47212kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47212
SMASH Issue 401362
bnc#1222709
https://git.kernel.org/stable/c/a51a6da375d82aed5c8f83abd13e7d060421bd48
https://git.kernel.org/stable/c/ba50cd9451f6c49cf0841c0a4a146ff6a2822699
rh#2274574
CVE-2021-47214kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47214
SMASH Issue 401342
bnc#1222710
https://git.kernel.org/stable/c/b5069d44e2fbc4a9093d005b3ef0949add3dd27e
https://git.kernel.org/stable/c/cc30042df6fcc82ea18acf0dace831503e60a0b7
rh#2274572
CVE-2021-47215kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47215
SMASH Issue 401340
bnc#1222704
https://git.kernel.org/stable/c/cc4a9cc03faa6d8db1a6954bb536f2c1e63bdff6
https://git.kernel.org/stable/c/ebeda7a9528ae690e6bf12791a868f0cca8391f2
rh#2274571
CVE-2021-47218kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47218
SMASH Issue 401370
bnc#1222791
https://git.kernel.org/stable/c/83c8ab8503adf56bf68dafc7a382f4946c87da79
https://git.kernel.org/stable/c/b17dd53cac769dd13031b0ca34f90cc65e523fab
https://git.kernel.org/stable/c/dc27f3c5d10c58069672215787a96b4fae01818b
rh#2274568
CVE-2021-47220kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47220
SMASH Issue 406846
bnc#1224859
https://git.kernel.org/stable/c/174c27583b3807ac96228c442735b02622d8d1c3
https://git.kernel.org/stable/c/4bf584a03eec674975ee9fe36c8583d9d470dab1
https://git.kernel.org/stable/c/58b5e02c6ca0e2b7c87cd8023ff786ef3c0eef74
https://git.kernel.org/stable/c/7f9745ab342bcce5efd5d4d2297d0a3dd9db0eac
https://git.kernel.org/stable/c/fa8c413e6b74ae5d12daf911c73238c5bdacd8e6
https://git.kernel.org/stable/c/fd7c4bd582494934be15d41aebe0dbe23790605f
https://git.kernel.org/stable/c/ff4c63f3e8cb7af2ce51cc56b031e08fd23c758b
rh#2282599
CVE-2021-47221kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47221
SMASH Issue 406847
bnc#1224858
https://git.kernel.org/stable/c/ce6e8bee7a3883e8008b30f5887dbb426aac6a35
https://git.kernel.org/stable/c/e41a49fadbc80b60b48d3c095d9e2ee7ef7c9a8e
https://git.kernel.org/stable/c/f6ed2357541612a13a5841b3af4dc32ed984a25f
rh#2282597
CVE-2021-47225kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47225
SMASH Issue 406844
bnc#1224828
https://git.kernel.org/stable/c/8043903fcb72f545c52e3ec74d6fd82ef79ce7c5
https://git.kernel.org/stable/c/d5befb224edbe53056c2c18999d630dafb4a08b9
rh#2282592
CVE-2021-47227kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47227
SMASH Issue 406853
bnc#1224852
https://git.kernel.org/stable/c/076f732b16a5bf842686e1b43ab6021a2d98233e
https://git.kernel.org/stable/c/484cea4f362e1eeb5c869abbfb5f90eae6421b38
https://git.kernel.org/stable/c/ec25ea1f3f05d6f8ee51d1277efea986eafd4f2a
rh#2282590
CVE-2021-47228kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47228
SMASH Issue 406854
bnc#1224826
https://git.kernel.org/stable/c/208bb686e7fa7fff16e8fa78ff0db34aa9acdbd7
https://git.kernel.org/stable/c/8d651ee9c71bb12fc0c8eb2786b66cbe5aa3e43b
https://git.kernel.org/stable/c/b7a05aba39f733ec337c5b952e112dd2dc4fc404
rh#2282589
CVE-2021-47229kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47229
SMASH Issue 406855
bnc#1224854
https://git.kernel.org/stable/c/1a1dbc4473974867fe8c5f195c17b341c8e82867
https://git.kernel.org/stable/c/3d213a4ddf49a860be6e795482c17f87e0c82b2a
https://git.kernel.org/stable/c/400e6b1860c8be61388d0b77814c53260f96e17a
https://git.kernel.org/stable/c/4c90f90a91d75c3c73dd633827c90e8746d9f54d
https://git.kernel.org/stable/c/b00a9aaa4be20ad6e3311fb78a485eae0899e89a
https://git.kernel.org/stable/c/f18139966d072dab8e4398c95ce955a9742e04f7
rh#2282588
CVE-2021-47231kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47231
SMASH Issue 406857
bnc#1224849
https://git.kernel.org/stable/c/6bd3d80d1f019cefa7011056c54b323f1d8b8e83
https://git.kernel.org/stable/c/6f87c0e21ad20dd3d22108e33db1c552dfa352a0
https://git.kernel.org/stable/c/89df95ce32be204eef2e7d4b2f6fb552fb191a68
https://git.kernel.org/stable/c/91c02557174be7f72e46ed7311e3bea1939840b0
https://git.kernel.org/stable/c/a115198caaab6d663bef75823a3c5f0802306d60
https://git.kernel.org/stable/c/d0760a4ef85697bc756d06eae17ae27f3f055401
rh#2282586
CVE-2021-47232kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47232
SMASH Issue 406859
bnc#1224848
https://git.kernel.org/stable/c/1071065eeb33d32b7d98c2ce7591881ae7381705
https://git.kernel.org/stable/c/2030043e616cab40f510299f09b636285e0a3678
https://git.kernel.org/stable/c/22cba878abf646cd3a02ee7c8c2cef7afe66a256
https://git.kernel.org/stable/c/509ab6bfdd0c76daebbad0f0af07da712116de22
rh#2282585
CVE-2021-47233kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47233
SMASH Issue 406860
bnc#1224850
https://git.kernel.org/stable/c/ba8a26a7ce8617f9f3d6230de34b2302df086b41
https://git.kernel.org/stable/c/cb2381cbecb81a8893b2d1e1af29bc2e5531df27
https://git.kernel.org/stable/c/dc68f0c9e4a001e02376fe87f4bdcacadb27e8a1
rh#2282584
CVE-2021-47236kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47236
SMASH Issue 406863
bnc#1224841
https://git.kernel.org/stable/c/05b2b9f7d24b5663d9b47427fe1555bdafd3ea02
https://git.kernel.org/stable/c/14184ec5c958b589ba934da7363a2877879204df
https://git.kernel.org/stable/c/1bcacd6088d61c0ac6a990d87975600a81f3247e
https://git.kernel.org/stable/c/81de2ed06df8b5451e050fe6a318af3263dbff3f
https://git.kernel.org/stable/c/b4f7a9fc9d094c0c4a66f2ad7c37b1dbe9e78f88
https://git.kernel.org/stable/c/c3b26fdf1b32f91c7a3bc743384b4a298ab53ad7
https://git.kernel.org/stable/c/f12554b0ff639e74612cc01b3b4a049e098d2d65
https://git.kernel.org/stable/c/f4e6a7f19c82f39b1803e91c54718f0d7143767d
rh#2282581
CVE-2021-47239kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47239
SMASH Issue 406867
bnc#1224846
https://git.kernel.org/stable/c/14616c372a7be01a2fb8c56c9d8debd232b9e43d
https://git.kernel.org/stable/c/2fc8300c9cfa5167fcb5b1a2a07db6f53e82f59b
https://git.kernel.org/stable/c/4252bf6c2b245f47011098113d405ffad6ad5d5b
https://git.kernel.org/stable/c/56b786d86694e079d8aad9b314e015cd4ac02a3d
https://git.kernel.org/stable/c/570a52cf3e01d19f7fd1a251dfc52b0cd86c13cb
https://git.kernel.org/stable/c/64160d1741a3de5204d1a822e058e0b4cc526504
https://git.kernel.org/stable/c/7cc8b2e05fcea6edd022d26e82091d781af8fd9b
https://git.kernel.org/stable/c/c4e3be2e7742863e454ce31faf8fd0109c00050b
rh#2282578
CVE-2021-47240kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47240
SMASH Issue 406868
bnc#1224843
https://git.kernel.org/stable/c/19892ab9c9d838e2e5a7744d36e4bb8b7c3292fe
https://git.kernel.org/stable/c/26b8d10703a9be45d6097946b2b4011f7dd2c56f
https://git.kernel.org/stable/c/960b08dd36de1e341e3eb43d1c547513e338f4f8
https://git.kernel.org/stable/c/ad9d24c9429e2159d1e279dc3a83191ccb4daf1d
https://git.kernel.org/stable/c/f8111c0d7ed42ede41a3d0d393b104de0730a8a6
rh#2282577
CVE-2021-47241kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47241
SMASH Issue 406869
bnc#1224842
https://git.kernel.org/stable/c/cfc7f0e70d649e6d2233fba0d9390b525677d971
https://git.kernel.org/stable/c/e175aef902697826d344ce3a12189329848fe898
https://git.kernel.org/stable/c/fb3a948143688e14e2cfd2a2812877923d0e5e92
rh#2282575
CVE-2021-47242kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47242
SMASH Issue 406870
bnc#1224829
https://git.kernel.org/stable/c/27ef25c72373222aaa5fe7b5cd890ae9cfb89a8d
https://git.kernel.org/stable/c/499ada5073361c631f2a3c4a8aed44d53b6f82ec
rh#2282573
CVE-2021-47244kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47244
SMASH Issue 406872
bnc#1224839
https://git.kernel.org/stable/c/07718be265680dcf496347d475ce1a5442f55ad7
https://git.kernel.org/stable/c/73eeba71dc9932970befa009e68272a3d5ec4a58
https://git.kernel.org/stable/c/76e02b8905d0691e89e104a882f3bba7dd0f6037
rh#2282569
CVE-2021-47246kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47246
SMASH Issue 406875
bnc#1224831
https://git.kernel.org/stable/c/4b16118665e94c90a3e84a5190486fd0e4eedd74
https://git.kernel.org/stable/c/a3e5fd9314dfc4314a9567cde96e1aef83a7458a
https://git.kernel.org/stable/c/b374c1304f6d3d4752ad1412427b7bf02bb1fd61
https://git.kernel.org/stable/c/be7f3f401d224e1efe8112b2fa8b837eeb8c5e52
rh#2282567
CVE-2021-47251kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47251
SMASH Issue 406880
bnc#1224881
https://git.kernel.org/stable/c/5a1cd67a801cf5ef989c4783e07b86a25b143126
https://git.kernel.org/stable/c/d1b949c70206178b12027f66edc088d40375b5cb
https://git.kernel.org/stable/c/e298aa358f0ca658406d524b6639fe389cb6e11e
rh#2282561
CVE-2021-47252kernel-source-rt:Already fixedlow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2021-47252
SMASH Issue 406881
bnc#1224882
https://git.kernel.org/stable/c/282baa8104af44e04c4af3e7f933b44267c7f86f
https://git.kernel.org/stable/c/2eb4e0b3631832a4291c8bf4c9db873f60b128c8
https://git.kernel.org/stable/c/45011f2973f6b52cf50db397bb27bf805f5f0e7f
https://git.kernel.org/stable/c/6031daaaf6d5c359c99dfffa102e332df234ff09
https://git.kernel.org/stable/c/77a99aad5bc3ea105806ebae6be3cbadc2fc615e
https://git.kernel.org/stable/c/9f460ae31c4435fd022c443a6029352217a16ac1
https://git.kernel.org/stable/c/e7fbd8184fa9e85f0d648c499841cb7ff6dec9f4
https://git.kernel.org/stable/c/e8e9d2968a9d08bf5c683afca182f1537edebf8d
rh#2282559
CVE-2021-47253kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47253
SMASH Issue 406882
bnc#1224886
https://git.kernel.org/stable/c/9e8c2af010463197315fa54a6c17e74988b5259c
https://git.kernel.org/stable/c/aa000f828e60ac15d6340f606ec4a673966f5b0b
https://git.kernel.org/stable/c/c5699e2d863f58221044efdc3fa712dd32d55cde
rh#2282558
CVE-2021-47254kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47254
SMASH Issue 406883
bnc#1224888
https://git.kernel.org/stable/c/0364742decb0f02bc183404868b82896f7992595
https://git.kernel.org/stable/c/094bf5670e762afa243d2c41a5c4ab71c7447bf4
https://git.kernel.org/stable/c/1ab19c5de4c537ec0d9b21020395a5b5a6c059b2
https://git.kernel.org/stable/c/38ce329534500bf4ae71f81df6a37a406cf187b4
https://git.kernel.org/stable/c/86fd5b27db743a0ce0cc245e3a34813b2aa6ec1d
https://git.kernel.org/stable/c/92869945cc5b78ee8a1ef90336fe070893e3458a
https://git.kernel.org/stable/c/a61156314b66456ab6a291ed5deba1ebd002ab3c
https://git.kernel.org/stable/c/e87ef30fe73e7e10d2c85bdcc778dcec24dca553
rh#2282556
CVE-2021-47255kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47255
SMASH Issue 406884
bnc#1224832
https://git.kernel.org/stable/c/018685461a5b9a9a70e664ac77aef0d7415a3fd5
https://git.kernel.org/stable/c/218bf772bddd221489c38dde6ef8e917131161f6
https://git.kernel.org/stable/c/a2aff09807fbe4018c269d3773a629949058b210
https://git.kernel.org/stable/c/bf99ea52970caeb4583bdba1192c1f9b53b12c84
rh#2282555
CVE-2021-47259kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47259
SMASH Issue 406888
bnc#1224953
https://git.kernel.org/stable/c/3e3c7ebbfac152d08be75c92802a64a1f6471a15
https://git.kernel.org/stable/c/42c10b0db064e45f5c5ae7019bbf2168ffab766c
https://git.kernel.org/stable/c/476bdb04c501fc64bf3b8464ffddefc8dbe01577
https://git.kernel.org/stable/c/72651c6579a25317a90536181d311c663d0329ab
https://git.kernel.org/stable/c/c3b6cf64dfe4ef96e7341508d50d6998da7062c7
https://git.kernel.org/stable/c/c7eab9e2d7b4e983ce280276fb920af649955897
rh#2282548
CVE-2021-47260kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47260
SMASH Issue 406889
bnc#1224834
https://git.kernel.org/stable/c/0057ecef9f324007c0ba5fcca4ddd131178ce78b
https://git.kernel.org/stable/c/09226e8303beeec10f2ff844d2e46d1371dc58e0
https://git.kernel.org/stable/c/279ad78a00f8b9c5ff24171a59297187a3bd44b7
https://git.kernel.org/stable/c/4b380a7d84ef2ce3f4f5bec5d8706ed937ac6502
https://git.kernel.org/stable/c/58ddf61f10b8f9b7b1341644bfee2f1c6508d4e1
https://git.kernel.org/stable/c/634f17ff1d59905eb3b4bbbc00805961d08beaee
https://git.kernel.org/stable/c/a979e601000982a3ca693171a6d4dffc47f8ad00
https://git.kernel.org/stable/c/fab8bfdfb4aac9e4e8363666333adfdf21e89106
rh#2282547
CVE-2021-47262kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47262
SMASH Issue 406892
bnc#1224836
https://git.kernel.org/stable/c/796d3bd4ac9316e70c181189318cd2bd98af34bc
https://git.kernel.org/stable/c/9fb088ce13bc3c59a51260207b487db3e556f275
https://git.kernel.org/stable/c/d046f724bbd725a24007b7e52b2d675249870888
https://git.kernel.org/stable/c/f31500b0d437a2464ca5972d8f5439e156b74960
rh#2282545
CVE-2021-47263kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2021-47263
SMASH Issue 406893
bnc#1224955
https://git.kernel.org/stable/c/dbec64b11c65d74f31427e2b9d5746fbf17bf840
https://git.kernel.org/stable/c/dd55331d493b7ea75c5db1f24d6822946fde2862
https://git.kernel.org/stable/c/e0b518a2eb44d8a74c19e50f79a8ed393e96d634
rh#2282544
CVE-2021-47264kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47264
SMASH Issue 406894
bnc#1224887
https://git.kernel.org/stable/c/047fd16015a79180771650aa6ce71f68b2c23368
https://git.kernel.org/stable/c/0e2c9aeb00289f279b8181fbd4c20765127d8943
https://git.kernel.org/stable/c/41daf6ba594d55f201c50280ebcd430590441da1
rh#2282542
CVE-2021-47265kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47265
SMASH Issue 406895
bnc#1224957
https://git.kernel.org/stable/c/2adcb4c5a52a2623cd2b43efa7041e74d19f3a5e
https://git.kernel.org/stable/c/8dc1b0e0ca204596c50bcd159ee069ae0f998176
jsc#CAR-3570
rh#2282540
CVE-2021-47267kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47267
SMASH Issue 406897
bnc#1224993
https://git.kernel.org/stable/c/032e288097a553db5653af552dd8035cd2a0ba96
https://git.kernel.org/stable/c/45f9a2fe737dc0a5df270787f2231aee8985cd59
https://git.kernel.org/stable/c/5ef23506695b01d5d56a13a092a97f2478069d75
https://git.kernel.org/stable/c/70cd19cb5bd94bbb5bacfc9c1e4ee0071699a604
https://git.kernel.org/stable/c/b972eff874637402ddc4a7dd11fb22538a0b6d28
https://git.kernel.org/stable/c/ca6bc277430d90375452b60b047763a090b7673e
https://git.kernel.org/stable/c/fd24be23abf3e94260be0f00bb42c7e91d495f87
rh#2282538
CVE-2021-47268kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47268
SMASH Issue 406899
bnc#1224994
https://git.kernel.org/stable/c/18eaf0de50eadeeb395b83310b259b21ad8ed0a6
https://git.kernel.org/stable/c/3a13ff7ef4349d70d1d18378d661117dd5af8efe
https://git.kernel.org/stable/c/d0a06696a8a4d99f649240b6f9b8a2e55452ecf5
rh#2282537
CVE-2021-47269kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47269
SMASH Issue 406900
bnc#1224996
https://git.kernel.org/stable/c/366369b89bedd59b1425386e8d4a18a466e420e4
https://git.kernel.org/stable/c/470403639114895e2697c766fbe17be8d0e9b67a
https://git.kernel.org/stable/c/60156089f07e724e4dc8483702d5e1ede4522749
https://git.kernel.org/stable/c/788755756dd4a6aba1de479fec20b0fa600e7f19
https://git.kernel.org/stable/c/96b74a99d360235c24052f1d060e64ac53f43528
https://git.kernel.org/stable/c/990dc90750772622d44ca2ea6652c521e6f67e16
https://git.kernel.org/stable/c/bd551e7c85939de2182010273450bfa78c3742fc
https://git.kernel.org/stable/c/d00889080ab60051627dab1d85831cd9db750e2a
rh#2282536
CVE-2021-47270kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47270
SMASH Issue 406901
bnc#1224997
https://git.kernel.org/stable/c/10770d2ac0094b053c8897d96d7b2737cd72f7c5
https://git.kernel.org/stable/c/4b289a0f3033f465b4fd51ba995251a7867a2aa2
https://git.kernel.org/stable/c/8cd5f45c1b769e3e9e0f4325dd08b6c3749dc7ee
https://git.kernel.org/stable/c/90c4d05780d47e14a50e11a7f17373104cd47d25
https://git.kernel.org/stable/c/b4903f7fdc484628d0b8022daf86e2439d3ab4db
https://git.kernel.org/stable/c/beb1e67a5ca8d69703c776db9000527f44c0c93c
https://git.kernel.org/stable/c/f17aae7c4009160f0630a91842a281773976a5bc
rh#2282535
CVE-2021-47271kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47271
SMASH Issue 406902
bnc#1224999
https://git.kernel.org/stable/c/a9aecef198faae3240921b707bc09b602e966fce
https://git.kernel.org/stable/c/ae746b6f4ce619cf4032fd798a232b010907a397
rh#2282534
CVE-2021-47272kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47272
SMASH Issue 406903
bnc#1224970
https://git.kernel.org/stable/c/03715ea2e3dbbc56947137ce3b4ac18a726b2f87
https://git.kernel.org/stable/c/4aad390363d2b9b3e92428dd34d27bb7ea8f1ee8
https://git.kernel.org/stable/c/851dee5a5da56564a70290713aee665403bb0b24
rh#2282532
CVE-2021-47273kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47273
SMASH Issue 406904
bnc#1224885
https://git.kernel.org/stable/c/4d2aa178d2ad2fb156711113790dde13e9aa2376
https://git.kernel.org/stable/c/750a0d75564293be3ed50f13ef7f38ab75106421
https://git.kernel.org/stable/c/d8dd3754e707104a34f8ec595034d503ea8871a2
rh#2282526
CVE-2021-47274kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47274
SMASH Issue 406905
bnc#1224990
https://git.kernel.org/stable/c/2d598902799886d67947406f26ee8e5fd2ca097f
https://git.kernel.org/stable/c/31ceae385556c37e4d286cb6378696448f566883
https://git.kernel.org/stable/c/3e08a9f9760f4a70d633c328a76408e62d6f80a3
https://git.kernel.org/stable/c/43c32c22254b9328d7abb1c2b0f689dc67838e60
https://git.kernel.org/stable/c/b16a249eca2230c2cd66fa1d4b94743bd9b6ef92
https://git.kernel.org/stable/c/d63f00ec908b3be635ead5d6029cc94246e1f38d
https://git.kernel.org/stable/c/edcce01e0e50840a9aa6a70baed21477bdd2c9f9
rh#2282525
CVE-2021-47275kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47275
SMASH Issue 406906
bnc#1224965
https://git.kernel.org/stable/c/41fe8d088e96472f63164e213de44ec77be69478
https://git.kernel.org/stable/c/555002a840ab88468e252b0eedf0b05e2ce7099c
rh#2282524
CVE-2021-47276kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47276
SMASH Issue 406907
bnc#1224966
https://git.kernel.org/stable/c/0bc62e398bbd9e600959e610def5109957437b28
https://git.kernel.org/stable/c/3e4ddeb68751fb4fb657199aed9cfd5d02796875
https://git.kernel.org/stable/c/4aedc2bc2b32c93555f47c95610efb89cc1ec09b
https://git.kernel.org/stable/c/6c14133d2d3f768e0a35128faac8aa6ed4815051
https://git.kernel.org/stable/c/7e4e824b109f1d41ccf223fbb0565d877d6223a2
https://git.kernel.org/stable/c/862dcc14f2803c556bdd73b43c27b023fafce2fb
https://git.kernel.org/stable/c/97524384762c1fb9b3ded931498dd2047bd0de81
https://git.kernel.org/stable/c/acf671ba79c1feccc3ec7cfdcffead4efcec49e7
rh#2282523
CVE-2021-47278kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47278
SMASH Issue 406909
bnc#1224919
https://git.kernel.org/stable/c/0b67808ade8893a1b3608ddd74fac7854786c919
https://git.kernel.org/stable/c/c597d5c59c7a6417dba06590f59b922e01188e8d
rh#2282519
CVE-2021-47279kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47279
SMASH Issue 406910
bnc#1224964
https://git.kernel.org/stable/c/2147684be1ebdaf845783139b9bc4eba3fecd9e4
https://git.kernel.org/stable/c/fbf649cd6d64d40c03c5397ecd6b1ae922ba7afc
rh#2282518
CVE-2021-47280kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47280
SMASH Issue 406912
bnc#1224982
https://git.kernel.org/stable/c/17dab9326ff263c62dab1dbac4492e2938a049e4
https://git.kernel.org/stable/c/491d52e0078860b33b6c14f0a7ac74ca1b603bd6
https://git.kernel.org/stable/c/7d233ba700ceb593905ea82b42dadb4ec8ef85e9
https://git.kernel.org/stable/c/b246b4c70c1250e7814f409b243000f9c0bf79a3
https://git.kernel.org/stable/c/b436acd1cf7fac0ba987abd22955d98025c80c2b
https://git.kernel.org/stable/c/f773f8cccac13c7e7bbd9182e7996c727742488e
rh#2282517
CVE-2021-47282kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47282
SMASH Issue 406914
bnc#1224986
https://git.kernel.org/stable/c/01415ff85a24308059e06ca3e97fd7bf75648690
https://git.kernel.org/stable/c/13817d466eb8713a1ffd254f537402f091d48444
https://git.kernel.org/stable/c/82a8ffba54d31e97582051cb56ba1f988018681e
https://git.kernel.org/stable/c/b5502580cf958b094f3b69dfe4eece90eae01fbc
rh#2282515
CVE-2021-47284kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47284
SMASH Issue 406916
bnc#1224987
https://git.kernel.org/stable/c/143fc7220961220eecc04669e5909af8847bf8c8
https://git.kernel.org/stable/c/4c1fcb6ec964b44edbf84235134582a5ffae1521
https://git.kernel.org/stable/c/6249193e03709ea625e10706ecaf17fea0427d3d
https://git.kernel.org/stable/c/958cb1078ca60d214826fd90a0961a447fade59a
https://git.kernel.org/stable/c/9d7d4649dc1c53acf76df260fd519db698ed20d7
https://git.kernel.org/stable/c/9f6f852550d0e1b7735651228116ae9d300f69b3
https://git.kernel.org/stable/c/a0a37e4454ca1c0b424edc2c9c2487c2c46a1be6
https://git.kernel.org/stable/c/bf78e25bd3f487208e042c67c8a31706c2dba265
rh#2282923
CVE-2021-47285kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47285
SMASH Issue 406917
bnc#1224981
https://git.kernel.org/stable/c/1e5cab50208c8fb7351b798cb1d569debfeb994a
https://git.kernel.org/stable/c/38cb2e23188af29c43966acee9dbb18b62e26cfe
https://git.kernel.org/stable/c/8ab78863e9eff11910e1ac8bcf478060c29b379e
https://git.kernel.org/stable/c/90d0a3c76965d7a10fc87c07be3e9714e2130d5c
https://git.kernel.org/stable/c/c08e0be44759d0b5affc5888be4aa5e536873335
https://git.kernel.org/stable/c/d6a21a3fb03300fbaa9fc3ed99f8b0962ce28362
https://git.kernel.org/stable/c/ec72482564ff99c6832d33610d9f8ab7ecc81b6d
https://git.kernel.org/stable/c/f3ed12af6bbbaf79eddb0ae14656b8ecacea74f0
rh#2282513
CVE-2021-47286kernel-source-rt:Not affectedmoderate5.9 (CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H)CVE-2021-47286
SMASH Issue 406919
bnc#1224890
https://git.kernel.org/stable/c/3efec3b4b16fc7af25676a94230a8ab2a3bb867c
https://git.kernel.org/stable/c/546362a9ef2ef40b57c6605f14e88ced507f8dd0
https://git.kernel.org/stable/c/aed4f5b51aba41e2afd7cfda20a0571a6a67dfe9
rh#2282512
CVE-2021-47287kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47287
SMASH Issue 406920
bnc#1224985
https://git.kernel.org/stable/c/4afa0c22eed33cfe0c590742387f0d16f32412f3
https://git.kernel.org/stable/c/ce5b3de58fc21303722df46551f7eb9a91afb409
rh#2282511
CVE-2021-47288kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2021-47288
SMASH Issue 406921
bnc#1224889
https://git.kernel.org/stable/c/4487b968e5eacd02c493303dc2b61150bb7fe4b2
https://git.kernel.org/stable/c/8d4abca95ecc82fc8c41912fa0085281f19cc29f
https://git.kernel.org/stable/c/b9a178f189bb6d75293573e181928735f5e3e070
https://git.kernel.org/stable/c/c6ddeb63dd543b5474b0217c4e47538b7ffd7686
https://git.kernel.org/stable/c/e617fa62f6cf859a7b042cdd6c73af905ff8fca3
https://git.kernel.org/stable/c/e818f2ff648581a6c553ae2bebc5dcef9a8bb90c
https://git.kernel.org/stable/c/e991457afdcb5f4dbc5bc9d79eaf775be33e7092
https://git.kernel.org/stable/c/ec731c6ef564ee6fc101fc5d73e3a3a953d09a00
rh#2282510
CVE-2021-47289kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47289
SMASH Issue 406922
bnc#1224984
https://git.kernel.org/stable/c/38f54217b423c0101d03a00feec6fb8ec608b12e
https://git.kernel.org/stable/c/cae3fa3d8165761f3000f523b11cfa1cd35206bc
https://git.kernel.org/stable/c/ccf23a0888077a25a0793a746c3941db2a7562e4
https://git.kernel.org/stable/c/fc68f42aa737dc15e7665a4101d4168aadb8e4c4
rh#2282508
CVE-2021-47290kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47290
SMASH Issue 406923
bnc#1224884
https://git.kernel.org/stable/c/a47fa41381a09e5997afd762664db4f5f6657e03
https://git.kernel.org/stable/c/e7732c5a19a15a62b0b23fd683a639b0483e1f40
rh#2282507
CVE-2021-47292kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47292
SMASH Issue 406925
bnc#1224979
https://git.kernel.org/stable/c/362a9e65289284f36403058eea2462d0330c1f24
https://git.kernel.org/stable/c/502731a03f27cba1513fbbff77e508185ffce5bb
rh#2282505
CVE-2021-47296kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47296
SMASH Issue 406930
bnc#1224891
https://git.kernel.org/stable/c/9bafc34dc4ad0cef18727c557f21ed3c3304df50
https://git.kernel.org/stable/c/a4a488915feaad38345cc01b80d52e8200ff5209
https://git.kernel.org/stable/c/bc4188a2f56e821ea057aca6bf444e138d06c252
https://git.kernel.org/stable/c/e14ef1095387f764d95614d3ec9e4d07c82a3533
https://git.kernel.org/stable/c/f38527f1890543cdfca8dfd06f75f9887cce6151
rh#2282491
CVE-2021-47298kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47298
SMASH Issue 406932
bnc#1224974
https://git.kernel.org/stable/c/6c508a1c6c62793dc6e6872cad4b200097bab7c9
https://git.kernel.org/stable/c/715f378f42909c401ec043f5150c4fdf57fb8889
https://git.kernel.org/stable/c/7e6b27a69167f97c56b5437871d29e9722c3e470
rh#2282485
CVE-2021-47299kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47299
SMASH Issue 406933
bnc#1224973
https://git.kernel.org/stable/c/5acc7d3e8d342858405fbbc671221f676b547ce7
https://git.kernel.org/stable/c/a7537dc73e69ad9c0b67ad24ad3ebee954ed0af6
https://git.kernel.org/stable/c/ca9ba1de8f09976b45ccc8e655c51c6201992139
rh#2282484
CVE-2021-47300kernel-source-rt:Not affectedlow ()CVE-2021-47300
SMASH Issue 406934
bnc#1224972
https://git.kernel.org/stable/c/39f1735c8107ef43a53c4daf82f330d880488d8f
https://git.kernel.org/stable/c/5dd0a6b8582ffbfa88351949d50eccd5b6694ade
https://git.kernel.org/stable/c/cbb086074dab631ac43f8645cbac1d7b148e05c4
CVE-2021-47301kernel-source-rt:Already fixedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47301
SMASH Issue 406936
bnc#1224916
https://git.kernel.org/stable/c/7b292608db23ccbbfbfa50cdb155d01725d7a52e
https://git.kernel.org/stable/c/88e0720133d42d34851c8721cf5f289a50a8710f
https://git.kernel.org/stable/c/8e24c12f2ff6d32fd9f057382f08e748ec97194c
https://git.kernel.org/stable/c/d3ccb18ed5ac3283c7b31ecc685b499e580d5492
https://git.kernel.org/stable/c/d7367f781e5a9ca5df9082b15b272b55e76931f8
https://git.kernel.org/stable/c/f153664d8e70c11d0371341613651e1130e20240
CVE-2021-47302kernel-source-rt:Already fixedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47302
SMASH Issue 406937
bnc#1224917
https://git.kernel.org/stable/c/56ea7ed103b46970e171eb1c95916f393d64eeff
https://git.kernel.org/stable/c/a9508e0edfe369ac95d0825bcdca976436ce780f
https://git.kernel.org/stable/c/e15f629036bac005fc758b4ad17896cf2312add4
https://git.kernel.org/stable/c/ea5e36b7367ea0a36ef73a163768f16d2977bd83
rh#2282481
CVE-2021-47303kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47303
SMASH Issue 406873
bnc#1224962
https://git.kernel.org/stable/c/599148d40366bd5d1d504a3a8fcd65e21107e500
https://git.kernel.org/stable/c/a9f36bf3613c65cb587c70fac655c775d911409b
https://git.kernel.org/stable/c/f263a81451c12da5a342d90572e317e611846f2c
CVE-2021-47304kernel-source-rt:Not affectedlow ()CVE-2021-47304
SMASH Issue 406938
bnc#1224971
https://git.kernel.org/stable/c/ad4ba3404931745a5977ad12db4f0c34080e52f7
https://git.kernel.org/stable/c/be5d1b61a2ad28c7e57fe8bfa277373e8ecffcdc
https://git.kernel.org/stable/c/fe77b85828ca9ddc42977b79de9e40d18545b4fe
CVE-2021-47305kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47305
SMASH Issue 406939
bnc#1224968
https://git.kernel.org/stable/c/0d514185ae792d3a1903c8e1a83899aa996705ce
https://git.kernel.org/stable/c/19edcd97727aae9362444a859a24d99a8730cb27
https://git.kernel.org/stable/c/19f51c2529339280d2c8c6427cd3e21ddf1ac3f8
https://git.kernel.org/stable/c/41f45e91c92c8480242ea448d54e28c753b13902
https://git.kernel.org/stable/c/e0355a0ad31a1d677b2a4514206de4902bd550e8
https://git.kernel.org/stable/c/ffe000217c5068c5da07ccb1c0f8cce7ad767435
CVE-2021-47307kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47307
SMASH Issue 406941
bnc#1224961
https://git.kernel.org/stable/c/03313d1c3a2f086bb60920607ab79ac8f8578306
https://git.kernel.org/stable/c/ae3d181f4e912f51af7776ea165f199b16fc165d
https://git.kernel.org/stable/c/e58c162789becede894d3e94c0ce6695a2ef5796
https://git.kernel.org/stable/c/f7d1fa65e74263d11f90ddd33b4d4cd905a93759
rh#2282475
CVE-2021-47308kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47308
SMASH Issue 406942
bnc#1224963
https://git.kernel.org/stable/c/0fe70c15f9435bb3c50954778245d62ee38b0e03
https://git.kernel.org/stable/c/44651522941c623e20882b3b443f23f77de1ea8b
https://git.kernel.org/stable/c/4921b1618045ffab71b1050bf0014df3313a2289
https://git.kernel.org/stable/c/8511293e643a18b248510ae5734e4f360754348c
https://git.kernel.org/stable/c/a4a54c54af2516caa9c145015844543cfc84316a
https://git.kernel.org/stable/c/b27c4577557045f1ab3cdfeabfc7f3cd24aca1fe
rh#2282474
CVE-2021-47312kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47312
SMASH Issue 406947
bnc#1225048
https://git.kernel.org/stable/c/4ca041f919f13783b0b03894783deee00dbca19a
https://git.kernel.org/stable/c/70a5a1950cca02c5cd161bb3846b4d983eed97d3
rh#2282469
CVE-2021-47313kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2021-47313
SMASH Issue 406948
bnc#1225051
https://git.kernel.org/stable/c/b775383355755885b19d2acef977f1ca132e80a3
https://git.kernel.org/stable/c/e1b2b2b61d30d7ce057ec17237c217d152ed97f2
https://git.kernel.org/stable/c/fe2535a44904a77615a3af8e8fd7dafb98fb0e1b
CVE-2021-47314kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47314
SMASH Issue 406950
bnc#1224893
https://git.kernel.org/stable/c/3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4
https://git.kernel.org/stable/c/443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5
https://git.kernel.org/stable/c/48ee69825f7480622ed447b0249123236d3b3ad0
https://git.kernel.org/stable/c/7626ffbea708e5aba6912295c012d2b409a1769f
https://git.kernel.org/stable/c/8018476756066e97ecb886c3dc024aeb7d5792ad
https://git.kernel.org/stable/c/8e0d09b1232d0538066c40ed4c13086faccbdff6
https://git.kernel.org/stable/c/a6b45b4932f7b0c36b41fb56a35ad679ece939a0
https://git.kernel.org/stable/c/b5789e23773f4a852fbfe244b63f675e265d3a7f
https://git.kernel.org/stable/c/ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6
CVE-2021-47315kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47315
SMASH Issue 406951
bnc#1224892
https://git.kernel.org/stable/c/28f71fd81ebd3b386bf5c7c5539664156f7d72c1
https://git.kernel.org/stable/c/3b132ab67fc7a358fff35e808fa65d4bea452521
https://git.kernel.org/stable/c/6b3b002de90738e3c85853a682ce7e0fa078d42b
https://git.kernel.org/stable/c/83af5816308b490b05fc8fa27fc1bdc769df200a
https://git.kernel.org/stable/c/8d071d270afba468708faca5f7b6d9e656f75e27
https://git.kernel.org/stable/c/94bc2fe46102d1e060fc749c0c19511e76c9995f
https://git.kernel.org/stable/c/b7a2bcb4a3731d68f938207f75ed3e1d41774510
https://git.kernel.org/stable/c/bd051b3e184fa56eeb6276ee913ba4d48069024b
https://git.kernel.org/stable/c/d0d04b95e8ed0223844a1d58497c686fe2e4a955
https://git.kernel.org/stable/c/d9213d4f372d30b5bc4d921795d6bed0c0e3eebf
CVE-2021-47316kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47316
SMASH Issue 406952
bnc#1225052
https://git.kernel.org/stable/c/650e6f383a6eb40f7c0a010982a74ab4b6893870
https://git.kernel.org/stable/c/ab1016d39cc052064e32f25ad18ef8767a0ee3b8
https://git.kernel.org/stable/c/e79057d15d96ef19de4de6d7e479bae3d58a2a8d
rh#2282464
CVE-2021-47317kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47317
SMASH Issue 406953
bnc#1225055
https://git.kernel.org/stable/c/0d435b6d94b05dcfd836d758a63145aa566618e2
https://git.kernel.org/stable/c/419ac821766cbdb9fd85872bb3f1a589df05c94c
https://git.kernel.org/stable/c/7284dab07e4d51d453cc42851fae9ec4fac6ef2f
CVE-2021-47318kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47318
SMASH Issue 406954
bnc#1225057
https://git.kernel.org/stable/c/83150f5d05f065fb5c12c612f119015cabdcc124
https://git.kernel.org/stable/c/ccdf7e073170886bc370c613e269de610a794c4a
CVE-2021-47319kernel-source-rt:Ignoremoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2021-47319
SMASH Issue 406955
bnc#1225054
https://git.kernel.org/stable/c/04c6e60b884cb5e94ff32af46867fb41d5848358
https://git.kernel.org/stable/c/102d6bc6475ab09bab579c18704e6cf8d898e93c
https://git.kernel.org/stable/c/29a2f4a3214aa14d61cc9737c9f886dae9dbb710
https://git.kernel.org/stable/c/381bde79d11e596002edfd914e6714291826967a
https://git.kernel.org/stable/c/600942d2fd49b90e44857d20c774b20d16f3130f
https://git.kernel.org/stable/c/863da837964c80c72e368a4f748c30d25daa1815
https://git.kernel.org/stable/c/b71ba22e7c6c6b279c66f53ee7818709774efa1f
https://git.kernel.org/stable/c/ca2b8ae93a6da9839dc7f9eb9199b18aa03c3dae
https://git.kernel.org/stable/c/cd24da0db9f75ca11eaf6060f0ccb90e2f3be3b0
jsc#CAR-3585
CVE-2021-47320kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2021-47320
SMASH Issue 406957
bnc#1225058
https://git.kernel.org/stable/c/0704f617040c397ae73c1f88f3956787ec5d6529
https://git.kernel.org/stable/c/1fcb6fcd74a222d9ead54d405842fc763bb86262
https://git.kernel.org/stable/c/2e3960f276b4574a9bb0dfa31a7497302f6363b2
https://git.kernel.org/stable/c/4b515308ab875c7e8ada8e606fe0c64762da5ed4
https://git.kernel.org/stable/c/687cf32865b2d6960214bce523f2afac58dd3cd2
https://git.kernel.org/stable/c/8a2b308a54c5ec224fedc753617f99b29ffcd883
https://git.kernel.org/stable/c/c8fc86e9df6a6a03f5a8e15a3b7a5c75fd05aa38
https://git.kernel.org/stable/c/cef9d9acb7c80ed6bace894b6334557fd493863b
https://git.kernel.org/stable/c/d0b32dc1409f7e65e4fcc34e236462268e69a357
rh#2282441
CVE-2021-47321kernel-source-rt:Already fixedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47321
SMASH Issue 406918
bnc#1225060
https://git.kernel.org/stable/c/1a053c4d716898a53c2e31c574a70ea0c37044a3
https://git.kernel.org/stable/c/4c05dac488a660fe2925c047ecb119e7afaaeb1e
https://git.kernel.org/stable/c/58606882ad8ec6c39e0f40344b922921ef94ab4d
https://git.kernel.org/stable/c/66ba9cf929b1c4fabf545bd4c18f6f64e23e46e4
https://git.kernel.org/stable/c/8bec568d7518b1504a602ed5376bb322e4dbb270
https://git.kernel.org/stable/c/ca96b8ea5e74956071154bdb456778cc3027e79f
https://git.kernel.org/stable/c/d0212f095ab56672f6f36aabc605bda205e1e0bf
https://git.kernel.org/stable/c/db222f1477ad5692cd454709b714949807e5d111
https://git.kernel.org/stable/c/ecd620e0fb1ff7f78fdb593379b2e6938c99707a
rh#2282440
CVE-2021-47322kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47322
SMASH Issue 406958
bnc#1225061
https://git.kernel.org/stable/c/3731d44bba8e0116b052b1b374476c5f6dd9a456
https://git.kernel.org/stable/c/5c7ef8a3705542136a1e19b070e951f0730b2153
https://git.kernel.org/stable/c/7aec9f862411906f8c27071ba65a1e110ad7d2fd
https://git.kernel.org/stable/c/7c96a2ee45be41d5a167e6332d202086752c36bb
rh#2282439
CVE-2021-47323kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47323
SMASH Issue 406959
bnc#1225026
https://git.kernel.org/stable/c/0015581a79bbf8e521f85dddb7d3e4a66b9f51d4
https://git.kernel.org/stable/c/2aef07017fae21c3d8acea9656b10e3b9c0f1e04
https://git.kernel.org/stable/c/522e75ed63f67e815d4ec0deace67df22d9ce78e
https://git.kernel.org/stable/c/7c56c5508dc20a6b133bc669fc34327a6711c24c
https://git.kernel.org/stable/c/90b7c141132244e8e49a34a4c1e445cce33e07f4
https://git.kernel.org/stable/c/a173e3b62cf6dd3c4a0a10c8a82eedfcae81a566
https://git.kernel.org/stable/c/b3c41ea5bc34d8c7b19e230d80e0e555c6f5057d
https://git.kernel.org/stable/c/b4565a8a2d6bffb05bfbec11399d261ec16fe373
https://git.kernel.org/stable/c/f0feab82f6a0323f54d85e8b512a2be64f83648a
rh#2282438
CVE-2021-47324kernel-source-rt:Already fixedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47324
SMASH Issue 406960
bnc#1225030
bnc#1225038
https://git.kernel.org/stable/c/0ac50a76cf3cd63db000648b3b19f3f98b8aaa76
https://git.kernel.org/stable/c/146cc288fb80c662c9c35e7bc58325d1ac0a7875
https://git.kernel.org/stable/c/63a3dc24bd053792f84cb4eef0168b1266202a02
https://git.kernel.org/stable/c/862f2b5a7c38762ac9e369daefbf361a91aca685
https://git.kernel.org/stable/c/8adbbe6c86bb13e14f8a19e036ae5f4f5661fd90
https://git.kernel.org/stable/c/a397cb4576fc2fc802562418b3a50b8f67d60d31
https://git.kernel.org/stable/c/b4ebf4a4692e84163a69444c70ad515de06e2259
https://git.kernel.org/stable/c/c08a6b31e4917034f0ed0cb457c3bb209576f542
https://git.kernel.org/stable/c/dc9403097be52d57a5c9c35efa9be79d166a78af
rh#2282437
CVE-2021-47326kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2021-47326
SMASH Issue 406962
bnc#1225045
https://git.kernel.org/stable/c/00fcd8f33e9b9f57115c3b1cfc4cb96450c18796
https://git.kernel.org/stable/c/2beb4a53fc3f1081cedc1c1a198c7f56cc4fc60c
https://git.kernel.org/stable/c/74569cb9ed7bc60e395927f55d3dc3be143a0164
https://git.kernel.org/stable/c/74d6fcea1d896800e60f1c675137efebd1a6c9a6
https://git.kernel.org/stable/c/afb04d0b5543a5bf8e157b9119fbfc52606f4c11
rh#2282435
CVE-2021-47329kernel-source-rt:Won't fixlow1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47329
SMASH Issue 406965
bnc#1225083
https://git.kernel.org/stable/c/04b6b9ea80906e3b41ff120b45db31768947cf72
https://git.kernel.org/stable/c/0680db6f41920b2c91c7df3cc9cd5968701a6f74
https://git.kernel.org/stable/c/0c6226601c3e191a44a57d8f9f814b7e5c308959
https://git.kernel.org/stable/c/b5438f48fdd8e1c3f130d32637511efd32038152
https://git.kernel.org/stable/c/e623f79691c5104317669ab36ec316a90c05062f
jsc#CAR-3590
rh#2282432
CVE-2021-47330kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47330
SMASH Issue 406966
bnc#1225084
https://git.kernel.org/stable/c/331f5923fce4f45b8170ccf06c529e8eb28f37bc
https://git.kernel.org/stable/c/34f4590f5ec9859ea9136249f528173d150bd584
https://git.kernel.org/stable/c/7a80f71601af015856a0aeb1e3c294037ac3dd32
https://git.kernel.org/stable/c/b2ef1f5de40342de44fc5355321595f91774dab5
https://git.kernel.org/stable/c/b5a2799cd62ed30c81b22c23028d9ee374e2138c
https://git.kernel.org/stable/c/c39cf4df19acf0133fa284a8cd83fad42cd13cc2
https://git.kernel.org/stable/c/cddee5c287e26f6b2ba5c0ffdfc3a846f2f10461
https://git.kernel.org/stable/c/ee16bed959862a6de2913f71a04cb563d7237b67
https://git.kernel.org/stable/c/fad92b11047a748c996ebd6cfb164a63814eeb2e
rh#2282431
CVE-2021-47331kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47331
SMASH Issue 406967
bnc#1225087
https://git.kernel.org/stable/c/1a133a0996d6b4c83509d570ed4edcba34c44f25
https://git.kernel.org/stable/c/436906fd248e018403bcda61a9311d9af02912f1
https://git.kernel.org/stable/c/880287910b1892ed2cb38977893b947382a09d21
https://git.kernel.org/stable/c/8e8d910e9a3a7fba86140aff4924c30955ab228b
rh#2282429
CVE-2021-47332kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47332
SMASH Issue 406968
bnc#1225091
https://git.kernel.org/stable/c/7d7f30cf182e55023fa8fde4c084b2d37c6be69d
https://git.kernel.org/stable/c/82e5ee742fdd8874fe996181b87fafe1eb5f1196
https://git.kernel.org/stable/c/88262229b778f4f7a896da828d966f94dcb35d19
https://git.kernel.org/stable/c/bee295f5e03510252d18b25cc1d26230256eb87a
https://git.kernel.org/stable/c/cae0cf651adccee2c3f376e78f30fbd788d0829f
rh#2282428
CVE-2021-47333kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47333
SMASH Issue 406970
bnc#1225113
https://git.kernel.org/stable/c/09d154990ca82d14aed2b72796f6c8845e2e605d
https://git.kernel.org/stable/c/3ce3e45cc333da707d4d6eb433574b990bcc26f5
https://git.kernel.org/stable/c/58f69684ba03e5b0e0a3ae844a845280c0f06309
https://git.kernel.org/stable/c/717cf5ae52322ddbdf3ac2c584b34c5970b0d174
https://git.kernel.org/stable/c/d2639ffdcad463b358b6bef8645ff81715daffcb
rh#2282427
CVE-2021-47334kernel-source-rt:Already fixedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2021-47334
SMASH Issue 406971
bnc#1225112
https://git.kernel.org/stable/c/1512e7dc5eb08b7d92a12e2bfcd9cb8c4a1ec069
https://git.kernel.org/stable/c/29ba8e2ba89ee2862a26d91204dd5fe77ceee25a
https://git.kernel.org/stable/c/38660031e80eaa6cc9370b031c180612f414b00d
https://git.kernel.org/stable/c/481a76d4749ee3a27f902ba213fdcbb4bb39720e
https://git.kernel.org/stable/c/5b06ca113bf197aab2ab61288f42506e0049fbab
https://git.kernel.org/stable/c/7272b591c4cb9327c43443f67b8fbae7657dd9ae
https://git.kernel.org/stable/c/a7268e8a227d5a4f0bd1584f556246b0224ab274
https://git.kernel.org/stable/c/b9c87ce3bc6331f82811a8cf8e930423c22523a3
https://git.kernel.org/stable/c/ef1067d2baa847d53c9988510d99fb494de4d12c
rh#2282426
CVE-2021-47335kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47335
SMASH Issue 406972
bnc#1224927
https://git.kernel.org/stable/c/79fa5d944c875711253a23b8155b36883c696409
https://git.kernel.org/stable/c/86786603014e0a22d0d6af8e80ae4b8687927048
https://git.kernel.org/stable/c/cad83c968c2ebe97905f900326988ed37146c347
https://git.kernel.org/stable/c/e472b276a0d2180808009be38105e12754432e2a
rh#2282425
CVE-2021-47336kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47336
SMASH Issue 406973
bnc#1225111
https://git.kernel.org/stable/c/135122f174c357b7a3e58f40fa5792156c5e93e6
https://git.kernel.org/stable/c/258fd821f69378453c071b9dd767b298810fc766
https://git.kernel.org/stable/c/3780348c1a0e14ffefcaf1fc521f815bcaac94b0
https://git.kernel.org/stable/c/49ec114a6e62d8d320037ce71c1aaf9650b3cafd
https://git.kernel.org/stable/c/5c2dca9a7a7ff6a2df34158903515e2e4fd3d2b2
https://git.kernel.org/stable/c/5f9880403e6b71d56924748ba331daf836243fca
https://git.kernel.org/stable/c/8f5c773a2871cf446e3f36b2834fb25bbb28512b
https://git.kernel.org/stable/c/cbd87ba6a13891acf6180783f8234a8b7a3e3d4d
jsc#CAR-3597
rh#2282424
CVE-2021-47337kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47337
SMASH Issue 406974
bnc#1224926
https://git.kernel.org/stable/c/887bfae2732b5b02a86a859fd239d34f7ff93c05
https://git.kernel.org/stable/c/8e4212ecf0713dd57d0e3209a66201da582149b1
https://git.kernel.org/stable/c/93aa71ad7379900e61c8adff6a710a4c18c7c99b
https://git.kernel.org/stable/c/c1671d2d2ef8a84837eea1b4d99ca0c6a66fb691
https://git.kernel.org/stable/c/d2f0b960d07e52bb664471b4de0ed8b08c636b3a
https://git.kernel.org/stable/c/e1bd3fac2baa3d5c04375980c1d5263a3335af92
https://git.kernel.org/stable/c/ea518b70ed5e4598c8d706f37fc16f7b06e440bd
https://git.kernel.org/stable/c/f3d0a109240c9bed5c60d819014786be3a2fe515
rh#2282423
CVE-2021-47338kernel-source-rt:Already fixedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H)CVE-2021-47338
SMASH Issue 406975
bnc#1224924
https://git.kernel.org/stable/c/087bff9acd2ec6db3f61aceb3224bde90fe0f7f8
https://git.kernel.org/stable/c/0af778269a522c988ef0b4188556aba97fb420cc
https://git.kernel.org/stable/c/359311b85ebec7c07c3a08ae2f3def946cad33fa
https://git.kernel.org/stable/c/d6e76469157d8f240e5dec6f8411aa8d306b1126
https://git.kernel.org/stable/c/f193509afc7ff37a46862610c93b896044d5b693
rh#2282422
CVE-2021-47339kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2021-47339
SMASH Issue 406976
bnc#1225102
https://git.kernel.org/stable/c/7b53cca764f9b291b7907fcd39d9e66ad728ee0b
https://git.kernel.org/stable/c/bfb48b54db25c3b4ef4bef5e0691464ebc4aa335
https://git.kernel.org/stable/c/dc02c0b2bd6096f2f3ce63e1fc317aeda05f74d8
rh#2282421
CVE-2021-47340kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47340
SMASH Issue 406977
bnc#1225148
https://git.kernel.org/stable/c/3bb27e27240289b47d3466f647a55c567adbdc3a
https://git.kernel.org/stable/c/42f102ea1943ecb10a0756bf75424de5d1d5beed
https://git.kernel.org/stable/c/49def1b0644892e3b113673c13d650c3060b43bc
https://git.kernel.org/stable/c/745c9a59422c63f661f4374ed5181740db4130a1
https://git.kernel.org/stable/c/7bde24bde490f3139eee147efc6d60d6040fe975
https://git.kernel.org/stable/c/8018936950360f1c503bb385e158cfc5e4945d18
https://git.kernel.org/stable/c/9d574f985fe33efd6911f4d752de6f485a1ea732
https://git.kernel.org/stable/c/a21e5cb1a64c904f1f0ef7b2d386fc7d2b1d2ce2
https://git.kernel.org/stable/c/aff8d95b69051d0cf4acc3d91f22299fdbb9dfb3
rh#2282420
CVE-2021-47341kernel-source-rt:Already fixedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47341
SMASH Issue 406979
bnc#1224923
https://git.kernel.org/stable/c/069d44a24c0ff8f85adf49233aae7a8ca16f5c7e
https://git.kernel.org/stable/c/23fa2e46a5556f787ce2ea1a315d3ab93cced204
https://git.kernel.org/stable/c/679837dc0abaa2c6e2a7bcd86483e05eee1d5066
https://git.kernel.org/stable/c/8d7c539316d652d217e5e82b89ee204c812a7061
https://git.kernel.org/stable/c/f2ff9d03432fcb160e9f7d4be26174d89de2779a
rh#2282418
CVE-2021-47342kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47342
SMASH Issue 406943
bnc#1225149
bnc#1225154
https://git.kernel.org/stable/c/61bb4a1c417e5b95d9edb4f887f131de32e419cb
https://git.kernel.org/stable/c/7ed572cdf11081f8f9e07abd4bea56a3f2c4edbd
https://git.kernel.org/stable/c/b663890d854403e566169f7e90aed5cd6ff64f6b
jsc#CAR-3613
rh#2282417
CVE-2021-47344kernel-source-rt:Already fixedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47344
SMASH Issue 406981
bnc#1224922
https://git.kernel.org/stable/c/021c294dff030f3ba38eb81e400ba123db32ecbc
https://git.kernel.org/stable/c/0a045eac8d0427b64577a24d74bb8347c905ac65
https://git.kernel.org/stable/c/0edd6759167295ea9969e89283b81017b4c688aa
https://git.kernel.org/stable/c/5f3f81f1c96b501d180021c23c25e9f48eaab235
https://git.kernel.org/stable/c/b0633051a6cb24186ff04ce1af99c7de18c1987e
https://git.kernel.org/stable/c/bbc80a972a3c5d7eba3f6c9c07af8fea42f5c513
https://git.kernel.org/stable/c/c57b2bd3247925e253729dce283d6bf6abc9339d
https://git.kernel.org/stable/c/c57bfd8000d7677bf435873b440eec0c47f73a08
https://git.kernel.org/stable/c/d69b39d89f362cfeeb54a68690768d0d257b2c8f
rh#2282410
CVE-2021-47345kernel-source-rt:Ignorelow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47345
SMASH Issue 406982
bnc#1225157
https://git.kernel.org/stable/c/032c68b4f5be128a2167f35b558b7cec88fe4972
https://git.kernel.org/stable/c/07583ba2e2d8947c3d365d97608cb436510885ac
https://git.kernel.org/stable/c/3d08b5917984f737f32d5bee9737b9075c3895c6
https://git.kernel.org/stable/c/40b613db3a95bc27998e4097d74c2f7e5d083a0b
https://git.kernel.org/stable/c/4893c938f2a140a74be91779e45e4a7fa111198f
https://git.kernel.org/stable/c/74f160ead74bfe5f2b38afb4fcf86189f9ff40c9
https://git.kernel.org/stable/c/e2da8ce2a9543f3ca5c93369bd1fe6eeb572101a
https://git.kernel.org/stable/c/e4e062da082a199357ba4911145f331d40139ad8
https://git.kernel.org/stable/c/f4f553d67236145fa5fd203ed7b35b9377e19939
jsc#CAR-3617
rh#2282409
CVE-2021-47346kernel-source-rt:Not affectedlow3.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L)CVE-2021-47346
SMASH Issue 406983
bnc#1224921
https://git.kernel.org/stable/c/0115687be7b13993066aef602253a53d55f5b11f
https://git.kernel.org/stable/c/04bd77ef4f4d9fc6102023b85f4590fc2130aac5
https://git.kernel.org/stable/c/35c1c4bd2d59ad734129d4e232af9d1098023918
https://git.kernel.org/stable/c/5fae8a946ac2df879caf3f79a193d4766d00239b
https://git.kernel.org/stable/c/733d4d95c0101d5f277b8e4910411d016e49a9dc
https://git.kernel.org/stable/c/ef0a06acc6b16388640ad367eedfa2a17f1945db
jsc#CAR-3556
rh#2282408
CVE-2021-47347kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47347
SMASH Issue 406985
bnc#1225177
bnc#1225305
https://git.kernel.org/stable/c/0f6c0488368c9ac1aa685821916fadba32f5d1ef
https://git.kernel.org/stable/c/115103f6e3f1c26c473766c16439c7c8b235529a
https://git.kernel.org/stable/c/302e2ee34c5f7c5d805b7f835d9a6f2b43474e2a
https://git.kernel.org/stable/c/40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea
https://git.kernel.org/stable/c/57ad99ae3c6738ba87bad259bb57c641ca68ebf6
https://git.kernel.org/stable/c/c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1
https://git.kernel.org/stable/c/d10a87a3535cce2b890897914f5d0d83df669c63
https://git.kernel.org/stable/c/d3d8b9c9c7843dce31e284927d4c9904fd5a510a
https://git.kernel.org/stable/c/d71dddeb5380613f9ef199f3e7368fd78fb1a46e
rh#2282407
CVE-2021-47348kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2021-47348
SMASH Issue 406986
bnc#1225178
https://git.kernel.org/stable/c/06888d571b513cbfc0b41949948def6cb81021b2
https://git.kernel.org/stable/c/3b2b93a485fb7a970bc8b5daef16f4cf579d172f
https://git.kernel.org/stable/c/44c7c901cb368a9f2493748f213b247b5872639f
https://git.kernel.org/stable/c/c5b518f4b98dbb2bc31b6a55e6aaa1e0e2948f2e
rh#2282405
CVE-2021-47349kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47349
SMASH Issue 406987
bnc#1225179
https://git.kernel.org/stable/c/1f9482aa8d412b4ba06ce6ab8e333fb8ca29a06e
https://git.kernel.org/stable/c/35af69c7c0490fdccfc159c6a87e4d1dc070838a
https://git.kernel.org/stable/c/a3041d39d3c14da97fa3476835aba043ba810cf0
rh#2282404
CVE-2021-47350kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47350
SMASH Issue 406988
bnc#1225181
https://git.kernel.org/stable/c/500f81cec9f1bfa5210aa9dd5ba9a06e22f62a35
https://git.kernel.org/stable/c/8a96ec5ebf96ad8e2ba7b1b34103a0be5140fc70
https://git.kernel.org/stable/c/a82471a14aad90f79d1608d2bcbb019f0ffb53f0
https://git.kernel.org/stable/c/cd5d5e602f502895e47e18cd46804d6d7014e65c
https://git.kernel.org/stable/c/d2e52d4664097a6c1f591d869ec594bd7a0d4925
rh#2282403
CVE-2021-47351kernel-source-rt:Not affectedmoderate6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2021-47351
SMASH Issue 406989
bnc#1225182
https://git.kernel.org/stable/c/38dde03eb239605f428f3f1e4baa73d4933a4cc6
https://git.kernel.org/stable/c/7adc05b73d91a5e3d4ca7714fa53ad9b70c53d08
https://git.kernel.org/stable/c/9558612cb829f2c022b788f55d6b8437d5234a82
https://git.kernel.org/stable/c/c0756f75c22149d20fcb7d8409827cee905eb386
https://git.kernel.org/stable/c/f4e3634a3b642225a530c292fdb1e8a4007507f5
jsc#CAR-3624
rh#2282402
CVE-2021-47352kernel-source-rt:Ignoremoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2021-47352
SMASH Issue 406990
bnc#1225124
https://git.kernel.org/stable/c/3133e01514c3c498f2b01ff210ee6134b70c663c
https://git.kernel.org/stable/c/ad993a95c508417acdeb15244109e009e50d8758
https://git.kernel.org/stable/c/ba710baa1cc1b17a0483f7befe03e696efd17292
https://git.kernel.org/stable/c/c92298d228f61589dd21657af2bea95fc866b813
jsc#CAR-3598
rh#2282401
CVE-2021-47353kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47353
SMASH Issue 406992
bnc#1225128
https://git.kernel.org/stable/c/21bf1414580c36ffc8d8de043beb3508cf812238
https://git.kernel.org/stable/c/2f3d9ddd32a28803baa547e6274983b67d5e287c
https://git.kernel.org/stable/c/3638705ecd5ad2785e996f820121c0ad15ce64b5
https://git.kernel.org/stable/c/371566f63cbd0bb6fbb25b8fe9d5798268d35af9
https://git.kernel.org/stable/c/5150877e4d99f85057a458daac7cd7c01005d5c6
https://git.kernel.org/stable/c/80d505aee6398cf8beb72475c7edcf1733c1c68b
https://git.kernel.org/stable/c/aebed6b19e51a34003d998da5ebb1dfdd2cb1d02
https://git.kernel.org/stable/c/baea588a42d675e35daeaddd10fbc9700550bc4d
https://git.kernel.org/stable/c/fa236c2b2d4436d9f19ee4e5d5924e90ffd7bb43
jsc#CAR-3599
rh#2282400
CVE-2021-47354kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2021-47354
SMASH Issue 406993
bnc#1225140
https://git.kernel.org/stable/c/0687411e2a8858262de2fc4a1d576016fd77292e
https://git.kernel.org/stable/c/0b10ab80695d61422337ede6ff496552d8ace99d
https://git.kernel.org/stable/c/50d7e03ad487cc45fc85164a299b945a41756ac0
https://git.kernel.org/stable/c/a8e23e3c1ff9ec598ab1b3a941ace6045027781f
https://git.kernel.org/stable/c/c32d0f0e164ffab2a56c7cf8e612584b4b740e2e
rh#2282399
CVE-2021-47355kernel-source-rt:Ignoremoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47355
SMASH Issue 406994
bnc#1225141
https://git.kernel.org/stable/c/2f958b6f6ba0854b39be748d21dfe71e0fe6580f
https://git.kernel.org/stable/c/34e7434ba4e97f4b85c1423a59b2922ba7dff2ea
https://git.kernel.org/stable/c/4e2a0848ea2cab0716d46f85a8ccd5fa9a493e51
https://git.kernel.org/stable/c/5b991df8881088448cb223e769e37cab8dd40706
https://git.kernel.org/stable/c/99779c9d9ffc7775da6f7fd8a7c93ac61657bed5
https://git.kernel.org/stable/c/a7a7b2848312cc4c3a42b6e42a8ab2e441857aba
https://git.kernel.org/stable/c/a7f7c42e31157d1f0871d6a8e1a0b73a6b4ea785
https://git.kernel.org/stable/c/bdf5334250c69fabf555b7322c75249ea7d5f148
https://git.kernel.org/stable/c/c471569632654e57c83512e0fc1ba0dbb4544ad6
jsc#CAR-3601
rh#2282397
CVE-2021-47356kernel-source-rt:Already fixedmoderate5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2021-47356
SMASH Issue 406995
bnc#1225143
https://git.kernel.org/stable/c/009fc857c5f6fda81f2f7dd851b2d54193a8e733
https://git.kernel.org/stable/c/3ecd228c636ee17c14662729737fa07242a93cb0
https://git.kernel.org/stable/c/49331c07ef0f8fdfa42b30ba6a83a657b29d7fbe
https://git.kernel.org/stable/c/54ff3202928952a100c477248e65ac6db01258a7
https://git.kernel.org/stable/c/5f2818185da0fe82a932f0856633038b66faf124
https://git.kernel.org/stable/c/61370ff07e0acc657559a8fac02551dfeb9d3020
https://git.kernel.org/stable/c/7867ddc5f3de7f289aee63233afc0df4b62834c5
https://git.kernel.org/stable/c/b7ee9ae1e0cf55a037c4a99af2acc5d78cb7802d
https://git.kernel.org/stable/c/ed7c3739d0a07e2ec3ccbffe7e93cea01c438cda
rh#2282394
CVE-2021-47358kernel-source-rt:Ignoremoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47358
SMASH Issue 406997
bnc#1224920
https://git.kernel.org/stable/c/4dc56951a8d9d61d364d346c61a5f1d70b4f5e14
https://git.kernel.org/stable/c/64062fcaca8872f063ec9da011e7bf30470be33f
https://git.kernel.org/stable/c/92b67aaafb7c449db9f0c3dcabc0ff967cb3a42d
https://git.kernel.org/stable/c/92dc0b1f46e12cfabd28d709bb34f7a39431b44f
https://git.kernel.org/stable/c/9872ff6fdce8b229f01993b611b5d1719cb70ff1
https://git.kernel.org/stable/c/a5cfd51f6348e8fd7531461366946039c29c7e69
https://git.kernel.org/stable/c/b9e697e60ce9890e9258a73eb061288e7d68e5e6
jsc#CAR-3555
rh#2282392
CVE-2021-47359kernel-source-rt:Not affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47359
SMASH Issue 406998
bnc#1225145
https://git.kernel.org/stable/c/71826b068884050d5fdd37fda857ba1539c513d3
https://git.kernel.org/stable/c/9f6c7aff21f81ae8856da1f63847d1362d523409
jsc#CAR-3603
rh#2282391
CVE-2021-47360kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47360
SMASH Issue 406999
bnc#1225122
https://git.kernel.org/stable/c/5fdb55c1ac9585eb23bb2541d5819224429e103d
https://git.kernel.org/stable/c/aa2c274c279ff365a06a4cba263f04965895166e
https://git.kernel.org/stable/c/b95483d8d94b41fa31a84c1d86710b7907a37621
https://git.kernel.org/stable/c/d5b0473707fa53b03a5db0256ce62b2874bddbc7
rh#2282389
CVE-2021-47362kernel-source-rt:Ignoremoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47362
SMASH Issue 407001
bnc#1225153
https://git.kernel.org/stable/c/06a18e64256f7aecb5a27df02faa3568fcd3c105
https://git.kernel.org/stable/c/68d4fbe6220cd1f3d07cab0a4901e62f8c12cc68
https://git.kernel.org/stable/c/ab39d3cef526ba09c4c6923b4cd7e6ec1c5d4faa
jsc#CAR-3609
rh#2282387
CVE-2021-47363kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47363
SMASH Issue 407002
bnc#1225156
https://git.kernel.org/stable/c/563f23b002534176f49524b5ca0e1d94d8906c40
https://git.kernel.org/stable/c/e9d32ec26e7f01d1af13bdc687f586362546aa25
rh#2282386
CVE-2021-47364kernel-source-rt:Not affectedlow3.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2021-47364
SMASH Issue 407003
bnc#1225158
https://git.kernel.org/stable/c/8d6a21e4cd6a319b0662cbe4ad6199e276ac776a
https://git.kernel.org/stable/c/bb509a6ffed2c8b0950f637ab5779aa818ed1596
https://git.kernel.org/stable/c/f217b6c1e28ed0b353634ce4d92a155b80bd1671
rh#2282385
CVE-2021-47365kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47365
SMASH Issue 407004
bnc#1224895
https://git.kernel.org/stable/c/581b2027af0018944ba301d68e7af45c6d1128b5
https://git.kernel.org/stable/c/d130b5fdd42254d92948d06347940276140c927e
rh#2282382
CVE-2021-47366kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N)CVE-2021-47366
SMASH Issue 406851
bnc#1225160
https://git.kernel.org/stable/c/b537a3c21775075395af475dcc6ef212fcf29db8
https://git.kernel.org/stable/c/e66fc460d6dcf85cf12288e133a081205aebcd97
jsc#CAR-3618
rh#2282380
CVE-2021-47367kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47367
SMASH Issue 407005
bnc#1225123
https://git.kernel.org/stable/c/afd92d82c9d715fb97565408755acad81573591a
https://git.kernel.org/stable/c/f020bb63b5d2e5576acadd10e158fe3b04af67ba
rh#2282379
CVE-2021-47369kernel-source-rt:Already fixedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47369
SMASH Issue 407008
bnc#1225164
https://git.kernel.org/stable/c/248f064af222a1f97ee02c84a98013dfbccad386
https://git.kernel.org/stable/c/9b00fb12cdc9d8d1c3ffe82a78e74738127803fc
https://git.kernel.org/stable/c/db94f89e1dadf693c15c2d60de0c34777cea5779
rh#2282377
CVE-2021-47370kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47370
SMASH Issue 407009
bnc#1225183
https://git.kernel.org/stable/c/977d293e23b48a1129830d7968605f61c4af71a0
https://git.kernel.org/stable/c/f8ff625a8082db8c2b58dcb5229b27928943b94b
rh#2282376
CVE-2021-47371kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2021-47371
SMASH Issue 407010
bnc#1225167
https://git.kernel.org/stable/c/3106a0847525befe3e22fc723909d1b21eb0d520
https://git.kernel.org/stable/c/741760fa6252628a3d3afad439b72437d4b123d9
rh#2282375
CVE-2021-47373kernel-source-rt:Ignorelow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47373
SMASH Issue 407012
bnc#1225190
https://git.kernel.org/stable/c/280bef512933b2dda01d681d8cbe499b98fc5bdd
https://git.kernel.org/stable/c/42d3711c23781045e7a5cd28536c774b9a66d20b
https://git.kernel.org/stable/c/568662e37f927e3dc3e475f3ff7cf4ab7719c5e7
https://git.kernel.org/stable/c/5701e8bff314c155e7afdc467b1e0389d86853d0
https://git.kernel.org/stable/c/7d39992d45acd6f2d6b2f62389c55b61fb3d486b
https://git.kernel.org/stable/c/e0c1c2e5da19685a20557a50f10c6aa4fa26aa84
jsc#CAR-3627
rh#2282373
CVE-2021-47374kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47374
SMASH Issue 407013
bnc#1225191
https://git.kernel.org/stable/c/510e1a724ab1bf38150be2c1acabb303f98d0047
https://git.kernel.org/stable/c/de4afec2d2946c92c62a15ab341c70b287289e6a
rh#2282372
CVE-2021-47375kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47375
SMASH Issue 407014
bnc#1225193
bnc#1225194
https://git.kernel.org/stable/c/3815fe7371d2411ce164281cef40d9fc7b323dee
https://git.kernel.org/stable/c/488da313edf3abea7f7733efe011c96b23740ab5
https://git.kernel.org/stable/c/5afedf670caf30a2b5a52da96eb7eac7dee6a9c9
https://git.kernel.org/stable/c/677e362ba807f3aafe6f405c07e0b37244da5222
https://git.kernel.org/stable/c/a5f8e86192612d0183047448d8bbe7918b3f1a26
https://git.kernel.org/stable/c/d56171d9360c0170c5c5f8f7e2362a2e999eca40
https://git.kernel.org/stable/c/dacfd5e4d1142bfb3809aab3634a375f6f373269
https://git.kernel.org/stable/c/ebb8d26d93c3ec3c7576c52a8373a2309423c069
rh#2282370
CVE-2021-47377kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2021-47377
SMASH Issue 407016
bnc#1225200
https://git.kernel.org/stable/c/29917bbb07c30be295dece245c7c21872e1a6fbb
https://git.kernel.org/stable/c/372d3e6ea1e115942fdfb4b25f7003d822d071be
https://git.kernel.org/stable/c/6bba79c6a073741b672b0bf86a1f03c0fe47f973
https://git.kernel.org/stable/c/8480ed9c2bbd56fc86524998e5f2e3e22f5038f6
https://git.kernel.org/stable/c/922fd5b6bb13ad31ff36e86e2eba2f26d8135272
https://git.kernel.org/stable/c/c5d5a43dd2b649a0a290bfed00fb76d1aff89be6
jsc#CAR-3630
rh#2282363
CVE-2021-47380kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47380
SMASH Issue 407019
bnc#1225205
https://git.kernel.org/stable/c/283e4bee701dfcd409dd293f19a268bb2bc8ff38
https://git.kernel.org/stable/c/d46ef750ed58cbeeba2d9a55c99231c30a172764
rh#2282360
CVE-2021-47381kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47381
SMASH Issue 407020
bnc#1225206
https://git.kernel.org/stable/c/a6bb576ead074ca6fa3b53cb1c5d4037a23de81b
https://git.kernel.org/stable/c/ac4dfccb96571ca03af7cac64b7a0b2952c97f3a
rh#2282359
CVE-2021-47382kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47382
SMASH Issue 407021
bnc#1225207
https://git.kernel.org/stable/c/0bfe741741327822d1482c7edef0184636d08b40
https://git.kernel.org/stable/c/d2b59bd4b06d84a4eadb520b0f71c62fe8ec0a62
rh#2282358
CVE-2021-47384kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47384
SMASH Issue 407023
bnc#1225209
https://git.kernel.org/stable/c/6cb01fe630eaffc5a2c3f7364436caddba286623
https://git.kernel.org/stable/c/746011193f44f97f8784edcf8327c587946745fc
https://git.kernel.org/stable/c/7c4fd5de39f273626a2b0f3a446d2cc85cd47616
https://git.kernel.org/stable/c/dd4d747ef05addab887dc8ff0d6ab9860bbcd783
jsc#CAR-3634
rh#2282356
CVE-2021-47385kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47385
SMASH Issue 407025
bnc#1225210
https://git.kernel.org/stable/c/0f36b88173f028e372668ae040ab1a496834d278
https://git.kernel.org/stable/c/1499bb2c3a87a2efea0065adab2bd66badee61c3
https://git.kernel.org/stable/c/200ced5ba724d8bbf29dfac4ed1e17a39ccaccd1
https://git.kernel.org/stable/c/24af1fe376e22c42238a4a604d31e46c486876c3
jsc#CAR-3635
rh#2282355
CVE-2021-47386kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47386
SMASH Issue 407026
bnc#1225268
https://git.kernel.org/stable/c/16887ae4e3defd2c4e7913b6c539f33eaf4eac5c
https://git.kernel.org/stable/c/44d3c480e4e2a75bf6296a18b4356157991ccd80
https://git.kernel.org/stable/c/516d9055039017a20a698103be2b556b4c976bb8
https://git.kernel.org/stable/c/943c15ac1b84d378da26bba41c83c67e16499ac4
jsc#CAR-3652
rh#2282354
CVE-2021-47388kernel-source-rt:Already fixedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47388
SMASH Issue 407028
bnc#1225214
https://git.kernel.org/stable/c/27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9
https://git.kernel.org/stable/c/31de381aef0ab1b342f62485118dc8a19363dc78
https://git.kernel.org/stable/c/3d5d629c99c468458022e9b381789de3595bf4dd
https://git.kernel.org/stable/c/447d001b875d0e7f211c4ba004916028da994258
https://git.kernel.org/stable/c/50149e0866a82cef33e680ee68dc380a5bc75d32
https://git.kernel.org/stable/c/57de2dcb18742dc2860861c9f496da7d42b67da0
https://git.kernel.org/stable/c/94513069eb549737bcfc3d988d6ed4da948a2de8
https://git.kernel.org/stable/c/f556e1d6fb9f2923a9a36f3df638c7d79ba09dbb
rh#2282352
CVE-2021-47389kernel-source-rt:Not affectedmoderate5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H)CVE-2021-47389
SMASH Issue 407029
bnc#1225126
https://git.kernel.org/stable/c/efd7866e114dcb44f86d151e843f8276b7efbc67
https://git.kernel.org/stable/c/f1815e0aa770f2127c5df31eb5c2f0e37b60fa77
rh#2282351
CVE-2021-47390kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H)CVE-2021-47390
SMASH Issue 407030
bnc#1225125
https://git.kernel.org/stable/c/2f9b68f57c6278c322793a06063181deded0ad69
https://git.kernel.org/stable/c/99a9e9b80f19fc63be005a33d76211dd23114792
https://git.kernel.org/stable/c/bebabb76ad9acca8858e0371e102fb60d708e25b
rh#2282350
CVE-2021-47391kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47391
SMASH Issue 407031
bnc#1225318
bnc#1225319
https://git.kernel.org/stable/c/03d884671572af8bcfbc9e63944c1021efce7589
https://git.kernel.org/stable/c/305d568b72f17f674155a2a8275f865f207b3808
https://git.kernel.org/stable/c/9a085fa9b7d644a234465091e038c1911e1a4f2a
rh#2282349
CVE-2021-47392kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47392
SMASH Issue 407032
bnc#1225320
https://git.kernel.org/stable/c/3f4e68902d2e545033c80d7ad62fd9a439e573f4
https://git.kernel.org/stable/c/ca465e1f1f9b38fe916a36f7d80c5d25f2337c81
https://git.kernel.org/stable/c/e56a5146ef8cb51cd7c9e748267dce7564448a35
rh#2282347
CVE-2021-47393kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47393
SMASH Issue 407034
bnc#1225321
https://git.kernel.org/stable/c/5c6e0bce647d9cb32a17d58ffa669b3421fcc6ca
https://git.kernel.org/stable/c/76bbb482d33bfcd7e9070ecf594c9ec73e01c930
https://git.kernel.org/stable/c/a6c42ae1530f94724d3c42cf91fe3d3c5e394f8a
https://git.kernel.org/stable/c/aa85fb7bde558bb2e364e85976b14b259c8b6fe8
https://git.kernel.org/stable/c/e6fab7af6ba1bc77c78713a83876f60ca7a4a064
rh#2282345
CVE-2021-47394kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47394
SMASH Issue 407035
bnc#1225323
https://git.kernel.org/stable/c/a499b03bf36b0c2e3b958a381d828678ab0ffc5e
https://git.kernel.org/stable/c/f65c73d3aabb87d4353e0bc4a718b5ae8c43fd04
rh#2282344
CVE-2021-47395kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47395
SMASH Issue 407036
bnc#1225326
https://git.kernel.org/stable/c/1282bb00835ff79d2d9c023055d514df5b4de260
https://git.kernel.org/stable/c/13cb6d826e0ac0d144b0d48191ff1a111d32f0c6
https://git.kernel.org/stable/c/76538c7b4df314bb937e44c5cb1782f37d47443c
https://git.kernel.org/stable/c/997ee230e4f5285cd98445c102d9033c7ec4814b
https://git.kernel.org/stable/c/ab85997465b972d39d9747fc16311fa5773374b2
https://git.kernel.org/stable/c/ce5f372f5f084ff51c285fc27b232f15a3d00f0b
https://git.kernel.org/stable/c/e5bb852aa2ad963074f0ad73030dbc20a30853e3
rh#2282342
CVE-2021-47396kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47396
SMASH Issue 407037
bnc#1225327
https://git.kernel.org/stable/c/2c204cf594df3b9468368dc9d0b24d482d93cda7
https://git.kernel.org/stable/c/313bbd1990b6ddfdaa7da098d0c56b098a833572
https://git.kernel.org/stable/c/9bee85de2c8155388c09a2e1530a243ec1c96f05
https://git.kernel.org/stable/c/ed2adf69e29848d1eb9df99633dde655421c92ed
rh#2282341
CVE-2021-47398kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2021-47398
SMASH Issue 407039
bnc#1225131
https://git.kernel.org/stable/c/714bfabe5f2901d96902e271d7217601fe4703e5
https://git.kernel.org/stable/c/7d5cfafe8b4006a75b55c2f1fdfdb363f9a5cc98
rh#2282339
CVE-2021-47399kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47399
SMASH Issue 407040
bnc#1225328
https://git.kernel.org/stable/c/20f6c4a31a525edd9ea6243712b868ba0e4e331e
https://git.kernel.org/stable/c/2744341dd52e935344ca1b4bf189ba0d182a3e8e
https://git.kernel.org/stable/c/513e605d7a9ce136886cb42ebb2c40e9a6eb6333
rh#2282337
CVE-2021-47404kernel-source-rt:Already fixedmoderate6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H)CVE-2021-47404
SMASH Issue 407046
bnc#1225303
https://git.kernel.org/stable/c/1c83c38dec83d57bc18d0c01d82c413d3b34ccb9
https://git.kernel.org/stable/c/1e4ce418b1cb1a810256b5fb3fd33d22d1325993
https://git.kernel.org/stable/c/6fc4476dda58f6c00097c7ddec3b772513f57525
https://git.kernel.org/stable/c/708107b80aa616976d1c5fa60ac0c1390749db5e
https://git.kernel.org/stable/c/a4faa7153b87fbcfe4be15f4278676f79ca6e019
https://git.kernel.org/stable/c/bb8b72374db69afa25a5b65cf1c092860c6fe914
https://git.kernel.org/stable/c/dedfc35a2de2bae9fa3da8210a05bfd515f83fee
https://git.kernel.org/stable/c/fe9bb925e7096509711660d39c0493a1546e9550
rh#2282332
CVE-2021-47405kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47405
SMASH Issue 407047
bnc#1225238
https://git.kernel.org/stable/c/2b704864c92dcec2b295f276fcfbfb81d9831f81
https://git.kernel.org/stable/c/764ac04de056801dfe52a716da63f6e7018e7f3b
https://git.kernel.org/stable/c/7ce4e49146612261265671b1d30d117139021030
https://git.kernel.org/stable/c/965147067fa1bedff3ae1f07ce3f89f1a14d2df3
https://git.kernel.org/stable/c/c3156fea4d8a0e643625dff69a0421e872d1fdae
https://git.kernel.org/stable/c/efc5c8d29256955cc90d8d570849b2d6121ed09f
https://git.kernel.org/stable/c/f7744fa16b96da57187dc8e5634152d3b63d72de
https://git.kernel.org/stable/c/f7ac4d24e1610b92689946fa88177673f1e88a3f
rh#2282331
CVE-2021-47406kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47406
SMASH Issue 407048
bnc#1225304
https://git.kernel.org/stable/c/1fd95c05d8f742abfe906620780aee4dbe1a2db0
https://git.kernel.org/stable/c/27e10c5d31ff1d222c7f797f1ee96d422859ba67
https://git.kernel.org/stable/c/a63474dbf692dd09b50fed592bc41f6de5f102fc
rh#2282330
CVE-2021-47410kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47410
SMASH Issue 407053
bnc#1225331
https://git.kernel.org/stable/c/197ae17722e989942b36e33e044787877f158574
https://git.kernel.org/stable/c/ac7d732b24f4061f8a732ada49b054ab38c63e15
rh#2282326
CVE-2021-47411kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2021-47411
SMASH Issue 407054
bnc#1225231
https://git.kernel.org/stable/c/648f59a06b0e1fec7a4158cdee9acd362e493ce1
https://git.kernel.org/stable/c/8bab4c09f24ec8d4a7a78ab343620f89d3a24804
rh#2282325
CVE-2021-47413kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47413
SMASH Issue 407056
bnc#1225333
https://git.kernel.org/stable/c/66dd03b10e1c0b2fae006c6e34c18ea8ee033e7b
https://git.kernel.org/stable/c/8253a34bfae3278baca52fc1209b7c29270486ca
https://git.kernel.org/stable/c/b3265b88e83b16c7be762fa5fb7e0632bce0002c
rh#2282323
CVE-2021-47414kernel-source-rt:Unsupportedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47414
SMASH Issue 407057
bnc#1225334
https://git.kernel.org/stable/c/427faa29e06f0709476ea1bd59758f997ec8b64e
https://git.kernel.org/stable/c/bb8958d5dc79acbd071397abb57b8756375fe1ce
https://git.kernel.org/stable/c/f1c7aa87c423e765e3862349c2f095fdfccdd9b3
jsc#CAR-3658
rh#2282321
CVE-2021-47415kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47415
SMASH Issue 407058
bnc#1225335
https://git.kernel.org/stable/c/24d5f16e407b75bc59d5419b957a9cab423b2681
https://git.kernel.org/stable/c/432d8185e9ffce97e3866ca71c39b0807a456920
rh#2282320
CVE-2021-47416kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47416
SMASH Issue 407059
bnc#1225189
bnc#1225336
https://git.kernel.org/stable/c/064c2616234a7394867c924b5c1303974f3a4f4d
https://git.kernel.org/stable/c/0d2dd40a7be61b89a7c99dae8ee96389d27b413a
https://git.kernel.org/stable/c/2250392d930bd0d989f24d355d6355b0150256e7
https://git.kernel.org/stable/c/2397b9e118721292429fea8807a698e71b94795f
https://git.kernel.org/stable/c/25e9f88c7e3cc35f5e3d3db199660d28a15df639
https://git.kernel.org/stable/c/414bb4ead1362ef2c8592db723c017258f213988
https://git.kernel.org/stable/c/ca6e11c337daf7925ff8a2aac8e84490a8691905
https://git.kernel.org/stable/c/f4f502a04ee1e543825af78f47eb7785015cd9f6
rh#2282319
CVE-2021-47417kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47417
SMASH Issue 406866
bnc#1225227
https://git.kernel.org/stable/c/9e8e7504e09831c469b67d6dc11d9a72654bdb8c
https://git.kernel.org/stable/c/b0e875bac0fab3e7a7431c2eee36a8ccc0c712ac
rh#2282318
CVE-2021-47419kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47419
SMASH Issue 407061
bnc#1225338
https://git.kernel.org/stable/c/3ec73ffeef54596c32aff0e73fe60971b9c8b866
https://git.kernel.org/stable/c/7a1c1af341041221b3acb9d7036cc2b43e0efa75
https://git.kernel.org/stable/c/a56d447f196fa9973c568f54c0d76d5391c3b0c0
https://git.kernel.org/stable/c/c951c08a5996365aecbc5f1a9bddec3905e1ddfc
rh#2282315
CVE-2021-47420kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47420
SMASH Issue 407062
bnc#1225339
https://git.kernel.org/stable/c/7e5ce6029b627efb4a004746cfdc1eeff850e6eb
https://git.kernel.org/stable/c/b072ef1215aca33186e3a10109e872e528a9e516
rh#2282313
CVE-2021-47421kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47421
SMASH Issue 407063
bnc#1225353
https://git.kernel.org/stable/c/248b061689a40f4fed05252ee2c89f87cf26d7d8
https://git.kernel.org/stable/c/72e9a1bf9b722628c28092e0c2cd8717edd201dc
rh#2282312
CVE-2021-47422kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47422
SMASH Issue 407064
bnc#1225233
https://git.kernel.org/stable/c/0b3d4945cc7e7ea1acd52cb06dfa83bfe265b6d5
https://git.kernel.org/stable/c/0b4e9fc14973a94ac0520f19b3633493ae13c912
https://git.kernel.org/stable/c/65fff0a8efcdca8d84ffe3e23057c3b32403482d
rh#2282311
CVE-2021-47423kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47423
SMASH Issue 407065
bnc#1225366
https://git.kernel.org/stable/c/11cd944bb87d9e575b94c07c952105eda745b459
https://git.kernel.org/stable/c/1508b09945bde393326a9dab73b1fc35f672d771
https://git.kernel.org/stable/c/88c3610045ca6e699331b6bb5c095c5565f30721
https://git.kernel.org/stable/c/9f9d4c88b2edc7924e19c44909cfc3fa4e4d3d43
https://git.kernel.org/stable/c/df0c9418923679bc6d0060bdb1b5bf2c755159e0
https://git.kernel.org/stable/c/f5a8703a9c418c6fc54eb772712dfe7641e3991c
https://git.kernel.org/stable/c/f69556a42043b5444ca712ee889829ba89fdcba8
rh#2282310
CVE-2021-47424kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47424
SMASH Issue 407066
bnc#1225367
https://git.kernel.org/stable/c/17063cac4088b8e2fc0f633abddca5426ed58312
https://git.kernel.org/stable/c/2e5a20573a926302b233b0c2e1077f5debc7ab2e
https://git.kernel.org/stable/c/60ad4cde0ad28921f9ea25b0201c774b95ffa4b4
https://git.kernel.org/stable/c/75099439209d3cda439a1d9b00d19a50f0066fef
https://git.kernel.org/stable/c/97aeed72af4f83ae51534f0a2473ff52f8d66236
rh#2282308
CVE-2021-47425kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47425
SMASH Issue 407067
bnc#1225223
https://git.kernel.org/stable/c/3d9d458a8aaafa47268ea4f1b4114a9f12927989
https://git.kernel.org/stable/c/60bacf259e8c2eb2324f3e13275200baaee9494b
https://git.kernel.org/stable/c/6558b646ce1c2a872fe1c2c7cb116f05a2c1950f
https://git.kernel.org/stable/c/90f1077c9184ec2ae9989e4642f211263f301694
https://git.kernel.org/stable/c/b8090a84d7758b929d348bafbd86bb7a10c5fb63
https://git.kernel.org/stable/c/f86de018fd7a24ee07372d55ffa7824f0c674a95
rh#2282307
CVE-2021-47426kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47426
SMASH Issue 407068
bnc#1225370
https://git.kernel.org/stable/c/29fdb11ca88d3c490a3d56f0dc77eb9444d086be
https://git.kernel.org/stable/c/686cb8b9f6b46787f035afe8fbd132a74e6b1bdd
https://git.kernel.org/stable/c/a326f9c01cfbee4450ae49ce618ae6cbc0f76842
https://git.kernel.org/stable/c/d590a410e472417a22336c7c37685bfb38e801f2
rh#2282306
CVE-2021-47427kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47427
SMASH Issue 407069
bnc#1225225
https://git.kernel.org/stable/c/1642f51ac0d4f2b55d5748094c49ff8f7191b93c
https://git.kernel.org/stable/c/258aad75c62146453d03028a44f2f1590d58e1f6
rh#2282305
CVE-2021-47429kernel-source-rt:Not affectedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2021-47429
SMASH Issue 407071
bnc#1225388
https://git.kernel.org/stable/c/d7a8e38999fbd6910516e44cb43f9f4317e54f73
https://git.kernel.org/stable/c/f08fb25bc66986b0952724530a640d9970fa52c1
rh#2282302
CVE-2021-47430kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47430
SMASH Issue 407072
bnc#1225228
https://git.kernel.org/stable/c/3958b9c34c2729597e182cc606cc43942fd19f7c
https://git.kernel.org/stable/c/4e9ec1c65da98c293f75d83755dfa5e03075a6d0
https://git.kernel.org/stable/c/f2447f6587b8ffe42ba04d14ce67d429a1163e5e
rh#2282301
CVE-2021-47431kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47431
SMASH Issue 407073
bnc#1225390
https://git.kernel.org/stable/c/18d1c5ea3798ba42cfa0f8b2264d873463facb03
https://git.kernel.org/stable/c/621ddffb70db824eabd63d18ac635180fe9500f9
https://git.kernel.org/stable/c/66805763a97f8f7bdf742fc0851d85c02ed9411f
https://git.kernel.org/stable/c/83d857d6b0967b6709cd38750c3ce2ed8ced1a95
rh#2282300
CVE-2021-47434kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47434
SMASH Issue 407288
bnc#1225232
https://git.kernel.org/stable/c/01c2dcb67e71c351006dd17cbba86c26b7f61eaf
https://git.kernel.org/stable/c/22bcb65ea41072ab5d03c0c6290e04e0df6d09a0
https://git.kernel.org/stable/c/62c182b5e763e5f4062e72678e72ce3e02dd4d1b
https://git.kernel.org/stable/c/dec944bb7079b37968cf69c8a438f91f15c4cc61
https://git.kernel.org/stable/c/e54abefe703ab7c4e5983e889babd1447738ca42
https://git.kernel.org/stable/c/ff0e50d3564f33b7f4b35cadeabd951d66cfc570
rh#2282880
CVE-2021-47436kernel-source-rt:Already fixedmoderate ()CVE-2021-47436
SMASH Issue 407290
bnc#1225244
https://git.kernel.org/stable/c/5ed60a430fb5f3d93e7fef66264daef466b4d10c
https://git.kernel.org/stable/c/9ab5d539bc975b8dcde86eca1b58d836b657732e
https://git.kernel.org/stable/c/9d89e287116796bf987cc48f5c8632ef3048f8eb
https://git.kernel.org/stable/c/c2115b2b16421d93d4993f3fe4c520e91d6fe801
https://git.kernel.org/stable/c/e923bce31ffefe4f60edfc6b84f62d4a858f3676
https://git.kernel.org/stable/c/ff9249aab39820be11b6975a10d94253b7d426fc
rh#2282878
CVE-2021-47437kernel-source-rt:Not affectedmoderate ()CVE-2021-47437
SMASH Issue 407291
bnc#1225245
https://git.kernel.org/stable/c/04e03b907022ebd876f422f17efcc2c6cc934dc6
https://git.kernel.org/stable/c/9da1b86865ab4376408c58cd9fec332c8bdb5c73
rh#2282876
CVE-2021-47439kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47439
SMASH Issue 407293
bnc#1225246
https://git.kernel.org/stable/c/383239a33cf29ebee9ce0d4e0e5c900b77a16148
https://git.kernel.org/stable/c/ef1100ef20f29aec4e62abeccdb5bdbebba1e378
https://git.kernel.org/stable/c/f2e1de075018cf71bcd7d628e9f759cb8540b0c3
rh#2282873
CVE-2021-47441kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47441
SMASH Issue 407295
bnc#1225224
https://git.kernel.org/stable/c/332fdf951df8b870e3da86b122ae304e2aabe88c
https://git.kernel.org/stable/c/ae0993739e14a102d506aa09e11b0065f3144f10
https://git.kernel.org/stable/c/df8e58716afb3bee2b59de66b1ba1033f2e26303
https://git.kernel.org/stable/c/e59d839743b50cb1d3f42a786bea48cc5621d254
rh#2282851
CVE-2021-47442kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47442
SMASH Issue 407296
bnc#1225263
https://git.kernel.org/stable/c/071bdef36391958c89af5fa2172f691b31baa212
https://git.kernel.org/stable/c/291c932fc3692e4d211a445ba8aa35663831bac7
https://git.kernel.org/stable/c/2bde4aca56db9fe25405d39ddb062531493a65db
https://git.kernel.org/stable/c/50cb95487c265187289810addec5093d4fed8329
https://git.kernel.org/stable/c/6432d7f1d1c3aa74cfe8f5e3afdf81b786c32e86
https://git.kernel.org/stable/c/74569c78aa84f8c958f1334b465bc530906ec99a
https://git.kernel.org/stable/c/88c890b0b9a1fb9fcd01c61ada515e8b636c34f9
https://git.kernel.org/stable/c/fcce6e5255474ca33c27dda0cdf9bf5087278873
rh#2282850
CVE-2021-47443kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47443
SMASH Issue 407297
bnc#1225262
https://git.kernel.org/stable/c/3f2960b39f22e26cf8addae93c3f5884d1c183c9
https://git.kernel.org/stable/c/429054ec51e648d241a7e0b465cf44f6633334c5
https://git.kernel.org/stable/c/564249219e5b5673a8416b5181875d828c3f1e8c
https://git.kernel.org/stable/c/58e7dcc9ca29c14e44267a4d0ea61e3229124907
https://git.kernel.org/stable/c/7ab488d7228a9dceb2456867f1f0919decf6efed
https://git.kernel.org/stable/c/9881b0c860649f27ef2565deef011e516390f416
https://git.kernel.org/stable/c/a67d47e32c91e2b10402cb8c081774cbf08edb2e
https://git.kernel.org/stable/c/b7b023e6ff567e991c31cd425b0e1d16779c938b
rh#2282849
CVE-2021-47444kernel-source-rt:Not affectedmoderate ()CVE-2021-47444
SMASH Issue 407298
bnc#1225243
https://git.kernel.org/stable/c/09f3946bb452918dbfb1982add56f9ffaae393dc
https://git.kernel.org/stable/c/97794170b696856483f74b47bfb6049780d2d3a0
https://git.kernel.org/stable/c/a7b45024f66f9ec769e8dbb1a51ae83cd05929c7
rh#2282848
CVE-2021-47445kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47445
SMASH Issue 407299
bnc#1225261
https://git.kernel.org/stable/c/0cd063aa0a09822cc1620fc59a67fe2f9f6338ac
https://git.kernel.org/stable/c/2133c4fc8e1348dcb752f267a143fe2254613b34
https://git.kernel.org/stable/c/46c8ddede0273d1d132beefa9de8b820326982be
https://git.kernel.org/stable/c/7f642b93710b6b1119bdff90be01e6b5a2a5d669
https://git.kernel.org/stable/c/91a340768b012f5b910a203a805b97a345b3db37
https://git.kernel.org/stable/c/bacac7d26849c8e903ceb7466d9ce8dc3c2797eb
https://git.kernel.org/stable/c/f175b9a83e5c252d7c74acddc792840016caae0a
https://git.kernel.org/stable/c/f302be08e3de94db8863a0b2958b2bb3e8e998e6
rh#2282847
CVE-2021-47446kernel-source-rt:Not affectedmoderate ()CVE-2021-47446
SMASH Issue 407300
bnc#1225240
https://git.kernel.org/stable/c/3962d626eb3e3b23ebb2e2a61537fa764acbfe11
https://git.kernel.org/stable/c/980d74e7d03ccf2eaa11d133416946bd880c7c08
rh#2282846
CVE-2021-47447kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47447
SMASH Issue 407301
bnc#1225260
https://git.kernel.org/stable/c/3eda901995371d390ef82d0b6462f4ea8efbcfdf
https://git.kernel.org/stable/c/d59e44e7821a8f2bb6f2e846b9167397a5f01608
rh#2282914
CVE-2021-47448kernel-source-rt:Not affectedmoderate5.7 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H)CVE-2021-47448
SMASH Issue 407302
bnc#1225129
https://git.kernel.org/stable/c/1a4554e94f0deff9fc1dc5addf93fa579cc29711
https://git.kernel.org/stable/c/612f71d7328c14369924384ad2170aae2a6abd92
rh#2282913
CVE-2021-47449kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47449
SMASH Issue 407303
bnc#1225259
https://git.kernel.org/stable/c/4d4a223a86afe658cd878800f09458e8bb54415d
https://git.kernel.org/stable/c/61616be899975404df44c20ab902464b60882cd7
rh#2282911
CVE-2021-47450kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47450
SMASH Issue 407304
bnc#1225258
https://git.kernel.org/stable/c/1d58a17ef54599506d44c45ac95be27273a4d2b1
https://git.kernel.org/stable/c/b372264c66ef78f2cab44e877fbd765ad6d24c39
rh#2282909
CVE-2021-47451kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47451
SMASH Issue 407305
bnc#1225237
https://git.kernel.org/stable/c/2a670c323055282c9b72794a491d53cef86bbeaf
https://git.kernel.org/stable/c/902c0b1887522a099aa4e1e6b4b476c2fe5dd13e
https://git.kernel.org/stable/c/cae7cab804c943d723d52724a3aeb07a3f4a2650
rh#2282907
CVE-2021-47452kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47452
SMASH Issue 407306
bnc#1225257
https://git.kernel.org/stable/c/68a3765c659f809dcaac20030853a054646eb739
https://git.kernel.org/stable/c/90c7c58aa2bd02c65a4c63b7dfe0b16eab12cf9f
rh#2282906
CVE-2021-47453kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47453
SMASH Issue 407307
bnc#1225239
https://git.kernel.org/stable/c/73e30a62b19b9fbb4e6a3465c59da186630d5f2e
https://git.kernel.org/stable/c/777682e59840e24e6c5672197e6ffbcf4bff823b
rh#2282905
CVE-2021-47454kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47454
SMASH Issue 407308
bnc#1225255
https://git.kernel.org/stable/c/3ea0b497a7a2fff6a4b7090310c9f52c91975934
https://git.kernel.org/stable/c/53770a411559cf7bc0906d1df319cc533d2f4f58
https://git.kernel.org/stable/c/787252a10d9422f3058df9a4821f389e5326c440
rh#2282904
CVE-2021-47456kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47456
SMASH Issue 407310
bnc#1225256
https://git.kernel.org/stable/c/0e5afdc2315b0737edcf55bede4ee1640d2d464d
https://git.kernel.org/stable/c/1248582e47a9f7ce0ecd156c39fc61f8b6aa3699
https://git.kernel.org/stable/c/1c616528ba4aeb1125a06b407572ab7b56acae38
https://git.kernel.org/stable/c/28f28e4bc3a5e0051faa963f10b778ab38c1db69
https://git.kernel.org/stable/c/34914971bb3244db4ce2be44e9438a9b30c56250
https://git.kernel.org/stable/c/447d44cd2f67a20b596ede3ca3cd67086dfd9ca9
https://git.kernel.org/stable/c/949fe9b35570361bc6ee2652f89a0561b26eec98
https://git.kernel.org/stable/c/adbda14730aacce41c0d3596415aa39ad63eafd9
rh#2282902
CVE-2021-47457kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47457
SMASH Issue 407311
bnc#1225235
https://git.kernel.org/stable/c/053bc12df0d6097c1126d0e14fa778a0a8faeb64
https://git.kernel.org/stable/c/9acf636215a6ce9362fe618e7da4913b8bfe84c8
https://git.kernel.org/stable/c/a76abedd2be3926d6deba236a935c7f98abf9110
rh#2282901
CVE-2021-47459kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47459
SMASH Issue 407313
bnc#1225253
https://git.kernel.org/stable/c/6e8811707e2df0c6ba920f0cad3a3bca7b42132f
https://git.kernel.org/stable/c/864e77771a24c877aaf53aee019f78619cbcd668
https://git.kernel.org/stable/c/a0e47d2833b4f65e6c799f28c6b636d36b8b936d
https://git.kernel.org/stable/c/d9d52a3ebd284882f5562c88e55991add5d01586
rh#2282898
CVE-2021-47460kernel-source-rt:Already fixedlow ()CVE-2021-47460
SMASH Issue 407314
bnc#1225251
https://git.kernel.org/stable/c/5314454ea3ff6fc746eaf71b9a7ceebed52888fa
https://git.kernel.org/stable/c/560edd14de2bf9dbc0129681eeb4d5ef87cc105f
https://git.kernel.org/stable/c/8e6bfb4f70168ddfd32fb6dc028ad52faaf1f32e
https://git.kernel.org/stable/c/a3a089c241cd49b33a8cdd7fcb37cc87a086912a
https://git.kernel.org/stable/c/b05caf023b14cbed9223bb5b48ecc7bffe38f632
https://git.kernel.org/stable/c/f1b98569e81c37d7e0deada7172f8f60860c1360
https://git.kernel.org/stable/c/fa9b6b6c953e3f6441ed6cf83b4c771dac2dae08
CVE-2021-47461kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47461
SMASH Issue 407277
bnc#1225249
https://git.kernel.org/stable/c/149958ecd0627a9f1e9c678c25c665400054cd6a
https://git.kernel.org/stable/c/3cda4bfffd4f755645577aaa9e96a606657b4525
https://git.kernel.org/stable/c/cb185d5f1ebf900f4ae3bf84cee212e6dd035aca
rh#2282896
CVE-2021-47462kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47462
SMASH Issue 407315
bnc#1225250
https://git.kernel.org/stable/c/6d2aec9e123bb9c49cb5c7fc654f25f81e688e8c
https://git.kernel.org/stable/c/9ee4e9ae98f1f262d6fae0d266cfdf3ba2c321d9
rh#2282895
CVE-2021-47463kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47463
SMASH Issue 407316
bnc#1225127
https://git.kernel.org/stable/c/79f9bc5843142b649575f887dccdf1c07ad75c20
https://git.kernel.org/stable/c/b77ba1e02345bafd703f0d407bdbd88c3be1f767
rh#2282893
CVE-2021-47464kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47464
SMASH Issue 407317
bnc#1225393
https://git.kernel.org/stable/c/16802fa4c33eb1a8efb23f1e93365190e4047d05
https://git.kernel.org/stable/c/4e9e46a700201b4c85081fd478c99c692a9aaa0d
https://git.kernel.org/stable/c/6e3ee990c90494561921c756481d0e2125d8b895
https://git.kernel.org/stable/c/d6f451f1f60c58d73038c7c3177066f8f084e2a2
rh#2282892
CVE-2021-47465kernel-source-rt:Already fixedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2021-47465
SMASH Issue 407318
bnc#1225341
https://git.kernel.org/stable/c/6d077c37c4643394b1bae9682da48164fc147ea8
https://git.kernel.org/stable/c/80bbb0bc3a0288442f7fe6fc514f4ee1cb06ccb7
https://git.kernel.org/stable/c/9b4416c5095c20e110c82ae602c254099b83b72f
https://git.kernel.org/stable/c/fbd724c49bead048ae9fc1a5b7bff2fb3e54f855
rh#2282891
CVE-2021-47466kernel-source-rt:Ignoremoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2021-47466
SMASH Issue 407285
bnc#1225342
https://git.kernel.org/stable/c/42b81946e3ac9ea0372ba16e05160dc11e02694f
https://git.kernel.org/stable/c/4f5d1c29cfab5cb0ab885059818751bdef32e2bb
https://git.kernel.org/stable/c/568f906340b43120abd6fcc67c37396482f85930
https://git.kernel.org/stable/c/9037c57681d25e4dcc442d940d6dbe24dd31f461
jsc#CAR-3660
rh#2282890
CVE-2021-47467kernel-source-rt:Not affectedlow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2021-47467
SMASH Issue 407319
bnc#1225344
https://git.kernel.org/stable/c/bbdd158b40b66a9403391a517f24ef6613573446
https://git.kernel.org/stable/c/f62314b1ced25c58b86e044fc951cd6a1ea234cf
rh#2282889
CVE-2021-47468kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47468
SMASH Issue 407320
bnc#1225346
https://git.kernel.org/stable/c/37e4f57b22cc5ebb3f80cf0f74fdeb487f082367
https://git.kernel.org/stable/c/4054b869dc263228d30a4755800b78f0f2ba0c89
https://git.kernel.org/stable/c/6510e80a0b81b5d814e3aea6297ba42f5e76f73c
https://git.kernel.org/stable/c/6f95c97e0f9d6eb39c3f2cb45e8fa4268d1b372b
https://git.kernel.org/stable/c/9f591cbdbed3d7822b2bdba89b34a6d7b434317d
https://git.kernel.org/stable/c/a5b34409d3fc52114c828be4adbc30744fa3258b
https://git.kernel.org/stable/c/ef269a8808cb1759245a98a7fe16fceaebad894c
https://git.kernel.org/stable/c/f5966ba53013149bcf94e1536644a958dd00a026
rh#2282887
CVE-2021-47469kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47469
SMASH Issue 407321
bnc#1225347
https://git.kernel.org/stable/c/6098475d4cb48d821bdf453c61118c56e26294f0
https://git.kernel.org/stable/c/722ef19a161ce3fffb3d1b01ce2301c306639bdd
jsc#CAR-3661
rh#2282886
CVE-2021-47470kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47470
SMASH Issue 407322
bnc#1225186
https://git.kernel.org/stable/c/159d8cfbd0428d487c53be4722f33cdab0d25d83
https://git.kernel.org/stable/c/67823a544414def2a36c212abadb55b23bcda00c
rh#2282885
CVE-2021-47471kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47471
SMASH Issue 407323
bnc#1225187
https://git.kernel.org/stable/c/3cfc183052c3dbf8eae57b6c1685dab00ed3db4a
https://git.kernel.org/stable/c/b0e6db0656ddfd8bb57303c2ef61ee1c1cc694a8
https://git.kernel.org/stable/c/f40c2281d2c0674d32ba732fee45222d76495472
rh#2282884
CVE-2021-47472kernel-source-rt:Analysislow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47472
SMASH Issue 407324
bnc#1225189
https://git.kernel.org/stable/c/0c4e87ba11eb331dca2315d484d08441b8c13193
https://git.kernel.org/stable/c/2bc10dca9432fadb09e45127e258fc7127fd346d
https://git.kernel.org/stable/c/3a0dc2e35a5d6546b1db87fe985582dadc64fe7b
https://git.kernel.org/stable/c/4ec0f9abc512cc02fb04daa89ccf6697e80ab417
https://git.kernel.org/stable/c/6a18d155d5b35ad50c8fac2be091212487ae58ec
https://git.kernel.org/stable/c/8121d0d4fd108280f5cd7b7fe8c6592adaa37be9
https://git.kernel.org/stable/c/8ba94a7f7b9fc2a2b808ccceb99b77135deae21a
https://git.kernel.org/stable/c/a9831afa2dc8a18205403907c41aa4e0950ac611
https://git.kernel.org/stable/c/ab609f25d19858513919369ff3d9a63c02cd9e2e
https://git.kernel.org/stable/c/b0feaa8376f52357bf2fd020d0c471713a859728
https://git.kernel.org/stable/c/b89f4537d7fdbd0bafb6d8a66a484e0bc99871a4
https://git.kernel.org/stable/c/bc5f2f3431ced08300e4cb3aff35f1da14c26433
https://git.kernel.org/stable/c/c828115a14eacbf42042770fd68543f134e89efa
https://git.kernel.org/stable/c/fd2400dd4f1b8bd7a309b1b424d9e0d188151b01
https://git.kernel.org/stable/c/fdbffd95c4ce94d2197c504008eaac46b16bc5a4
rh#2282883
CVE-2021-47473kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47473
SMASH Issue 407276
bnc#1225192
https://git.kernel.org/stable/c/7fb223d0ad801f633c78cbe42b1d1b55f5d163ad
https://git.kernel.org/stable/c/96f0aebf29be25254fa585af43924e34aa21fd9a
https://git.kernel.org/stable/c/a7fbb56e6c941d9f59437b96412a348e66388d3e
rh#2282882
CVE-2021-47474kernel-source-rt:Not affectedmoderate6.8 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47474
SMASH Issue 407352
bnc#1224915
https://git.kernel.org/stable/c/063f576c43d589a4c153554b681d32b3f8317c7b
https://git.kernel.org/stable/c/0866dcaa828c21bc2f94dac00e086078f11b5772
https://git.kernel.org/stable/c/1ae4715121a57bc6fa29fd992127b01907f2f993
https://git.kernel.org/stable/c/47b4636ebdbeba2044b3db937c4d2b6a4fe3d0f2
https://git.kernel.org/stable/c/78cdfd62bd54af615fba9e3ca1ba35de39d3871d
https://git.kernel.org/stable/c/7b0e356189327287d0eb98ec081bd6dd97068cd3
https://git.kernel.org/stable/c/7cfb35db607760698d299fd1cf7402dfa8f09973
https://git.kernel.org/stable/c/b7fd7f3387f070215e6be341e68eb5c087eeecc0
https://git.kernel.org/stable/c/e0e6a63fd97ad95fe05dfd77268a1952551e11a7
jsc#CAR-3552
rh#2282949
CVE-2021-47475kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47475
SMASH Issue 407353
bnc#1224914
https://git.kernel.org/stable/c/06ac746d57e6d32b062e220415c607b7e2e0fa50
https://git.kernel.org/stable/c/199acd8c110e3ae62833c24f632b0bb1c9f012a9
https://git.kernel.org/stable/c/278484ae93297b1bb1ce755f9d3b6d95a48c7d47
https://git.kernel.org/stable/c/33d7a470730dfe7c9bfc8da84575cf2cedd60d00
https://git.kernel.org/stable/c/40d2a7e278e2e7c0a5fd7e997e7eb63945bf93f7
https://git.kernel.org/stable/c/5229159f1d052821007aff1a1beb7873eacf1a9f
https://git.kernel.org/stable/c/7a2021b896de1ad559d33b5c5cdd20b982242088
https://git.kernel.org/stable/c/a23461c47482fc232ffc9b819539d1f837adf2b1
https://git.kernel.org/stable/c/ec85bcff4ed09260243d8f39faba99e1041718ba
jsc#CAR-3551
rh#2282948
CVE-2021-47476kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47476
SMASH Issue 407354
bnc#1224913
https://git.kernel.org/stable/c/4a9d43cb5d5f39fa39fc1da438517004cc95f7ea
https://git.kernel.org/stable/c/58478143771b20ab219937b1c30a706590a59224
https://git.kernel.org/stable/c/907767da8f3a925b060c740e0b5c92ea7dbec440
https://git.kernel.org/stable/c/aa39738423503825625853b643b9e99d11c23816
https://git.kernel.org/stable/c/b0156b7c9649d8f55a2ce3d3258509f1b2a181c3
https://git.kernel.org/stable/c/bc51111bf6e8e7b6cc94b133e4c291273a16acd1
https://git.kernel.org/stable/c/d6a727a681a39ae4f73081a9bedb45d14f95bdd1
https://git.kernel.org/stable/c/df7b1238f3b599a0b9284249772cdfd1ea83a632
https://git.kernel.org/stable/c/ef143dc0c3defe56730ecd3a9de7b3e1d7e557c1
jsc#CAR-3550
rh#2282947
CVE-2021-47477kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2021-47477
SMASH Issue 407355
bnc#1224912
https://git.kernel.org/stable/c/20cebb8b620dc987e55ddc46801de986e081757e
https://git.kernel.org/stable/c/365a346cda82f51d835c49136a00a9df8a78c7f2
https://git.kernel.org/stable/c/39ea61037ae78f14fa121228dd962ea3280eacf3
https://git.kernel.org/stable/c/3ac273d154d634e2034508a14db82a95d7ad12ed
https://git.kernel.org/stable/c/3efb7af8ac437085b6c776e5b54830b149d86efe
https://git.kernel.org/stable/c/536de747bc48262225889a533db6650731ab25d3
https://git.kernel.org/stable/c/786f5b03450454557ff858a8bead5d7c0cbf78d6
https://git.kernel.org/stable/c/8a52bc480992c7c9da3ebfea456af731f50a4b97
https://git.kernel.org/stable/c/a6af69768d5cb4b2528946d53be5fa19ade37723
jsc#CAR-3549
rh#2282946
CVE-2021-47479kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47479
SMASH Issue 407357
bnc#1224911
https://git.kernel.org/stable/c/a65c9afe9f2f55b7a7fb4a25ab654cd4139683a4
https://git.kernel.org/stable/c/befd23bd3b17f1a3f9c943a8580b47444c7c63ed
https://git.kernel.org/stable/c/c052cc1a069c3e575619cf64ec427eb41176ca70
https://git.kernel.org/stable/c/c430094541a80575259a94ff879063ef01473506
jsc#CAR-3548
rh#2282944
CVE-2021-47481kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47481
SMASH Issue 407359
bnc#1224910
https://git.kernel.org/stable/c/5508546631a0f555d7088203dec2614e41b5106e
https://git.kernel.org/stable/c/5f6995295f65d1ee6f36d466d26afd98eb797afe
rh#2282942
CVE-2021-47482kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47482
SMASH Issue 407360
bnc#1224909
https://git.kernel.org/stable/c/07533f1a673ce1126d0a72ef1e4b5eaaa3dd6d20
https://git.kernel.org/stable/c/0c6b199f09be489c48622537a550787fc80aea73
https://git.kernel.org/stable/c/6422e8471890273994fe8cc6d452b0dcd2c9483e
https://git.kernel.org/stable/c/6f68cd634856f8ca93bafd623ba5357e0f648c68
https://git.kernel.org/stable/c/a8f7359259dd5923adc6129284fdad12fc5db347
https://git.kernel.org/stable/c/b0a2cd38553c77928ef1646ed1518486b1e70ae8
https://git.kernel.org/stable/c/e50f957652190b5a88a8ebce7e5ab14ebd0d3f00
https://git.kernel.org/stable/c/fbf150b16a3635634b7dfb7f229d8fcd643c6c51
rh#2282941
CVE-2021-47483kernel-source-rt:Already fixedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47483
SMASH Issue 407361
bnc#1224907
bnc#1224908
https://git.kernel.org/stable/c/1cead23c1c0bc766dacb900a3b0269f651ad596f
https://git.kernel.org/stable/c/36e911a16b377bde0ad91a8c679069d0d310b1a6
https://git.kernel.org/stable/c/3dae1a4eced3ee733d7222e69b8a55caf2d61091
https://git.kernel.org/stable/c/50cc1462a668dc62949a1127388bc3af785ce047
https://git.kernel.org/stable/c/55e6d8037805b3400096d621091dfbf713f97e83
https://git.kernel.org/stable/c/758ced2c3878ff789801e6fee808e185c5cf08d6
https://git.kernel.org/stable/c/e72dce9afbdbfa70d9b44f5908a50ff6c4858999
https://git.kernel.org/stable/c/fc081477b47dfc3a6cb50a96087fc29674013fc2
rh#2282939
CVE-2021-47484kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47484
SMASH Issue 407362
bnc#1224905
https://git.kernel.org/stable/c/c2d4c543f74c90f883e8ec62a31973ae8807d354
https://git.kernel.org/stable/c/f1e3cd1cc80204fd02b9e9843450925a2af90dc0
rh#2282938
CVE-2021-47486kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47486
SMASH Issue 407364
bnc#1224903
https://git.kernel.org/stable/c/27de809a3d83a6199664479ebb19712533d6fd9b
https://git.kernel.org/stable/c/cac6b043cea3e120f4fccec16f7381747cbfdc0d
https://git.kernel.org/stable/c/e1b80a5ebe5431caeb20f88c32d4a024777a2d41
rh#2282936
CVE-2021-47487kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47487
SMASH Issue 407365
bnc#1225423
https://git.kernel.org/stable/c/5afa7898ab7a0ec9c28556a91df714bf3c2f725e
https://git.kernel.org/stable/c/d3ed72495a59fbfb9377450c8dfe94389a6509a7
https://git.kernel.org/stable/c/eb3b6805e3e9d98b2507201fd061a231988ce623
rh#2282933
CVE-2021-47488kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47488
SMASH Issue 407366
bnc#1224902
https://git.kernel.org/stable/c/01599bf7cc2b49c3d2be886cb438647dc25446ed
https://git.kernel.org/stable/c/04f8ef5643bcd8bcde25dfdebef998aea480b2ba
https://git.kernel.org/stable/c/b529f88d93884cf8ccafda793ee3d27b82fa578d
rh#2282929
CVE-2021-47489kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47489
SMASH Issue 407367
bnc#1224901
https://git.kernel.org/stable/c/3f4e54bd312d3dafb59daf2b97ffa08abebe60f5
https://git.kernel.org/stable/c/9eb4bdd554fc31a5ef6bf645a20ff21618ce45a9
rh#2282928
CVE-2021-47491kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47491
SMASH Issue 407369
bnc#1224900
https://git.kernel.org/stable/c/5fcb6fce74ffa614d964667110cf1a516c48c6d9
https://git.kernel.org/stable/c/6d67b2a73b8e3a079c355bab3c1aef7d85a044b8
https://git.kernel.org/stable/c/a4aeaa06d45e90f9b279f0b09de84bd00006e733
rh#2282925
CVE-2021-47492kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47492
SMASH Issue 407370
bnc#1224898
https://git.kernel.org/stable/c/5e669d8ab30ab61dec3c36e27b4711f07611e6fc
https://git.kernel.org/stable/c/69a7fa5cb0de06c8956b040f19a7248c8c8308ca
https://git.kernel.org/stable/c/74c42e1baacf206338b1dd6b6199ac964512b5bb
rh#2282924
CVE-2021-47493kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47493
SMASH Issue 407371
bnc#1225439
https://git.kernel.org/stable/c/2e382600e8856ea654677b5134ee66e03ea72bc2
https://git.kernel.org/stable/c/5043fbd294f5909a080ade0f04b70a4da9e122b7
https://git.kernel.org/stable/c/6f1b228529ae49b0f85ab89bcdb6c365df401558
rh#2282922
CVE-2021-47494kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47494
SMASH Issue 407372
bnc#1225450
https://git.kernel.org/stable/c/09b1d5dc6ce1c9151777f6c4e128a59457704c97
https://git.kernel.org/stable/c/3c897f39b71fe68f90599f6a45b5f7bf5618420e
https://git.kernel.org/stable/c/4c22227e39c7a0b4dab55617ee8d34d171fab8d4
rh#2282921
CVE-2021-47495kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47495
SMASH Issue 407373
bnc#1225351
https://git.kernel.org/stable/c/002d82227c0abe29118cf80f7e2f396b22d448ed
https://git.kernel.org/stable/c/397430b50a363d8b7bdda00522123f82df6adc5e
https://git.kernel.org/stable/c/492140e45d2bf27c1014243f8616a9b612144e20
https://git.kernel.org/stable/c/524f333e98138d909a0a0c574a9ff6737dce2767
https://git.kernel.org/stable/c/693ecbe8f799405f8775719deedb1f76265d375a
https://git.kernel.org/stable/c/74b3b27cf9fecce00cd8918b7882fd81191d0aa4
https://git.kernel.org/stable/c/7e8b6a4f18edee070213cb6a77118e8a412253c5
https://git.kernel.org/stable/c/b9eba0a4a527e04d712f0e0401e5391ef124b33e
rh#2282920
CVE-2021-47502kernel-source-rt:Not affectedimportant7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H)CVE-2021-47502
SMASH Issue 407663
bnc#1225369
https://git.kernel.org/stable/c/1089dac26c6b4b833323ae6c0ceab29fb30ede72
https://git.kernel.org/stable/c/23ba28616d3063bd4c4953598ed5e439ca891101
https://git.kernel.org/stable/c/339ffb5b56005582aacc860524d2d208604049d1
rh#2283452
CVE-2021-47503kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47503
SMASH Issue 407654
bnc#1225374
https://git.kernel.org/stable/c/1e434d2687e8bc0b3cdc9dd093c0e9047c0b4add
https://git.kernel.org/stable/c/653926205741add87a6cf452e21950eebc6ac10b
https://git.kernel.org/stable/c/f8dccc1bdea7e21b5ec06c957aef8831c772661c
rh#2283451
CVE-2021-47504kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47504
SMASH Issue 407664
bnc#1225382
https://git.kernel.org/stable/c/78a780602075d8b00c98070fa26e389b3b3efa72
https://git.kernel.org/stable/c/8e12976c0c19ebc14b60046b1348c516a74c25a2
rh#2283450
CVE-2021-47505kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47505
SMASH Issue 407665
bnc#1225400
https://git.kernel.org/stable/c/321fba81ec034f88aea4898993c1bf15605c023f
https://git.kernel.org/stable/c/4105e6a128e8a98455dfc9e6dbb2ab0c33c4497f
https://git.kernel.org/stable/c/47ffefd88abfffe8a040bcc1dd0554d4ea6f7689
https://git.kernel.org/stable/c/50252e4b5e989ce64555c7aef7516bdefc2fea72
https://git.kernel.org/stable/c/60d311f9e6381d779d7d53371f87285698ecee24
rh#2283448
CVE-2021-47506kernel-source-rt:Already fixedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47506
SMASH Issue 407666
bnc#1225404
https://git.kernel.org/stable/c/04a8d07f3d58308b92630045560799a3faa3ebce
https://git.kernel.org/stable/c/148c816f10fd11df27ca6a9b3238cdd42fa72cd3
https://git.kernel.org/stable/c/2becaa990b93cbd2928292c0b669d3abb6cf06d4
https://git.kernel.org/stable/c/33645d3e22720cac1e4548f8fef57bf0649536ee
https://git.kernel.org/stable/c/348714018139c39533c55661a0c7c990671396b4
https://git.kernel.org/stable/c/548ec0805c399c65ed66c6641be467f717833ab5
https://git.kernel.org/stable/c/e0759696de6851d7536efddfdd2dfed4c4df1f09
https://git.kernel.org/stable/c/eeb0711801f5e19ef654371b627682aed3b11373
rh#2283447
CVE-2021-47507kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47507
SMASH Issue 407668
bnc#1225405
https://git.kernel.org/stable/c/8bf902fee5893cfc2f04a698abab47629699ae9a
https://git.kernel.org/stable/c/b10252c7ae9c9d7c90552f88b544a44ee773af64
https://git.kernel.org/stable/c/c520943a00ad5015704969ad3304c956bcd49d25
https://git.kernel.org/stable/c/f5734b1714ca355703e9ea8fb61d04beff1790b9
jsc#CAR-3683
rh#2283445
CVE-2021-47508kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2021-47508
SMASH Issue 407669
bnc#1225408
https://git.kernel.org/stable/c/ca06c5cb1b6dbfe67655b33c02fc394d65824519
https://git.kernel.org/stable/c/da5e817d9d75422eaaa05490d0b9a5e328fc1a51
jsc#CAR-3684
rh#2283444
CVE-2021-47510kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47510
SMASH Issue 407671
bnc#1225410
https://git.kernel.org/stable/c/477675049ca803aa95ff77468ffbddd966b415b0
https://git.kernel.org/stable/c/84c25448929942edacba905cecc0474e91114e7a
rh#2283442
CVE-2021-47512kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47512
SMASH Issue 407673
bnc#1225424
https://git.kernel.org/stable/c/2a51edaf5cc563574878b93d7ef3d5955dda7030
https://git.kernel.org/stable/c/61c2402665f1e10c5742033fce18392e369931d7
https://git.kernel.org/stable/c/d86216dfda7c98375f809e26a30bfdaaba21d46e
rh#2283440
CVE-2021-47513kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47513
SMASH Issue 407674
bnc#1225380
https://git.kernel.org/stable/c/973a0373e88cc19129bd6ef0ec193040535397d9
https://git.kernel.org/stable/c/e8b1d7698038e76363859fb47ae0a262080646f5
rh#2283439
CVE-2021-47514kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47514
SMASH Issue 407675
bnc#1225425
https://git.kernel.org/stable/c/4b7e90672af8e0c78205db006f1b0a20ebd07f5f
https://git.kernel.org/stable/c/4dbb0dad8e63fcd0b5a117c2861d2abe7ff5f186
https://git.kernel.org/stable/c/fe30b70ca84da9c4aca85c03ad86e7a9b89c5ded
rh#2283437
CVE-2021-47516kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47516
SMASH Issue 407677
bnc#1225427
https://git.kernel.org/stable/c/2e0e072e62fdaf7816220af08e05c020f0fcb77a
https://git.kernel.org/stable/c/3e93abcdcec0436fbf0b6a88ae806902426895a2
https://git.kernel.org/stable/c/484069b5de9d223cc1c64c6f80389a99cfef51f1
https://git.kernel.org/stable/c/c56c96303e9289cc34716b1179597b6f470833de
https://git.kernel.org/stable/c/eb51f639ef3fd5498b7def290ed8681b6aadd9a7
https://git.kernel.org/stable/c/f707820c09239d6f67699d9b2ff57863cc7905b0
rh#2283435
CVE-2021-47517kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47517
SMASH Issue 407678
bnc#1225428
bnc#1225429
https://git.kernel.org/stable/c/7c26da3be1e9843a15b5318f90db8a564479d2ac
https://git.kernel.org/stable/c/cfd719f04267108f5f5bf802b9d7de69e99a99f9
https://git.kernel.org/stable/c/dde91ccfa25fd58f64c397d91b81a4b393100ffa
rh#2283434
CVE-2021-47519kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47519
SMASH Issue 407680
bnc#1225430
https://git.kernel.org/stable/c/31cb32a590d62b18f69a9a6d433f4e69c74fdd56
https://git.kernel.org/stable/c/75a422165477dd12d2d20aa7c9ee7c9a281c9908
rh#2283432
CVE-2021-47520kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47520
SMASH Issue 407681
bnc#1225431
bnc#1225434
https://git.kernel.org/stable/c/3a3c46e2eff0577454860a203be1a8295f4acb76
https://git.kernel.org/stable/c/3e193ef4e0a3f5bf92ede83ef214cb09d01b00aa
https://git.kernel.org/stable/c/6c73fc931658d8cbc8a1714b326cb31eb71d16a7
https://git.kernel.org/stable/c/703dde112021c93d6e89443c070e7dbd4dea612e
https://git.kernel.org/stable/c/94cddf1e9227a171b27292509d59691819c458db
https://git.kernel.org/stable/c/abb4eff3dcd2e583060082a18a8dbf31f02689d4
https://git.kernel.org/stable/c/affbad02bf80380a7403885b9fe4a1587d1bb4f3
https://git.kernel.org/stable/c/bafe343a885c70dddf358379cf0b2a1c07355d8d
jsc#CAR-3688
rh#2283431
CVE-2021-47521kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47521
SMASH Issue 407682
bnc#1225435
https://git.kernel.org/stable/c/1a295fea90e1acbe80c6d4940f5ff856edcd6bec
https://git.kernel.org/stable/c/1dd5b819f7e406dc15bbc7670596ff25261aaa2a
https://git.kernel.org/stable/c/3ec6ca6b1a8e64389f0212b5a1b0f6fed1909e45
https://git.kernel.org/stable/c/474f9a8534f5f89841240a7e978bafd6e1e039ce
https://git.kernel.org/stable/c/923f4dc5df679f678e121c20bf2fd70f7bf3e288
https://git.kernel.org/stable/c/c8718026ba287168ff9ad0ccc4f9a413062cba36
https://git.kernel.org/stable/c/cbd86110546f7f730a1f5d7de56c944a336c15c4
https://git.kernel.org/stable/c/ccf070183e4655824936c0f96c4a2bcca93419aa
rh#2283430
CVE-2021-47522kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47522
SMASH Issue 407683
bnc#1225437
https://git.kernel.org/stable/c/58f15f5ae7786c824868f3a7e093859b74669ce7
https://git.kernel.org/stable/c/6272b17001e6fdcf7b4a16206287010a1523fa6e
https://git.kernel.org/stable/c/8e0ceff632f48175ec7fb4706129c55ca8a7c7bd
https://git.kernel.org/stable/c/918aa1ef104d286d16b9e7ef139a463ac7a296f0
rh#2283429
CVE-2021-47524kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47524
SMASH Issue 407685
bnc#1225377
https://git.kernel.org/stable/c/888fc81107cacd2a4f681bac7bb785cef868214f
https://git.kernel.org/stable/c/dd5e90b16cca8a697cbe17b72e2a5f49291cabb2
rh#2283427
CVE-2021-47525kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47525
SMASH Issue 407686
bnc#1225441
https://git.kernel.org/stable/c/05f929b395dec8957b636ff14e66b277ed022ed9
https://git.kernel.org/stable/c/602824cf9aa9db8830ffe5cfb2cd54365cada4fe
rh#2283426
CVE-2021-47526kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47526
SMASH Issue 407687
bnc#1225376
https://git.kernel.org/stable/c/0f55f89d98c8b3e12b4f55f71c127a173e29557c
https://git.kernel.org/stable/c/189c99c629bbf85916c02c153f904649cc0a9d7f
rh#2283425
CVE-2021-47527kernel-source-rt:Ignoremoderate ()CVE-2021-47527
L3:62411
Oracle:CVE-2021-43527
SMASH Issue 319539
SMASH Issue 319540
bnc#1194288
https://git.kernel.org/stable/c/00de977f9e0aa9760d9a79d1e41ff780f74e3424
https://git.kernel.org/stable/c/011f6c92b5bf6e1fbfdedc8b5232f64c1c493206
https://git.kernel.org/stable/c/1179b168fa3f3a6aae3bd140000455a0e58457db
https://git.kernel.org/stable/c/64e491c1634b73d3bddc081d08620bdc92ab2c12
https://git.kernel.org/stable/c/c5da8aa441053958594f94254592bb41264bdfbf
https://git.kernel.org/stable/c/e1722acf4f0d4d67b60f57e08ce16f8b66cd4b8f
https://git.kernel.org/stable/c/e74d9663fd57640fc3394abb5c76fa95b9cc2f2e
rh#2024370
rh#2283424
CVE-2021-47528kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47528
SMASH Issue 407688
bnc#1225368
https://git.kernel.org/stable/c/37307f7020ab38dde0892a578249bf63d00bca64
https://git.kernel.org/stable/c/7d94bc8e335cb33918e52efdbe192c36707bfa24
rh#2283423
CVE-2021-47529kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47529
SMASH Issue 407689
bnc#1225373
https://git.kernel.org/stable/c/4768935c25403ba96e7a745645df24a51a774b7e
https://git.kernel.org/stable/c/a571bc28326d9f3e13f5f2d9cda2883e0631b0ce
rh#2283422
CVE-2021-47530kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47530
SMASH Issue 407690
bnc#1225442
https://git.kernel.org/stable/c/4c3cdbf2540319ea674f1f3c54f31f14c6f39647
https://git.kernel.org/stable/c/ea0006d390a28012f8187717aea61498b2b341e5
rh#2283421
CVE-2021-47531kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47531
SMASH Issue 407691
bnc#1225443
https://git.kernel.org/stable/c/3466d9e217b337bf473ee629c608e53f9f3ab786
https://git.kernel.org/stable/c/8e2b7fe5e8a4be5e571561d9afcfbd92097288ba
rh#2283420
CVE-2021-47532kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47532
SMASH Issue 407692
bnc#1225444
https://git.kernel.org/stable/c/59ba1b2b4825342676300f66d785764be3fcb093
https://git.kernel.org/stable/c/a4eb55901df1dce8c6944438bbdf57caf08911e2
rh#2283419
CVE-2021-47533kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47533
SMASH Issue 407693
bnc#1225445
https://git.kernel.org/stable/c/2931db9a5ed219546cf2ae0546698faf78281b89
https://git.kernel.org/stable/c/d134c5ff71c7f2320fc7997f2fbbdedf0c76889a
rh#2283418
CVE-2021-47534kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47534
SMASH Issue 407695
https://git.kernel.org/stable/c/049cfff8d53a30cae3349ff71a4c01b7d9981bc2
https://git.kernel.org/stable/c/53f9601e908d42481addd67cdb01a9288c611124
rh#2283417
CVE-2021-47535kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2021-47535
SMASH Issue 407696
bnc#1225446
https://git.kernel.org/stable/c/83e54fcf0b14ca2d869dd37abe1bb6542805f538
https://git.kernel.org/stable/c/b4d25abf9720b69a03465b09d0d62d1998ed6708
https://git.kernel.org/stable/c/d646856a600e8635ba498f20b194219b158626e8
rh#2283416
CVE-2021-47537kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47537
SMASH Issue 407697
bnc#1225375
https://git.kernel.org/stable/c/1c0ddef45b7e3dbe3ed073695d20faa572b7056a
https://git.kernel.org/stable/c/e07a097b4986afb8f925d0bb32612e1d3e88ce15
rh#2283414
CVE-2021-47538kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47538
SMASH Issue 407698
bnc#1225448
https://git.kernel.org/stable/c/3e70e3a72d80b16094faccbe438cd53761c3503a
https://git.kernel.org/stable/c/60f0b9c42cb80833a03ca57c1c8b078d716e71d1
https://git.kernel.org/stable/c/913c24af2d13a3fd304462916ee98e298d56bdce
https://git.kernel.org/stable/c/9469273e616ca8f1b6e3773c5019f21b4c8d828c
https://git.kernel.org/stable/c/beacff50edbd6c9659a6f15fc7f6126909fade29
rh#2283413
CVE-2021-47539kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47539
SMASH Issue 407676
bnc#1225452
https://git.kernel.org/stable/c/35b40f724c4ef0f683d94dab3af9ab38261d782b
https://git.kernel.org/stable/c/bc97458620e38961af9505cc060ad4cf5c9e4af7
https://git.kernel.org/stable/c/ca77fba821351190777b236ce749d7c4d353102e
rh#2283412
CVE-2021-47540kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47540
SMASH Issue 407700
bnc#1225386
https://git.kernel.org/stable/c/14b03b8cebdf18ff13c39d58501b625411314de2
https://git.kernel.org/stable/c/6e53d6d26920d5221d3f4d4f5ffdd629ea69aa5c
https://git.kernel.org/stable/c/932b338f4e5c4cb0c2ed640da3bced1e63620198
rh#2283411
CVE-2021-47541kernel-source-rt:Already fixedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47541
SMASH Issue 407701
bnc#1225453
bnc#1225454
https://git.kernel.org/stable/c/676dc7d9b15bf8733233a2db1ec3f9091ab34275
https://git.kernel.org/stable/c/75917372eef0dbfb290ae45474314d35f97aea18
https://git.kernel.org/stable/c/addad7643142f500080417dd7272f49b7a185570
https://git.kernel.org/stable/c/be12572c5ddc8ad7453bada4eec8fa46967dc757
https://git.kernel.org/stable/c/e461a9816a1ac5b4aeb61621b817225b61e46a68
https://git.kernel.org/stable/c/f1d43efa59f1edd3e7eca0e94559b4c6b1cd4e2b
rh#2283410
CVE-2021-47542kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47542
SMASH Issue 407702
bnc#1225455
https://git.kernel.org/stable/c/15fa12c119f869173f9b710cbe6a4a14071d2105
https://git.kernel.org/stable/c/3a061d54e260b701b538873b43e399d9b8b83e03
https://git.kernel.org/stable/c/550658a2d61e4eaf522c8ebc7fad76dc376bfb45
https://git.kernel.org/stable/c/57af54a56024435d83e44c78449513b414eb6edf
https://git.kernel.org/stable/c/b4f217d6fcc00c3fdc0921a7691f30be7490b073
https://git.kernel.org/stable/c/bbeb0325a7460ebf1e03f5e0bfc5c652fba9519f
https://git.kernel.org/stable/c/c5ef33c1489b2cd74368057fa00b5d2183bb5853
https://git.kernel.org/stable/c/e2dabc4f7e7b60299c20a36d6a7b24ed9bf8e572
rh#2283408
CVE-2021-47543kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2021-47543
SMASH Issue 407703
bnc#1225456
https://git.kernel.org/stable/c/71e284dcebecb9fd204ff11097469cc547723ad1
https://git.kernel.org/stable/c/d9fc706108c15f8bc2d4ccccf8e50f74830fabd9
https://git.kernel.org/stable/c/df5990db088d4c7fea9a2f9b8195a7859e1768c4
https://git.kernel.org/stable/c/ff061b5bda73c4f785b4703eeb0848fd99e5608a
jsc#CAR-3695
rh#2283407
CVE-2021-47545kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2021-47545
SMASH Issue 407705
bnc#1225469
https://git.kernel.org/stable/c/0ca1f534a776cc7d42f2c33da4732b74ec2790cd
https://git.kernel.org/stable/c/24a139c105fa0f7f99888cf328bf6a02fc841675
https://git.kernel.org/stable/c/5b5c6f57a1f81499db4c8ea597898cb1b87de0b6
https://git.kernel.org/stable/c/a4c17ebdd6249cb4e061358d3693383f6628e069
https://git.kernel.org/stable/c/b380d09e44e8479e71e3ae8446b515a5b3166244
https://git.kernel.org/stable/c/c5c8a26c0dc69a400553245e92d741fe55f91095
jsc#CAR-3700
rh#2283404
CVE-2021-47547kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2021-47547
SMASH Issue 407707
bnc#1225505
https://git.kernel.org/stable/c/12f907cb11576b8cd0b1d95a16d1f10ed5bb7237
https://git.kernel.org/stable/c/142ead3dc70411bd5977e8c47a6d8bf22287b3f8
https://git.kernel.org/stable/c/2c1a6a9a011d622a7c61324a97a49801ba425eff
https://git.kernel.org/stable/c/61217be886b5f7402843677e4be7e7e83de9cb41
https://git.kernel.org/stable/c/77ff166909458646e66450e42909e0adacc99049
https://git.kernel.org/stable/c/d3dedaa5a601107cfedda087209772c76e364d58
https://git.kernel.org/stable/c/ec5bd0aef1cec96830d0c7e06d3597d9e786cc98
https://git.kernel.org/stable/c/f059fa40f0fcc6bc7a12e0f2a2504e9a4ff74f1f
rh#2283402
CVE-2021-47549kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47549
SMASH Issue 407709
bnc#1225508
https://git.kernel.org/stable/c/0769449b0a5eabc3545337217ae690e46673e73a
https://git.kernel.org/stable/c/325ea49fc43cbc03a5e1e37de8f0ca6357ced4b1
https://git.kernel.org/stable/c/4a46b2f5dce02539e88a300800812bd24a45e097
https://git.kernel.org/stable/c/6c8ad7e8cf29eb55836e7a0215f967746ab2b504
https://git.kernel.org/stable/c/77393806c76b6b44f1c44bd957788c8bd9152c45
https://git.kernel.org/stable/c/91ba94d3f7afca195b224f77a72044fbde1389ce
https://git.kernel.org/stable/c/adf098e2a8a1e1fc075d6a5ba2edd13cf7189082
https://git.kernel.org/stable/c/cdcd80292106df5cda325426e96495503e41f947
rh#2283400
CVE-2021-47550kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47550
SMASH Issue 407710
bnc#1225379
https://git.kernel.org/stable/c/27dfaedc0d321b4ea4e10c53e4679d6911ab17aa
https://git.kernel.org/stable/c/75752ada77e0726327adf68018b9f50ae091baeb
https://git.kernel.org/stable/c/c746945fb6bcbe3863c9ea6369c7ef376e38e5eb
rh#2283399
CVE-2021-47553kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47553
SMASH Issue 407712
bnc#1225464
https://git.kernel.org/stable/c/229c555260cb9c1ccdab861e16f0410f1718f302
https://git.kernel.org/stable/c/dce1ca0525bfdc8a69a9343bc714fbc19a2f04b3
https://git.kernel.org/stable/c/e6ee7abd6bfe559ad9989004b34c320fd638c526
rh#2283396
CVE-2021-47554kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47554
SMASH Issue 407713
bnc#1225466
https://git.kernel.org/stable/c/bb93ce4b150dde79f58e34103cbd1fe829796649
https://git.kernel.org/stable/c/e4d58ac67e63727aa45a4a26185876f598e8b3dd
rh#2283395
CVE-2021-47555kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2021-47555
SMASH Issue 407714
bnc#1225467
https://git.kernel.org/stable/c/01d9cc2dea3fde3bad6d27f464eff463496e2b00
https://git.kernel.org/stable/c/5e44178864b38dd70b877985abd7d86fdb95f27d
https://git.kernel.org/stable/c/6e800ee43218a56acc93676bbb3d93b74779e555
https://git.kernel.org/stable/c/f7fc72a508cf115c273a7a29350069def1041890
rh#2283394
CVE-2021-47556kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47556
SMASH Issue 407694
bnc#1225383
https://git.kernel.org/stable/c/0276af2176c78771da7f311621a25d7608045827
https://git.kernel.org/stable/c/abfdd9e2f0f9699015d72317f74154d3e53664e6
rh#2283393
CVE-2021-47557kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47557
SMASH Issue 407715
bnc#1225468
https://git.kernel.org/stable/c/ae2659d2c670252759ee9c823c4e039c0e05a6f2
https://git.kernel.org/stable/c/de6d25924c2a8c2988c6a385990cafbe742061bf
https://git.kernel.org/stable/c/e25bdbc7e951ae5728fee1f4c09485df113d013c
rh#2283392
CVE-2021-47558kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47558
SMASH Issue 407716
bnc#1225492
https://git.kernel.org/stable/c/a92f0eebb8dc008b9e8c51c6f7b8c93b27a29a43
https://git.kernel.org/stable/c/b270bfe697367776eca2e6759a71d700fb8d82a2
rh#2283391
CVE-2021-47560kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47560
SMASH Issue 407653
bnc#1225495
https://git.kernel.org/stable/c/63b08b1f6834bbb0b4f7783bf63b80c8c8e9a047
https://git.kernel.org/stable/c/90d0736876c50ecde1a3275636a06b9ddb1cace9
https://git.kernel.org/stable/c/da4d70199e5d82da664a80077508d6c18f5e76df
jsc#CAR-3699
rh#2283389
CVE-2021-47561kernel-source-rt:Not affectedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2021-47561
SMASH Issue 407718
bnc#1225496
https://git.kernel.org/stable/c/84e1d0bf1d7121759622dabf8fbef4c99ad597c5
https://git.kernel.org/stable/c/cc432b0727ce404cc13e8f6b5ce29f412c3f9f1f
rh#2283388
CVE-2021-47562kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47562
SMASH Issue 407719
bnc#1225499
https://git.kernel.org/stable/c/1eb5395add786613c7c5579d3947aa0b8f0ec241
https://git.kernel.org/stable/c/792b2086584f25d84081a526beee80d103c2a913
https://git.kernel.org/stable/c/992ba40a67638dfe2772b84dfc8168dc328d5c4c
rh#2283387
CVE-2021-47563kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47563
SMASH Issue 407699
bnc#1225500
https://git.kernel.org/stable/c/1f10b09ccc832698ef4624a6ab9a213b6ccbda76
https://git.kernel.org/stable/c/e65a8707b4cd756d26d246bb2b9fab06eebafac1
https://git.kernel.org/stable/c/f65ee535df775a13a1046c0a0b2d72db342f8a5b
rh#2283386
CVE-2021-47564kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47564
SMASH Issue 407720
bnc#1225501
https://git.kernel.org/stable/c/03e5203d2161a00afe4d97d206d2293e40b2f253
https://git.kernel.org/stable/c/5dca8eff4627315df98feec09fff9dfe3356325e
https://git.kernel.org/stable/c/e8d032507cb7912baf1d3e0af54516f823befefd
rh#2283467
CVE-2021-47565kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47565
SMASH Issue 407721
bnc#1225384
https://git.kernel.org/stable/c/0d4b29eaadc1f59cec0c7e85eae77d08fcca9824
https://git.kernel.org/stable/c/0ee4ba13e09c9d9c1cb6abb59da8295d9952328b
https://git.kernel.org/stable/c/2bf9c5a5039c8f4b037236aed505e6a25c1d5f7b
https://git.kernel.org/stable/c/58ef2c7a6de13721865d84b80eecf56d6cba0937
https://git.kernel.org/stable/c/5d4d50b1f159a5ebab7617f47121b4370aa58afe
https://git.kernel.org/stable/c/7e324f734a914957b8cc3ff4b4c9f0409558adb5
https://git.kernel.org/stable/c/8485649a7655e791a6e4e9f15b4d30fdae937184
https://git.kernel.org/stable/c/dd035ca0e7a142870a970d46b1d19276cfe2bc8c
rh#2283466
CVE-2021-47567kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47567
SMASH Issue 407723
bnc#1225399
https://git.kernel.org/stable/c/5bb60ea611db1e04814426ed4bd1c95d1487678e
https://git.kernel.org/stable/c/c4e3ff8b8b1d54f0c755670174c453b06e17114b
https://git.kernel.org/stable/c/dfe906da9a1abebdebe8b15bb3e66a2578f6c4c7
rh#2283462
CVE-2021-47568kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47568
SMASH Issue 407651
bnc#1225395
https://git.kernel.org/stable/c/11e659827c3a2facb3a04e08cc97ff14d5091f51
https://git.kernel.org/stable/c/178ca6f85aa3231094467691f5ea1ff2f398aa8d
rh#2283461
CVE-2021-47569kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47569
SMASH Issue 407724
bnc#1225515
https://git.kernel.org/stable/c/3d2a1e68fd9904fdc1b02f2e7d40ca47df7ba39f
https://git.kernel.org/stable/c/617a89484debcd4e7999796d693cf0b77d2519de
rh#2283460
CVE-2021-47570kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2021-47570
SMASH Issue 407725
bnc#1225516
https://git.kernel.org/stable/c/be4ea8f383551b9dae11b8dfff1f38b3b5436e9a
https://git.kernel.org/stable/c/c8d3775745adacf9784a7a80a82d047051752573
rh#2283459
CVE-2021-47573kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47573
SMASH Issue 411391
bnc#1226532
https://git.kernel.org/stable/c/0fd08a34e8e3b67ec9bd8287ac0facf8374b844a
https://git.kernel.org/stable/c/25898389795bd85d8e1520c0c75c3ad906c17da7
https://git.kernel.org/stable/c/269d7124bcfad2558d2329d0fe603ca20b20d3f4
https://git.kernel.org/stable/c/3e04b9e6aa7d77287e70a400be83060d2b7b2cfe
https://git.kernel.org/stable/c/4ed9f5c511ce95cb8db05ff82026ea901f45fd76
https://git.kernel.org/stable/c/5ac3b68b79c9e964dd6f3cf80ff825518e502b79
https://git.kernel.org/stable/c/8ac3b6ee7c9ff2df7c99624bb1235e2e55623825
https://git.kernel.org/stable/c/caf9b51829a50590b84daea924a0fd62d32bc952
rh#2293262
CVE-2021-47574kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47574
SMASH Issue 411419
bnc#1226534
https://git.kernel.org/stable/c/3559ca594f15fcd23ed10c0056d40d71e5dab8e5
https://git.kernel.org/stable/c/3e68d099f09c260a7dee28b99af02fe6977a9e66
https://git.kernel.org/stable/c/4bf81386e3d6e5083c93d51eff70260bcec091bb
https://git.kernel.org/stable/c/81900aa7d7a130dec4c55b68875e30fb8c9effec
https://git.kernel.org/stable/c/99120c8230fdd5e8b72a6e4162db9e1c0a61954a
https://git.kernel.org/stable/c/a29c8b5226eda52e6d6ff151d9343558ea3ad451
https://git.kernel.org/stable/c/b27d47950e481f292c0a5ad57357edb9d95d03ba
https://git.kernel.org/stable/c/d31b3379179d64724d3bbfa87bd4ada94e3237de
rh#2293260
CVE-2021-47575kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47575
SMASH Issue 411406
bnc#1226535
https://git.kernel.org/stable/c/153d1ea3272209fc970116f09051002d14422cde
https://git.kernel.org/stable/c/560e64413b4a6d9bd6630e350d5f2e6a05f6ffe3
https://git.kernel.org/stable/c/57e46acb3b48ea4e8efb1e1bea2e89e0c6cc43e2
https://git.kernel.org/stable/c/68b78f976ca47d52c03c41eded207a312e46b934
https://git.kernel.org/stable/c/728389c21176b2095fa58e858d5ef1d2f2aac429
https://git.kernel.org/stable/c/8fa3a370cc2af858a9ba662ca4f2bd0917550563
https://git.kernel.org/stable/c/c7eaa5082bccfc00dfdb500ac6cc86d6f24ca027
https://git.kernel.org/stable/c/fe415186b43df0db1f17fa3a46275fd92107fe71
rh#2293254
CVE-2021-47577kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47577
SMASH Issue 411410
bnc#1226538
https://git.kernel.org/stable/c/4b4e5bbf9386d4ec21d91c0cb0fd60b9bba778ec
https://git.kernel.org/stable/c/71a85387546e50b1a37b0fa45dadcae3bfb35cf6
rh#2293252
CVE-2021-47578kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47578
SMASH Issue 411414
bnc#1226539
https://git.kernel.org/stable/c/3344b58b53a76199dae48faa396e9fc37bf86992
https://git.kernel.org/stable/c/47d11d35203b0aa13533634e270fe2c3610e531b
https://git.kernel.org/stable/c/aa1f912712a109b6306746133de7e5343f016b26
rh#2293251
CVE-2021-47579kernel-source-rt:Won't fixlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2021-47579
SMASH Issue 411342
bnc#1226540
https://git.kernel.org/stable/c/1f5573cfe7a7056e80a92c7a037a3e69f3a13d1c
https://git.kernel.org/stable/c/445d2dc63e5871d218f21b8f62ab29ac72f2e6b8
https://git.kernel.org/stable/c/6859985a2fbda5d1586bf44538853e1be69e85f7
https://git.kernel.org/stable/c/d2ccdd4e4efab06178608a34d7bfb20a54104c02
https://git.kernel.org/stable/c/f9f300a92297be8250547347fd52216ef0177ae0
jsc#CAR-3789
rh#2293250
CVE-2021-47580kernel-source-rt:Won't fiximportant7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L)CVE-2021-47580
SMASH Issue 411389
bnc#1226550
https://git.kernel.org/stable/c/3085147645938eb41f0bc0e25ef9791e71f5ee4b
https://git.kernel.org/stable/c/36e07d7ede88a1f1ef8f0f209af5b7612324ac2c
https://git.kernel.org/stable/c/bdb854f134b964528fa543e0351022eb45bd7346
jsc#CAR-3790
rh#2293249
CVE-2021-47581kernel-source-rt:Not affectedmoderate ()CVE-2021-47581
SMASH Issue 411412
bnc#1226573
https://git.kernel.org/stable/c/0928efb09178e01d3dc8e8849aa1c807436c3c37
https://git.kernel.org/stable/c/0d99b3c6bd39a0a023e972d8f912fd47698bbbb8
https://git.kernel.org/stable/c/88f20cccbeec9a5e83621df5cc2453b5081454dc
https://git.kernel.org/stable/c/9bebb2eedf679b3be4acaa20efda97f32c999d74
https://git.kernel.org/stable/c/b4226b387436315e7f57465c15335f4f4b5b075d
https://git.kernel.org/stable/c/bd926d189210cd1d5b4e618e45898053be6b4b3b
https://git.kernel.org/stable/c/be81992f9086b230623ae3ebbc85ecee4d00a3d3
https://git.kernel.org/stable/c/c9f17e92917fd5786be872626a3928979ecc4c39
rh#2293248
CVE-2021-47582kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47582
SMASH Issue 411422
bnc#1226559
https://git.kernel.org/stable/c/403716741c6c2c510dce44e88f085a740f535de6
https://git.kernel.org/stable/c/ae8709b296d80c7f45aa1f35c0e7659ad69edce1
rh#2293247
CVE-2021-47583kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47583
SMASH Issue 411443
bnc#1226563
https://git.kernel.org/stable/c/44870a9e7a3c24acbb3f888b2a7cc22c9bdf7e7f
https://git.kernel.org/stable/c/4b2d9600b31f9ba7adbc9f3c54a068615d27b390
https://git.kernel.org/stable/c/8c6fdf62bfe1bc72bfceeaf832ef7499c7ed09ba
https://git.kernel.org/stable/c/96f182c9f48b984447741f054ec301fdc8517035
https://git.kernel.org/stable/c/b99bdf127af91d53919e96292c05f737c45ea59a
rh#2293245
CVE-2021-47584kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47584
SMASH Issue 411385
bnc#1226564
https://git.kernel.org/stable/c/3a1a4eb574178c21241a6200f4785572e661c472
https://git.kernel.org/stable/c/a7c80674538f15f85d68138240aae440b8039519
https://git.kernel.org/stable/c/edaa26334c117a584add6053f48d63a988d25a6e
rh#2293244
CVE-2021-47585kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47585
SMASH Issue 411341
bnc#1226556
https://git.kernel.org/stable/c/005d9292b5b2e71a009f911bd85d755009b37242
https://git.kernel.org/stable/c/493ff661d434d6bdf02e3a21adae04d7a0b4265d
https://git.kernel.org/stable/c/f35838a6930296fc1988764cfa54cb3f705c0665
rh#2293243
CVE-2021-47586kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47586
SMASH Issue 411409
bnc#1226561
https://git.kernel.org/stable/c/0546b224cc7717cc8a2db076b0bb069a9c430794
https://git.kernel.org/stable/c/0b4a5d1e15ce72f69be48f38dc0401dab890ae0f
rh#2293242
CVE-2021-47590kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47590
SMASH Issue 411387
bnc#1226565
https://git.kernel.org/stable/c/23311b92755ffa9087332d1bb8c71c0f6a10cc08
https://git.kernel.org/stable/c/3d79e3756ca90f7a6087b77b62c1d9c0801e0820
rh#2293237
CVE-2021-47591kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47591
SMASH Issue 411353
bnc#1226570
https://git.kernel.org/stable/c/3de0c86d42f841d1d64f316cd949e65c566f0734
https://git.kernel.org/stable/c/404cd9a22150f24acf23a8df2ad0c094ba379f57
rh#2293236
CVE-2021-47592kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47592
SMASH Issue 411361
bnc#1226572
https://git.kernel.org/stable/c/97cb5c82aa1dd85a39b1bd021c8b5f18af623779
https://git.kernel.org/stable/c/aeb7c75cb77478fdbf821628e9c95c4baa9adc63
rh#2293235
CVE-2021-47593kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47593
SMASH Issue 411345
bnc#1226551
https://git.kernel.org/stable/c/451f1eded7f56e93aaf52eb547ba97742d9c0e97
https://git.kernel.org/stable/c/c26ac0ea3a91c210cf90452e625dc441adf3e549
https://git.kernel.org/stable/c/d6692b3b97bdc165d150f4c1505751a323a80717
rh#2293234
CVE-2021-47594kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47594
SMASH Issue 411393
bnc#1226560
https://git.kernel.org/stable/c/1456a0004cc54c58adb2501cb0c95dc8b3c83e9e
https://git.kernel.org/stable/c/b0cdc5dbcf2ba0d99785da5aabf1b17943805b8a
rh#2293232
CVE-2021-47595kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47595
SMASH Issue 411359
bnc#1226552
https://git.kernel.org/stable/c/491c1253441e2fdc8f6a6f4976e3f13440419b7a
https://git.kernel.org/stable/c/81fbdd45652d8605a029e78ef14a6aaa529c4e72
https://git.kernel.org/stable/c/c062f2a0b04d86c5b8c9d973bea43493eaca3d32
rh#2293231
CVE-2021-47596kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47596
SMASH Issue 411439
bnc#1226558
https://git.kernel.org/stable/c/12512bc8f25b8ba9795dfbae0e9ca57ff13fd542
https://git.kernel.org/stable/c/27cbf64a766e86f068ce6214f04c00ceb4db1af4
https://git.kernel.org/stable/c/4f4a353f6fe033807cd026a5de81c67469ff19b0
rh#2293230
CVE-2021-47601kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47601
SMASH Issue 411458
bnc#1226576
https://git.kernel.org/stable/c/640e28d618e82be78fb43b4bf5113bc90d6aa442
https://git.kernel.org/stable/c/832f3655c6138c23576ed268e31cc76e0f05f2b1
https://git.kernel.org/stable/c/9d7482771fac8d8e38e763263f2ca0ca12dd22c6
rh#2293225
CVE-2021-47604kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47604
SMASH Issue 411375
bnc#1226566
https://git.kernel.org/stable/c/dc1db0060c02d119fd4196924eff2d1129e9a442
https://git.kernel.org/stable/c/ebbbc5fea3f648175df1aa3f127c78eb0252cc2a
rh#2293222
CVE-2021-47605kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47605
SMASH Issue 411372
bnc#1226579
https://git.kernel.org/stable/c/e6c67560b4341914bec32ec536e931c22062af65
https://git.kernel.org/stable/c/ff9f9c6e74848170fcb45c8403c80d661484c8c9
rh#2293215
CVE-2021-47607kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2021-47607
SMASH Issue 411395
bnc#1226580
https://git.kernel.org/stable/c/a82fe085f344ef20b452cd5f481010ff96b5c4cd
https://git.kernel.org/stable/c/f87a6c160ecc8c7b417d25f508d3f076fe346136
rh#2293206
CVE-2021-47608kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47608
SMASH Issue 411373
bnc#1226569
https://git.kernel.org/stable/c/423628125a484538111c2c6d9bb1588eb086053b
https://git.kernel.org/stable/c/7d3baf0afa3aa9102d6a521a8e4c41888bb79882
rh#2293205
CVE-2021-47610kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47610
SMASH Issue 411396
bnc#1226581
https://git.kernel.org/stable/c/26d776fd0f79f093a5d0ce1a4c7c7a992bc3264c
https://git.kernel.org/stable/c/f6db3d98f876870c35e96693cfd54752f6199e59
rh#2293269
CVE-2021-47613kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L)CVE-2021-47613
SMASH Issue 411445
bnc#1226600
https://git.kernel.org/stable/c/9cbb957441ed8873577d7d313a3d79d69f1dad5c
https://git.kernel.org/stable/c/b503de239f62eca898cfb7e820d9a35499137d22
rh#2293266
CVE-2021-47614kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47614
SMASH Issue 411347
bnc#1226601
https://git.kernel.org/stable/c/11eebcf63e98fcf047a876a51d76afdabc3b8b9b
https://git.kernel.org/stable/c/1e11a39a82e95ce86f849f40dda0d9c0498cebd9
rh#2293265
CVE-2021-47615kernel-source-rt:Not affectedlow3.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L)CVE-2021-47615
SMASH Issue 411427
bnc#1226602
https://git.kernel.org/stable/c/c44979ace49b4aede3cc7cb5542316e53a4005c9
https://git.kernel.org/stable/c/e3bc4d4b50cae7db08e50dbe43f771c906e97701
https://git.kernel.org/stable/c/f0ae4afe3d35e67db042c58a52909e06262b740f
rh#2293264
CVE-2021-47616kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2021-47616
SMASH Issue 411363
bnc#1226603
https://git.kernel.org/stable/c/84b01721e8042cdd1e8ffeb648844a09cd4213e0
https://git.kernel.org/stable/c/acb53e47db1fbc7cd37ab10b46388f045a76e383
rh#2293263
CVE-2021-47618kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-47618
SMASH Issue 411541
bnc#1226644
https://git.kernel.org/stable/c/1515e72aae803fc6b466adf918e71c4e4c9d5b3d
https://git.kernel.org/stable/c/8b59b0a53c840921b625378f137e88adfa87647e
https://git.kernel.org/stable/c/ba1863be105b06e10d0e2f6b1b8a0570801cfc71
rh#2293295
CVE-2022-0001kernel-source-rt:Releasedmoderate5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)CONFIRM:developer.arm.com:CVE-2017-5754
CONFIRM:security.netapp.com:CVE-2022-0002
CVE-2021-26341
CVE-2021-26401
CVE-2022-0001
CVE-2022-0002
CVE-2022-23960
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-23960
D:CVE-2022-32296
DSA-5096
DSA-5161
DSA-5173
DSA-5184
DSA-5378
L3:65520
MISC:developer.arm.com:CVE-2021-28664
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.amd.com:CVE-2021-26341
MISC:www.amd.com:CVE-2021-26401
MISC:www.intel.com:CVE-2022-0002
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2021/07/22/1
OSS:2022/01/25/12
OSS:2022/03/18/2
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/11/10/2
OSS:2022/Q1/171
OSS:2022/Q3/141
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
Oracle:CVE-2022-21123
RHSA-2022:1975
RHSA-2022:1988
RHSA-2022:7683
RHSA-2023:0187
RHSA-2023:0399
RHSA-2023:0400
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 312331
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#1033297
bdo#922204
bdo#988044
bdo#989285
bdo#990279
bdo#990411
bdo#994050
bnc#1191580
bnc#1195283
bnc#1195330
bnc#1196657
bnc#1196901
bnc#1196915
https://www.kb.cert.org/vuls/id/155143
jsc#CAR-1593
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1519780
rh#1832397
rh#1980646
rh#1997467
rh#2039448
rh#2044561
rh#2053632
rh#2056381
rh#2058395
rh#2058955
rh#2059923
rh#2061633
rh#2061700
rh#2061703
rh#2061712
rh#2061721
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2119127
rh#2141026
CVE-2022-0002kernel-source-rt:Releasedmoderate5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)CONFIRM:developer.arm.com:CVE-2017-5754
CONFIRM:security.netapp.com:CVE-2022-0002
CVE-2021-26341
CVE-2021-26401
CVE-2022-0001
CVE-2022-0002
CVE-2022-23960
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-23960
D:CVE-2022-32296
DSA-5096
DSA-5161
DSA-5173
DSA-5184
DSA-5378
L3:65520
MISC:developer.arm.com:CVE-2021-28664
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.amd.com:CVE-2021-26341
MISC:www.amd.com:CVE-2021-26401
MISC:www.intel.com:CVE-2022-0002
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2021/07/22/1
OSS:2022/01/25/12
OSS:2022/03/18/2
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/11/10/2
OSS:2022/Q1/171
OSS:2022/Q3/141
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
Oracle:CVE-2022-21123
RHSA-2022:1975
RHSA-2022:1988
RHSA-2022:7683
RHSA-2023:0187
RHSA-2023:0399
RHSA-2023:0400
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 312331
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#1033297
bdo#922204
bdo#988044
bdo#989285
bdo#990279
bdo#990411
bdo#994050
bnc#1191580
bnc#1195283
bnc#1195330
bnc#1196657
bnc#1196901
bnc#1196915
https://www.kb.cert.org/vuls/id/155143
jsc#CAR-1593
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1519780
rh#1832397
rh#1980646
rh#1997467
rh#2039448
rh#2044561
rh#2053632
rh#2056381
rh#2058395
rh#2058955
rh#2059923
rh#2061633
rh#2061700
rh#2061703
rh#2061712
rh#2061721
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2119127
rh#2141026
CVE-2022-0128vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)CONFIRM:huntr.dev:CVE-2022-0128
CONFIRM:support.apple.com:CVE-2018-25032
CONFIRM:support.apple.com:CVE-2022-0158
CONFIRM:support.apple.com:CVE-2022-26704
CVE-2022-0128
FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
FULLDISC:20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
GLSA-202208-32
MISC:github.com:CVE-2022-0128
OSS:2022/01/15/1
OSS:2022/Q1/40
SMASH Issue 319761
bnc#1194388
rh#2044954
CVE-2022-0156vim:Not affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H)CONFIRM:huntr.dev:CVE-2022-0156
CONFIRM:support.apple.com:CVE-2022-0158
CVE-2022-0156
FEDORA:FEDORA-2022-20e66c6698
FEDORA:FEDORA-2022-48b86d586f
FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
FULLDISC:20220721 APPLE-SA-2022-07-20-3 macOS Big Sur 11.6.8
GLSA-202208-32
MISC:github.com:CVE-2022-0156
OSS:2022/01/15/1
OSS:2022/Q1/40
SMASH Issue 319929
bnc#1194559
rh#2039843
CVE-2022-0158vim:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-0158
CONFIRM:support.apple.com:CVE-2022-0158
CVE-2022-0158
FEDORA:FEDORA-2022-20e66c6698
FEDORA:FEDORA-2022-48b86d586f
FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
FULLDISC:20220721 APPLE-SA-2022-07-20-3 macOS Big Sur 11.6.8
GLSA-202208-32
MISC:github.com:CVE-2022-0158
OSS:2022/01/15/1
OSS:2022/Q1/40
SMASH Issue 319927
bnc#1194553
rh#2039846
CVE-2022-0168kernel-source-rt:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-0168
MISC:access.redhat.com:/errata/RHSA-2022:7444
MISC:access.redhat.com:/errata/RHSA-2022:7683
MISC:access.redhat.com:/errata/RHSA-2022:7933
MISC:access.redhat.com:/errata/RHSA-2022:8267
MISC:access.redhat.com:CVE-2022-0168
MISC:git.kernel.org:CVE-2022-0168
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 327008
bnc#1197472
jsc#CAR-1617
rh#2037386
CVE-2022-0171kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-0171
DSA-5257
MISC:access.redhat.com:CVE-2022-0171
MISC:git.kernel.org:CVE-2022-0171
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/Q4/30
SMASH Issue 331582
ZDI-22-1462
bnc#1199509
jsc#CAR-1762
linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f
linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc
linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f
linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f
linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6
rh#2038940
rh#2123056
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2139586
rh#2139598
CVE-2022-0185kernel-source-rt:Released, ltp:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-0185
CVE-2022-0185
MISC:a13xp0p0v.github.io:MLIST:[oss-security] 20210409 Re: Linux kernel: Exploitable vulnerabilities in AF_VSOCK implementation
MISC:a13xp0p0v.github.io:OSS:2022/Q1/83
MISC:access.redhat.com:/errata/RHSA-2022:0176
MISC:access.redhat.com:/errata/RHSA-2022:0186
MISC:access.redhat.com:/errata/RHSA-2022:0187
MISC:access.redhat.com:/errata/RHSA-2022:0188
MISC:access.redhat.com:/errata/RHSA-2022:0231
MISC:access.redhat.com:/errata/RHSA-2022:0232
MISC:access.redhat.com:/errata/RHSA-2022:0540
MISC:access.redhat.com:OSS:2022/Q1/83
MISC:git.kernel.org:OSS:2022/01/18/7
MISC:git.kernel.org:OSS:2022/Q1/83
MISC:github.com:CVE-2022-0185
MISC:github.com:OSS:2022/01/18/7
MISC:security-tracker.debian.org:OSS:2022/Q1/83
MISC:ubuntu.com:OSS:2022/Q1/83
MISC:www.openwall.com:OSS:2022/Q1/83
MISC:www.suse.com:OSS:2022/Q1/83
MISC:www.willsroot.io:CVE-2022-0185
OSS:2022/01/18/7
OSS:2022/01/25/14
OSS:2022/Q1/55
OSS:2022/Q1/83
RHSA-2022:0176
RHSA-2022:0186
RHSA-2022:0187
RHSA-2022:0188
RHSA-2022:0231
RHSA-2022:0232
RHSA-2022:0540
SMASH Issue 319975
SMASH Issue 319981
bdo#988044
bdo#996974
bnc#1194517
bnc#1194737
jsc#CAR-1453
rh#2040358
CVE-2022-0213vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-0213
CVE-2022-0213
GLSA-202208-32
MISC:github.com:CVE-2022-0213
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
OSS:2022/01/15/1
OSS:2022/Q1/40
SMASH Issue 320470
bnc#1194885
jsc#CAR-1436
rh#2043779
CVE-2022-0261vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-0261
CONFIRM:support.apple.com:CVE-2022-1720
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-0261
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
GLSA-202208-32
MISC:github.com:CVE-2022-0261
MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
RHSA-2022:0894
SMASH Issue 320852
bnc#1194872
jsc#CAR-1435
rh#2044607
CVE-2022-0264kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-0264
SMASH Issue 320792
bnc#1194226
bnc#1194826
rh#2041547
CVE-2022-0286kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-0286
MISC:git.kernel.org:CVE-2022-0286
MISC:syzkaller.appspot.com:CVE-2022-0286
MISC:www.oracle.com:CVE-2022-21586
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 322204
bnc#1195371
rh#2037019
CVE-2022-0318vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-0318
CONFIRM:support.apple.com:CVE-2022-1720
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-0318
D:CVE-2022-0318
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
GLSA-202208-32
MISC:github.com:CVE-2022-0318
MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
RHSA-2022:0894
SMASH Issue 321378
bnc#1195004
jsc#CAR-1452
rh#2045355
CVE-2022-0319vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)CONFIRM:huntr.dev:CVE-2022-0319
CONFIRM:support.apple.com:CVE-2022-1720
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-0319
D:CVE-2022-0319
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
GLSA-202208-32
MISC:github.com:CVE-2022-0319
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 321458
bnc#1195066
jsc#CAR-1592
rh#2049556
CVE-2022-0322kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2021-3894
CVE-2022-0322
D:CVE-2022-0322
DSA-5096
MISC:git.kernel.org:CVE-2022-0322
MISC:www.oracle.com:CVE-2022-21586
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 321260
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1194985
bnc#1195489
jsc#CAR-1516
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2014970
rh#2042822
rh#2044561
rh#2053632
rh#2059923
CVE-2022-0330kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-0330
CVE-2022-0330
DSA-5096
OSS:2021/07/22/1
OSS:2022/01/25/12
OSS:2022/11/30/1
OSS:2022/Q1/81
OSS:2022/Q4/163
RHSA-2022:0592
RHSA-2022:0620
RHSA-2022:0622
RHSA-2022:0712
RHSA-2022:0718
RHSA-2022:0771
RHSA-2022:0772
RHSA-2022:0777
RHSA-2022:0819
RHSA-2022:0820
RHSA-2022:0821
RHSA-2022:0823
RHSA-2022:0825
RHSA-2022:0841
RHSA-2022:0849
RHSA-2022:0851
RHSA-2022:0925
RHSA-2022:0958
RHSA-2022:1103
RHSA-2022:1104
RHSA-2022:1106
RHSA-2022:1107
RHSA-2022:1263
SMASH Issue 321027
SMASH Issue 321410
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1194880
bnc#1195950
jsc#CAR-1513
linux.git:commit:04aa64375f48a5d430b5550d9271f8428883e550
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2042404
rh#2044561
rh#2053632
rh#2059923
rh#2147572
CVE-2022-0351vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-0351
CONFIRM:support.apple.com:CVE-2022-1720
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-0351
D:CVE-2022-0351
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
GLSA-202208-32
MISC:github.com:CVE-2022-0351
MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 321730
bnc#1195126
jsc#CAR-1461
rh#2046436
CVE-2022-0359vim:Releasedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H)CONFIRM:huntr.dev:CVE-2022-0359
CONFIRM:support.apple.com:CVE-2022-1720
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-0359
D:CVE-2022-0359
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
GLSA-202208-32
MISC:github.com:CVE-2022-0359
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
RHSA-2022:0894
SMASH Issue 321758
bnc#1195203
jsc#CAR-1476
rh#2046479
CVE-2022-0361vim:Releasedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H)CONFIRM:huntr.dev:CVE-2022-0361
CONFIRM:support.apple.com:CVE-2022-1720
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-0361
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
GLSA-202208-32
L3:64069
MISC:github.com:CVE-2022-0361
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
RHSA-2022:0894
SMASH Issue 321785
bnc#1195202
jsc#CAR-1475
rh#2050053
CVE-2022-0368vim:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-0368
CONFIRM:support.apple.com:CVE-2022-1720
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-0368
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
GLSA-202208-32
MISC:github.com:CVE-2022-0368
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 321801
bnc#1195205
rh#2048353
CVE-2022-0382kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-0382
MISC:github.com:CVE-2022-0382
SMASH Issue 321811
bnc#1195199
rh#2046440
CVE-2022-0391python3:Already fixedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)CONFIRM:security.netapp.com:CVE-2022-0391
CVE-2022-0391
FEDORA:FEDORA-2022-18ad73aba6
FEDORA:FEDORA-2022-ef99a016f6
MISC:bugs.python.org:MISC:www.openwall.com:CVE-2021-32052
MISC:www.oracle.com:CVE-2022-21498
RHSA-2021:3254
RHSA-2022:1663
RHSA-2022:1764
RHSA-2022:1821
RHSA-2022:6457
SMASH Issue 321856
bnc#1195396
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://security.gentoo.org/glsa/202305-02
jsc#CAR-1490
rh#2047376
CVE-2022-0392vim:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-0392
CONFIRM:support.apple.com:CVE-2022-1720
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-0392
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
GLSA-202208-32
MISC:github.com:CVE-2022-0392
MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
RHSA-2022:0894
SMASH Issue 322085
bnc#1195332
jsc#CAR-1485
rh#2049175
CVE-2022-0393vim:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-0393
CVE-2022-0393
FEDORA:FEDORA-2022-48bf3cb1c4
FEDORA:FEDORA-2022-da2fb07efb
GLSA-202208-32
MISC:github.com:CVE-2022-0393
SMASH Issue 322084
bnc#1195336
rh#2049180
CVE-2022-0400kernel-source-rt:Ignoremoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-0400
MISC:access.redhat.com:CVE-2022-0400
MISC:bugzilla.redhat.com:CVE-2022-0400
SMASH Issue 321944
bnc#1195329
rh#2044575
CVE-2022-0407vim:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:huntr.dev:CVE-2022-0407
CVE-2022-0407
D:CVE-2022-0407
GLSA-202208-32
L3:64932
L3:65211
L3:65301
L3:65303
MISC:github.com:CVE-2022-0407
SMASH Issue 322172
SMASH Issue 322217
SMASH Issue 322290
bnc#1195354
rh#2049007
CVE-2022-0408vim:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H)CONFIRM:huntr.dev:CVE-2022-0408
CVE-2022-0408
D:CVE-2022-0408
FEDORA:FEDORA-2022-48bf3cb1c4
FEDORA:FEDORA-2022-da2fb07efb
GLSA-202208-32
MISC:github.com:CVE-2022-0408
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 322171
bnc#1195459
rh#2048515
CVE-2022-0413vim:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:huntr.dev:CVE-2022-0413
CVE-2022-0413
D:CVE-2022-0413
FEDORA:FEDORA-2022-48bf3cb1c4
FEDORA:FEDORA-2022-da2fb07efb
GLSA-202208-32
L3:64932
L3:65211
L3:65303
MISC:github.com:CVE-2022-0413
MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
RHSA-2022:0894
SMASH Issue 322169
bnc#1195356
jsc#CAR-1488
rh#2048519
CVE-2022-0417vim:Not affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H)CONFIRM:huntr.dev:CVE-2022-0417
CVE-2022-0417
D:CVE-2022-0417
FEDORA:FEDORA-2022-48bf3cb1c4
FEDORA:FEDORA-2022-da2fb07efb
GLSA-202208-32
MISC:github.com:CVE-2022-0417
MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 322303
bnc#1195499
rh#2050149
CVE-2022-0433kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-0433
MISC:git.kernel.org:CVE-2022-0433
MISC:lore.kernel.org:CVE-2022-0433
SMASH Issue 322224
bnc#1195373
rh#2048259
CVE-2022-0435kernel-source-rt:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-0435
CVE-2022-0435
DSA-5096
OSS:2021/07/22/1
OSS:2022/01/25/12
OSS:2022/02/10/1
OSS:2022/Q1/130
RHSA-2022:0771
RHSA-2022:0772
RHSA-2022:0777
RHSA-2022:0819
RHSA-2022:0825
RHSA-2022:0841
RHSA-2022:0849
RHSA-2022:1186
RHSA-2022:1209
RHSA-2022:1213
RHSA-2022:1589
RHSA-2022:1619
SMASH Issue 321933
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1195254
bnc#1195308
jsc#CAR-1519
linux.git:commit:271351d255b09e39c7f6437738cba595f9b235be
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
linux.git:commit:9aa422ad326634b76309e8ff342c246800621216
rh#1980646
rh#1997467
rh#2044561
rh#2048738
rh#2053632
rh#2059923
CVE-2022-0443vim:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-0443
CVE-2022-0443
D:CVE-2022-0443
FEDORA:FEDORA-2022-48bf3cb1c4
FEDORA:FEDORA-2022-da2fb07efb
GLSA-202208-32
MISC:github.com:CVE-2022-0443
MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 322483
bnc#1195509
rh#2050182
CVE-2022-0480kernel-source-rt:Won't fixmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-0480
MISC:access.redhat.com:CVE-2022-0480
MISC:git.kernel.org:CVE-2022-0480
MISC:github.com:CVE-2022-0480
MISC:lore.kernel.org:CVE-2022-0480
MISC:ubuntu.com:CVE-2022-0480
SMASH Issue 322419
bnc#1195487
https://lore.kernel.org/linux-mm/20210902215519.AWcuVc3li%25akpm%40linux-foundation.org/
rh#2049700
CVE-2022-0487kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-0487
DSA-5095
DSA-5096
MISC:git.kernel.org:CVE-2022-0487
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
SMASH Issue 319974
SMASH Issue 322579
bdo#988044
bdo#989285
bdo#990279
bdo#990411
bdo#994050
bnc#1194516
bnc#1195949
jsc#CAR-1489
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2022-0492kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-0492
CVE-2022-0492
DSA-5095
DSA-5096
L3:62814
MISC:git.kernel.org:OSS:2022/Q1/123
MISC:packetstormsecurity.com:CVE-2022-0492
MISC:packetstormsecurity.com:CVE-2022-29581
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
OSS:2022/Q1/123
Oracle:CVE-2022-0492
RHSA-2022:0819
RHSA-2022:0820
RHSA-2022:0821
RHSA-2022:0823
RHSA-2022:0825
RHSA-2022:0849
RHSA-2022:0851
RHSA-2022:0925
RHSA-2022:0958
RHSA-2022:1413
RHSA-2022:1417
RHSA-2022:1418
RHSA-2022:1455
RHSA-2022:2186
RHSA-2022:2189
RHSA-2022:2211
RHSA-2022:4642
RHSA-2022:4644
RHSA-2022:4655
RHSA-2022:4717
RHSA-2022:4721
RHSA-2022:5157
SMASH Issue 322592
SMASH Issue 322593
bdo#988044
bdo#989285
bdo#990279
bdo#990411
bdo#994050
bnc#1195543
bnc#1195908
bnc#1196578
http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html
jsc#CAR-1520
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2044561
rh#2051505
rh#2053632
rh#2055502
rh#2059923
CVE-2022-0494kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2022-0494
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:lore.kernel.org:CVE-2022-0494
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.debian.org:CVE-2022-32250
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/141
Oracle:CVE-2022-21123
RHSA-2022:6002
RHSA-2022:6003
RHSA-2022:6243
RHSA-2022:6248
RHSA-2022:7110
RHSA-2022:7134
SMASH Issue 326886
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1197386
jsc#CAR-1606
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084183
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-0500kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-0500
CVE-2022-0500
MISC:git.kernel.org:CVE-2022-0500
SMASH Issue 324384
bnc#1196261
bnc#1196811
jsc#CAR-1589
rh#2044578
CVE-2022-0516kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-0516
CVE-2022-0516
DSA-5092
DSA-5096
MISC:git.kernel.org:CVE-2022-0516
MISC:git.kernel.org:OSS:2022/Q1/132
OSS:2021/07/22/1
OSS:2022/01/25/12
OSS:2022/Q1/132
RHSA-2022:0777
RHSA-2022:0825
SMASH Issue 322550
SMASH Issue 323433
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1195516
bnc#1195947
jsc#CAR-1601
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2044561
rh#2050237
rh#2053632
rh#2055502
rh#2059923
CVE-2022-0529unzip:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2022-0529
DSA-5202
MISC:github.com:CVE-2022-0530
MLIST:[debian-lts-announce] 20220922 [SECURITY] [DLA 3118-1] unzip security update
SMASH Issue 322963
bdo#1010355
bnc#1196180
https://security.gentoo.org/glsa/202310-17
jsc#CAR-1544
rh#2051395
rh#2051402
CVE-2022-0530unzip:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:support.apple.com:CVE-2018-25032
CVE-2022-0530
DSA-5202
FULLDISC:20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
FULLDISC:20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
MISC:github.com:CVE-2022-0530
MLIST:[debian-lts-announce] 20220922 [SECURITY] [DLA 3118-1] unzip security update
SMASH Issue 322962
bdo#1010355
bnc#1196177
https://security.gentoo.org/glsa/202310-17
rh#2051395
CVE-2022-0554vim:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-0554
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-0554
D:CVE-2022-0554
FEDORA:FEDORA-2022-48bf3cb1c4
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-0554
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
RHSA-2022:5242
SMASH Issue 323482
bnc#1195846
rh#2058483
CVE-2022-0563util-linux:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-0563
CVE-2022-0563
MISC:lore.kernel.org:CVE-2022-0563
SMASH Issue 323744
bnc#1196241
https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
https://security.gentoo.org/glsa/202401-08
rh#2053151
CVE-2022-0572vim:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-0572
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-0572
FEDORA:FEDORA-2022-48bf3cb1c4
FEDORA:FEDORA-2022-9cef12c14c
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
MISC:github.com:CVE-2022-0572
MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 323715
bnc#1196023
rh#2054278
CVE-2022-0615kernel-source-rt:Not affectedimportant ()CVE-2022-0615
MISC:support.eset.com:CVE-2022-0615
SMASH Issue 324835
bnc#1196541
CVE-2022-0617kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-0617
DSA-5095
DSA-5096
MISC:access.redhat.com:OSS:2022/04/13/2
MISC:cve.mitre.org:OSS:2022/04/13/2
MISC:git.kernel.org:CVE-2022-0617
MISC:lore.kernel.org:CVE-2022-0617
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
OSS:2022/04/13/2
OSS:2022/Q2/40
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 323880
bdo#988044
bdo#989285
bdo#990279
bdo#990411
bdo#994050
bnc#1196079
jsc#CAR-1538
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2022-0629vim:Not affectedmoderate5.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-0629
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-0629
D:CVE-2022-0629
FEDORA:FEDORA-2022-48bf3cb1c4
FEDORA:FEDORA-2022-8622ebdebb
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-0629
MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
SMASH Issue 324097
bnc#1196226
rh#2055695
CVE-2022-0644kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-0644
SMASH Issue 323951
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1196155
jsc#CAR-1602
rh#2026491
CVE-2022-0646kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-0646
CVE-2022-0646
D:CVE-2022-0646
MISC:lore.kernel.org:CVE-2022-0646
SMASH Issue 324074
bnc#1196090
https://lore.kernel.org/all/20220211011552.1861886-1-jk%40codeconstruct.com.au
rh#2055206
CVE-2022-0685vim:Not affectedimportant ()CONFIRM:huntr.dev:CVE-2022-0685
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-0685
D:CVE-2022-0685
FEDORA:FEDORA-2022-48bf3cb1c4
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-0685
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 324393
bnc#1196227
rh#2057820
CVE-2022-0696vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-0696
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-0696
FEDORA:FEDORA-2022-48bf3cb1c4
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
L3:64619
MISC:github.com:CVE-2022-0696
MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
SMASH Issue 324457
bnc#1196361
rh#2056805
CVE-2022-0714vim:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-0714
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-0714
D:CVE-2022-0714
FEDORA:FEDORA-2022-48bf3cb1c4
FEDORA:FEDORA-2022-63ca9a1129
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-0714
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 324507
bnc#1196358
rh#2057187
CVE-2022-0729vim:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-0729
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-0729
D:CVE-2022-0729
FEDORA:FEDORA-2022-48bf3cb1c4
FEDORA:FEDORA-2022-63ca9a1129
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-0729
MLIST:[debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 324555
bnc#1196437
rh#2057716
CVE-2022-0742kernel-source-rt:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2022-0742
CVE-2022-0742
MISC:git.kernel.org:CVE-2022-0742
OSS:2022/03/15/3
OSS:2022/Q1/183
SMASH Issue 326212
bnc#1197128
bnc#1197129
rh#2059294
CVE-2022-0778openssl:Not affected, openssl-1_1:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:CVE-2022-0778
CONFIRM:git.openssl.org:CVE-2022-0778
CONFIRM:psirt.global.sonicwall.com:CVE-2022-0778
CONFIRM:security.netapp.com:CVE-2022-0778
CONFIRM:security.netapp.com:CVE-2022-21490
CONFIRM:support.apple.com:CVE-2018-25032
CONFIRM:www.openssl.org:CVE-2022-0778
CONFIRM:www.tenable.com:CVE-2022-0778
CONFIRM:www.tenable.com:CVE-2022-24828
CVE-2022-0778
DSA-5103
FEDORA:FEDORA-2022-8bb51f6901
FEDORA:FEDORA-2022-9e88b5d8d7
FEDORA:FEDORA-2022-a5f51502f0
FULLDISC:20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
FULLDISC:20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
GLSA-202210-02
MISC:packetstormsecurity.com:CVE-2022-0778
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update
MLIST:[debian-lts-announce] 20220317 [SECURITY] [DLA 2953-1] openssl1.0 security update
Oracle:CVE-2022-0778
RHSA-2022:1065
RHSA-2022:1066
RHSA-2022:1071
RHSA-2022:1073
RHSA-2022:1076
RHSA-2022:1077
RHSA-2022:1078
RHSA-2022:1082
RHSA-2022:1091
RHSA-2022:1112
RHSA-2022:1263
RHSA-2022:1389
RHSA-2022:1390
RHSA-2022:1519
RHSA-2022:1520
RHSA-2022:4896
RHSA-2022:4899
RHSA-2022:4956
RHSA-2022:5326
SMASH Issue 325569
SMASH Issue 325570
bdo#989604
bnc#1196877
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG/
https://security.netapp.com/advisory/ntap-20240621-0006/
jsc#CAR-1594
openssl.git:commit:9eafb53614bf65797db25f467946e735e1b43dc9
rh#2062202
CVE-2022-0812kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-0812
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
MISC:access.redhat.com:CVE-2022-0812
MISC:bugzilla.redhat.com:CVE-2022-0812
MISC:git.kernel.org:CVE-2022-0812
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:ubuntu.com:CVE-2022-0812
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/141
Oracle:CVE-2022-21123
SMASH Issue 325040
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1196639
https://security.netapp.com/advisory/ntap-20230427-0011/
jsc#CAR-1650
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-0847kernel-source-rt:Released, ltp:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:cert-portal.siemens.com:CVE-2022-0847
CONFIRM:psirt.global.sonicwall.com:CVE-2022-0847
CONFIRM:security.netapp.com:CVE-2022-0847
CVE-2022-0847
MISC:dirtypipe.cm4all.com:CVE-2022-0847
MISC:packetstormsecurity.com:CVE-2022-0847
MISC:www.suse.com:CVE-2022-0847
OSS:2022/03/07/1
OSS:2022/Q1/170
RHSA-2022:0819
RHSA-2022:0820
RHSA-2022:0821
RHSA-2022:0822
RHSA-2022:0823
RHSA-2022:0825
RHSA-2022:0831
RHSA-2022:0841
SMASH Issue 325027
SMASH Issue 325327
bnc#1196584
bnc#1196601
http://packetstormsecurity.com/files/176534/Linux-4.20-KTLS-Read-Only-Write.html
jsc#CAR-1576
rh#2060795
CVE-2022-0850kernel-source-rt:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2022-0850
MISC:access.redhat.com:CVE-2022-0850
MISC:git.kernel.org:CVE-2022-0850
MISC:syzkaller.appspot.com:CVE-2022-0850
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 325331
bnc#1196761
jsc#CAR-1649
rh#2060606
CVE-2022-0854kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-0854
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
MISC:git.kernel.org:CVE-2022-0854
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.debian.org:CVE-2022-32250
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/141
Oracle:CVE-2022-21123
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 326812
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1196823
jsc#CAR-1619
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084183
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-0886kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2022-0995
CVE-2022-0886
CVE-2022-27666
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-27666
D:CVE-2022-32296
DSA-5127
DSA-5161
DSA-5173
DSA-5184
MISC:anatomic.rip:OSS:2024/Q2/172
MISC:blog.exodusintel.com:OSS:2024/Q2/172
MISC:cdn.kernel.org:CVE-2022-27666
MISC:git.kernel.org:CVE-2022-27666
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:git.kernel.org:OSS:2024/Q2/172
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:CVE-2022-27666
MISC:github.com:OSS:2022/04/02/2
MISC:github.com:OSS:2022/Q3/101
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:ruia-ruia.github.io:OSS:2022/Q3/101
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/04/22/3
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/101
OSS:2022/Q3/141
OSS:2024/04/24/3
OSS:2024/Q2/172
Oracle:CVE-2022-21123
RHSA-2022:4809
RHSA-2022:4829
RHSA-2022:4835
RHSA-2022:4924
RHSA-2022:4942
RHSA-2022:5214
RHSA-2022:5219
RHSA-2022:5220
RHSA-2022:5224
RHSA-2022:5249
RHSA-2022:5267
RHSA-2022:5316
RHSA-2022:5344
RHSA-2022:5476
RHSA-2022:5678
SMASH Issue 326065
SMASH Issue 327016
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1197131
bnc#1197133
bnc#1197462
https://bugs.chromium.org/p/project-zero/issues/detail?id=2504
jsc#CAR-1595
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2067299
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2078456
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-0943vim:Not affectedimportant ()CONFIRM:huntr.dev:CVE-2022-0943
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-0943
D:CVE-2022-0943
FEDORA:FEDORA-2022-b718ebbfce
FEDORA:FEDORA-2022-e62adccfca
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-0943
MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
RHSA-2022:5242
SMASH Issue 326149
bnc#1197225
rh#2064064
CVE-2022-0995kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-0995
CVE-2022-0995
MISC:git.kernel.org:CVE-2022-0995
MISC:packetstormsecurity.com:CVE-2022-0995
SMASH Issue 326386
bnc#1197246
bnc#1197337
rh#2063786
CVE-2022-0998kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-0998
CVE-2022-0998
MISC:git.kernel.org:OSS:2022/04/02/1
MISC:lore.kernel.org:CVE-2022-0998
OSS:2022/04/02/1
OSS:2022/Q2/0
SMASH Issue 326509
SMASH Issue 327959
bnc#1197247
bnc#1197338
rh#2057506
CVE-2022-1011kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-1011
CVE-2022-1011
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
FEDORA:FEDORA-2022-9342e59a98
FEDORA:FEDORA-2022-de4474b89d
L3:64306
L3:64525
L3:64549
L3:66073
MISC:git.kernel.org:CVE-2022-1011
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:packetstormsecurity.com:CVE-2022-1011
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/141
Oracle:CVE-2022-21123
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 326653
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1197343
bnc#1197344
jsc#CAR-1599
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2064855
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1012kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H)CONFIRM:security.netapp.com:CVE-2022-1012
CVE-2022-1012
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:kernel.googlesource.com:CVE-2022-1012
MISC:lore.kernel.org:CVE-2022-1012
MISC:research.nccgroup.com:OSS:2022/09/02/9
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/141
Oracle:CVE-2022-21123
RHSA-2022:5214
RHSA-2022:5220
RHSA-2022:5224
RHSA-2022:5249
RHSA-2022:5267
RHSA-2022:5626
RHSA-2022:5633
RHSA-2022:5636
RHSA-2022:5819
RHSA-2022:5834
RHSA-2022:6551
SMASH Issue 331349
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1199482
bnc#1199694
jsc#CAR-1763
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1015kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-1015
CVE-2022-1016
CVE-2023-0179
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
DSA-5324
L3:65449
L3:65879
L3:66739
MISC:access.redhat.com:/errata/RHSA-2022:7444
MISC:access.redhat.com:/errata/RHSA-2022:7683
MISC:access.redhat.com:/errata/RHSA-2022:7933
MISC:access.redhat.com:/errata/RHSA-2022:8267
MISC:access.redhat.com:CVE-2022-1016
MISC:blog.dbouman.nl:CVE-2022-1015
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:packetstormsecurity.com:CVE-2022-42722
MISC:research.nccgroup.com:OSS:2022/09/02/9
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q1/205
OSS:2022/Q3/141
OSS:2023/01/13/2
OSS:2023/02/23/1
OSS:2023/Q1/20
Oracle:CVE-2022-21123
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
RHSA-2023:0951
RHSA-2023:0979
RHSA-2023:1008
RHSA-2023:1202
RHSA-2023:1203
RHSA-2023:1435
RHSA-2023:4137
RHSA-2023:4138
SMASH Issue 326549
SMASH Issue 326808
SMASH Issue 329989
SMASH Issue 353369
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1197227
bnc#1197335
bnc#1207034
bnc#1207139
http://packetstormsecurity.com/files/171601/Kernel-Live-Patch-Security-Notice-LNS-0093-1.html
https://security.netapp.com/advisory/ntap-20230511-0003/
jsc#CAR-1620
linux.git:commit:696e1a48b1a1b01edad542a1ef293665864a4dd0
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2065323
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
rh#2161713
CVE-2022-1016kernel-source-rt:Releasedimportant5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-1015
CVE-2022-1016
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
MISC:access.redhat.com:/errata/RHSA-2022:7444
MISC:access.redhat.com:/errata/RHSA-2022:7683
MISC:access.redhat.com:/errata/RHSA-2022:7933
MISC:access.redhat.com:/errata/RHSA-2022:8267
MISC:access.redhat.com:CVE-2022-1016
MISC:blog.dbouman.nl:CVE-2022-1015
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:packetstormsecurity.com:CVE-2022-42722
MISC:research.nccgroup.com:OSS:2022/09/02/9
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q1/205
OSS:2022/Q3/141
OSS:2023/01/13/2
OSS:2023/02/23/1
Oracle:CVE-2022-21123
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
RHSA-2023:4137
RHSA-2023:4138
SMASH Issue 326549
SMASH Issue 326807
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1197227
jsc#CAR-1620
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2065323
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1043kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-1043
MISC:access.redhat.com:CVE-2022-1043
MISC:github.com:CVE-2022-1043
MISC:packetstormsecurity.com:/files/170834/io_uring-Same-Type-Object-Reuse-Privilege-Escalation.html
MISC:www.zerodayinitiative.com:CVE-2022-1043
SMASH Issue 326934
bnc#1197393
bnc#1197596
rh#1997328
CVE-2022-1048kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-1353
CVE-2022-1048
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5127
DSA-5161
DSA-5173
DSA-5184
L3:64306
L3:64525
L3:64549
L3:66075
MISC:anatomic.rip:OSS:2024/Q2/172
MISC:blog.exodusintel.com:OSS:2024/Q2/172
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:git.kernel.org:OSS:2024/Q2/172
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:github.com:OSS:2022/Q3/101
MISC:lore.kernel.org:CVE-2022-1048
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:ruia-ruia.github.io:OSS:2022/Q3/101
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/04/22/3
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q1/204
OSS:2022/Q3/101
OSS:2022/Q3/141
OSS:2024/04/24/3
OSS:2024/Q2/172
Oracle:CVE-2022-21123
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 326830
SMASH Issue 326948
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1197331
bnc#1197597
https://bugs.chromium.org/p/project-zero/issues/detail?id=2504
https://lore.kernel.org/lkml/20220322170720.3529-5-tiwai%40suse.de/T/#m1d3b791b815556012c6be92f1c4a7086b854f7f3
jsc#CAR-1634
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2078456
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1055kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:N/A
CONFIRM:security.netapp.com:CVE-2022-1055
CVE-2022-1055
D:CVE-2022-1055
MISC:packetstormsecurity.com:CVE-2022-29581
RHSA-2022:6002
RHSA-2022:6003
RHSA-2022:7444
RHSA-2022:7683
SMASH Issue 327545
bnc#1197702
bnc#1197705
jsc#CAR-1635
rh#2070220
CVE-2022-1097mozilla-nss:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:github.com:CVE-2022-24713
CVE-2022-1097
CVE-2022-1196
CVE-2022-1197
CVE-2022-24713
CVE-2022-28281
CVE-2022-28282
CVE-2022-28283
CVE-2022-28284
CVE-2022-28285
CVE-2022-28286
CVE-2022-28287
CVE-2022-28288
CVE-2022-28289
D:CVE-2022-24713
DSA-5113
DSA-5118
FEDORA:FEDORA-2022-8436ac4c39
FEDORA:FEDORA-2022-ceb3e03c5e
FEDORA:FEDORA-2022-d20d44ba98
GLSA-202208-08
GLSA-202208-14
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:github.com:CVE-2022-24713
MISC:groups.google.com:CVE-2022-24713
MISC:www.mozilla.org:/security/advisories/mfsa2022-13/
MISC:www.mozilla.org:/security/advisories/mfsa2022-14/
MISC:www.mozilla.org:/security/advisories/mfsa2022-15/
MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update
MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update
Mozilla Foundation Security Advisory 2022-13
RHSA-2022:1283
RHSA-2022:1284
RHSA-2022:1285
RHSA-2022:1286
RHSA-2022:1287
RHSA-2022:1301
RHSA-2022:1302
RHSA-2022:1303
RHSA-2022:1305
RHSA-2022:1326
SMASH Issue 327815
SMASH Issue 327877
bnc#1197903
jsc#CAR-1667
rh#2072559
rh#2072560
rh#2072561
rh#2072562
rh#2072563
rh#2072564
rh#2072565
rh#2072566
rh#2072963
xf#223379
CVE-2022-1116kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-1116
CVE-2022-1116
L3:65426
MISC:git.kernel.org:CVE-2022-1116
MISC:kernel.dance:CVE-2022-1116
MISC:packetstormsecurity.com:CVE-2022-29581
SMASH Issue 332133
bnc#1199647
bnc#1199648
jsc#CAR-1774
rh#2087936
CVE-2022-1154vim:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:huntr.dev:CVE-2022-1154
CVE-2022-1154
FEDORA:FEDORA-2022-d776fcfe60
FEDORA:FEDORA-2022-e62adccfca
GLSA-202208-32
MISC:github.com:CVE-2022-1154
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
Oracle:CVE-2022-1154
RHSA-2022:1552
RHSA-2022:5242
SMASH Issue 327694
bnc#1197813
https://security.gentoo.org/glsa/202305-16
rh#2073013
CVE-2022-1158kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2022-1158
MISC:git.kernel.org:OSS:2022/04/08/4
MISC:github.com:OSS:2022/04/08/4
OSS:2022/04/08/4
OSS:2022/Q2/22
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
RHSA-2022:8673
RHSA-2022:8685
RHSA-2022:8686
RHSA-2022:8809
RHSA-2022:8831
RHSA-2022:8940
RHSA-2022:8941
RHSA-2022:8973
RHSA-2022:8974
RHSA-2022:8989
RHSA-2022:9082
SMASH Issue 327524
SMASH Issue 327604
bnc#1197660
bnc#1198133
https://security.netapp.com/advisory/ntap-20230214-0003/
jsc#CAR-1757
rh#2069793
CVE-2022-1160vim:Not affectedmoderate6.3 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-1160
CVE-2022-1160
FEDORA:FEDORA-2022-d776fcfe60
FEDORA:FEDORA-2022-e62adccfca
GLSA-202208-32
MISC:github.com:CVE-2022-1160
SMASH Issue 327708
bnc#1197814
https://security.gentoo.org/glsa/202305-16
rh#2070437
CVE-2022-1184kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-1184
DSA-5257
MISC:access.redhat.com:/errata/RHSA-2022:7444
MISC:access.redhat.com:/errata/RHSA-2022:7683
MISC:access.redhat.com:/errata/RHSA-2022:7933
MISC:access.redhat.com:/errata/RHSA-2022:8267
MISC:access.redhat.com:CVE-2022-1184
MISC:ubuntu.com:CVE-2022-1184
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/Q4/30
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 329431
ZDI-22-1462
bdo#1006346
bdo#1013299
bdo#922204
bnc#1198577
linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f
linux.git:commit:61a1d87a324ad5e3ed27c6699dfc93218fcf3201
linux.git:commit:65f8ea4cd57dbd46ea13b41dc8bac03176b04233
linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc
linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f
linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f
linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6
rh#2070205
rh#2123056
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2139586
rh#2139598
rh#2189896
CVE-2022-1195kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-1195
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5127
DSA-5161
DSA-5173
DSA-5184
MISC:anatomic.rip:OSS:2024/Q2/172
MISC:blog.exodusintel.com:OSS:2024/Q2/172
MISC:git.kernel.org:CVE-2022-1195
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:git.kernel.org:OSS:2024/Q2/172
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:github.com:OSS:2022/Q3/101
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:ruia-ruia.github.io:OSS:2022/Q3/101
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/04/22/3
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/101
OSS:2022/Q3/141
OSS:2024/04/24/3
OSS:2024/Q2/172
Oracle:CVE-2022-21123
SMASH Issue 327765
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1198029
https://bugs.chromium.org/p/project-zero/issues/detail?id=2504
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2078456
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1196mozilla-nss:Releasedimportant6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)CONFIRM:github.com:CVE-2022-24713
CVE-2022-1097
CVE-2022-1196
CVE-2022-1197
CVE-2022-24713
CVE-2022-28281
CVE-2022-28282
CVE-2022-28283
CVE-2022-28284
CVE-2022-28285
CVE-2022-28286
CVE-2022-28287
CVE-2022-28288
CVE-2022-28289
D:CVE-2022-24713
DSA-5113
DSA-5118
FEDORA:FEDORA-2022-8436ac4c39
FEDORA:FEDORA-2022-ceb3e03c5e
FEDORA:FEDORA-2022-d20d44ba98
GLSA-202208-08
GLSA-202208-14
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:github.com:CVE-2022-24713
MISC:groups.google.com:CVE-2022-24713
MISC:www.mozilla.org:/security/advisories/mfsa2022-13/
MISC:www.mozilla.org:/security/advisories/mfsa2022-14/
MISC:www.mozilla.org:/security/advisories/mfsa2022-15/
MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update
MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update
Mozilla Foundation Security Advisory 2022-13
RHSA-2022:1283
RHSA-2022:1284
RHSA-2022:1285
RHSA-2022:1286
RHSA-2022:1287
RHSA-2022:1301
RHSA-2022:1302
RHSA-2022:1303
RHSA-2022:1305
RHSA-2022:1326
SMASH Issue 327815
bnc#1197903
jsc#CAR-1667
rh#2072559
rh#2072560
rh#2072561
rh#2072562
rh#2072563
rh#2072564
rh#2072565
rh#2072566
rh#2072963
xf#223379
CVE-2022-1197mozilla-nss:Releasedimportant6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)CONFIRM:github.com:CVE-2022-24713
CVE-2022-1097
CVE-2022-1196
CVE-2022-1197
CVE-2022-24713
CVE-2022-28281
CVE-2022-28282
CVE-2022-28283
CVE-2022-28284
CVE-2022-28285
CVE-2022-28286
CVE-2022-28287
CVE-2022-28288
CVE-2022-28289
D:CVE-2022-24713
DSA-5113
DSA-5118
FEDORA:FEDORA-2022-8436ac4c39
FEDORA:FEDORA-2022-ceb3e03c5e
FEDORA:FEDORA-2022-d20d44ba98
GLSA-202208-08
GLSA-202208-14
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:github.com:CVE-2022-24713
MISC:groups.google.com:CVE-2022-24713
MISC:www.mozilla.org:/security/advisories/mfsa2022-13/
MISC:www.mozilla.org:/security/advisories/mfsa2022-14/
MISC:www.mozilla.org:/security/advisories/mfsa2022-15/
MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update
MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update
Mozilla Foundation Security Advisory 2022-13
RHSA-2022:1283
RHSA-2022:1284
RHSA-2022:1285
RHSA-2022:1286
RHSA-2022:1287
RHSA-2022:1301
RHSA-2022:1302
RHSA-2022:1303
RHSA-2022:1305
RHSA-2022:1326
SMASH Issue 327815
SMASH Issue 328343
bnc#1197903
jsc#CAR-1667
rh#2072559
rh#2072560
rh#2072561
rh#2072562
rh#2072563
rh#2072564
rh#2072565
rh#2072566
rh#2072963
xf#223379
CVE-2022-1198kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-1198
D:CVE-2022-1016
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
MISC:access.redhat.com:CVE-2022-1198
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q2/2
OSS:2022/Q3/141
Oracle:CVE-2022-21123
SMASH Issue 327769
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1198030
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2070689
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1199kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20221228-0006/
CVE-2022-1199
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
MISC:access.redhat.com:CVE-2022-1199
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q2/4
OSS:2022/Q3/141
Oracle:CVE-2022-21123
SMASH Issue 327770
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1198028
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1204kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-1204
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
MISC:access.redhat.com:CVE-2022-1204
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:security-tracker.debian.org:CVE-2022-1204
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q2/1
OSS:2022/Q3/141
Oracle:CVE-2022-21123
SMASH Issue 327883
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1198025
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2071051
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1205kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-1205
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
MISC:access.redhat.com:CVE-2022-1205
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q2/3
OSS:2022/Q3/141
Oracle:CVE-2022-21123
SMASH Issue 327882
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1198027
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1247kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-1247
L3:64302
L3:64306
L3:64525
L3:64549
MISC:access.redhat.com:CVE-2022-1247
SMASH Issue 331344
bnc#1199434
bnc#1199696
rh#2066799
CVE-2022-1249pesign:Not affectedlow ()CVE-2022-1249
SMASH Issue 328265
bnc#1198157
rh#2065771
CVE-2022-1263kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-1263
MISC:access.redhat.com:CVE-2022-1263
MISC:github.com:CVE-2022-1263
OSS:2022/04/07/1
OSS:2022/Q2/12
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 328341
bnc#1198189
rh#2072698
CVE-2022-1271gzip:Released, xz:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-1271
CVE-2022-1271
DSA-5122
DSA-5123
GLSA-202209-01
L3:63462
L3:63468
MISC:access.redhat.com:CVE-2022-1271
MISC:git.tukaani.org:CVE-2022-1271
MISC:lists.gnu.org:CVE-2022-1271
MISC:security-tracker.debian.org:CVE-2022-1271
MISC:tukaani.org:CVE-2022-1271
MISC:tukaani.org:OSS:2022/04/07/8
OSS:2022/04/07/8
OSS:2022/Q2/21
Oracle:CVE-2022-1271
RHSA-2022:1537
RHSA-2022:1592
RHSA-2022:1665
RHSA-2022:1676
RHSA-2022:2191
RHSA-2022:4582
RHSA-2022:4896
RHSA-2022:4940
RHSA-2022:4991
RHSA-2022:4992
RHSA-2022:4993
RHSA-2022:4994
RHSA-2022:5052
RHSA-2022:5439
SMASH Issue 328097
SMASH Issue 328398
ZDI-22-1458
ZDI-22-619
bdo#1009167
bdo#1009168
bnc#1198062
bnc#1200199
bnc#1200208
jsc#CAR-1661
rh#2073310
CVE-2022-1280kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-1280
OSS:2022/04/12/3
OSS:2022/Q2/39
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 327827
SMASH Issue 328420
bnc#1197914
bnc#1198590
jsc#CAR-1679
rh#2071022
CVE-2022-1292openssl:Not affected, openssl-1_1:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:git.openssl.org:CVE-2022-1292
CONFIRM:psirt.global.sonicwall.com:CVE-2022-1292
CONFIRM:security.netapp.com:CVE-2022-1473
CONFIRM:security.netapp.com:CVE-2022-21569
CONFIRM:www.openssl.org:CVE-2022-1473
CVE-2022-1292
D:CVE-2022-1292
DSA-5139
FEDORA:FEDORA-2022-b651cb69e6
FEDORA:FEDORA-2022-c9c02865f6
GLSA-202210-02
L3:63379
L3:63382
L3:68186
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220515 [SECURITY] [DLA 3008-1] openssl security update
Oracle:CVE-2022-1292
Oracle:CVE-2022-2068
RHSA-2022:5818
RHSA-2022:6224
RHSA-2022:8840
RHSA-2022:8841
RHSA-2022:8913
RHSA-2022:8917
SMASH Issue 330566
bnc#1199166
bnc#1199336
bnc#1199823
bnc#1199844
https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf
jsc#CAR-1735
openssl.git:commit:7c33270707b568c524a8ef125fe611a8872cb5e8
openssl.git:commit:ce60b13707add7e6b54c5817376234c4043506ed
rh#2081494
rh#2097310
CVE-2022-1304e2fsprogs:Releasedmoderate7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H)CVE-2022-1304
MISC:access.redhat.com:/errata/RHSA-2022:7720
MISC:access.redhat.com:/errata/RHSA-2022:8361
MISC:access.redhat.com:/security/cve/CVE-2022-1304
Oracle:CVE-2022-1304
RHSA-2022:7720
RHSA-2022:8361
SMASH Issue 328572
bnc#1198446
jsc#CAR-1823
rh#2069726
CVE-2022-1343openssl:Not affected, openssl-1_1:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:N)CONFIRM:git.openssl.org:CVE-2022-1343
CONFIRM:security.netapp.com:CVE-2022-1473
CONFIRM:www.openssl.org:CVE-2022-1473
CVE-2022-1343
RHSA-2022:6224
SMASH Issue 330567
bnc#1199167
https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf
openssl.git:commit:21f89f542d745adbf1131338929ae538e200d50d
rh#2087911
CVE-2022-1348logrotate:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)CVE-2022-1348
FEDORA:FEDORA-2022-87c0f05204
FEDORA:FEDORA-2022-ff0188b37c
MISC:bugzilla.redhat.com:CVE-2022-1348
MISC:github.com:OSS:2022/05/25/5
OSS:2022/05/25/3
OSS:2022/05/25/4
OSS:2022/05/25/5
RHSA-2022:8393
SMASH Issue 332242
SMASH Issue 332243
bnc#1199652
rh#2075074
CVE-2022-1353kernel-source-rt:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CONFIRM:security.netapp.com:CVE-2022-1353
CVE-2022-1353
D:CVE-2022-2153
DSA-5127
DSA-5161
DSA-5173
DSA-5184
L3:66049
MISC:anatomic.rip:OSS:2024/Q2/172
MISC:blog.exodusintel.com:OSS:2024/Q2/172
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:git.kernel.org:OSS:2024/Q2/172
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:CVE-2022-1353
MISC:github.com:OSS:2022/04/02/2
MISC:github.com:OSS:2022/Q3/101
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:ruia-ruia.github.io:OSS:2022/Q3/101
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/04/22/3
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/101
OSS:2022/Q3/141
OSS:2024/04/24/3
OSS:2024/Q2/172
Oracle:CVE-2022-21123
RHSA-2022:5934
RHSA-2022:5998
RHSA-2022:6243
RHSA-2022:6248
RHSA-2022:7110
RHSA-2022:7134
RHSA-2022:7933
RHSA-2022:8267
RHSA-2023:4801
RHSA-2023:4814
SMASH Issue 329048
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1198516
https://bugs.chromium.org/p/project-zero/issues/detail?id=2504
jsc#CAR-1684
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2078456
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1381vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-1381
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1381
D:CVE-2022-1381
FEDORA:FEDORA-2022-b605768c94
FEDORA:FEDORA-2022-e304fffd34
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-1381
SMASH Issue 329434
bnc#1198596
https://security.gentoo.org/glsa/202305-16
rh#2076170
CVE-2022-1419kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-1419
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
L3:64060
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q2/49
OSS:2022/Q3/141
Oracle:CVE-2022-21123
SMASH Issue 329712
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1198742
bnc#1201655
jsc#CAR-1720
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2077560
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1420vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-1420
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1420
D:CVE-2022-1420
FEDORA:FEDORA-2022-b605768c94
FEDORA:FEDORA-2022-e304fffd34
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-1420
RHSA-2022:5242
SMASH Issue 329709
bnc#1198748
https://security.gentoo.org/glsa/202305-16
rh#2077734
CVE-2022-1434openssl:Not affected, openssl-1_1:Not affectedimportant8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:git.openssl.org:CVE-2022-1434
CONFIRM:security.netapp.com:CVE-2022-1473
CONFIRM:www.openssl.org:CVE-2022-1473
CVE-2022-1434
SMASH Issue 330568
bnc#1199168
https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf
openssl.git:commit:33219939c782cf363b30e9e899b9997fb1ced440
rh#2087912
rh#2087913
xf#225617
CVE-2022-1462kernel-source-rt:Releasedmoderate6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H)CVE-2022-1462
MISC:github.com:OSS:2022/Q2/155
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
OSS:2022/Q2/155
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 329994
SMASH Issue 329995
bnc#1198829
rh#2078466
CVE-2022-1473openssl:Not affected, openssl-1_1:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:git.openssl.org:CVE-2022-1473
CONFIRM:security.netapp.com:CVE-2022-1473
CONFIRM:www.openssl.org:CVE-2022-1473
CVE-2022-1473
GLSA-202210-02
RHSA-2022:6224
SMASH Issue 330569
bnc#1199169
https://cert-portal.siemens.com/productcert/pdf/ssa-953464.pdf
rh#2087913
CVE-2022-1508kernel-source-rt:Not affectedmoderate6.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L)CVE-2022-1508
MISC:access.redhat.com:CVE-2022-1508
MISC:git.kernel.org:CVE-2022-1508
MISC:ubuntu.com:CVE-2022-1508
SMASH Issue 330184
bnc#1198968
rh#2075533
CVE-2022-1516kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-1516
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
MISC:git.kernel.org:CVE-2022-1516
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:github.com:OSS:2022/06/19/1
MISC:research.nccgroup.com:OSS:2022/09/02/9
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/19/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q2/201
OSS:2022/Q3/141
Oracle:CVE-2022-21123
SMASH Issue 330276
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1199012
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2079802
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1586pcre:Releasedimportant8.6 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L)CONFIRM:security.netapp.com:CVE-2022-1587
CVE-2022-1586
FEDORA:FEDORA-2022-19f4c34184
FEDORA:FEDORA-2022-9c9691d058
FEDORA:FEDORA-2022-a3edad0ab6
FEDORA:FEDORA-2022-e56085ba31
L3:64059
MISC:bugzilla.redhat.com:CVE-2022-1586
MISC:github.com:CVE-2022-1586
Oracle:CVE-2022-1586
RHSA-2022:5251
RHSA-2022:5809
SMASH Issue 330794
bnc#1199232
https://lists.debian.org/debian-lts-announce/2023/03/msg00014.html
jsc#CAR-1749
rh#2077976
CVE-2022-1587pcre:Not affectedimportant8.6 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L)CONFIRM:security.netapp.com:CVE-2022-1587
CVE-2022-1587
FEDORA:FEDORA-2022-19f4c34184
FEDORA:FEDORA-2022-9c9691d058
FEDORA:FEDORA-2022-a3edad0ab6
FEDORA:FEDORA-2022-e56085ba31
L3:63788
L3:64059
MISC:bugzilla.redhat.com:CVE-2022-1587
MISC:github.com:CVE-2022-1587
Oracle:CVE-2022-1587
RHSA-2022:5251
SMASH Issue 330795
bnc#1199235
bnc#1201754
https://lists.debian.org/debian-lts-announce/2023/03/msg00014.html
rh#2077983
CVE-2022-1616vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-1616
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1616
D:CVE-2022-1616
FEDORA:FEDORA-2022-8df66cdbef
FEDORA:FEDORA-2022-e92c3ce170
FEDORA:FEDORA-2022-f0db3943d9
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-1616
MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 331072
bnc#1199331
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1751
rh#2083017
CVE-2022-1619vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-1619
CONFIRM:security.netapp.com:CVE-2022-1619
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1619
D:CVE-2022-1619
FEDORA:FEDORA-2022-8df66cdbef
FEDORA:FEDORA-2022-e92c3ce170
FEDORA:FEDORA-2022-f0db3943d9
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-1619
MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
SMASH Issue 331075
bnc#1199333
https://security.gentoo.org/glsa/202305-16
rh#2083026
CVE-2022-1620vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-1620
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1620
D:CVE-2022-1620
FEDORA:FEDORA-2022-8df66cdbef
FEDORA:FEDORA-2022-e92c3ce170
FEDORA:FEDORA-2022-f0db3943d9
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
L3:63688
MISC:github.com:CVE-2022-1620
SMASH Issue 331074
bnc#1199334
bnc#1201281
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1752
rh#2083029
CVE-2022-1621vim:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-1621
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1621
FEDORA:FEDORA-2022-8df66cdbef
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-1621
MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
RHSA-2022:5242
RHSA-2022:5319
SMASH Issue 331173
bnc#1199435
https://security.gentoo.org/glsa/202305-16
rh#2083924
CVE-2022-1629vim:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-1629
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1629
FEDORA:FEDORA-2022-8df66cdbef
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-1629
RHSA-2022:5242
RHSA-2022:5319
SMASH Issue 331172
bnc#1199436
https://security.gentoo.org/glsa/202305-16
rh#2083931
CVE-2022-1651kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2022-1671
CVE-2022-1651
D:CVE-2022-1651
MISC:git.kernel.org:CVE-2022-1651
SMASH Issue 331345
bnc#1199433
rh#2083455
CVE-2022-1652kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CERT-VN:VU#647177
CONFIRM:security.netapp.com:CVE-2022-1652
CVE-2022-1652
D:CVE-2022-1016
D:CVE-2022-2153
DSA-5161
DSA-5173
DSA-5184
L3:64306
L3:64525
L3:64549
L3:66060
MISC:francozappa.github.io:CVE-2020-10135
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q2/91
OSS:2022/Q3/141
Oracle:CVE-2022-21123
SMASH Issue 330428
SMASH Issue 331140
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1199063
bnc#1200057
jsc#CAR-1806
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2090723
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1664update-alternatives:Releasedlow4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-1664
CVE-2022-1664
DSA-5147
MISC:git.dpkg.org:CVE-2022-1664
MISC:lists.debian.org:CVE-2022-1664
SMASH Issue 332928
bnc#1199944
CVE-2022-1671kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:H)CONFIRM:security.netapp.com:CVE-2022-1671
CVE-2022-1671
D:CVE-2022-1671
MISC:git.kernel.org:CVE-2022-1671
SMASH Issue 331346
bnc#1199439
rh#2083992
CVE-2022-1674vim:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-1674
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1674
FEDORA:FEDORA-2022-74b9e404c1
FEDORA:FEDORA-2022-d044e7e0b4
FEDORA:FEDORA-2022-d20b51de9c
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-1674
SMASH Issue 331586
bnc#1199502
https://security.gentoo.org/glsa/202305-16
rh#2085393
CVE-2022-1678kernel-source-rt:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:bugzilla.openanolis.cn:CVE-2022-1678
CONFIRM:security.netapp.com:CVE-2022-1678
CVE-2022-1678
MISC:anas.openanolis.cn:CVE-2022-1678
MISC:gitee.com:CVE-2022-1678
MISC:github.com:CVE-2022-1678
MISC:lore.kernel.org:CVE-2022-1678
SMASH Issue 332942
bnc#1199939
rh#2091704
CVE-2022-1679kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-1679
CVE-2022-1679
L3:63649
L3:64302
L3:64306
L3:64525
L3:64549
L3:66067
MISC:lore.kernel.org:CVE-2022-1679
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
RHSA-2022:7933
RHSA-2022:8267
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 331563
bnc#1199487
bnc#1199696
bnc#1201080
bnc#1201083
https://lore.kernel.org/lkml/87ilqc7jv9.fsf%40kernel.org/t/
jsc#CAR-1766
rh#2066799
rh#2084125
CVE-2022-1706systemd-presets-common-SUSE:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2022-1706
FEDORA:FEDORA-2022-393948cc9e
FEDORA:FEDORA-2022-5df5dc8ec5
FEDORA:FEDORA-2022-7846cac830
MISC:github.com:CVE-2022-1706
RHSA-2022:5068
RHSA-2022:8126
SMASH Issue 331765
bnc#1199524
rh#2082274
CVE-2022-1720vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-1720
CONFIRM:support.apple.com:CVE-2022-1720
CONFIRM:support.apple.com:CVE-2022-1725
CONFIRM:support.apple.com:CVE-2022-32894
CVE-2022-1720
FEDORA:FEDORA-2022-719f3ec21b
FEDORA:FEDORA-2022-bb7f3cacbf
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
FULLDISC:20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
GLSA-202208-32
MISC:github.com:CVE-2022-1720
MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 335182
bnc#1200732
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1861
rh#2099979
CVE-2022-1725vim:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-1725
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1725
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
MISC:github.com:CVE-2022-1725
SMASH Issue 343922
bnc#1204118
https://security.gentoo.org/glsa/202305-16
rh#2132561
CVE-2022-1729kernel-source-rt:Releasedimportant8.2 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)CVE-2022-1729
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
MISC:git.kernel.org:CVE-2022-1729
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q2/122
OSS:2022/Q3/141
Oracle:CVE-2022-21123
RHSA-2022:5157
RHSA-2022:5220
RHSA-2022:5224
RHSA-2022:5232
RHSA-2022:5236
RHSA-2022:5249
RHSA-2022:5267
RHSA-2022:5564
RHSA-2022:5565
RHSA-2022:5626
RHSA-2022:5633
RHSA-2022:5636
RHSA-2022:5806
RHSA-2022:6432
RHSA-2022:6741
SMASH Issue 331771
SMASH Issue 331903
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1199507
bnc#1199697
https://security.netapp.com/advisory/ntap-20230214-0006/
jsc#CAR-1801
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1733vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)CONFIRM:huntr.dev:CVE-2022-1733
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1733
FEDORA:FEDORA-2022-74b9e404c1
FEDORA:FEDORA-2022-d044e7e0b4
FEDORA:FEDORA-2022-d6d1ac4ca7
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-1733
SMASH Issue 332132
bnc#1199655
https://security.gentoo.org/glsa/202305-16
rh#2087600
CVE-2022-1734kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-1734
CVE-2022-1734
D:CVE-2022-1016
D:CVE-2022-1734
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:CVE-2022-1734
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/05/4
OSS:2022/06/09/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q2/173
OSS:2022/Q3/141
Oracle:CVE-2022-21123
SMASH Issue 331958
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1199605
bnc#1199606
jsc#CAR-1769
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2086766
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1735vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-1735
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1735
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
L3:64069
MISC:github.com:CVE-2022-1735
SMASH Issue 332115
bnc#1199651
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1775
rh#2088240
CVE-2022-1769vim:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)CONFIRM:huntr.dev:CVE-2022-1769
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1769
FEDORA:FEDORA-2022-74b9e404c1
FEDORA:FEDORA-2022-d044e7e0b4
FEDORA:FEDORA-2022-d6d1ac4ca7
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-1769
SMASH Issue 332131
bnc#1199658
https://security.gentoo.org/glsa/202305-16
rh#2087594
CVE-2022-1771vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-1771
CVE-2022-1771
GLSA-202208-32
L3:64287
MISC:github.com:CVE-2022-1771
SMASH Issue 332321
bnc#1199693
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1787
rh#2088241
CVE-2022-1785vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-1785
CVE-2022-1785
D:CVE-2022-1785
GLSA-202208-32
MISC:github.com:CVE-2022-1785
MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
RHSA-2022:5813
RHSA-2022:5942
SMASH Issue 332391
bnc#1199745
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1798
rh#2088689
CVE-2022-1786kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-1786
CVE-2022-1786
DSA-5161
MISC:git.kernel.org:CVE-2022-32250
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.debian.org:CVE-2022-32250
OSS:2022/05/31/1
OSS:2022/08/25/1
OSS:2022/09/02/9
OSS:2022/Q2/134
OSS:2022/Q3/141
SMASH Issue 332049
SMASH Issue 332282
ZDI-23-1834
bnc#1199599
bnc#1199700
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#2039448
rh#2058395
rh#2064604
rh#2074208
rh#2084183
rh#2086753
rh#2087760
rh#2089815
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2104423
CVE-2022-1789kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CERT-VN:VU#647177
CVE-2022-1789
D:CVE-2022-1789
DSA-5161
FEDORA:FEDORA-2022-3b86247c11
FEDORA:FEDORA-2022-be819b07a3
FEDORA:FEDORA-2022-ef8c8a5925
MISC:francozappa.github.io:CVE-2020-10135
MISC:git.kernel.org:CVE-2022-32250
MISC:research.nccgroup.com:OSS:2022/09/02/9
OSS:2022/05/31/1
OSS:2022/08/25/1
OSS:2022/09/02/9
OSS:2022/Q2/144
OSS:2022/Q3/141
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 332283
SMASH Issue 332284
ZDI-23-1834
bnc#1199674
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2058395
rh#2064604
rh#2074208
rh#2084183
rh#2084458
rh#2086753
rh#2089815
rh#2090723
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2104423
CVE-2022-1796vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-1796
CVE-2022-1796
GLSA-202208-32
L3:63627
L3:64014
MISC:github.com:CVE-2022-1796
SMASH Issue 332422
bnc#1199747
bnc#1201035
bnc#1202876
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1799
rh#2088693
rh#2101293
rh#2102159
CVE-2022-1836kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-1836
CVE-2022-33981
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
L3:64743
MISC:cdn.kernel.org:CVE-2022-33981
MISC:exchange.xforce.ibmcloud.com:CVE-2022-33981
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:CVE-2022-33981
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:seclists.org:CVE-2022-33981
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/141
Oracle:CVE-2022-21123
SMASH Issue 330078
SMASH Issue 332751
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1198866
bnc#1200692
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2080330
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1851vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-1851
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1851
D:CVE-2022-1851
FEDORA:FEDORA-2022-5ce148636b
FEDORA:FEDORA-2022-bb2daad935
FEDORA:FEDORA-2022-d94440bf0e
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-1851
MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 332922
bnc#1199936
https://security.gentoo.org/glsa/202305-16
rh#2091676
CVE-2022-1852kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-1852
DSA-5161
OSS:2022/Q2/161
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 332791
SMASH Issue 332792
ZDI-23-1834
bnc#1199875
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#2039448
rh#2058395
rh#2064604
rh#2074208
rh#2086753
rh#2089815
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2104423
CVE-2022-1882kernel-source-rt:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-1882
CVE-2022-1882
MISC:lore.kernel.org:CVE-2022-1882
RHSA-2023:2148
RHSA-2023:2458
SMASH Issue 332911
bnc#1199904
bnc#1200058
rh#2089701
CVE-2022-1886vim:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-1886
CVE-2022-1886
FEDORA:FEDORA-2022-bb2daad935
GLSA-202208-32
MISC:github.com:CVE-2022-1886
SMASH Issue 332971
bnc#1199969
https://security.gentoo.org/glsa/202305-16
rh#2092973
CVE-2022-1897vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-1897
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1897
D:CVE-2022-1897
FEDORA:FEDORA-2022-5ce148636b
FEDORA:FEDORA-2022-bb2daad935
FEDORA:FEDORA-2022-d94440bf0e
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
L3:64069
MISC:github.com:CVE-2022-1897
MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
RHSA-2022:5813
RHSA-2022:5942
SMASH Issue 333152
bnc#1200010
bnc#1203113
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1808
rh#2050053
rh#2091682
CVE-2022-1898vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-1898
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1898
D:CVE-2022-1898
FEDORA:FEDORA-2022-5ce148636b
FEDORA:FEDORA-2022-bb2daad935
FEDORA:FEDORA-2022-d94440bf0e
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
L3:64069
MISC:github.com:CVE-2022-1898
MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 333150
bnc#1200011
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1809
rh#2091679
CVE-2022-1919mozilla-nss:Releasedimportant ()CVE-2022-1919
CVE-2022-31736
CVE-2022-31737
CVE-2022-31738
CVE-2022-31739
CVE-2022-31740
CVE-2022-31742
CVE-2022-31743
CVE-2022-31744
CVE-2022-31745
CVE-2022-31747
CVE-2022-31748
D:CVE-2022-1919
DSA-5156
DSA-5158
DSA-5172
DSA-5175
GLSA-202208-08
Google Chrome Releases Web site
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:crbug.com:CVE-2022-1919
MISC:www.mozilla.org:/security/advisories/mfsa2022-20/
MISC:www.mozilla.org:/security/advisories/mfsa2022-21/
MISC:www.mozilla.org:/security/advisories/mfsa2022-22/
MISC:www.mozilla.org:/security/advisories/mfsa2022-25/
MISC:www.mozilla.org:/security/advisories/mfsa2022-26/
RHSA-2022:4870
RHSA-2022:4871
RHSA-2022:4872
RHSA-2022:4873
RHSA-2022:4875
RHSA-2022:4876
RHSA-2022:4887
RHSA-2022:4888
RHSA-2022:4889
RHSA-2022:4890
RHSA-2022:4891
RHSA-2022:4892
RHSA-2022:5469
RHSA-2022:5470
RHSA-2022:5472
RHSA-2022:5473
RHSA-2022:5474
RHSA-2022:5475
RHSA-2022:5477
RHSA-2022:5478
RHSA-2022:5479
RHSA-2022:5480
RHSA-2022:5481
RHSA-2022:5482
SMASH Issue 333185
bnc#1200027
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/
rh#2092018
rh#2092019
rh#2092021
rh#2092022
rh#2092023
rh#2092024
rh#2092025
rh#2092026
rh#2092416
rh#2102165
CVE-2022-1927vim:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L)CONFIRM:huntr.dev:CVE-2022-1927
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1927
D:CVE-2022-1927
FEDORA:FEDORA-2022-5ce148636b
FEDORA:FEDORA-2022-bb2daad935
FEDORA:FEDORA-2022-d94440bf0e
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-1927
RHSA-2022:5813
RHSA-2022:5942
SMASH Issue 333175
bnc#1200012
https://security.gentoo.org/glsa/202305-16
rh#2091687
CVE-2022-1941protobuf:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cloud.google.com:CVE-2022-1941
CONFIRM:github.com:CVE-2022-1941
CVE-2022-1941
D:CVE-2022-1941
FEDORA:FEDORA-2022-25f35ed634
L3:64558
OSS:2022/09/27/1
OSS:2022/Q3/236
Oracle:CVE-2022-1941
SMASH Issue 343244
SMASH Issue 343744
bnc#1203681
bnc#1204630
bnc#1205141
https://lists.debian.org/debian-lts-announce/2023/04/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP/
jsc#CAR-2051
rh#2291470
CVE-2022-1942vim:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-1942
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1942
D:CVE-2022-1942
FEDORA:FEDORA-2022-bb2daad935
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-1942
MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
SMASH Issue 333259
bnc#1200125
https://security.gentoo.org/glsa/202305-16
rh#2092890
CVE-2022-1943kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-1943
D:CVE-2022-1943
MISC:git.kernel.org:CVE-2022-1943
SMASH Issue 333203
bnc#1200055
rh#2086412
CVE-2022-1966kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-1966
CVE-2022-32250
DSA-5161
FEDORA:FEDORA-2022-80cc9873be
FEDORA:FEDORA-2022-8269eaf361
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/04/1
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.cve.org:OSS:2022/Q2/202
OSS:2022/05/31/1
OSS:2022/06/03/1
OSS:2022/06/04/1
OSS:2022/06/20/1
OSS:2022/08/25/1
OSS:2022/09/02/9
OSS:2022/Q2/165
OSS:2022/Q2/202
OSS:2022/Q3/141
RHSA-2022:5214
RHSA-2022:5216
RHSA-2022:5220
RHSA-2022:5224
RHSA-2022:5232
RHSA-2022:5236
RHSA-2022:5249
RHSA-2022:5267
RHSA-2022:5439
RHSA-2022:5476
SMASH Issue 333177
SMASH Issue 333285
ZDI-23-1834
bnc#1200015
bnc#1200268
bnc#1200494
jsc#CAR-1820
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#2039448
rh#2058395
rh#2064604
rh#2074208
rh#2084183
rh#2086753
rh#2089815
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2104423
CVE-2022-1968vim:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-1968
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-1968
D:CVE-2022-1968
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202208-32
MISC:github.com:CVE-2022-1968
MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 333520
bnc#1200270
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1826
rh#2094695
CVE-2022-1972kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-1972
CVE-2022-2078
DSA-5161
MISC:git.kernel.org:CVE-2022-2078
MISC:github.com:OSS:2022/Q2/164
MISC:www.debian.org:CVE-2022-32250
OSS:2022/Q2/164
RHSA-2022:6582
RHSA-2022:6610
RHSA-2022:7444
RHSA-2022:7683
SMASH Issue 333178
ZDI-23-1834
bnc#1200019
bnc#1200266
bnc#1200522
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#2039448
rh#2058395
rh#2064604
rh#2074208
rh#2086753
rh#2089815
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2104423
CVE-2022-1973kernel-source-rt:Not affectedimportant ()CONFIRM:security.netapp.com:/advisory/ntap-20230120-0001/
CVE-2022-1973
OSS:2022/Q2/179
SMASH Issue 333184
SMASH Issue 333757
bnc#1200023
rh#2092542
CVE-2022-1974kernel-source-rt:Releasedmoderate6.8 (CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-1974
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:CVE-2022-1974
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q2/170
OSS:2022/Q3/141
Oracle:CVE-2022-21123
SMASH Issue 333306
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1200144
bnc#1200265
jsc#CAR-1821
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084443
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1975kernel-source-rt:Releasedmoderate4.5 (CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-1975
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:CVE-2022-1975
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q2/171
OSS:2022/Q3/141
Oracle:CVE-2022-21123
SMASH Issue 333305
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1200143
jsc#CAR-1822
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-1976kernel-source-rt:Not affectedimportant ()CVE-2022-1976
MISC:git.kernel.org:CVE-2022-1976
OSS:2022/Q2/195
SMASH Issue 333232
bnc#1200050
https://security.netapp.com/advisory/ntap-20230214-0005/
rh#2092549
CVE-2022-1998kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-1998
CVE-2022-1998
MISC:git.kernel.org:CVE-2022-1998
MISC:seclists.org:CVE-2022-1998
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 333691
bnc#1200284
rh#2052312
CVE-2022-2000vim:Not affectedimportant ()CONFIRM:huntr.dev:CVE-2022-2000
CONFIRM:support.apple.com:CVE-2022-1720
CONFIRM:support.apple.com:CVE-2022-1725
CONFIRM:support.apple.com:CVE-2022-32894
CVE-2022-2000
FEDORA:FEDORA-2022-c302c5f62d
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
FULLDISC:20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
GLSA-202208-32
MISC:github.com:CVE-2022-2000
MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
SMASH Issue 334139
bnc#1200405
https://security.gentoo.org/glsa/202305-16
rh#2097374
CVE-2022-20008kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2022-20008
MISC:source.android.com:CVE-2022-20116
SMASH Issue 331304
bnc#1199564
jsc#CAR-1776
CVE-2022-20009kernel-source-rt:Already fixedmoderate6.8 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2022-20009
MISC:source.android.com:CVE-2022-20116
SMASH Issue 331303
bnc#1199566
CVE-2022-20117kernel-source-rt:Not affectedlow ()CVE-2022-20117
MISC:source.android.com:CVE-2022-20121
SMASH Issue 331281
bnc#1199569
CVE-2022-20118kernel-source-rt:Not affectedmoderate ()CVE-2022-20118
MISC:source.android.com:CVE-2022-20121
SMASH Issue 331280
bnc#1199570
CVE-2022-20119kernel-source-rt:Not affectedlow ()CVE-2022-20119
MISC:source.android.com:CVE-2022-20121
SMASH Issue 331279
bnc#1199563
CVE-2022-20132kernel-source-rt:Releasedmoderate4.9 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L)CVE-2022-20132
L3:66043
MISC:source.android.com:CVE-2022-20210
SMASH Issue 334795
bnc#1200619
jsc#CAR-1851
jsc#CAR-1852
rh#2173712
CVE-2022-20141kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-20141
L3:64060
MISC:source.android.com:CVE-2022-20210
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 334784
bnc#1200604
bnc#1200605
jsc#CAR-1850
rh#2114937
CVE-2022-20148kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-20148
MISC:source.android.com:CVE-2022-20233
SMASH Issue 334777
bnc#1200610
rh#2122497
CVE-2022-20153kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-20153
MISC:source.android.com:CVE-2022-20233
SMASH Issue 334773
bnc#1200609
rh#2150845
CVE-2022-20154kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-20154
L3:68095
L3:68137
MISC:source.android.com:CVE-2022-20233
SMASH Issue 334772
bnc#1200599
bnc#1200608
jsc#CAR-1849
rh#2150863
CVE-2022-20158kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-20158
D:CVE-2022-20158
MISC:source.android.com:CVE-2022-20408
SMASH Issue 339663
bnc#1202345
jsc#CAR-1962
CVE-2022-20166kernel-source-rt:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2022-20166
L3:66040
MISC:source.android.com:CVE-2022-20233
SMASH Issue 334765
bnc#1200598
jsc#CAR-1862
rh#2122089
CVE-2022-20368kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-20368
L3:66063
MISC:source.android.com:CVE-2022-20408
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 339645
bnc#1202346
jsc#CAR-1963
rh#2123695
CVE-2022-20369kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-20369
L3:66072
MISC:source.android.com:CVE-2022-20408
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
SMASH Issue 339644
bnc#1202347
jsc#CAR-1964
rh#2137505
CVE-2022-20371kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-20371
MISC:source.android.com:CVE-2022-20408
SMASH Issue 339642
bnc#1202348
CVE-2022-20382kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-20382
MISC:source.android.com:CVE-2022-20408
SMASH Issue 339631
bnc#1202349
CVE-2022-2042vim:Not affectedimportant ()CONFIRM:huntr.dev:CVE-2022-2042
CONFIRM:support.apple.com:CVE-2022-1720
CONFIRM:support.apple.com:CVE-2022-1725
CONFIRM:support.apple.com:CVE-2022-32894
CVE-2022-2042
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
FULLDISC:20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
GLSA-202208-32
MISC:github.com:CVE-2022-2042
SMASH Issue 334212
bnc#1200471
https://security.gentoo.org/glsa/202305-16
rh#2097768
CVE-2022-20567kernel-source-rt:Already fixedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-20567
MISC:source.android.com:/security/bulletin/pixel/2022-12-01
SMASH Issue 351105
bnc#1208850
rh#2174464
CVE-2022-20572kernel-source-rt:Already fixedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-20572
MISC:source.android.com:/security/bulletin/pixel/2022-12-01
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 351100
bnc#1210532
rh#2186545
CVE-2022-2068openssl:Not affected, openssl-1_1:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:git.openssl.org:CVE-2022-2068
CONFIRM:security.netapp.com:CVE-2022-2068
CONFIRM:www.openssl.org:CVE-2022-2068
CVE-2022-2068
DSA-5169
FEDORA:FEDORA-2022-3b7d0abd0b
FEDORA:FEDORA-2022-41890e9e44
L3:65090
L3:68186
MISC:cert-portal.siemens.com:/productcert/pdf/ssa-332410.pdf
Oracle:CVE-2022-1292
Oracle:CVE-2022-2068
RHSA-2022:5818
RHSA-2022:6224
RHSA-2022:8840
RHSA-2022:8841
RHSA-2022:8913
RHSA-2022:8917
SMASH Issue 334634
SMASH Issue 334635
bnc#1200550
bnc#1201283
bnc#1207568
jsc#CAR-1865
openssl.git:commit:7c33270707b568c524a8ef125fe611a8872cb5e8
openssl.git:commit:ce60b13707add7e6b54c5817376234c4043506ed
rh#2081494
rh#2097310
CVE-2022-2078kernel-source-rt:Not affectedmoderate ()CVE-2022-1972
CVE-2022-2078
DSA-5161
MISC:git.kernel.org:CVE-2022-2078
MISC:github.com:OSS:2022/Q2/164
MISC:www.debian.org:CVE-2022-32250
OSS:2022/Q2/164
RHSA-2022:6582
RHSA-2022:6610
RHSA-2022:7444
RHSA-2022:7683
SMASH Issue 333178
SMASH Issue 334420
ZDI-23-1834
bnc#1200019
bnc#1200266
bnc#1200522
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#2039448
rh#2058395
rh#2064604
rh#2074208
rh#2086753
rh#2089815
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2104423
CVE-2022-2097openssl:Not affected, openssl-1_1:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:git.openssl.org:CVE-2022-2097
CONFIRM:security.netapp.com:CVE-2022-2097
CONFIRM:www.openssl.org:CVE-2022-2097
CVE-2022-2097
D:CVE-2022-2097
DSA-5343
FEDORA:FEDORA-2022-3fdc2d3047
FEDORA:FEDORA-2022-41890e9e44
FEDORA:FEDORA-2022-89a17be281
GLSA-202210-02
MISC:cert-portal.siemens.com:/productcert/pdf/ssa-332410.pdf
Oracle:CVE-2022-2097
RHSA-2022:5818
RHSA-2022:6224
SMASH Issue 336071
SMASH Issue 336072
bdo#1023424
bnc#1201099
bnc#1201100
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=919925673d6c9cfed3c1085497f5dfbbed5fc431
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a98f339ddd7e8f487d6e0088d4a9a42324885a93
https://lists.debian.org/debian-lts-announce/2023/02/msg00019.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/
https://security.netapp.com/advisory/ntap-20230420-0008/
https://security.netapp.com/advisory/ntap-20240621-0006/
https://www.debian.org/security/2023/dsa-5343
jsc#CAR-1900
openssl.git:commit:6ebf6d51596f51d23ccbc17930778d104a57d99c
rh#2104905
CVE-2022-21123kernel-source-rt:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N)CONFIRM:security.netapp.com:CVE-2022-21166
CONFIRM:security.netapp.com:CVE-2022-21180
CONFIRM:xenbits.xen.org:CVE-2022-21124
CVE-2022-21123
CVE-2022-21125
CVE-2022-21127
CVE-2022-21166
CVE-2022-21180
D:CVE-2022-1016
D:CVE-2022-21125
D:CVE-2022-21127
D:CVE-2022-21180
D:CVE-2022-2153
D:CVE-2022-26373
D:CVE-2022-32296
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5161
DSA-5173
DSA-5178
DSA-5184
DSA-5207
FEDORA:FEDORA-2022-177a008b98
FEDORA:FEDORA-2022-2c9f8224f8
FEDORA:FEDORA-2022-391e24517d
FEDORA:FEDORA-2022-925fc688c1
GLSA-202208-23
L3:65395
L3:65396
L3:65397
L3:66064
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.intel.com:CVE-2022-21166
MISC:www.intel.com:CVE-2022-21180
MISC:www.intel.com:OSS:2022/06/14/4
MISC:xenbits.xen.org:OSS:2019/Q4/67
MISC:xenbits.xen.org:OSS:2020/Q2/176
MISC:xenbits.xen.org:OSS:2022/Q2/197
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/14/4
OSS:2022/06/16/1
OSS:2022/06/22/1
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/11/08/1
OSS:2022/11/10/2
OSS:2022/Q2/197
OSS:2022/Q2/200
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
OSS:2022/Q3/141
Oracle:CVE-2022-21123
RHSA-2022:5937
RHSA-2022:5939
RHSA-2022:6437
RHSA-2022:6460
RHSA-2022:6872
RHSA-2022:6983
RHSA-2022:6991
RHSA-2022:7279
RHSA-2022:7280
RHSA-2022:7933
RHSA-2022:8267
RHSA-2022:8973
RHSA-2022:8974
SMASH Issue 332241
ZDI-22-1117
ZDI-22-1118
ZDI-23-1834
bdo#1006346
bdo#1010947
bdo#1013299
bdo#922204
bnc#1199650
jsc#CAR-1838
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086730
rh#2086753
rh#2088021
rh#2089815
rh#2090226
rh#2090237
rh#2090240
rh#2090241
rh#2090243
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2103148
rh#2103153
rh#2104423
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119855
rh#2141026
CVE-2022-21125kernel-source-rt:Releasedmoderate5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-21166
CONFIRM:security.netapp.com:CVE-2022-21180
CONFIRM:xenbits.xen.org:CVE-2022-21124
CVE-2022-21123
CVE-2022-21125
CVE-2022-21127
CVE-2022-21166
CVE-2022-21180
D:CVE-2022-1016
D:CVE-2022-21125
D:CVE-2022-21127
D:CVE-2022-21180
D:CVE-2022-2153
D:CVE-2022-26373
D:CVE-2022-32296
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5161
DSA-5173
DSA-5178
DSA-5184
DSA-5207
FEDORA:FEDORA-2022-177a008b98
FEDORA:FEDORA-2022-2c9f8224f8
FEDORA:FEDORA-2022-391e24517d
FEDORA:FEDORA-2022-925fc688c1
GLSA-202208-23
L3:65395
L3:65396
L3:65397
L3:66064
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.intel.com:CVE-2022-21166
MISC:www.intel.com:CVE-2022-21180
MISC:www.intel.com:OSS:2022/06/14/4
MISC:xenbits.xen.org:OSS:2019/Q4/67
MISC:xenbits.xen.org:OSS:2020/Q2/176
MISC:xenbits.xen.org:OSS:2022/Q2/197
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/14/4
OSS:2022/06/16/1
OSS:2022/06/22/1
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/11/08/1
OSS:2022/11/10/2
OSS:2022/Q2/197
OSS:2022/Q2/200
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
OSS:2022/Q3/141
Oracle:CVE-2022-21123
RHSA-2022:5937
RHSA-2022:5939
RHSA-2022:6437
RHSA-2022:6460
RHSA-2022:6872
RHSA-2022:6983
RHSA-2022:6991
RHSA-2022:7279
RHSA-2022:7280
RHSA-2022:7933
RHSA-2022:8267
RHSA-2022:8973
RHSA-2022:8974
SMASH Issue 332241
ZDI-22-1117
ZDI-22-1118
ZDI-23-1834
bdo#1006346
bdo#1010947
bdo#1013299
bdo#922204
bnc#1199650
jsc#CAR-1838
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086730
rh#2086753
rh#2088021
rh#2089815
rh#2090226
rh#2090237
rh#2090240
rh#2090241
rh#2090243
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2103148
rh#2103153
rh#2104423
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119855
rh#2141026
CVE-2022-21127kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-21166
CONFIRM:security.netapp.com:CVE-2022-21180
CONFIRM:xenbits.xen.org:CVE-2022-21124
CVE-2022-21123
CVE-2022-21125
CVE-2022-21127
CVE-2022-21166
CVE-2022-21180
D:CVE-2022-1016
D:CVE-2022-21125
D:CVE-2022-21127
D:CVE-2022-21180
D:CVE-2022-2153
D:CVE-2022-26373
D:CVE-2022-32296
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5161
DSA-5173
DSA-5178
DSA-5184
DSA-5207
FEDORA:FEDORA-2022-177a008b98
FEDORA:FEDORA-2022-2c9f8224f8
FEDORA:FEDORA-2022-391e24517d
FEDORA:FEDORA-2022-925fc688c1
GLSA-202208-23
L3:65395
L3:65396
L3:65397
L3:66064
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.intel.com:CVE-2022-21166
MISC:www.intel.com:CVE-2022-21180
MISC:www.intel.com:OSS:2022/06/14/4
MISC:xenbits.xen.org:OSS:2019/Q4/67
MISC:xenbits.xen.org:OSS:2020/Q2/176
MISC:xenbits.xen.org:OSS:2022/Q2/197
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/14/4
OSS:2022/06/16/1
OSS:2022/06/22/1
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/11/08/1
OSS:2022/11/10/2
OSS:2022/Q2/197
OSS:2022/Q2/200
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
OSS:2022/Q3/141
Oracle:CVE-2022-21123
RHSA-2022:5937
RHSA-2022:5939
RHSA-2022:6437
RHSA-2022:6460
RHSA-2022:6872
RHSA-2022:6983
RHSA-2022:6991
RHSA-2022:7279
RHSA-2022:7280
RHSA-2022:7933
RHSA-2022:8267
RHSA-2022:8973
RHSA-2022:8974
SMASH Issue 332241
ZDI-22-1117
ZDI-22-1118
ZDI-23-1834
bdo#1006346
bdo#1010947
bdo#1013299
bdo#922204
bnc#1199650
jsc#CAR-1838
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086730
rh#2086753
rh#2088021
rh#2089815
rh#2090226
rh#2090237
rh#2090240
rh#2090241
rh#2090243
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2103148
rh#2103153
rh#2104423
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119855
rh#2141026
CVE-2022-21166kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-21166
CONFIRM:security.netapp.com:CVE-2022-21180
CONFIRM:xenbits.xen.org:CVE-2022-21124
CVE-2022-21123
CVE-2022-21125
CVE-2022-21127
CVE-2022-21166
CVE-2022-21180
D:CVE-2022-1016
D:CVE-2022-21125
D:CVE-2022-21127
D:CVE-2022-21180
D:CVE-2022-2153
D:CVE-2022-26373
D:CVE-2022-32296
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5161
DSA-5173
DSA-5178
DSA-5184
DSA-5207
FEDORA:FEDORA-2022-177a008b98
FEDORA:FEDORA-2022-2c9f8224f8
FEDORA:FEDORA-2022-391e24517d
FEDORA:FEDORA-2022-925fc688c1
GLSA-202208-23
L3:65395
L3:65396
L3:65397
L3:66064
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.intel.com:CVE-2022-21166
MISC:www.intel.com:CVE-2022-21180
MISC:www.intel.com:OSS:2022/06/14/4
MISC:xenbits.xen.org:OSS:2019/Q4/67
MISC:xenbits.xen.org:OSS:2020/Q2/176
MISC:xenbits.xen.org:OSS:2022/Q2/197
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/14/4
OSS:2022/06/16/1
OSS:2022/06/22/1
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/11/08/1
OSS:2022/11/10/2
OSS:2022/Q2/197
OSS:2022/Q2/200
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
OSS:2022/Q3/141
Oracle:CVE-2022-21123
RHSA-2022:5937
RHSA-2022:5939
RHSA-2022:6437
RHSA-2022:6460
RHSA-2022:6872
RHSA-2022:6983
RHSA-2022:6991
RHSA-2022:7279
RHSA-2022:7280
RHSA-2022:7933
RHSA-2022:8267
RHSA-2022:8973
RHSA-2022:8974
SMASH Issue 332241
ZDI-22-1117
ZDI-22-1118
ZDI-23-1834
bdo#1006346
bdo#1010947
bdo#1013299
bdo#922204
bnc#1199650
jsc#CAR-1838
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086730
rh#2086753
rh#2088021
rh#2089815
rh#2090226
rh#2090237
rh#2090240
rh#2090241
rh#2090243
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2103148
rh#2103153
rh#2104423
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119855
rh#2141026
CVE-2022-21180kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-21166
CONFIRM:security.netapp.com:CVE-2022-21180
CONFIRM:xenbits.xen.org:CVE-2022-21124
CVE-2022-21123
CVE-2022-21125
CVE-2022-21127
CVE-2022-21166
CVE-2022-21180
D:CVE-2022-1016
D:CVE-2022-21125
D:CVE-2022-21127
D:CVE-2022-21180
D:CVE-2022-2153
D:CVE-2022-26373
D:CVE-2022-32296
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5161
DSA-5173
DSA-5178
DSA-5184
DSA-5207
FEDORA:FEDORA-2022-177a008b98
FEDORA:FEDORA-2022-2c9f8224f8
FEDORA:FEDORA-2022-391e24517d
FEDORA:FEDORA-2022-925fc688c1
GLSA-202208-23
L3:65395
L3:65396
L3:65397
L3:66064
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.intel.com:CVE-2022-21166
MISC:www.intel.com:CVE-2022-21180
MISC:www.intel.com:OSS:2022/06/14/4
MISC:xenbits.xen.org:OSS:2019/Q4/67
MISC:xenbits.xen.org:OSS:2020/Q2/176
MISC:xenbits.xen.org:OSS:2022/Q2/197
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/14/4
OSS:2022/06/16/1
OSS:2022/06/22/1
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/11/08/1
OSS:2022/11/10/2
OSS:2022/Q2/197
OSS:2022/Q2/200
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
OSS:2022/Q3/141
Oracle:CVE-2022-21123
RHSA-2022:5937
RHSA-2022:5939
RHSA-2022:6437
RHSA-2022:6460
RHSA-2022:6872
RHSA-2022:6983
RHSA-2022:6991
RHSA-2022:7279
RHSA-2022:7280
RHSA-2022:7933
RHSA-2022:8267
RHSA-2022:8973
RHSA-2022:8974
SMASH Issue 332241
ZDI-22-1117
ZDI-22-1118
ZDI-23-1834
bdo#1006346
bdo#1010947
bdo#1013299
bdo#922204
bnc#1199650
jsc#CAR-1838
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086730
rh#2086753
rh#2088021
rh#2089815
rh#2090226
rh#2090237
rh#2090240
rh#2090241
rh#2090243
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2103148
rh#2103153
rh#2104423
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119855
rh#2141026
CVE-2022-2124vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2124
CONFIRM:support.apple.com:CVE-2022-1720
CONFIRM:support.apple.com:CVE-2022-1725
CONFIRM:support.apple.com:CVE-2022-32894
CVE-2022-2124
D:CVE-2022-2124
FEDORA:FEDORA-2022-719f3ec21b
FEDORA:FEDORA-2022-bb7f3cacbf
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
FULLDISC:20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
GLSA-202208-32
MISC:github.com:CVE-2022-2124
MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
SMASH Issue 335122
bnc#1200697
https://security.gentoo.org/glsa/202305-16
rh#2099558
CVE-2022-2125vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2125
CONFIRM:support.apple.com:CVE-2022-1720
CONFIRM:support.apple.com:CVE-2022-1725
CONFIRM:support.apple.com:CVE-2022-32894
CVE-2022-2125
FEDORA:FEDORA-2022-719f3ec21b
FEDORA:FEDORA-2022-bb7f3cacbf
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
FULLDISC:20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
GLSA-202208-32
L3:64619
MISC:github.com:CVE-2022-2125
SMASH Issue 335120
bnc#1200698
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1860
rh#2099590
CVE-2022-2126vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2126
CONFIRM:support.apple.com:CVE-2022-1720
CONFIRM:support.apple.com:CVE-2022-1725
CONFIRM:support.apple.com:CVE-2022-32894
CVE-2022-2126
FEDORA:FEDORA-2022-719f3ec21b
FEDORA:FEDORA-2022-bb7f3cacbf
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
FULLDISC:20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
GLSA-202208-32
MISC:github.com:CVE-2022-2126
MLIST:[debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
SMASH Issue 335119
bnc#1200700
https://security.gentoo.org/glsa/202305-16
rh#2099596
CVE-2022-2129vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2129
CVE-2022-2129
FEDORA:FEDORA-2022-719f3ec21b
FEDORA:FEDORA-2022-bb7f3cacbf
GLSA-202208-32
MISC:github.com:CVE-2022-2129
MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
SMASH Issue 335123
bnc#1200701
https://security.gentoo.org/glsa/202305-16
rh#2099586
CVE-2022-21385kernel-source-rt:Already fixedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-21385
L3:66041
MISC:git.kernel.org:CVE-2022-21385
MISC:git.kernel.org:MISC:www.openwall.com:CVE-2019-14835
MISC:github.com:MISC:www.openwall.com:CVE-2019-14835
MISC:patchwork.kernel.org:MISC:www.openwall.com:CVE-2019-14895
OSS:2019/09/17/1
OSS:2019/11/02/1
OSS:2019/11/22/2
OSS:2019/12/16/1
Oracle:CVE-2018-12207
Oracle:CVE-2019-14821
SMASH Issue 341103
bnc#1154848
bnc#1202897
linux.git:commit:f68f2ff91512c199ec24883001245912afc17873
rh#1646768
rh#1773519
rh#1774988
rh#1774996
rh#1775004
rh#1781514
rh#1783498
rh#1783515
rh#1851480
rh#1997467
CVE-2022-21499kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2022-21499
DSA-5161
L3:64060
L3:64302
L3:64306
L3:64525
L3:64549
L3:66066
MISC:git.kernel.org:CVE-2022-21499
MISC:git.kernel.org:CVE-2022-32250
MISC:packetstormsecurity.com:CVE-2022-34918
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.debian.org:CVE-2022-32250
OSS:2022/05/31/1
OSS:2022/08/25/1
OSS:2022/09/02/9
OSS:2022/Q2/137
OSS:2022/Q3/141
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 331342
ZDI-23-1834
bnc#1199426
bnc#1200059
jsc#CAR-1805
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#2039448
rh#2058395
rh#2064604
rh#2074208
rh#2084183
rh#2086753
rh#2089815
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2104423
CVE-2022-21505kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-21505
OSS:2022/Q3/57
RHSA-2023:2148
RHSA-2023:2458
SMASH Issue 337173
SMASH Issue 337174
bnc#1201458
jsc#CAR-1915
linux.git:commit:543ce63b664e2c2f9533d089a4664b559c3e6b5b
rh#2106830
CVE-2022-2153kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)CVE-2022-2153
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:CVE-2022-2153
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q2/205
OSS:2022/Q3/141
Oracle:CVE-2022-21123
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 335226
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1200788
jsc#CAR-1864
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-2175vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-2175
CVE-2022-2175
D:CVE-2022-2175
FEDORA:FEDORA-2022-719f3ec21b
FEDORA:FEDORA-2022-bb7f3cacbf
GLSA-202208-32
L3:64808
MISC:github.com:CVE-2022-2175
SMASH Issue 335384
bnc#1200904
bnc#1201039
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1870
rh#2101293
CVE-2022-2182vim:Releasedmoderate3.9 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2182
CVE-2022-2182
FEDORA:FEDORA-2022-719f3ec21b
FEDORA:FEDORA-2022-bb7f3cacbf
GLSA-202208-32
MISC:github.com:CVE-2022-2182
SMASH Issue 335348
bnc#1200903
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1871
rh#2102153
CVE-2022-2183vim:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2183
CVE-2022-2183
FEDORA:FEDORA-2022-719f3ec21b
FEDORA:FEDORA-2022-bb7f3cacbf
GLSA-202208-32
MISC:github.com:CVE-2022-2183
SMASH Issue 335347
bnc#1200902
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1869
rh#2102159
CVE-2022-2196kernel-source-rt:Already fixedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2022-2196
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
MISC:kernel.dance:/
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 353105
bnc#1206992
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
jsc#CAR-2282
linux.git:commit:2e7eab81425ad6c875f2ed47c0ce01e78afc38a5
rh#2160023
CVE-2022-22058kernel-source-rt:Not affectedimportant ()CONFIRM:www.qualcomm.com:CVE-2022-25659
CVE-2022-22058
SMASH Issue 343645
bnc#1203777
CVE-2022-2206vim:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2206
CVE-2022-2206
D:CVE-2022-2206
FEDORA:FEDORA-2022-719f3ec21b
FEDORA:FEDORA-2022-bb7f3cacbf
GLSA-202208-32
MISC:github.com:CVE-2022-2206
SMASH Issue 335614
bnc#1201155
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1880
rh#2102188
CVE-2022-2207vim:Releasedmoderate3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2207
CVE-2022-2207
FEDORA:FEDORA-2022-719f3ec21b
FEDORA:FEDORA-2022-bb7f3cacbf
GLSA-202208-32
MISC:github.com:CVE-2022-2207
SMASH Issue 335687
bnc#1201153
https://security.gentoo.org/glsa/202305-16
rh#2102185
CVE-2022-22075kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2022-22075
D:CVE-2022-22075
SMASH Issue 359729
bnc#1209195
https://www.qualcomm.com/company/product-security/bulletins/march-2023-bulletin
CVE-2022-2208vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2208
CVE-2022-2208
FEDORA:FEDORA-2022-719f3ec21b
FEDORA:FEDORA-2022-bb7f3cacbf
GLSA-202208-32
MISC:github.com:CVE-2022-2208
SMASH Issue 335683
bnc#1201152
https://security.gentoo.org/glsa/202305-16
rh#2102183
CVE-2022-2209kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H)CVE-2022-2209
MISC:github.com:CVE-2022-2209
MISC:kernel.dance:CVE-2022-2209
SMASH Issue 338098
bnc#1201828
CVE-2022-2210vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-2210
CVE-2022-2210
FEDORA:FEDORA-2022-719f3ec21b
FEDORA:FEDORA-2022-bb7f3cacbf
GLSA-202208-32
MISC:github.com:CVE-2022-2210
SMASH Issue 335714
bnc#1201151
https://security.gentoo.org/glsa/202305-16
rh#2102177
CVE-2022-2231vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2231
CVE-2022-2231
FEDORA:FEDORA-2022-719f3ec21b
FEDORA:FEDORA-2022-bb7f3cacbf
GLSA-202208-32
MISC:github.com:CVE-2022-2231
SMASH Issue 335823
bnc#1201150
https://security.gentoo.org/glsa/202305-16
rh#2102173
CVE-2022-2257vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2257
CVE-2022-2257
FEDORA:FEDORA-2022-9d7a58e376
FEDORA:FEDORA-2022-b06fbea2c7
GLSA-202208-32
MISC:github.com:CVE-2022-2257
SMASH Issue 336035
bnc#1201154
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1879
rh#2103133
CVE-2022-22576curl:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-27776
CVE-2022-22576
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
DSA-5197
GLSA-202212-01
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/61
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2022-22576
MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
OSS:2022/Q2/61
OSS:2023/02/15/3
OSS:2023/03/20/6
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
RHSA-2022:5245
RHSA-2022:5313
SMASH Issue 329491
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1198614
jsc#CAR-1717
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099300
rh#2099305
rh#2099306
CVE-2022-2264vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2264
CVE-2022-2264
D:CVE-2022-2264
FEDORA:FEDORA-2022-9d7a58e376
FEDORA:FEDORA-2022-b06fbea2c7
GLSA-202208-32
MISC:github.com:CVE-2022-2264
SMASH Issue 336078
bnc#1201132
https://security.gentoo.org/glsa/202305-16
rh#2103951
CVE-2022-2274openssl:Not affected, openssl-1_1:Not affectedcritical9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H)CONFIRM:git.openssl.org:CVE-2022-2274
CONFIRM:github.com:CVE-2022-2274
CONFIRM:security.netapp.com:CVE-2022-2274
CONFIRM:www.openssl.org:CVE-2022-2097
CVE-2022-2274
D:CVE-2022-2274
Oracle:CVE-2022-2274
SMASH Issue 336034
bnc#1201148
rh#2102943
CVE-2022-22822expat:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:www.tenable.com:CVE-2022-23990
CVE-2022-22822
DSA-5073
GLSA-202209-24
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:github.com:CVE-2022-22827
OSS:2022/01/17/3
Oracle:CVE-2022-23990
RHSA-2022:0951
RHSA-2022:1069
RHSA-2022:7144
RHSA-2022:7692
SMASH Issue 319787
SMASH Issue 319788
bdo#1002994
bdo#1003474
bnc#1194474
jsc#CAR-1382
rh#2044451
rh#2044455
rh#2044457
rh#2044464
rh#2044467
rh#2044479
rh#2044484
rh#2044488
rh#2044613
rh#2048356
CVE-2022-22823expat:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:www.tenable.com:CVE-2022-23990
CVE-2022-22823
DSA-5073
GLSA-202209-24
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:github.com:CVE-2022-22827
OSS:2022/01/17/3
Oracle:CVE-2022-23990
RHSA-2022:0951
RHSA-2022:1069
RHSA-2022:7144
RHSA-2022:7692
SMASH Issue 319789
SMASH Issue 319790
bdo#1002994
bdo#1003474
bnc#1194476
jsc#CAR-1383
rh#2044451
rh#2044455
rh#2044457
rh#2044464
rh#2044467
rh#2044479
rh#2044484
rh#2044488
rh#2044613
rh#2048356
CVE-2022-22824expat:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:www.tenable.com:CVE-2022-23990
CVE-2022-22824
DSA-5073
GLSA-202209-24
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:github.com:CVE-2022-22827
OSS:2022/01/17/3
Oracle:CVE-2022-23990
RHSA-2022:0951
RHSA-2022:1069
RHSA-2022:7144
RHSA-2022:7692
SMASH Issue 319791
SMASH Issue 319792
bdo#1002994
bdo#1003474
bnc#1194477
jsc#CAR-1384
rh#2044451
rh#2044455
rh#2044457
rh#2044464
rh#2044467
rh#2044479
rh#2044484
rh#2044488
rh#2044613
rh#2048356
CVE-2022-22825expat:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:www.tenable.com:CVE-2022-23990
CVE-2022-22825
DSA-5073
GLSA-202209-24
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:github.com:CVE-2022-22827
OSS:2022/01/17/3
Oracle:CVE-2022-23990
RHSA-2022:0951
RHSA-2022:1069
RHSA-2022:7144
RHSA-2022:7692
SMASH Issue 319793
SMASH Issue 319794
bdo#1002994
bdo#1003474
bnc#1194478
jsc#CAR-1385
rh#2044451
rh#2044455
rh#2044457
rh#2044464
rh#2044467
rh#2044479
rh#2044484
rh#2044488
rh#2044613
rh#2048356
CVE-2022-22826expat:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:www.tenable.com:CVE-2022-23990
CVE-2022-22826
DSA-5073
GLSA-202209-24
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:github.com:CVE-2022-22827
OSS:2022/01/17/3
Oracle:CVE-2022-23990
RHSA-2022:0951
RHSA-2022:1069
RHSA-2022:7144
RHSA-2022:7692
SMASH Issue 319795
SMASH Issue 319796
bdo#1002994
bdo#1003474
bnc#1194479
jsc#CAR-1386
rh#2044451
rh#2044455
rh#2044457
rh#2044464
rh#2044467
rh#2044479
rh#2044484
rh#2044488
rh#2044613
rh#2048356
CVE-2022-22827expat:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:www.tenable.com:CVE-2022-23990
CVE-2022-22827
DSA-5073
GLSA-202209-24
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:github.com:CVE-2022-22827
OSS:2022/01/17/3
Oracle:CVE-2022-23990
RHSA-2022:0951
RHSA-2022:1069
RHSA-2022:7144
RHSA-2022:7692
SMASH Issue 319797
SMASH Issue 319798
bdo#1002994
bdo#1003474
bnc#1194480
jsc#CAR-1387
rh#2044451
rh#2044455
rh#2044457
rh#2044464
rh#2044467
rh#2044479
rh#2044484
rh#2044488
rh#2044613
rh#2048356
CVE-2022-2284vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2284
CVE-2022-2284
D:CVE-2022-2284
FEDORA:FEDORA-2022-9d7a58e376
FEDORA:FEDORA-2022-b06fbea2c7
GLSA-202208-32
MISC:github.com:CVE-2022-2284
SMASH Issue 336170
bnc#1201133
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1876
rh#2103872
CVE-2022-2285vim:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-2285
CVE-2022-2285
D:CVE-2022-2285
FEDORA:FEDORA-2022-9d7a58e376
FEDORA:FEDORA-2022-b06fbea2c7
GLSA-202208-32
L3:64808
MISC:github.com:CVE-2022-2285
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 336169
bnc#1201134
bnc#1206218
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1878
rh#2103874
CVE-2022-2286vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2286
CVE-2022-2286
D:CVE-2022-2286
FEDORA:FEDORA-2022-9d7a58e376
FEDORA:FEDORA-2022-b06fbea2c7
GLSA-202208-32
MISC:github.com:CVE-2022-2286
SMASH Issue 336175
bnc#1201135
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1877
rh#2103875
CVE-2022-2287vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2287
CVE-2022-2287
D:CVE-2022-2287
FEDORA:FEDORA-2022-9d7a58e376
FEDORA:FEDORA-2022-b06fbea2c7
GLSA-202208-32
MISC:github.com:CVE-2022-2287
SMASH Issue 336178
bnc#1201136
https://security.gentoo.org/glsa/202305-16
rh#2103876
CVE-2022-2288vim:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-2288
CVE-2022-2288
D:CVE-2022-2288
FEDORA:FEDORA-2022-9d7a58e376
FEDORA:FEDORA-2022-b06fbea2c7
GLSA-202208-32
MISC:github.com:CVE-2022-2288
SMASH Issue 336180
bnc#1201137
https://security.gentoo.org/glsa/202305-16
rh#2103878
CVE-2022-2289vim:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-2289
CVE-2022-2289
D:CVE-2022-2289
FEDORA:FEDORA-2022-9d7a58e376
FEDORA:FEDORA-2022-b06fbea2c7
GLSA-202208-32
MISC:github.com:CVE-2022-2289
SMASH Issue 336181
bnc#1201139
https://security.gentoo.org/glsa/202305-16
rh#2103880
CVE-2022-22942kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-22942
DSA-5096
OSS:2021/07/22/1
OSS:2022/01/25/12
OSS:2022/01/27/4
OSS:2022/02/03/1
OSS:2022/Q1/98
RHSA-2022:0592
RHSA-2022:0620
RHSA-2022:0622
RHSA-2022:0771
RHSA-2022:0772
RHSA-2022:0777
RHSA-2022:0819
RHSA-2022:0820
RHSA-2022:0821
RHSA-2022:0823
RHSA-2022:0825
RHSA-2022:0841
RHSA-2022:0849
RHSA-2022:0851
RHSA-2022:0925
RHSA-2022:0958
RHSA-2022:1103
RHSA-2022:1107
RHSA-2022:1263
RHSA-2022:1324
RHSA-2022:1373
SMASH Issue 321574
SMASH Issue 321575
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1195065
bnc#1195951
https://github.com/vmware/photon/wiki/Security-Update-3.0-356
https://github.com/vmware/photon/wiki/Security-Update-4.0-148
jsc#CAR-1492
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2044561
rh#2044809
rh#2053632
rh#2059923
CVE-2022-23036kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)CVE-2022-23036
CVE-2022-23037
CVE-2022-23038
CVE-2022-23039
CVE-2022-23040
CVE-2022-23041
CVE-2022-23042
L3:64302
L3:64306
L3:64525
L3:64549
MISC:xenbits.xenproject.org:CVE-2022-23042
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/Q1/173
SMASH Issue 324768
bnc#1196488
bnc#1199141
jsc#CAR-1588
linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb
linux.git:commit:33172ab50a53578a95691310f49567c9266968b0
linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827
linux.git:commit:42baefac638f06314298087394b982ead9ec444b
linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd
linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d
linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a
linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638
linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888
linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809
rh#2063839
CVE-2022-23037kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)CVE-2022-23036
CVE-2022-23037
CVE-2022-23038
CVE-2022-23039
CVE-2022-23040
CVE-2022-23041
CVE-2022-23042
L3:64302
L3:64306
L3:64525
L3:64549
MISC:xenbits.xenproject.org:CVE-2022-23042
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/Q1/173
SMASH Issue 324768
SMASH Issue 325445
bnc#1196488
bnc#1199141
jsc#CAR-1588
linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb
linux.git:commit:33172ab50a53578a95691310f49567c9266968b0
linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827
linux.git:commit:42baefac638f06314298087394b982ead9ec444b
linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd
linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d
linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a
linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638
linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888
linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809
rh#2063839
CVE-2022-23038kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)CVE-2022-23036
CVE-2022-23037
CVE-2022-23038
CVE-2022-23039
CVE-2022-23040
CVE-2022-23041
CVE-2022-23042
L3:64302
L3:64306
L3:64525
L3:64549
MISC:xenbits.xenproject.org:CVE-2022-23042
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/Q1/173
SMASH Issue 324768
SMASH Issue 325446
bnc#1196488
bnc#1199141
jsc#CAR-1588
linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb
linux.git:commit:33172ab50a53578a95691310f49567c9266968b0
linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827
linux.git:commit:42baefac638f06314298087394b982ead9ec444b
linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd
linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d
linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a
linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638
linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888
linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809
rh#2063839
CVE-2022-23039kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)CVE-2022-23036
CVE-2022-23037
CVE-2022-23038
CVE-2022-23039
CVE-2022-23040
CVE-2022-23041
CVE-2022-23042
L3:64302
L3:64306
L3:64525
L3:64549
MISC:xenbits.xenproject.org:CVE-2022-23042
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/Q1/173
SMASH Issue 324768
SMASH Issue 325447
bnc#1196488
bnc#1199141
jsc#CAR-1588
linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb
linux.git:commit:33172ab50a53578a95691310f49567c9266968b0
linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827
linux.git:commit:42baefac638f06314298087394b982ead9ec444b
linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd
linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d
linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a
linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638
linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888
linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809
rh#2063839
CVE-2022-2304vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-2304
CVE-2022-2304
D:CVE-2022-2304
FEDORA:FEDORA-2022-9d7a58e376
FEDORA:FEDORA-2022-b06fbea2c7
GLSA-202208-32
MISC:github.com:CVE-2022-2304
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 336284
bnc#1201249
https://security.gentoo.org/glsa/202305-16
rh#2104416
CVE-2022-23040kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)CVE-2022-23036
CVE-2022-23037
CVE-2022-23038
CVE-2022-23039
CVE-2022-23040
CVE-2022-23041
CVE-2022-23042
L3:64302
L3:64306
L3:64525
L3:64549
MISC:xenbits.xenproject.org:CVE-2022-23042
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/Q1/173
SMASH Issue 324768
SMASH Issue 325448
bnc#1196488
bnc#1199141
jsc#CAR-1588
linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb
linux.git:commit:33172ab50a53578a95691310f49567c9266968b0
linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827
linux.git:commit:42baefac638f06314298087394b982ead9ec444b
linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd
linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d
linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a
linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638
linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888
linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809
rh#2063839
CVE-2022-23041kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)CVE-2022-23036
CVE-2022-23037
CVE-2022-23038
CVE-2022-23039
CVE-2022-23040
CVE-2022-23041
CVE-2022-23042
L3:64302
L3:64306
L3:64525
L3:64549
MISC:xenbits.xenproject.org:CVE-2022-23042
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/Q1/173
SMASH Issue 324768
bnc#1196488
bnc#1199141
jsc#CAR-1588
linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb
linux.git:commit:33172ab50a53578a95691310f49567c9266968b0
linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827
linux.git:commit:42baefac638f06314298087394b982ead9ec444b
linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd
linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d
linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a
linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638
linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888
linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809
rh#2063839
CVE-2022-23042kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)CVE-2022-23036
CVE-2022-23037
CVE-2022-23038
CVE-2022-23039
CVE-2022-23040
CVE-2022-23041
CVE-2022-23042
L3:64302
L3:64306
L3:64525
L3:64549
MISC:xenbits.xenproject.org:CVE-2022-23042
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/Q1/173
SMASH Issue 324768
bnc#1196488
bnc#1199141
jsc#CAR-1588
linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb
linux.git:commit:33172ab50a53578a95691310f49567c9266968b0
linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827
linux.git:commit:42baefac638f06314298087394b982ead9ec444b
linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd
linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d
linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a
linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638
linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888
linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809
rh#2063839
CVE-2022-2308kernel-source-rt:Not affectedmoderate ()CVE-2022-2308
SMASH Issue 340315
bnc#1202573
linux.git:commit:46f8a29272e51b6df7393d58fc5cb8967397ef2b
rh#2103900
CVE-2022-2309python-lxml:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-2309
CONFIRM:security.netapp.com:CVE-2022-2309
CVE-2022-2309
D:CVE-2022-2309
FEDORA:FEDORA-2022-ed0eeb6a20
FEDORA:FEDORA-2022-ed17f59c1d
GLSA-202208-06
MISC:github.com:CVE-2022-2309
RHSA-2022:8226
SMASH Issue 336287
bnc#1201253
rh#2107571
CVE-2022-2318kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230120-0001/
CONFIRM:security.netapp.com:CVE-2022-23181
CVE-2022-2318
CVE-2022-23181
D:CVE-2021-43980
D:CVE-2022-23181
DSA-5191
DSA-5265
L3:63558
L3:64743
L3:66057
MISC:github.com:CVE-2022-2318
MISC:github.com:OSS:2022/07/02/3
MISC:lists.apache.org:CVE-2022-23181
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
MLIST:[debian-lts-announce] 20221026 [SECURITY] [DLA 3160-1] tomcat9 security update
OSS:2022/07/02/3
OSS:2022/Q3/23
Oracle:CVE-2020-9484
Oracle:CVE-2022-23181
RHSA-2022:5532
RHSA-2022:7272
RHSA-2022:7273
RHSA-2023:0272
SMASH Issue 321850
SMASH Issue 321934
SMASH Issue 336296
ZDI-23-1834
bnc#1195255
bnc#1201251
jsc#CAR-1885
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26
rh#1838332
rh#2047417
rh#2092427
rh#2093146
rh#2104114
rh#2104423
rh#2107924
rh#2108691
rh#2130599
CVE-2022-23218glibc:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2022-23218
GLSA-202208-24
L3:64698
MISC:sourceware.org:CVE-2022-23218
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
Oracle:CVE-2022-23218
RHSA-2022:0896
SMASH Issue 320464
bnc#1194770
jsc#CAR-1433
rh#2042013
CVE-2022-23219glibc:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2022-23219
GLSA-202208-24
L3:64698
MISC:sourceware.org:CVE-2022-23219
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
Oracle:CVE-2022-23219
RHSA-2022:0896
SMASH Issue 320463
bnc#1194768
jsc#CAR-1432
rh#2042017
CVE-2022-23222kernel-source-rt:Not affected, ltp:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-23222
CVE-2022-23222
D:CVE-2022-23222
DSA-5050
DSA-5096
FEDORA:FEDORA-2022-952bb7b856
FEDORA:FEDORA-2022-edbd74424e
MISC:github.com:OSS:2022/Q2/176
OSS:2021/07/22/1
OSS:2022/01/13/1
OSS:2022/01/14/1
OSS:2022/01/18/2
OSS:2022/01/25/12
OSS:2022/06/01/1
OSS:2022/06/04/3
OSS:2022/06/07/3
OSS:2022/Q1/38
OSS:2022/Q1/49
OSS:2022/Q2/176
SMASH Issue 320458
SMASH Issue 320775
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bdo#996974
bnc#1194765
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=64620e0a1e712a778095bd35cbb277dc2259281f
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCR3LIRUEXR7CA63W5M2HT3K63MZGKBR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z5VTIZZUPC73IEJNZX66BY2YCBRZAELB/
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2043520
rh#2044561
rh#2053632
rh#2059923
CVE-2022-2327kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:H)CONFIRM:git.kernel.org:CVE-2022-2327
CONFIRM:security.netapp.com:/advisory/ntap-20230203-0009/
CVE-2022-2327
MISC:kernel.dance:CVE-2022-2209
SMASH Issue 338099
bnc#1201829
CVE-2022-23308libxml2:Releasedmoderate7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H)CONFIRM:github.com:CVE-2022-23308
CONFIRM:security.netapp.com:CVE-2022-23308
CONFIRM:support.apple.com:CVE-2018-25032
CONFIRM:support.apple.com:CVE-2022-23308
CVE-2022-23308
D:CVE-2022-23308
FEDORA:FEDORA-2022-050c712ed7
FULLDISC:20220516 APPLE-SA-2022-05-16-1 iOS 15.5 and iPadOS 15.5
FULLDISC:20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
FULLDISC:20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
FULLDISC:20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
FULLDISC:20220516 APPLE-SA-2022-05-16-5 watchOS 8.6
FULLDISC:20220516 APPLE-SA-2022-05-16-6 tvOS 15.5
GLSA-202210-03
L3:62986
L3:63416
L3:63420
MISC:gitlab.gnome.org:CVE-2022-23308
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220408 [SECURITY] [DLA 2972-1] libxml2 security update
Oracle:CVE-2022-23308
RHSA-2022:0899
RHSA-2022:1389
RHSA-2022:1390
SMASH Issue 324493
bnc#1196490
bnc#1197514
bnc#1200032
bnc#1200040
jsc#CAR-1565
rh#2056913
CVE-2022-2343vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-2343
CVE-2022-2343
D:CVE-2022-2343
FEDORA:FEDORA-2022-9d7a58e376
GLSA-202208-32
MISC:github.com:CVE-2022-2343
SMASH Issue 336558
bnc#1201356
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1888
rh#2106779
CVE-2022-2344vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-2344
CVE-2022-2344
FEDORA:FEDORA-2022-9d7a58e376
GLSA-202208-32
MISC:github.com:CVE-2022-2344
SMASH Issue 336556
bnc#1201359
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1889
rh#2106787
CVE-2022-2345vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-2345
CVE-2022-2345
D:CVE-2022-2345
FEDORA:FEDORA-2022-9d7a58e376
GLSA-202208-32
MISC:github.com:CVE-2022-2345
SMASH Issue 336591
bnc#1201363
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1890
rh#2106775
CVE-2022-23491mozilla-nss:Releasedmoderate6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-23491
D:CVE-2022-23491
L3:64895
MISC:github.com:/certifi/python-certifi/security/advisories/GHSA-43fp-rhv2-5gv8
MISC:groups.google.com:/a/mozilla.org/g/dev-security-policy/c/oxX69KFvsm4/m/yLohoVqtCgAJ
Oracle:CVE-2022-23491
RHBA-2023:0589
SMASH Issue 350038
bnc#1206212
bnc#1206587
rh#2180089
CVE-2022-2380kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2022-2380
MISC:git.kernel.org:CVE-2022-2380
SMASH Issue 336707
bnc#1201378
rh#2105785
CVE-2022-23816kernel-source-rt:Not affectedmoderate5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)CONFIRM:www.intel.com:CVE-2022-29901
CVE-2022-23816
D:CVE-2022-26373
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5184
DSA-5207
MISC:www.intel.com:OSS:2022/07/12/2
OSS:2022/07/12/2
OSS:2022/07/12/4
OSS:2022/07/12/5
OSS:2022/07/13/1
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
OSS:2022/Q3/44
RHSA-2022:7110
RHSA-2022:7134
RHSA-2022:7337
RHSA-2022:7338
RHSA-2022:7933
RHSA-2022:8267
RHSA-2022:8973
RHSA-2022:8974
SMASH Issue 336843
ZDI-22-1117
ZDI-22-1118
bnc#1201456
jsc#CAR-1906
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
rh#2090226
rh#2103148
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119855
CVE-2022-23825kernel-source-rt:Ignoremoderate5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)CONFIRM:www.intel.com:CVE-2022-29901
CVE-2022-23825
D:CVE-2022-26373
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5184
DSA-5207
DSA-5378
FEDORA:FEDORA-2022-3e6ce58029
FEDORA:FEDORA-2022-8aab5b5cde
FEDORA:FEDORA-2022-a0d7a5eaf2
FEDORA:FEDORA-2022-c69ef9c1dd
MISC:www.amd.com:CVE-2022-23825
MISC:www.intel.com:OSS:2022/07/12/2
OSS:2022/07/12/2
OSS:2022/07/12/4
OSS:2022/07/12/5
OSS:2022/07/13/1
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/11/08/1
OSS:2022/11/10/2
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
OSS:2022/Q3/44
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
Oracle:CVE-2022-21123
RHSA-2022:7110
RHSA-2022:7134
RHSA-2022:7337
RHSA-2022:7338
RHSA-2022:7933
RHSA-2022:8267
RHSA-2022:8973
RHSA-2022:8974
SMASH Issue 336844
ZDI-22-1117
ZDI-22-1118
bdo#1033297
bnc#1201457
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLSRW4LLTAT3CZMOYVNTC7YIYGX3KLED/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/
https://security.gentoo.org/glsa/202402-07
jsc#CAR-1916
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
rh#1519780
rh#2061700
rh#2090226
rh#2090237
rh#2090240
rh#2090241
rh#2103148
rh#2103153
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119127
rh#2119855
CVE-2022-23852expat:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-23852
CONFIRM:www.tenable.com:CVE-2022-23990
CVE-2022-23852
D:CVE-2022-23852
DSA-5073
GLSA-202209-24
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:github.com:CVE-2022-23852
MISC:www.oracle.com:CVE-2022-21498
MLIST:[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update
Oracle:CVE-2022-23990
RHSA-2022:0951
RHSA-2022:1069
RHSA-2022:4834
RHSA-2022:7144
SMASH Issue 321506
bdo#1002994
bdo#1003474
bnc#1195054
jsc#CAR-1454
rh#2044451
rh#2044455
rh#2044457
rh#2044464
rh#2044467
rh#2044479
rh#2044484
rh#2044488
rh#2044613
rh#2048356
CVE-2022-23901re2c:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2022-23901
MISC:github.com:CVE-2022-23901
SMASH Issue 327522
bnc#1197693
CVE-2022-23960kernel-source-rt:Releasedmoderate5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)CONFIRM:developer.arm.com:CVE-2017-5754
CONFIRM:security.netapp.com:CVE-2022-0002
CVE-2021-26341
CVE-2021-26401
CVE-2022-0001
CVE-2022-0002
CVE-2022-23960
CVE-2022-25368
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-23960
D:CVE-2022-32296
DSA-5096
DSA-5161
DSA-5173
DSA-5184
DSA-5378
L3:65520
MISC:amperecomputing.com:CVE-2022-25368
MISC:developer.arm.com:CVE-2021-28664
MISC:developer.arm.com:CVE-2022-25368
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.amd.com:CVE-2021-26341
MISC:www.amd.com:CVE-2021-26401
MISC:www.intel.com:CVE-2022-0002
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2021/07/22/1
OSS:2022/01/25/12
OSS:2022/03/18/2
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/11/10/2
OSS:2022/Q1/171
OSS:2022/Q3/141
OSS:2022/Q4/132
OSS:2022/Q4/135
Oracle:CVE-2017-5715
Oracle:CVE-2022-21123
RHSA-2022:1975
RHSA-2022:1988
RHSA-2022:7683
RHSA-2023:0187
RHSA-2023:0399
RHSA-2023:0400
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 312331
SMASH Issue 325165
SMASH Issue 325839
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#1033297
bdo#922204
bdo#988044
bdo#989285
bdo#990279
bdo#990411
bdo#994050
bnc#1191580
bnc#1195283
bnc#1195330
bnc#1196657
bnc#1196901
bnc#1196915
bnc#1197000
https://www.kb.cert.org/vuls/id/155143
jsc#CAR-1593
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1519780
rh#1832397
rh#1980646
rh#1997467
rh#2039448
rh#2044561
rh#2053632
rh#2056381
rh#2058395
rh#2058955
rh#2059923
rh#2061633
rh#2061700
rh#2061703
rh#2061712
rh#2061721
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2119127
rh#2141026
CVE-2022-23990expat:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:www.tenable.com:CVE-2022-23990
CVE-2022-23990
DSA-5073
FEDORA:FEDORA-2022-88f6a3d290
FEDORA:FEDORA-2022-d2abd0858e
GLSA-202209-24
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:github.com:CVE-2022-23990
MISC:www.oracle.com:CVE-2022-21498
Oracle:CVE-2022-23990
RHSA-2022:7144
RHSA-2022:7811
SMASH Issue 321796
bdo#1002994
bdo#1003474
bnc#1195217
jsc#CAR-1477
rh#2044451
rh#2044455
rh#2044457
rh#2044464
rh#2044467
rh#2044479
rh#2044484
rh#2044488
rh#2044613
rh#2048356
CVE-2022-24122kernel-source-rt:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-24122
CVE-2022-24122
D:CVE-2022-24122
FEDORA:FEDORA-2022-57fd391bf8
FEDORA:FEDORA-2022-667a5c6e26
MISC:git.kernel.org:CVE-2022-24122
MISC:github.com:CVE-2022-24122
OSS:2022/01/29/1
OSS:2022/Q1/104
SMASH Issue 322165
bnc#1195306
bnc#1196028
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HSR3AI2IQGRKZCHNKF6S25JGDKUEAWWL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VVSZKUJAZ2VN6LJ35J2B6YD6BOPQTU3B/
rh#2048492
CVE-2022-24448kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-24448
DSA-5092
DSA-5096
MISC:cdn.kernel.org:CVE-2022-24448
MISC:git.kernel.org:CVE-2022-24448
MISC:github.com:CVE-2022-24448
MISC:lore.kernel.org:CVE-2022-24448
MISC:www.spinics.net:CVE-2022-24448
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 322734
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1195612
jsc#CAR-1499
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2044561
rh#2051444
rh#2053632
rh#2055502
rh#2059923
CVE-2022-24695kernel-source-rt:Ignoremoderate4.3 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2022-24695
MISC:www.computer.org:/csdl/proceedings-article/sp/2023/933600a521/1He7Yja1AYM
SMASH Issue 368229
bnc#1212028
https://sp2023.ieee-security.org/program-papers.html
https://www.bluetooth.com/specifications/specs/core-specification/
CVE-2022-24713mozilla-nss:Releasedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:github.com:CVE-2022-24713
CVE-2022-1097
CVE-2022-1196
CVE-2022-1197
CVE-2022-24713
CVE-2022-28281
CVE-2022-28282
CVE-2022-28283
CVE-2022-28284
CVE-2022-28285
CVE-2022-28286
CVE-2022-28287
CVE-2022-28288
CVE-2022-28289
D:CVE-2022-24713
DSA-5113
DSA-5118
FEDORA:FEDORA-2022-8436ac4c39
FEDORA:FEDORA-2022-ceb3e03c5e
FEDORA:FEDORA-2022-d20d44ba98
GLSA-202208-08
GLSA-202208-14
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:github.com:CVE-2022-24713
MISC:groups.google.com:CVE-2022-24713
MISC:www.mozilla.org:/security/advisories/mfsa2022-13/
MISC:www.mozilla.org:/security/advisories/mfsa2022-14/
MISC:www.mozilla.org:/security/advisories/mfsa2022-15/
MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update
MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update
Mozilla Foundation Security Advisory 2022-13
RHSA-2022:1283
RHSA-2022:1284
RHSA-2022:1285
RHSA-2022:1286
RHSA-2022:1287
RHSA-2022:1301
RHSA-2022:1302
RHSA-2022:1303
RHSA-2022:1305
RHSA-2022:1326
SMASH Issue 325578
SMASH Issue 327815
bnc#1196972
bnc#1197903
jsc#CAR-1667
rh#2072559
rh#2072560
rh#2072561
rh#2072562
rh#2072563
rh#2072564
rh#2072565
rh#2072566
rh#2072963
xf#223379
CVE-2022-24958kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2022-24958
CVE-2022-24958
D:CVE-2022-24958
FEDORA:FEDORA-2022-2aa7c08b53
FEDORA:FEDORA-2022-9d4e48836d
MISC:git.kernel.org:CVE-2022-24958
MISC:github.com:CVE-2022-24958
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
SMASH Issue 323537
bnc#1195905
jsc#CAR-1523
rh#2053548
CVE-2022-24959kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-24959
D:CVE-2022-24959
DSA-5092
DSA-5096
MISC:cdn.kernel.org:CVE-2022-24448
MISC:github.com:CVE-2022-24959
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
SMASH Issue 323536
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1195897
jsc#CAR-1508
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2044561
rh#2053552
rh#2053632
rh#2055502
rh#2059923
CVE-2022-2503kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:github.com:CVE-2022-2503
CVE-2022-2503
D:CVE-2022-2503
RHSA-2022:7933
RHSA-2022:8267
RHSA-2023:5627
SMASH Issue 339685
bnc#1202677
https://security.netapp.com/advisory/ntap-20230214-0005/
jsc#CAR-1980
rh#2177862
CVE-2022-2509gnutls:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-2509
DSA-5203
FEDORA:FEDORA-2022-5470992bfc
MISC:access.redhat.com:CVE-2022-2509
MISC:lists.gnupg.org:CVE-2022-2509
MLIST:[debian-lts-announce] 20220812 [SECURITY] [DLA 3070-1] gnutls28 security update
Oracle:CVE-2022-2509
RHSA-2022:6854
RHSA-2022:7105
SMASH Issue 338507
bnc#1202020
jsc#CAR-1940
rh#2108977
CVE-2022-2522vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2522
CVE-2022-2522
L3:64124
L3:64808
MISC:github.com:CVE-2022-2522
MISC:huntr.dev:CVE-2022-2522
SMASH Issue 338141
bnc#1201863
bnc#1203356
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1923
rh#2112299
CVE-2022-25235expat:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-25315
CVE-2022-25235
D:CVE-2022-25235
DSA-5085
FEDORA:FEDORA-2022-04f206996b
FEDORA:FEDORA-2022-3d9d67f558
GLSA-202209-24
L3:63782
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:github.com:CVE-2022-25235
MISC:www.oracle.com:CVE-2022-21498
MLIST:[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update
OSS:2022/02/19/1
Oracle:CVE-2022-25236
Oracle:CVE-2022-25315
RHSA-2022:0815
RHSA-2022:0816
RHSA-2022:0817
RHSA-2022:0818
RHSA-2022:0824
RHSA-2022:0843
RHSA-2022:0845
RHSA-2022:0847
RHSA-2022:0850
RHSA-2022:0853
RHSA-2022:0951
RHSA-2022:1012
RHSA-2022:1053
RHSA-2022:1068
RHSA-2022:1069
RHSA-2022:1070
RHSA-2022:1263
RHSA-2022:1309
RHSA-2022:1539
RHSA-2022:1540
RHSA-2022:1643
RHSA-2022:1644
RHSA-2022:7144
RHSA-2022:7811
SMASH Issue 323930
bdo#1005894
bdo#1005895
bnc#1196026
jsc#CAR-1532
rh#2056350
rh#2056354
rh#2056363
rh#2056366
rh#2056370
CVE-2022-25236expat:Released, python3:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-25315
CVE-2022-25236
D:CVE-2022-25236
DSA-5085
FEDORA:FEDORA-2022-04f206996b
FEDORA:FEDORA-2022-3d9d67f558
GLSA-202209-24
L3:63782
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:github.com:CVE-2022-25236
MISC:packetstormsecurity.com:CVE-2022-22787
MISC:www.oracle.com:CVE-2022-21498
MLIST:[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update
OSS:2022/02/19/1
Oracle:CVE-2022-25236
Oracle:CVE-2022-25315
RHSA-2022:0815
RHSA-2022:0816
RHSA-2022:0817
RHSA-2022:0818
RHSA-2022:0824
RHSA-2022:0843
RHSA-2022:0845
RHSA-2022:0847
RHSA-2022:0850
RHSA-2022:0853
RHSA-2022:0951
RHSA-2022:1012
RHSA-2022:1053
RHSA-2022:1068
RHSA-2022:1069
RHSA-2022:1070
RHSA-2022:1263
RHSA-2022:1309
RHSA-2022:7144
RHSA-2022:7811
SMASH Issue 323929
bdo#1005894
bdo#1005895
bnc#1196025
bnc#1196784
jsc#CAR-1531
rh#2056350
rh#2056354
rh#2056363
rh#2056366
rh#2056370
CVE-2022-25258kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-25258
CVE-2022-25258
D:CVE-2022-25258
DSA-5092
DSA-5096
FEDORA:FEDORA-2022-9d4e48836d
MISC:cdn.kernel.org:CVE-2022-25258
MISC:github.com:CVE-2022-25258
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
SMASH Issue 324016
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1196095
bnc#1196132
jsc#CAR-1604
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2022-2526systemd:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2022-2526
CVE-2022-2526
L3:64045
MISC:github.com:CVE-2022-2526
Oracle:CVE-2022-2526
RHSA-2022:6160
RHSA-2022:6161
RHSA-2022:6162
RHSA-2022:6163
RHSA-2022:6206
RHSA-2022:6551
SMASH Issue 340316
bnc#1202574
bnc#1203000
jsc#CAR-1975
rh#2109926
CVE-2022-25265gcc:Not affected, kernel-source-rt:Not affectedimportant ()CONFIRM:security.netapp.com:CVE-2022-25265
CVE-2022-25265
D:CVE-2022-25265
MISC:github.com:CVE-2022-25265
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 324010
bnc#1196134
rh#2055499
CVE-2022-25313expat:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2022-25315
CVE-2022-25313
D:CVE-2022-25313
DSA-5085
FEDORA:FEDORA-2022-04f206996b
FEDORA:FEDORA-2022-3d9d67f558
GLSA-202209-24
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:github.com:CVE-2022-25313
MISC:www.oracle.com:CVE-2022-21498
MLIST:[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update
OSS:2022/02/19/1
Oracle:CVE-2022-25236
Oracle:CVE-2022-25315
RHSA-2022:5244
RHSA-2022:5314
RHSA-2022:7143
RHSA-2022:7144
RHSA-2022:7811
SMASH Issue 324167
bdo#1005894
bdo#1005895
bnc#1196168
jsc#CAR-1540
rh#2056350
rh#2056354
rh#2056363
rh#2056366
rh#2056370
CVE-2022-25314expat:Releasedimportant8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-25315
CVE-2022-25314
D:CVE-2022-25314
DSA-5085
FEDORA:FEDORA-2022-04f206996b
FEDORA:FEDORA-2022-3d9d67f558
GLSA-202209-24
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:github.com:CVE-2022-25314
MISC:www.oracle.com:CVE-2022-21498
OSS:2022/02/19/1
Oracle:CVE-2022-25236
Oracle:CVE-2022-25315
RHSA-2022:5244
RHSA-2022:5314
RHSA-2022:7144
RHSA-2022:7811
SMASH Issue 324166
bdo#1005894
bdo#1005895
bnc#1196169
jsc#CAR-1541
rh#2056350
rh#2056354
rh#2056363
rh#2056366
rh#2056370
CVE-2022-25315expat:Releasedimportant8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-25315
CVE-2022-25315
D:CVE-2022-25315
DSA-5085
FEDORA:FEDORA-2022-04f206996b
FEDORA:FEDORA-2022-3d9d67f558
GLSA-202209-24
L3:63782
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:github.com:CVE-2022-25315
MISC:www.oracle.com:CVE-2022-21498
MLIST:[debian-lts-announce] 20220307 [SECURITY] [DLA 2935-1] expat security update
OSS:2022/02/19/1
Oracle:CVE-2022-25236
Oracle:CVE-2022-25315
RHSA-2022:0815
RHSA-2022:0816
RHSA-2022:0817
RHSA-2022:0818
RHSA-2022:0824
RHSA-2022:0843
RHSA-2022:0845
RHSA-2022:0847
RHSA-2022:0850
RHSA-2022:0853
RHSA-2022:0951
RHSA-2022:1012
RHSA-2022:1053
RHSA-2022:1068
RHSA-2022:1069
RHSA-2022:1070
RHSA-2022:1263
RHSA-2022:1309
RHSA-2022:7144
RHSA-2022:7811
SMASH Issue 324165
bdo#1005894
bdo#1005895
bnc#1196171
jsc#CAR-1542
rh#2056350
rh#2056354
rh#2056363
rh#2056366
rh#2056370
CVE-2022-25368kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-23960
CVE-2022-25368
MISC:amperecomputing.com:CVE-2022-25368
MISC:developer.arm.com:CVE-2022-25368
RHSA-2022:7683
SMASH Issue 325839
bnc#1197000
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
rh#2062284
rh#2141026
CVE-2022-25375kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-25375
DSA-5092
DSA-5096
MISC:cdn.kernel.org:CVE-2022-25258
MISC:github.com:CVE-2022-25375
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
MLIST:[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
OSS:2021/07/22/1
OSS:2022/01/25/12
OSS:2022/02/21/1
OSS:2022/Q1/151
SMASH Issue 324397
SMASH Issue 324456
bdo#988044
bdo#989285
bdo#990411
bdo#994050
bnc#1196235
jsc#CAR-1600
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2055502
rh#2059923
CVE-2022-25636kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-25636
CVE-2022-25636
DSA-5095
DSA-5096
MISC:git.kernel.org:CVE-2022-25636
MISC:git.kernel.org:OSS:2022/02/21/2
MISC:github.com:CVE-2022-25636
MISC:nickgregory.me:CVE-2022-25636
MISC:packetstormsecurity.com:CVE-2022-0492
MISC:www.oracle.com:CVE-2022-21586
OSS:2021/07/22/1
OSS:2022/01/25/12
OSS:2022/02/21/2
OSS:2022/02/22/1
OSS:2022/Q1/153
Oracle:CVE-2022-25636
RHSA-2022:1413
RHSA-2022:1418
RHSA-2022:1455
RHSA-2022:1535
RHSA-2022:1550
RHSA-2022:1555
RHSA-2022:4896
SMASH Issue 324487
bdo#988044
bdo#989285
bdo#990279
bdo#990411
bdo#994050
bnc#1196299
bnc#1196301
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:99c23da0eed4fd20cae8243f2b51e10e66aa0951
rh#1980646
rh#1997467
rh#2044561
rh#2053632
rh#2056830
rh#2059923
CVE-2022-2571vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-2571
CVE-2022-2571
MISC:github.com:CVE-2022-2571
SMASH Issue 338574
bnc#1202046
jsc#CAR-1941
rh#2116877
CVE-2022-2580vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-2580
CVE-2022-2580
MISC:github.com:CVE-2022-2580
SMASH Issue 338573
bnc#1202049
jsc#CAR-1946
rh#2116874
CVE-2022-2581vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)CONFIRM:huntr.dev:CVE-2022-2581
CVE-2022-2581
L3:64124
MISC:github.com:CVE-2022-2581
SMASH Issue 338572
bnc#1202050
jsc#CAR-1945
rh#2116873
CVE-2022-2585kernel-source-rt:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2022-2585
D:CVE-2022-26373
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5184
DSA-5207
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
RHSA-2022:7318
RHSA-2022:7319
RHSA-2022:7330
SMASH Issue 338820
SMASH Issue 338821
ZDI-22-1117
ZDI-22-1118
bnc#1202094
bnc#1202163
https://lore.kernel.org/lkml/20220809170751.164716-1-cascardo@canonical.com/T/#u
https://ubuntu.com/security/notices/USN-5564-1
https://ubuntu.com/security/notices/USN-5565-1
https://ubuntu.com/security/notices/USN-5566-1
https://ubuntu.com/security/notices/USN-5567-1
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
rh#2090226
rh#2103148
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119855
CVE-2022-2586kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-2586
D:CVE-2022-26373
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5184
DSA-5207
L3:65547
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 338822
SMASH Issue 338823
ZDI-22-1117
ZDI-22-1118
bnc#1202095
https://lore.kernel.org/netfilter-devel/20220809170148.164591-1-cascardo@canonical.com/T/#t
https://ubuntu.com/security/notices/USN-5557-1
https://ubuntu.com/security/notices/USN-5560-1
https://ubuntu.com/security/notices/USN-5560-2
https://ubuntu.com/security/notices/USN-5562-1
https://ubuntu.com/security/notices/USN-5564-1
https://ubuntu.com/security/notices/USN-5565-1
https://ubuntu.com/security/notices/USN-5566-1
https://ubuntu.com/security/notices/USN-5567-1
https://ubuntu.com/security/notices/USN-5582-1
https://www.zerodayinitiative.com/advisories/ZDI-22-1118/
jsc#CAR-1960
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
rh#2090226
rh#2103148
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119855
CVE-2022-2588kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-36946
CVE-2022-2588
CVE-2022-3635
CVE-2022-42703
D:CVE-2022-26373
D:CVE-2022-3635
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5184
DSA-5207
DSA-5324
L3:63917
L3:64012
L3:64086
L3:64306
L3:64310
L3:64329
L3:64525
L3:64549
L3:64602
L3:64716
L3:64728
L3:64743
L3:65176
L3:65426
L3:66045
MISC:bugs.chromium.org:CVE-2022-42703
MISC:cdn.kernel.org:CVE-2022-42703
MISC:git.kernel.org:CVE-2022-42703
MISC:github.com:CVE-2022-42703
MISC:googleprojectzero.blogspot.com:/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html
MISC:marc.info:CVE-2022-36946
MLIST:[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
RHSA-2022:6551
RHSA-2022:6872
RHSA-2022:6875
RHSA-2022:6978
RHSA-2022:6983
RHSA-2022:6991
RHSA-2022:7110
RHSA-2022:7134
RHSA-2022:7137
RHSA-2022:7146
RHSA-2022:7171
RHSA-2022:7173
RHSA-2022:7279
RHSA-2022:7280
RHSA-2022:7337
RHSA-2022:7338
RHSA-2022:7344
RHSA-2022:7885
RHSA-2023:1091
RHSA-2023:1092
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
RHSA-2023:3388
RHSA-2023:4022
RHSA-2023:4023
RHSA-2023:4137
RHSA-2023:4138
SMASH Issue 338824
SMASH Issue 338825
ZDI-22-1117
ZDI-22-1118
bnc#1201941
bnc#1202096
bnc#1202961
bnc#1203613
bnc#1204168
bnc#1204170
bnc#1204631
bnc#1204636
bnc#1205058
bnc#1205085
git.kernel.org:CVE-2022-3635
https://github.com/Markakd/CVE-2022-2588
https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u
https://ubuntu.com/security/notices/USN-5557-1
https://ubuntu.com/security/notices/USN-5560-1
https://ubuntu.com/security/notices/USN-5560-2
https://ubuntu.com/security/notices/USN-5562-1
https://ubuntu.com/security/notices/USN-5564-1
https://ubuntu.com/security/notices/USN-5565-1
https://ubuntu.com/security/notices/USN-5566-1
https://ubuntu.com/security/notices/USN-5567-1
https://ubuntu.com/security/notices/USN-5582-1
https://ubuntu.com/security/notices/USN-5588-1
https://www.zerodayinitiative.com/advisories/ZDI-22-1117/
jsc#CAR-1930
jsc#CAR-1961
jsc#CAR-2091
jsc#CAR-2137
linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb
linux.git:commit:33172ab50a53578a95691310f49567c9266968b0
linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827
linux.git:commit:42baefac638f06314298087394b982ead9ec444b
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd
linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d
linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638
linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888
linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809
linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066
linux.git:commit:fd3d91ab1c6ab0628fe642dd570b56302c30a792
rh#1832397
rh#2015046
rh#2063236
rh#2066706
rh#2066799
rh#2084125
rh#2084183
rh#2090226
rh#2103148
rh#2108691
rh#2112688
rh#2112693
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119855
rh#2120664
rh#2122960
rh#2124475
rh#2130141
rh#2132640
rh#2133483
rh#2148458
rh#2150953
vuldb.com:CVE-2022-3635
CVE-2022-2590kernel-source-rt:Not affected, ltp:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-2590
D:CVE-2022-2590
MISC:lists.openwall.net:OSS:2022/08/08/2
MISC:lore.kernel.org:CVE-2022-2590
OSS:2022/08/08/1
OSS:2022/08/08/2
OSS:2022/08/08/7
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/Q3/99
Oracle:CVE-2016-5195
SMASH Issue 338546
SMASH Issue 338547
bnc#1202013
bnc#1202089
https://lore.kernel.org/linux-mm/20220808073232.8808-1-david%40redhat.com/
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
rh#1384344
rh#2116175
CVE-2022-2598vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2598
CVE-2022-2598
MISC:github.com:CVE-2022-2598
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 338568
bnc#1202051
jsc#CAR-1947
rh#2116868
CVE-2022-2602kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-2602
DSA-5257
OSS:2022/Q4/30
SMASH Issue 344902
SMASH Issue 344903
ZDI-22-1462
bnc#1204228
bnc#1205186
http://packetstormsecurity.com/files/176533/Linux-Broken-Unix-GC-Interaction-Use-After-Free.html
https://ubuntu.com/security/notices/USN-5691-1
https://ubuntu.com/security/notices/USN-5692-1
https://ubuntu.com/security/notices/USN-5693-1
https://ubuntu.com/security/notices/USN-5700-1
https://ubuntu.com/security/notices/USN-5752-1
linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f
linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc
linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f
linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f
linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6
rh#2123056
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2139586
rh#2139598
CVE-2022-26280libarchive:Releasedimportant7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H)CVE-2022-26280
CVE-2022-28066
D:CVE-2022-26280
FEDORA:FEDORA-2022-bbb5ec21b2
GLSA-202208-26
MISC:github.com:CVE-2022-26280
RHSA-2022:5252
SMASH Issue 327442
bnc#1197634
bnc#1199230
jsc#CAR-1633
jsc#CAR-1743
rh#2071931
CVE-2022-26365kernel-source-rt:Releasedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CONFIRM:xenbits.xen.org:CVE-2022-33742
CVE-2022-26365
CVE-2022-33740
CVE-2022-33741
CVE-2022-33742
D:CVE-2022-26365
D:CVE-2022-33740
D:CVE-2022-33741
DSA-5191
FEDORA:FEDORA-2022-2c9f8224f8
FEDORA:FEDORA-2022-c4ec706488
MISC:github.com:OSS:2022/07/02/3
MISC:xenbits.xenproject.org:CVE-2022-33742
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
OSS:2022/07/02/3
OSS:2022/07/05/6
OSS:2022/Q3/22
SMASH Issue 335221
SMASH Issue 335223
ZDI-23-1834
bnc#1200762
jsc#CAR-1882
linux.git:commit:2400617da7eebf9167d71a46122828bc479d64c9
linux.git:commit:2f446ffe9d737e9a844b97887919c4fda18246e7
linux.git:commit:307c8de2b02344805ebead3440d8feed28f2f010
linux.git:commit:4491001c2e0fa69efbb748c96ec96b100a5cdb7e
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:e35e5b6f695d241ffb1d223207da58a1fbcdff4b
linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26
rh#2092427
rh#2093146
rh#2104114
rh#2104423
rh#2104746
rh#2107924
rh#2108691
CVE-2022-26373kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-26373
CVE-2022-26373
D:CVE-2022-26373
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5184
DSA-5207
L3:65516
L3:67055
MISC:www.intel.com:CVE-2022-26373
MLIST:[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
RHSA-2022:7337
RHSA-2022:7338
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
RHSA-2022:8973
RHSA-2022:8974
RHSA-2023:0440
SMASH Issue 337835
bnc#1201726
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
rh#2090226
rh#2103148
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119855
CVE-2022-2639kernel-source-rt:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2022-2639
MISC:github.com:CVE-2022-2639
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
RHSA-2022:8765
RHSA-2022:8767
RHSA-2022:8768
RHSA-2022:8809
RHSA-2022:8831
RHSA-2022:8940
RHSA-2022:8941
RHSA-2022:8973
RHSA-2022:8974
RHSA-2022:8989
RHSA-2022:9082
RHSA-2023:0058
RHSA-2023:0059
SMASH Issue 338841
bnc#1202154
jsc#CAR-1950
rh#2084479
CVE-2022-26488python3:Not affectedmoderate ()CONFIRM:security.netapp.com:CVE-2022-26488
CVE-2022-26488
MISC:mail.python.org:CVE-2022-26488
SMASH Issue 325794
bnc#1203151
CVE-2022-26490kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-26490
CVE-2022-26490
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-26490
D:CVE-2022-32296
DSA-5127
DSA-5161
DSA-5173
DSA-5184
FEDORA:FEDORA-2022-9342e59a98
FEDORA:FEDORA-2022-de4474b89d
L3:65879
MISC:anatomic.rip:OSS:2024/Q2/172
MISC:blog.exodusintel.com:OSS:2024/Q2/172
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:git.kernel.org:OSS:2024/Q2/172
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:CVE-2022-26490
MISC:github.com:OSS:2022/04/02/2
MISC:github.com:OSS:2022/Q3/101
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:ruia-ruia.github.io:OSS:2022/Q3/101
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/04/22/3
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/101
OSS:2022/Q3/141
OSS:2024/04/24/3
OSS:2024/Q2/172
Oracle:CVE-2022-21123
SMASH Issue 325424
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1196830
bnc#1201656
https://bugs.chromium.org/p/project-zero/issues/detail?id=2504
jsc#CAR-1573
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064232
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2078456
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-2663kernel-source-rt:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)CVE-2022-2663
D:CVE-2022-2663
DSA-5257
L3:66055
MISC:dgl.cx:CVE-2022-2663
MISC:lore.kernel.org:CVE-2022-2663
MISC:www.youtube.com:CVE-2022-2663
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/08/30/1
OSS:2022/Q4/30
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 338826
SMASH Issue 341245
ZDI-22-1462
bnc#1202097
https://lore.kernel.org/netfilter-devel/20220826045658.100360-1-dgl%40dgl.cx/T/
jsc#CAR-2008
linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f
linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc
linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f
linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f
linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6
rh#2123056
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2139586
rh#2139598
CVE-2022-26878kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:cdn.kernel.org:CVE-2021-44879
CVE-2022-26878
D:CVE-2022-26878
MISC:cdn.kernel.org:CVE-2022-26878
MISC:git.kernel.org:CVE-2022-26878
MISC:lore.kernel.org:CVE-2022-26878
OSS:2022/03/11/1
OSS:2022/Q1/175
SMASH Issue 325992
bnc#1197035
rh#2064113
CVE-2022-26966kernel-source-rt:Releasedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-27223
CVE-2022-26966
D:CVE-2022-26966
MISC:cdn.kernel.org:CVE-2022-25258
MISC:git.kernel.org:CVE-2022-26966
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
SMASH Issue 325454
SMASH Issue 326105
bnc#1196836
jsc#CAR-1596
rh#2063718
CVE-2022-27223kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2022-27223
CVE-2022-27223
D:CVE-2022-27223
MISC:cdn.kernel.org:CVE-2022-27223
MISC:github.com:CVE-2022-27223
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
SMASH Issue 326379
bnc#1197245
rh#2064626
CVE-2022-27666kernel-source-rt:Releasedimportant7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-0995
CVE-2022-0886
CVE-2022-27666
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-27666
D:CVE-2022-32296
DSA-5127
DSA-5161
DSA-5173
DSA-5184
MISC:anatomic.rip:OSS:2024/Q2/172
MISC:blog.exodusintel.com:OSS:2024/Q2/172
MISC:cdn.kernel.org:CVE-2022-27666
MISC:git.kernel.org:CVE-2022-27666
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:git.kernel.org:OSS:2024/Q2/172
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:CVE-2022-27666
MISC:github.com:OSS:2022/04/02/2
MISC:github.com:OSS:2022/Q3/101
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:ruia-ruia.github.io:OSS:2022/Q3/101
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/04/22/3
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/101
OSS:2022/Q3/141
OSS:2024/04/24/3
OSS:2024/Q2/172
Oracle:CVE-2022-21123
RHSA-2022:4809
RHSA-2022:4829
RHSA-2022:4835
RHSA-2022:4924
RHSA-2022:4942
RHSA-2022:5214
RHSA-2022:5219
RHSA-2022:5220
RHSA-2022:5224
RHSA-2022:5249
RHSA-2022:5267
RHSA-2022:5316
RHSA-2022:5344
RHSA-2022:5476
RHSA-2022:5678
SMASH Issue 327016
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1197131
bnc#1197133
bnc#1197462
https://bugs.chromium.org/p/project-zero/issues/detail?id=2504
jsc#CAR-1595
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2067299
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2078456
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-27774curl:Ignoremoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-27776
CVE-2022-27774
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
DSA-5197
GLSA-202212-01
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/62
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2022-27774
MLIST:[debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update
OSS:2022/Q2/62
OSS:2023/02/15/3
OSS:2023/03/20/6
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
RHSA-2022:5245
RHSA-2022:5313
SMASH Issue 329490
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1198608
jsc#CAR-1715
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099300
rh#2099305
rh#2099306
CVE-2022-27775curl:Releasedmoderate5.6 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)CONFIRM:security.netapp.com:CVE-2022-27776
CVE-2022-27775
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
DSA-5197
GLSA-202212-01
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/63
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2022-27775
OSS:2022/Q2/63
OSS:2023/02/15/3
OSS:2023/03/20/6
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
RHSA-2022:8299
SMASH Issue 329695
SMASH Issue 329696
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1198723
jsc#CAR-1718
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099300
rh#2099305
rh#2099306
CVE-2022-27776curl:Releasedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-27776
CVE-2022-27776
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
DSA-5197
FEDORA:FEDORA-2022-bca2c95559
FEDORA:FEDORA-2022-f83aec6d57
GLSA-202212-01
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/64
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2022-27776
MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
OSS:2022/Q2/64
OSS:2023/02/15/3
OSS:2023/03/20/6
Oracle:CVE-2018-1000007
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
RHSA-2022:5245
RHSA-2022:5313
SMASH Issue 329920
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1198766
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/
jsc#CAR-1716
rh#1955316
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099300
rh#2099305
rh#2099306
CVE-2022-27778curl:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N)CONFIRM:security.netapp.com:CVE-2022-21569
CONFIRM:security.netapp.com:CVE-2022-30115
CVE-2022-27778
MISC:curl.se:OSS:2022/Q2/92
MISC:hackerone.com:CVE-2022-27778
MISC:www.oracle.com:CVE-2022-21586
OSS:2022/Q2/92
Oracle:CVE-2022-27778
SMASH Issue 330782
SMASH Issue 330783
bnc#1199220
rh#2082194
CVE-2022-27779curl:Not affectedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)CONFIRM:security.netapp.com:CVE-2022-30115
CVE-2022-27779
GLSA-202212-01
MISC:curl.se:OSS:2022/Q2/93
MISC:hackerone.com:CVE-2022-27779
OSS:2022/Q2/93
SMASH Issue 330784
SMASH Issue 330785
bnc#1199221
rh#2082202
CVE-2022-27780curl:Not affectedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)CONFIRM:security.netapp.com:CVE-2022-30115
CVE-2022-27780
GLSA-202212-01
MISC:curl.se:OSS:2022/Q2/94
MISC:hackerone.com:CVE-2022-27780
OSS:2022/Q2/94
SMASH Issue 330786
SMASH Issue 330787
bnc#1199222
rh#2082203
CVE-2022-27781curl:Releasedlow3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2022-30115
CVE-2022-27781
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
DSA-5197
GLSA-202212-01
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/95
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2022-27781
MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
OSS:2022/Q2/95
OSS:2023/02/15/3
OSS:2023/03/20/6
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
RHSA-2022:8840
RHSA-2022:8841
SMASH Issue 330788
SMASH Issue 330789
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1199223
jsc#CAR-1767
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099300
rh#2099305
rh#2099306
CVE-2022-27782curl:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-30115
CVE-2022-27782
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
DSA-5197
GLSA-202212-01
L3:64216
L3:64537
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2022-27782
MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
OSS:2022/Q2/96
OSS:2023/02/15/3
OSS:2023/03/20/6
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
RHSA-2022:5245
RHSA-2022:5313
SMASH Issue 330790
SMASH Issue 330791
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1199224
jsc#CAR-1768
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099300
rh#2099305
rh#2099306
CVE-2022-2785kernel-source-rt:Not affectedmoderate ()CONFIRM:git.kernel.org:CVE-2022-2785
CONFIRM:lore.kernel.org:CVE-2022-2785
CVE-2022-2785
SMASH Issue 343369
bnc#1203734
rh#2129419
CVE-2022-27943binutils:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2022-27943
D:CVE-2022-27943
FEDORA:FEDORA-2022-c9a1fd5370
L3:64643
MISC:gcc.gnu.org:CVE-2022-27943
MISC:sourceware.org:CVE-2022-27943
SMASH Issue 327299
bnc#1197592
jsc#CAR-1631
rh#2071728
CVE-2022-27950kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-27950
MISC:cdn.kernel.org:CVE-2022-27950
MISC:git.kernel.org:CVE-2022-27950
MISC:git.kernel.org:OSS:2022/03/13/1
MISC:github.com:CVE-2022-27950
OSS:2022/03/13/1
RHSA-2022:7444
RHSA-2022:7683
SMASH Issue 327324
bnc#1197646
rh#2069408
CVE-2022-28066libarchive:Releasedimportant5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CVE-2022-26280
CVE-2022-28066
D:CVE-2022-26280
FEDORA:FEDORA-2022-bbb5ec21b2
GLSA-202208-26
MISC:github.com:CVE-2022-26280
RHSA-2022:5252
SMASH Issue 327442
SMASH Issue 330728
bnc#1197634
bnc#1199230
jsc#CAR-1633
jsc#CAR-1743
rh#2071931
CVE-2022-2816vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2816
CVE-2022-2816
D:CVE-2022-2816
FEDORA:FEDORA-2022-6f5e420e52
L3:64177
L3:64184
MISC:github.com:CVE-2022-2816
SMASH Issue 339915
bnc#1202421
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1968
rh#2119042
CVE-2022-2817vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-2817
CVE-2022-2817
D:CVE-2022-2817
FEDORA:FEDORA-2022-6f5e420e52
MISC:github.com:CVE-2022-2817
SMASH Issue 339912
bnc#1202420
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1966
rh#2119043
CVE-2022-2819vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-2819
CVE-2022-2819
FEDORA:FEDORA-2022-6f5e420e52
L3:64177
L3:64184
MISC:github.com:CVE-2022-2819
SMASH Issue 339855
bnc#1202414
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1965
rh#2118594
CVE-2022-28281mozilla-nss:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:github.com:CVE-2022-24713
CVE-2022-1097
CVE-2022-1196
CVE-2022-1197
CVE-2022-24713
CVE-2022-28281
CVE-2022-28282
CVE-2022-28283
CVE-2022-28284
CVE-2022-28285
CVE-2022-28286
CVE-2022-28287
CVE-2022-28288
CVE-2022-28289
D:CVE-2022-24713
DSA-5113
DSA-5118
FEDORA:FEDORA-2022-8436ac4c39
FEDORA:FEDORA-2022-ceb3e03c5e
FEDORA:FEDORA-2022-d20d44ba98
GLSA-202208-08
GLSA-202208-14
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:github.com:CVE-2022-24713
MISC:groups.google.com:CVE-2022-24713
MISC:www.mozilla.org:/security/advisories/mfsa2022-13/
MISC:www.mozilla.org:/security/advisories/mfsa2022-14/
MISC:www.mozilla.org:/security/advisories/mfsa2022-15/
MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update
MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update
Mozilla Foundation Security Advisory 2022-13
RHSA-2022:1283
RHSA-2022:1284
RHSA-2022:1285
RHSA-2022:1286
RHSA-2022:1287
RHSA-2022:1301
RHSA-2022:1302
RHSA-2022:1303
RHSA-2022:1305
RHSA-2022:1326
SMASH Issue 327815
bnc#1197903
jsc#CAR-1667
rh#2072559
rh#2072560
rh#2072561
rh#2072562
rh#2072563
rh#2072564
rh#2072565
rh#2072566
rh#2072963
xf#223379
CVE-2022-28282mozilla-nss:Releasedimportant6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)CONFIRM:github.com:CVE-2022-24713
CVE-2022-1097
CVE-2022-1196
CVE-2022-1197
CVE-2022-24713
CVE-2022-28281
CVE-2022-28282
CVE-2022-28283
CVE-2022-28284
CVE-2022-28285
CVE-2022-28286
CVE-2022-28287
CVE-2022-28288
CVE-2022-28289
D:CVE-2022-24713
DSA-5113
DSA-5118
FEDORA:FEDORA-2022-8436ac4c39
FEDORA:FEDORA-2022-ceb3e03c5e
FEDORA:FEDORA-2022-d20d44ba98
GLSA-202208-08
GLSA-202208-14
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:github.com:CVE-2022-24713
MISC:groups.google.com:CVE-2022-24713
MISC:www.mozilla.org:/security/advisories/mfsa2022-13/
MISC:www.mozilla.org:/security/advisories/mfsa2022-14/
MISC:www.mozilla.org:/security/advisories/mfsa2022-15/
MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update
MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update
Mozilla Foundation Security Advisory 2022-13
RHSA-2022:1283
RHSA-2022:1284
RHSA-2022:1285
RHSA-2022:1286
RHSA-2022:1287
RHSA-2022:1301
RHSA-2022:1302
RHSA-2022:1303
RHSA-2022:1305
RHSA-2022:1326
SMASH Issue 327815
bnc#1197903
jsc#CAR-1667
rh#2072559
rh#2072560
rh#2072561
rh#2072562
rh#2072563
rh#2072564
rh#2072565
rh#2072566
rh#2072963
xf#223379
CVE-2022-28283mozilla-nss:Releasedimportant5.4 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N)CONFIRM:github.com:CVE-2022-24713
CVE-2022-1097
CVE-2022-1196
CVE-2022-1197
CVE-2022-24713
CVE-2022-28281
CVE-2022-28282
CVE-2022-28283
CVE-2022-28284
CVE-2022-28285
CVE-2022-28286
CVE-2022-28287
CVE-2022-28288
CVE-2022-28289
D:CVE-2022-24713
DSA-5113
DSA-5118
FEDORA:FEDORA-2022-8436ac4c39
FEDORA:FEDORA-2022-ceb3e03c5e
FEDORA:FEDORA-2022-d20d44ba98
GLSA-202208-08
GLSA-202208-14
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:github.com:CVE-2022-24713
MISC:groups.google.com:CVE-2022-24713
MISC:www.mozilla.org:/security/advisories/mfsa2022-13/
MISC:www.mozilla.org:/security/advisories/mfsa2022-14/
MISC:www.mozilla.org:/security/advisories/mfsa2022-15/
MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update
MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update
Mozilla Foundation Security Advisory 2022-13
RHSA-2022:1283
RHSA-2022:1284
RHSA-2022:1285
RHSA-2022:1286
RHSA-2022:1287
RHSA-2022:1301
RHSA-2022:1302
RHSA-2022:1303
RHSA-2022:1305
RHSA-2022:1326
SMASH Issue 327815
bnc#1197903
jsc#CAR-1667
rh#2072559
rh#2072560
rh#2072561
rh#2072562
rh#2072563
rh#2072564
rh#2072565
rh#2072566
rh#2072963
xf#223379
CVE-2022-28284mozilla-nss:Releasedimportant6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N)CONFIRM:github.com:CVE-2022-24713
CVE-2022-1097
CVE-2022-1196
CVE-2022-1197
CVE-2022-24713
CVE-2022-28281
CVE-2022-28282
CVE-2022-28283
CVE-2022-28284
CVE-2022-28285
CVE-2022-28286
CVE-2022-28287
CVE-2022-28288
CVE-2022-28289
D:CVE-2022-24713
DSA-5113
DSA-5118
FEDORA:FEDORA-2022-8436ac4c39
FEDORA:FEDORA-2022-ceb3e03c5e
FEDORA:FEDORA-2022-d20d44ba98
GLSA-202208-08
GLSA-202208-14
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:github.com:CVE-2022-24713
MISC:groups.google.com:CVE-2022-24713
MISC:www.mozilla.org:/security/advisories/mfsa2022-13/
MISC:www.mozilla.org:/security/advisories/mfsa2022-14/
MISC:www.mozilla.org:/security/advisories/mfsa2022-15/
MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update
MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update
Mozilla Foundation Security Advisory 2022-13
RHSA-2022:1283
RHSA-2022:1284
RHSA-2022:1285
RHSA-2022:1286
RHSA-2022:1287
RHSA-2022:1301
RHSA-2022:1302
RHSA-2022:1303
RHSA-2022:1305
RHSA-2022:1326
SMASH Issue 327815
bnc#1197903
jsc#CAR-1667
rh#2072559
rh#2072560
rh#2072561
rh#2072562
rh#2072563
rh#2072564
rh#2072565
rh#2072566
rh#2072963
xf#223379
CVE-2022-28285mozilla-nss:Releasedimportant6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)CONFIRM:github.com:CVE-2022-24713
CVE-2022-1097
CVE-2022-1196
CVE-2022-1197
CVE-2022-24713
CVE-2022-28281
CVE-2022-28282
CVE-2022-28283
CVE-2022-28284
CVE-2022-28285
CVE-2022-28286
CVE-2022-28287
CVE-2022-28288
CVE-2022-28289
D:CVE-2022-24713
DSA-5113
DSA-5118
FEDORA:FEDORA-2022-8436ac4c39
FEDORA:FEDORA-2022-ceb3e03c5e
FEDORA:FEDORA-2022-d20d44ba98
GLSA-202208-08
GLSA-202208-14
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:github.com:CVE-2022-24713
MISC:groups.google.com:CVE-2022-24713
MISC:www.mozilla.org:/security/advisories/mfsa2022-13/
MISC:www.mozilla.org:/security/advisories/mfsa2022-14/
MISC:www.mozilla.org:/security/advisories/mfsa2022-15/
MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update
MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update
Mozilla Foundation Security Advisory 2022-13
RHSA-2022:1283
RHSA-2022:1284
RHSA-2022:1285
RHSA-2022:1286
RHSA-2022:1287
RHSA-2022:1301
RHSA-2022:1302
RHSA-2022:1303
RHSA-2022:1305
RHSA-2022:1326
SMASH Issue 327815
bnc#1197903
jsc#CAR-1667
rh#2072559
rh#2072560
rh#2072561
rh#2072562
rh#2072563
rh#2072564
rh#2072565
rh#2072566
rh#2072963
xf#223379
CVE-2022-28286mozilla-nss:Releasedimportant4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)CONFIRM:github.com:CVE-2022-24713
CVE-2022-1097
CVE-2022-1196
CVE-2022-1197
CVE-2022-24713
CVE-2022-28281
CVE-2022-28282
CVE-2022-28283
CVE-2022-28284
CVE-2022-28285
CVE-2022-28286
CVE-2022-28287
CVE-2022-28288
CVE-2022-28289
D:CVE-2022-24713
DSA-5113
DSA-5118
FEDORA:FEDORA-2022-8436ac4c39
FEDORA:FEDORA-2022-ceb3e03c5e
FEDORA:FEDORA-2022-d20d44ba98
GLSA-202208-08
GLSA-202208-14
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:github.com:CVE-2022-24713
MISC:groups.google.com:CVE-2022-24713
MISC:www.mozilla.org:/security/advisories/mfsa2022-13/
MISC:www.mozilla.org:/security/advisories/mfsa2022-14/
MISC:www.mozilla.org:/security/advisories/mfsa2022-15/
MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update
MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update
Mozilla Foundation Security Advisory 2022-13
RHSA-2022:1283
RHSA-2022:1284
RHSA-2022:1285
RHSA-2022:1286
RHSA-2022:1287
RHSA-2022:1301
RHSA-2022:1302
RHSA-2022:1303
RHSA-2022:1305
RHSA-2022:1326
SMASH Issue 327815
bnc#1197903
jsc#CAR-1667
rh#2072559
rh#2072560
rh#2072561
rh#2072562
rh#2072563
rh#2072564
rh#2072565
rh#2072566
rh#2072963
xf#223379
CVE-2022-28287mozilla-nss:Releasedimportant4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:github.com:CVE-2022-24713
CVE-2022-1097
CVE-2022-1196
CVE-2022-1197
CVE-2022-24713
CVE-2022-28281
CVE-2022-28282
CVE-2022-28283
CVE-2022-28284
CVE-2022-28285
CVE-2022-28286
CVE-2022-28287
CVE-2022-28288
CVE-2022-28289
D:CVE-2022-24713
DSA-5113
DSA-5118
FEDORA:FEDORA-2022-8436ac4c39
FEDORA:FEDORA-2022-ceb3e03c5e
FEDORA:FEDORA-2022-d20d44ba98
GLSA-202208-08
GLSA-202208-14
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:github.com:CVE-2022-24713
MISC:groups.google.com:CVE-2022-24713
MISC:www.mozilla.org:/security/advisories/mfsa2022-13/
MISC:www.mozilla.org:/security/advisories/mfsa2022-14/
MISC:www.mozilla.org:/security/advisories/mfsa2022-15/
MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update
MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update
Mozilla Foundation Security Advisory 2022-13
RHSA-2022:1283
RHSA-2022:1284
RHSA-2022:1285
RHSA-2022:1286
RHSA-2022:1287
RHSA-2022:1301
RHSA-2022:1302
RHSA-2022:1303
RHSA-2022:1305
RHSA-2022:1326
SMASH Issue 327815
bnc#1197903
jsc#CAR-1667
rh#2072559
rh#2072560
rh#2072561
rh#2072562
rh#2072563
rh#2072564
rh#2072565
rh#2072566
rh#2072963
xf#223379
CVE-2022-28288mozilla-nss:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:github.com:CVE-2022-24713
CVE-2022-1097
CVE-2022-1196
CVE-2022-1197
CVE-2022-24713
CVE-2022-28281
CVE-2022-28282
CVE-2022-28283
CVE-2022-28284
CVE-2022-28285
CVE-2022-28286
CVE-2022-28287
CVE-2022-28288
CVE-2022-28289
D:CVE-2022-24713
DSA-5113
DSA-5118
FEDORA:FEDORA-2022-8436ac4c39
FEDORA:FEDORA-2022-ceb3e03c5e
FEDORA:FEDORA-2022-d20d44ba98
GLSA-202208-08
GLSA-202208-14
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:github.com:CVE-2022-24713
MISC:groups.google.com:CVE-2022-24713
MISC:www.mozilla.org:/security/advisories/mfsa2022-13/
MISC:www.mozilla.org:/security/advisories/mfsa2022-14/
MISC:www.mozilla.org:/security/advisories/mfsa2022-15/
MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update
MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update
Mozilla Foundation Security Advisory 2022-13
RHSA-2022:1283
RHSA-2022:1284
RHSA-2022:1285
RHSA-2022:1286
RHSA-2022:1287
RHSA-2022:1301
RHSA-2022:1302
RHSA-2022:1303
RHSA-2022:1305
RHSA-2022:1326
SMASH Issue 327815
bnc#1197903
jsc#CAR-1667
rh#2072559
rh#2072560
rh#2072561
rh#2072562
rh#2072563
rh#2072564
rh#2072565
rh#2072566
rh#2072963
xf#223379
CVE-2022-28289mozilla-nss:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:github.com:CVE-2022-24713
CVE-2022-1097
CVE-2022-1196
CVE-2022-1197
CVE-2022-24713
CVE-2022-28281
CVE-2022-28282
CVE-2022-28283
CVE-2022-28284
CVE-2022-28285
CVE-2022-28286
CVE-2022-28287
CVE-2022-28288
CVE-2022-28289
D:CVE-2022-24713
DSA-5113
DSA-5118
FEDORA:FEDORA-2022-8436ac4c39
FEDORA:FEDORA-2022-ceb3e03c5e
FEDORA:FEDORA-2022-d20d44ba98
GLSA-202208-08
GLSA-202208-14
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:github.com:CVE-2022-24713
MISC:groups.google.com:CVE-2022-24713
MISC:www.mozilla.org:/security/advisories/mfsa2022-13/
MISC:www.mozilla.org:/security/advisories/mfsa2022-14/
MISC:www.mozilla.org:/security/advisories/mfsa2022-15/
MLIST:[debian-lts-announce] 20220407 [SECURITY] [DLA 2971-1] firefox-esr security update
MLIST:[debian-lts-announce] 20220411 [SECURITY] [DLA 2978-1] thunderbird security update
Mozilla Foundation Security Advisory 2022-13
RHSA-2022:1283
RHSA-2022:1284
RHSA-2022:1285
RHSA-2022:1286
RHSA-2022:1287
RHSA-2022:1301
RHSA-2022:1302
RHSA-2022:1303
RHSA-2022:1305
RHSA-2022:1326
SMASH Issue 327815
bnc#1197903
jsc#CAR-1667
rh#2072559
rh#2072560
rh#2072561
rh#2072562
rh#2072563
rh#2072564
rh#2072565
rh#2072566
rh#2072963
xf#223379
CVE-2022-28321pam:Already fixedcritical ()CVE-2022-28321
D:CVE-2022-28321
MISC:download.opensuse.org:CVE-2022-28321
MISC:www.suse.com:CVE-2022-28321
SMASH Issue 331760
bnc#1197654
rh#2175261
CVE-2022-28348kernel-source-rt:Not affectedcritical ()CONFIRM:developer.arm.com:CVE-2022-28350
CVE-2022-28348
D:CVE-2022-28348
MISC:developer.arm.com:CVE-2021-28664
SMASH Issue 332375
bnc#1199720
CVE-2022-28349kernel-source-rt:Not affectedcritical ()CONFIRM:developer.arm.com:CVE-2022-28350
CVE-2022-28349
D:CVE-2022-28349
MISC:developer.arm.com:CVE-2021-28664
SMASH Issue 332374
bnc#1199761
CVE-2022-28350kernel-source-rt:Not affectedcritical ()CONFIRM:developer.arm.com:CVE-2022-28350
CVE-2022-28350
D:CVE-2022-28350
MISC:developer.arm.com:CVE-2021-28664
SMASH Issue 332373
bnc#1199762
CVE-2022-28356kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2022-28796
CVE-2022-28356
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-28356
D:CVE-2022-32296
DSA-5127
DSA-5161
DSA-5173
DSA-5184
L3:66496
L3:67104
MISC:anatomic.rip:OSS:2024/Q2/172
MISC:blog.exodusintel.com:OSS:2024/Q2/172
MISC:cdn.kernel.org:CVE-2022-28356
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:git.kernel.org:OSS:2022/Q2/9
MISC:git.kernel.org:OSS:2024/Q2/172
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:CVE-2022-28356
MISC:github.com:OSS:2022/04/02/2
MISC:github.com:OSS:2022/Q3/101
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:ruia-ruia.github.io:OSS:2022/Q3/101
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/04/06/1
OSS:2022/04/22/3
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q2/9
OSS:2022/Q3/101
OSS:2022/Q3/141
OSS:2024/04/24/3
OSS:2024/Q2/172
Oracle:CVE-2022-21123
SMASH Issue 326949
SMASH Issue 327961
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1197390
bnc#1197391
https://bugs.chromium.org/p/project-zero/issues/detail?id=2504
jsc#CAR-1662
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2078456
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-28388kernel-source-rt:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:security.netapp.com:CVE-2022-28390
CVE-2022-28388
D:CVE-2022-32296
DSA-5127
DSA-5161
DSA-5173
DSA-5184
FEDORA:FEDORA-2022-5cd9d787dc
FEDORA:FEDORA-2022-91633399ff
FEDORA:FEDORA-2022-af492757d9
MISC:anatomic.rip:OSS:2024/Q2/172
MISC:blog.exodusintel.com:OSS:2024/Q2/172
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:git.kernel.org:OSS:2024/Q2/172
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:CVE-2022-28388
MISC:github.com:OSS:2022/04/02/2
MISC:github.com:OSS:2022/Q3/101
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:ruia-ruia.github.io:OSS:2022/Q3/101
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/04/22/3
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/101
OSS:2022/Q3/141
OSS:2024/04/24/3
OSS:2024/Q2/172
Oracle:CVE-2022-21123
RHSA-2023:2148
RHSA-2023:2458
SMASH Issue 327988
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1198032
https://bugs.chromium.org/p/project-zero/issues/detail?id=2504
jsc#CAR-1643
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2070694
rh#2071047
rh#2073064
rh#2073091
rh#2074208
rh#2074441
rh#2078456
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-28389kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-28390
CVE-2022-28389
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5127
DSA-5161
DSA-5173
DSA-5184
FEDORA:FEDORA-2022-5cd9d787dc
FEDORA:FEDORA-2022-91633399ff
FEDORA:FEDORA-2022-af492757d9
MISC:anatomic.rip:OSS:2024/Q2/172
MISC:blog.exodusintel.com:OSS:2024/Q2/172
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:git.kernel.org:OSS:2024/Q2/172
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:CVE-2022-28389
MISC:github.com:OSS:2022/04/02/2
MISC:github.com:OSS:2022/Q3/101
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:ruia-ruia.github.io:OSS:2022/Q3/101
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/04/22/3
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/101
OSS:2022/Q3/141
OSS:2024/04/24/3
OSS:2024/Q2/172
Oracle:CVE-2022-21123
SMASH Issue 327987
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1198033
bnc#1201657
https://bugs.chromium.org/p/project-zero/issues/detail?id=2504
jsc#CAR-1642
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2073086
rh#2074208
rh#2074441
rh#2078456
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-28390kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-28390
CVE-2022-28390
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5127
DSA-5161
DSA-5173
DSA-5184
FEDORA:FEDORA-2022-5cd9d787dc
FEDORA:FEDORA-2022-91633399ff
FEDORA:FEDORA-2022-af492757d9
L3:65157
MISC:anatomic.rip:OSS:2024/Q2/172
MISC:blog.exodusintel.com:OSS:2024/Q2/172
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:git.kernel.org:OSS:2024/Q2/172
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:CVE-2022-28390
MISC:github.com:OSS:2022/04/02/2
MISC:github.com:OSS:2022/Q3/101
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:ruia-ruia.github.io:OSS:2022/Q3/101
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/04/22/3
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/101
OSS:2022/Q3/141
OSS:2024/04/24/3
OSS:2024/Q2/172
Oracle:CVE-2022-21123
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 327986
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1198031
bnc#1201517
https://bugs.chromium.org/p/project-zero/issues/detail?id=2504
jsc#CAR-1644
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2078456
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-28391busybox:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2022-28391
L3:63232
MISC:git.alpinelinux.org:CVE-2022-28391
MISC:gitlab.alpinelinux.org:CVE-2022-28391
SMASH Issue 327985
bnc#1198092
bnc#1199106
jsc#CAR-1648
rh#2080958
CVE-2022-2845vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2845
CVE-2022-2845
D:CVE-2022-2845
FEDORA:FEDORA-2022-3b33d04743
FEDORA:FEDORA-2022-b9edf60581
L3:64287
MISC:github.com:CVE-2022-2845
SMASH Issue 340113
bnc#1202515
bnc#1204083
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C72HDIMR3KTTAO7QGTXWUMPBNFUFIBRD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1972
rh#2119844
CVE-2022-2849vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2849
CVE-2022-2849
FEDORA:FEDORA-2022-b9edf60581
L3:64287
MISC:github.com:CVE-2022-2849
SMASH Issue 340140
bnc#1202512
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1971
rh#2122137
CVE-2022-2862vim:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-2862
CVE-2022-2862
FEDORA:FEDORA-2022-b9edf60581
MISC:github.com:CVE-2022-2862
SMASH Issue 340136
bnc#1202511
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1970
rh#2122139
CVE-2022-28693kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-28693
RHSA-2022:7110
RHSA-2022:7134
RHSA-2022:7337
RHSA-2022:7338
RHSA-2022:7933
RHSA-2022:8267
RHSA-2022:8973
RHSA-2022:8974
SMASH Issue 337169
SMASH Issue 337170
bnc#1201455
rh#2107465
CVE-2022-2873kernel-source-rt:Not affectedmoderate4.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230120-0001/
CVE-2022-2873
DSA-5324
MISC:lore.kernel.org:CVE-2022-2873
RHSA-2023:0832
RHSA-2023:0854
RHSA-2023:0951
RHSA-2023:0979
RHSA-2023:5627
SMASH Issue 340163
bnc#1202558
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
rh#2119048
CVE-2022-28737binutils:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2022-28737
D:CVE-2022-28737
L3:64532
L3:64533
L3:64726
L3:65878
L3:65882
L3:65890
MISC:lists.gnu.org:OSS:2022/06/07/5
OSS:2022/06/07/5
RHSA-2022:5095
RHSA-2022:5096
RHSA-2022:5098
RHSA-2022:5099
RHSA-2022:5100
SMASH Issue 328973
SMASH Issue 328974
bnc#1198458
bnc#1211494
bnc#1211498
bnc#1211510
rh#2090899
CVE-2022-2874vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2874
CVE-2022-2874
MISC:github.com:CVE-2022-2874
SMASH Issue 340196
bnc#1202552
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1974
rh#2193207
CVE-2022-28748kernel-source-rt:Releasedlow3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2022-28748
SMASH Issue 323937
SMASH Issue 328344
bnc#1196018
jsc#CAR-1663
CVE-2022-28796kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-28796
CVE-2022-28796
D:CVE-2022-28796
MISC:cdn.kernel.org:CVE-2022-28356
MISC:github.com:CVE-2022-28796
SMASH Issue 328443
bnc#1198325
bnc#1198594
rh#2073941
CVE-2022-28805lua53:Not affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L)CVE-2022-28805
D:CVE-2022-28805
FEDORA:FEDORA-2022-5b5889f43a
FEDORA:FEDORA-2022-b9ed35a7ad
MISC:github.com:CVE-2022-28805
MISC:lua-users.org:CVE-2022-28805
RHSA-2023:2582
SMASH Issue 328442
bnc#1198328
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RJNJ66IFDUKWJJZXHGOLRGIA3HWWC36R/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHYZOEFDVLVAD6EEP4CDW6DNONIVVHPA/
https://security.gentoo.org/glsa/202305-23
jsc#CAR-1675
rh#2073884
CVE-2022-2889vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-2889
CVE-2022-2889
D:CVE-2022-2889
FEDORA:FEDORA-2022-3b33d04743
MISC:github.com:CVE-2022-2889
SMASH Issue 340320
bnc#1202599
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1978
rh#2119864
CVE-2022-28893kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2022-28893
CVE-2022-28893
D:CVE-2022-28893
DSA-5161
MISC:git.kernel.org:CVE-2022-28893
MISC:git.kernel.org:CVE-2022-32250
MISC:github.com:OSS:2022/04/11/5
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.debian.org:CVE-2022-32250
OSS:2022/04/11/3
OSS:2022/04/11/4
OSS:2022/04/11/5
OSS:2022/05/31/1
OSS:2022/08/25/1
OSS:2022/09/02/9
OSS:2022/Q2/29
OSS:2022/Q3/141
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 328557
SMASH Issue 328558
ZDI-23-1834
bnc#1198330
jsc#CAR-1676
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#2039448
rh#2058395
rh#2064604
rh#2074208
rh#2084183
rh#2086753
rh#2089815
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2104423
CVE-2022-2905kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2022-2905
MISC:lore.kernel.org:CVE-2022-2905
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/Q3/148
SMASH Issue 340932
bnc#1202564
bnc#1202860
jsc#CAR-1997
rh#2121800
CVE-2022-29154rsync:Releasedimportant8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2022-29154
D:CVE-2022-29154
FEDORA:FEDORA-2022-15da0cf165
FEDORA:FEDORA-2022-25e4dbedf9
L3:64035
L3:64047
L3:64136
L3:64217
L3:64299
L3:64539
L3:64848
MISC:github.com:CVE-2022-29154
MISC:github.com:OSS:2022/08/02/1
OSS:2022/08/02/1
OSS:2022/Q3/77
RHSA-2022:6170
RHSA-2022:6171
RHSA-2022:6172
RHSA-2022:6173
RHSA-2022:6180
RHSA-2022:6181
RHSA-2022:6551
SMASH Issue 338112
SMASH Issue 338113
bnc#1201840
jsc#CAR-1949
rh#1666127
rh#2110928
CVE-2022-29156kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-29156
CVE-2022-29156
D:CVE-2022-29156
MISC:cdn.kernel.org:CVE-2022-27223
MISC:github.com:CVE-2022-29156
SMASH Issue 328982
bnc#1198515
rh#2075431
CVE-2022-2923vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2923
CVE-2022-2923
D:CVE-2022-2923
FEDORA:FEDORA-2022-3b33d04743
MISC:github.com:CVE-2022-2923
SMASH Issue 340393
bnc#1202687
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1982
rh#2120989
CVE-2022-2928dhcp:Releasedmoderate6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:kb.isc.org:CVE-2022-2928
CVE-2022-2928
D:CVE-2022-2928
D:CVE-2022-2929
DSA-5251
FEDORA:FEDORA-2022-9ca9a94e28
FEDORA:FEDORA-2022-c4f274a54f
FEDORA:FEDORA-2022-f5a45757df
MLIST:[debian-lts-announce] 20221010 [SECURITY] [DLA 3146-1] isc-dhcp security update
OSS:2022/Q4/6
RHSA-2023:2502
RHSA-2023:3000
SMASH Issue 344215
SMASH Issue 344216
bdo#1021320
bnc#1203988
https://security.gentoo.org/glsa/202305-22
jsc#CAR-2083
rh#2132001
rh#2132002
CVE-2022-2929dhcp:Releasedmoderate6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:kb.isc.org:CVE-2022-2929
CVE-2022-2929
D:CVE-2022-2928
D:CVE-2022-2929
DSA-5251
FEDORA:FEDORA-2022-9ca9a94e28
FEDORA:FEDORA-2022-c4f274a54f
FEDORA:FEDORA-2022-f5a45757df
MLIST:[debian-lts-announce] 20221010 [SECURITY] [DLA 3146-1] isc-dhcp security update
OSS:2022/Q4/6
RHSA-2023:2502
RHSA-2023:3000
SMASH Issue 344217
SMASH Issue 344218
bdo#1021320
bnc#1203989
https://security.gentoo.org/glsa/202305-22
jsc#CAR-2084
rh#2132001
rh#2132002
CVE-2022-2938kernel-source-rt:Already fixedmoderate6.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20221223-0002/
CVE-2022-2938
MISC:git.kernel.org:CVE-2022-2938
RHSA-2022:7444
RHSA-2022:7683
SMASH Issue 340387
bnc#1202623
jsc#CAR-1994
rh#2120175
CVE-2022-29458ncurses:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-29458
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
MISC:lists.gnu.org:CVE-2022-29458
MLIST:[debian-lts-announce] 20221029 [SECURITY] [DLA 3167-1] ncurses security update
SMASH Issue 329442
bnc#1198627
jsc#CAR-1692
rh#2076483
CVE-2022-2946vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-2946
CVE-2022-2946
D:CVE-2022-2946
FEDORA:FEDORA-2022-3b33d04743
MISC:github.com:CVE-2022-2946
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 340574
bnc#1202689
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1983
rh#2120993
CVE-2022-29581kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-29581
CVE-2022-29581
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
L3:64602
MISC:git.kernel.org:CVE-2022-29581
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:kernel.dance:CVE-2022-29581
MISC:packetstormsecurity.com:CVE-2022-29581
MISC:packetstormsecurity.com:CVE-2022-34918
MISC:research.nccgroup.com:OSS:2022/09/02/9
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/18/2
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q2/118
OSS:2022/Q3/141
Oracle:CVE-2022-21123
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 332127
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1199665
bnc#1199695
jsc#CAR-1784
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-29582kernel-source-rt:Not affectedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2022-29582
DSA-5127
MISC:anatomic.rip:OSS:2024/Q2/172
MISC:blog.exodusintel.com:OSS:2024/Q2/172
MISC:cdn.kernel.org:CVE-2022-29582
MISC:git.kernel.org:CVE-2022-29582
MISC:git.kernel.org:OSS:2024/Q2/172
MISC:github.com:CVE-2022-29582
MISC:github.com:OSS:2022/Q3/101
MISC:ruia-ruia.github.io:OSS:2022/Q3/101
OSS:2022/04/22/3
OSS:2022/04/22/4
OSS:2022/08/08/3
OSS:2022/Q2/54
OSS:2022/Q3/101
OSS:2024/04/24/3
OSS:2024/Q2/172
SMASH Issue 329921
bnc#1198287
bnc#1198811
bnc#1199750
https://bugs.chromium.org/p/project-zero/issues/detail?id=2504
rh#2056381
rh#2061633
rh#2066706
rh#2066819
rh#2073064
rh#2074441
rh#2078456
CVE-2022-2959kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-2959
L3:64716
L3:64743
MISC:github.com:CVE-2022-2959
MISC:www.zerodayinitiative.com:CVE-2022-2959
RHSA-2022:8973
RHSA-2022:8974
RHSA-2022:9082
RHSA-2023:0300
RHSA-2023:0334
RHSA-2023:0348
SMASH Issue 340559
ZDI-22-1165
bnc#1202681
bnc#1202685
https://security.netapp.com/advisory/ntap-20230214-0005/
rh#2103681
CVE-2022-2961kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H)CVE-2022-2961
MISC:access.redhat.com:CVE-2022-2961
SMASH Issue 340532
bnc#1202660
https://security.netapp.com/advisory/ntap-20230214-0004/
rh#2120595
CVE-2022-2964kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230113-0001/
CVE-2022-2964
L3:64716
L3:64743
L3:64933
L3:65176
RHSA-2023:0101
RHSA-2023:0114
RHSA-2023:0123
RHSA-2023:0300
RHSA-2023:0334
RHSA-2023:0348
RHSA-2023:0392
RHSA-2023:0395
RHSA-2023:0396
RHSA-2023:0399
RHSA-2023:0400
RHSA-2023:0404
RHSA-2023:0496
RHSA-2023:0499
RHSA-2023:0512
RHSA-2023:0526
RHSA-2023:0531
RHSA-2023:0536
RHSA-2023:0856
RHSA-2023:0858
RHSA-2023:1130
RHSA-2023:1192
SMASH Issue 340540
bnc#1202686
bnc#1203008
rh#2067482
CVE-2022-2977kernel-source-rt:Releasedmoderate4.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H)CVE-2022-2977
MISC:git.kernel.org:CVE-2022-2977
SMASH Issue 340602
bnc#1202672
https://security.netapp.com/advisory/ntap-20230214-0006/
jsc#CAR-1979
rh#2120146
CVE-2022-2978kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-2978
L3:64459
L3:64525
L3:64549
L3:64716
L3:64743
MISC:lore.kernel.org:CVE-2022-2978
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
SMASH Issue 340617
bnc#1202700
bnc#1204745
jsc#CAR-1995
rh#2120664
CVE-2022-2980vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2980
CVE-2022-2980
FEDORA:FEDORA-2022-b9edf60581
MISC:github.com:CVE-2022-2980
SMASH Issue 340858
bnc#1203155
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2012
rh#2123709
CVE-2022-2982vim:Releasedmoderate3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-2982
CVE-2022-2982
FEDORA:FEDORA-2022-b9edf60581
MISC:github.com:CVE-2022-2982
SMASH Issue 340857
bnc#1203152
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2013
rh#2123714
CVE-2022-29824libxml2:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-29824
CVE-2022-29824
D:CVE-2022-29824
DSA-5142
FEDORA:FEDORA-2022-9136d646e4
FEDORA:FEDORA-2022-be6d83642a
FEDORA:FEDORA-2022-f624aad735
GLSA-202210-03
L3:64015
L3:64301
L3:64305
L3:64536
MISC:gitlab.gnome.org:CVE-2022-29824
MISC:packetstormsecurity.com:CVE-2022-29824
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20220516 [SECURITY] [DLA 3012-1] libxml2 security update
Oracle:CVE-2022-29824
RHSA-2022:5250
RHSA-2022:5317
RHSA-2022:8841
SMASH Issue 330532
SMASH Issue 330533
bdo#1010526
bnc#1199132
jsc#CAR-1736
rh#2082158
CVE-2022-29900kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CONFIRM:comsec.ethz.ch:CVE-2022-29901
CONFIRM:security.netapp.com:CVE-2022-29901
CONFIRM:www.intel.com:CVE-2022-29901
CONFIRM:xenbits.xen.org:CVE-2022-29900
CVE-2022-29900
CVE-2022-29901
D:CVE-2022-26373
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5184
DSA-5207
FEDORA:FEDORA-2022-3e6ce58029
FEDORA:FEDORA-2022-8aab5b5cde
FEDORA:FEDORA-2022-a0d7a5eaf2
FEDORA:FEDORA-2022-c69ef9c1dd
L3:65147
MISC:www.amd.com:CVE-2022-23825
MISC:www.intel.com:OSS:2022/07/12/2
MLIST:[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
OSS:2022/07/12/2
OSS:2022/07/12/4
OSS:2022/07/12/5
OSS:2022/07/13/1
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/11/08/1
OSS:2022/11/10/2
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
OSS:2022/Q3/44
Oracle:CVE-2022-21123
RHSA-2022:7110
RHSA-2022:7134
RHSA-2022:7337
RHSA-2022:7338
RHSA-2022:7933
RHSA-2022:8267
RHSA-2022:8973
RHSA-2022:8974
SMASH Issue 332271
SMASH Issue 332272
ZDI-22-1117
ZDI-22-1118
bnc#1199657
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/
https://security.gentoo.org/glsa/202402-07
https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/
jsc#CAR-1894
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
rh#2090226
rh#2090237
rh#2090240
rh#2090241
rh#2103148
rh#2103153
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119855
CVE-2022-29901kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CONFIRM:comsec.ethz.ch:CVE-2022-29901
CONFIRM:security.netapp.com:CVE-2022-29901
CONFIRM:www.intel.com:CVE-2022-29901
CONFIRM:xenbits.xen.org:CVE-2022-29900
CVE-2022-29900
CVE-2022-29901
D:CVE-2022-26373
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5184
DSA-5207
FEDORA:FEDORA-2022-3e6ce58029
FEDORA:FEDORA-2022-8aab5b5cde
FEDORA:FEDORA-2022-a0d7a5eaf2
FEDORA:FEDORA-2022-c69ef9c1dd
L3:65147
MISC:www.amd.com:CVE-2022-23825
MISC:www.intel.com:OSS:2022/07/12/2
MLIST:[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
OSS:2022/07/12/2
OSS:2022/07/12/4
OSS:2022/07/12/5
OSS:2022/07/13/1
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/11/08/1
OSS:2022/11/10/2
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
OSS:2022/Q3/44
Oracle:CVE-2022-21123
RHSA-2022:7110
RHSA-2022:7134
RHSA-2022:7337
RHSA-2022:7338
RHSA-2022:7933
RHSA-2022:8267
RHSA-2022:8973
RHSA-2022:8974
SMASH Issue 332271
SMASH Issue 335849
ZDI-22-1117
ZDI-22-1118
bnc#1199657
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D4RW5FCIYFNCQOEFJEUIRW3DGYW7CWBG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M27MB3QFNIJV4EQQSXWARHP3OGX6CR6K/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYI3OMJ7RIZNL3C6GUWNANNPEUUID6FM/
https://security.gentoo.org/glsa/202402-07
https://www.secpod.com/blog/retbleed-intel-and-amd-processor-information-disclosure-vulnerability/
jsc#CAR-1894
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
rh#2090226
rh#2090237
rh#2090240
rh#2090241
rh#2103148
rh#2103153
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119855
CVE-2022-2991kernel-source-rt:Releasedimportant8.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)CVE-2022-2991
L3:64310
L3:64716
L3:64743
L3:65879
MISC:git.kernel.org:CVE-2022-2991
MISC:www.zerodayinitiative.com:CVE-2022-2991
SMASH Issue 336733
SMASH Issue 340678
ZDI-22-961
bnc#1201420
bnc#1202799
bnc#1203993
jsc#CAR-1893
rh#2107066
CVE-2022-29968kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-29968
CVE-2022-29968
D:CVE-2022-29968
FEDORA:FEDORA-2022-a0f65397a3
FEDORA:FEDORA-2022-e9378a3573
FEDORA:FEDORA-2022-fd85148be2
MISC:github.com:CVE-2022-29968
SMASH Issue 330430
bnc#1199087
rh#2080940
CVE-2022-30065busybox:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-333517.pdf
CVE-2022-30065
MISC:bugs.busybox.net:CVE-2022-30065
SMASH Issue 332353
bnc#1199744
jsc#CAR-1969
rh#2088233
CVE-2022-30115curl:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-30115
CVE-2022-30115
CVE-2022-42916
CVE-2022-43551
GLSA-202212-01
MISC:curl.se:OSS:2022/Q2/97
MISC:github.com:OSS:2022/10/26/4
MISC:github.com:OSS:2022/12/21/1
MISC:hackerone.com:CVE-2022-30115
OSS:2022/10/26/4
OSS:2022/12/21/1
OSS:2022/Q2/97
SMASH Issue 330792
SMASH Issue 330793
bnc#1199225
rh#2082223
CVE-2022-3016vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-3016
CVE-2022-3016
D:CVE-2022-3016
FEDORA:FEDORA-2022-b9edf60581
MISC:github.com:CVE-2022-3016
SMASH Issue 340968
bnc#1202862
https://security.gentoo.org/glsa/202305-16
jsc#CAR-1998
rh#2124208
CVE-2022-3028kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-3028
D:CVE-2022-3028
FEDORA:FEDORA-2022-35c14ba5bb
FEDORA:FEDORA-2022-6835ddb6d8
FEDORA:FEDORA-2022-ccb0138bb6
L3:66052
MISC:github.com:CVE-2022-3028
MISC:lore.kernel.org:CVE-2022-3028
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
Oracle:CVE-2022-3028
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 341035
bnc#1202898
https://security.netapp.com/advisory/ntap-20230214-0004/
jsc#CAR-2003
rh#2122228
CVE-2022-3037vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-3037
CVE-2022-3037
FEDORA:FEDORA-2022-221bd89404
FEDORA:FEDORA-2022-35d9bdb7dc
FEDORA:FEDORA-2022-b9edf60581
MISC:github.com:CVE-2022-3037
SMASH Issue 341171
bnc#1202962
jsc#CAR-2002
rh#2122907
CVE-2022-30594kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-30594
CVE-2022-30594
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-30594
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
L3:64302
L3:64306
L3:67233
MISC:bugs.chromium.org:CVE-2022-30594
MISC:cdn.kernel.org:CVE-2022-30594
MISC:git.kernel.org:CVE-2022-30594
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:CVE-2022-30594
MISC:github.com:OSS:2022/04/02/2
MISC:packetstormsecurity.com:/files/170362/Linux-PT_SUSPEND_SECCOMP-Permission-Bypass-Ptracer-Death-Race.html
MISC:packetstormsecurity.com:CVE-2022-29581
MISC:research.nccgroup.com:OSS:2022/09/02/9
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/141
Oracle:CVE-2022-21123
RHSA-2022:7318
RHSA-2022:7319
RHSA-2023:0300
RHSA-2023:0334
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 331596
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1199505
bnc#1199602
bnc#1204122
jsc#CAR-1761
linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb
linux.git:commit:33172ab50a53578a95691310f49567c9266968b0
linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827
linux.git:commit:42baefac638f06314298087394b982ead9ec444b
linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd
linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d
linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638
linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888
linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809
linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066799
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084125
rh#2084183
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-3061kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3061
DSA-5257
MISC:git.kernel.org:CVE-2022-3061
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/Q4/30
SMASH Issue 341123
ZDI-22-1462
bnc#1202913
jsc#CAR-1999
linux.git:commit:04e5eac8f3ab2ff52fa191c187a46d4fdbc1e288
linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f
linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc
linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f
linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f
linux.git:commit:e421946be7d9bf545147bea8419ef8239cb7ca52
linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6
rh#2122526
rh#2123056
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2139586
rh#2139598
CVE-2022-3077kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)CVE-2022-3077
MISC:github.com:CVE-2022-3077
RHSA-2023:0300
RHSA-2023:0334
SMASH Issue 341338
bnc#1203040
rh#2123309
CVE-2022-3078kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2022-3078
MISC:git.kernel.org:CVE-2022-3078
SMASH Issue 341339
bnc#1203041
rh#2123310
CVE-2022-3099vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-3099
CVE-2022-3099
D:CVE-2022-3099
FEDORA:FEDORA-2022-3f5099bcc9
FEDORA:FEDORA-2022-b9edf60581
FEDORA:FEDORA-2022-c28b637883
MISC:github.com:CVE-2022-3099
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 341478
bnc#1203110
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2010
rh#2124157
CVE-2022-3103kernel-source-rt:Not affectedimportant ()CVE-2022-3103
MISC:github.com:CVE-2022-3103
SMASH Issue 343596
bnc#1203801
rh#2130189
CVE-2022-3104kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3104
D:CVE-2022-3104
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
SMASH Issue 350613
bnc#1206396
rh#2153062
CVE-2022-3105kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3105
D:CVE-2022-3105
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 350615
bnc#1206398
rh#2153067
CVE-2022-3106kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3106
D:CVE-2022-3106
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 350614
bnc#1206397
rh#2153066
CVE-2022-3107kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3107
D:CVE-2022-3107
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 350612
bnc#1206395
rh#2153060
CVE-2022-3108kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3108
D:CVE-2022-3108
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
RHSA-2022:1975
RHSA-2022:1988
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 350606
bnc#1206389
rh#2153052
CVE-2022-3110kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3110
D:CVE-2022-3110
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
SMASH Issue 350609
bnc#1206392
rh#2153055
CVE-2022-3111kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3111
D:CVE-2022-3111
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
SMASH Issue 350611
bnc#1206394
rh#2153059
CVE-2022-3112kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3112
D:CVE-2022-3112
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
SMASH Issue 350616
bnc#1206399
jsc#CAR-2250
rh#2153068
CVE-2022-3113kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3113
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
SMASH Issue 350607
bnc#1206390
linux.git:commit:53dbe08504442dc7ba4865c09b3bbf5fe849681b
rh#2153053
CVE-2022-3114kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3114
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
SMASH Issue 350608
bnc#1206391
rh#2153054
CVE-2022-3115kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3115
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
SMASH Issue 350610
bnc#1206393
rh#2153058
CVE-2022-31252permissions:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-31252
SMASH Issue 341328
SMASH Issue 341329
bnc#1203018
jsc#CAR-2053
CVE-2022-3134vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-3134
CVE-2022-3134
MISC:github.com:CVE-2022-3134
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 341690
bnc#1203194
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2019
rh#2126085
CVE-2022-3153vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:huntr.dev:CVE-2022-3153
CVE-2022-3153
MISC:github.com:CVE-2022-3153
SMASH Issue 341919
bnc#1203272
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2024
rh#2126401
CVE-2022-3169kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3169
MISC:bugzilla.kernel.org:CVE-2022-3169
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
SMASH Issue 341955
bnc#1203290
jsc#CAR-2027
rh#2125341
CVE-2022-3170kernel-source-rt:Not affectedimportant ()CVE-2022-3170
MISC:github.com:CVE-2022-3170
SMASH Issue 342091
bnc#1203321
rh#2125879
CVE-2022-3171protobuf:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:github.com:CVE-2022-3171
CVE-2022-3171
D:CVE-2022-3171
FEDORA:FEDORA-2022-25f35ed634
GLSA-202301-09
Oracle:CVE-2022-3171
Oracle:CVE-2022-3510
RHSA-2022:7896
RHSA-2022:9023
RHSA-2023:1006
RHSA-2023:4983
SMASH Issue 344939
bnc#1204256
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPCGUT3T5L6C3IDWUPSUO22QDCGQKTOP/
jsc#CAR-2106
rh#2137645
rh#2184161
rh#2184176
CVE-2022-31736mozilla-nss:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2022-1919
CVE-2022-31736
CVE-2022-31737
CVE-2022-31738
CVE-2022-31739
CVE-2022-31740
CVE-2022-31742
CVE-2022-31743
CVE-2022-31744
CVE-2022-31745
CVE-2022-31747
CVE-2022-31748
D:CVE-2022-1919
DSA-5156
DSA-5158
DSA-5172
DSA-5175
GLSA-202208-08
Google Chrome Releases Web site
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:crbug.com:CVE-2022-1919
MISC:www.mozilla.org:/security/advisories/mfsa2022-20/
MISC:www.mozilla.org:/security/advisories/mfsa2022-21/
MISC:www.mozilla.org:/security/advisories/mfsa2022-22/
MISC:www.mozilla.org:/security/advisories/mfsa2022-25/
MISC:www.mozilla.org:/security/advisories/mfsa2022-26/
RHSA-2022:4870
RHSA-2022:4871
RHSA-2022:4872
RHSA-2022:4873
RHSA-2022:4875
RHSA-2022:4876
RHSA-2022:4887
RHSA-2022:4888
RHSA-2022:4889
RHSA-2022:4890
RHSA-2022:4891
RHSA-2022:4892
RHSA-2022:5469
RHSA-2022:5470
RHSA-2022:5472
RHSA-2022:5473
RHSA-2022:5474
RHSA-2022:5475
RHSA-2022:5477
RHSA-2022:5478
RHSA-2022:5479
RHSA-2022:5480
RHSA-2022:5481
RHSA-2022:5482
SMASH Issue 333185
bnc#1200027
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/
rh#2092018
rh#2092019
rh#2092021
rh#2092022
rh#2092023
rh#2092024
rh#2092025
rh#2092026
rh#2092416
rh#2102165
CVE-2022-31737mozilla-nss:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2022-1919
CVE-2022-31736
CVE-2022-31737
CVE-2022-31738
CVE-2022-31739
CVE-2022-31740
CVE-2022-31742
CVE-2022-31743
CVE-2022-31744
CVE-2022-31745
CVE-2022-31747
CVE-2022-31748
D:CVE-2022-1919
DSA-5156
DSA-5158
DSA-5172
DSA-5175
GLSA-202208-08
Google Chrome Releases Web site
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:crbug.com:CVE-2022-1919
MISC:www.mozilla.org:/security/advisories/mfsa2022-20/
MISC:www.mozilla.org:/security/advisories/mfsa2022-21/
MISC:www.mozilla.org:/security/advisories/mfsa2022-22/
MISC:www.mozilla.org:/security/advisories/mfsa2022-25/
MISC:www.mozilla.org:/security/advisories/mfsa2022-26/
RHSA-2022:4870
RHSA-2022:4871
RHSA-2022:4872
RHSA-2022:4873
RHSA-2022:4875
RHSA-2022:4876
RHSA-2022:4887
RHSA-2022:4888
RHSA-2022:4889
RHSA-2022:4890
RHSA-2022:4891
RHSA-2022:4892
RHSA-2022:5469
RHSA-2022:5470
RHSA-2022:5472
RHSA-2022:5473
RHSA-2022:5474
RHSA-2022:5475
RHSA-2022:5477
RHSA-2022:5478
RHSA-2022:5479
RHSA-2022:5480
RHSA-2022:5481
RHSA-2022:5482
SMASH Issue 333185
bnc#1200027
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/
rh#2092018
rh#2092019
rh#2092021
rh#2092022
rh#2092023
rh#2092024
rh#2092025
rh#2092026
rh#2092416
rh#2102165
CVE-2022-31738mozilla-nss:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2022-1919
CVE-2022-31736
CVE-2022-31737
CVE-2022-31738
CVE-2022-31739
CVE-2022-31740
CVE-2022-31742
CVE-2022-31743
CVE-2022-31744
CVE-2022-31745
CVE-2022-31747
CVE-2022-31748
D:CVE-2022-1919
DSA-5156
DSA-5158
DSA-5172
DSA-5175
GLSA-202208-08
Google Chrome Releases Web site
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:crbug.com:CVE-2022-1919
MISC:www.mozilla.org:/security/advisories/mfsa2022-20/
MISC:www.mozilla.org:/security/advisories/mfsa2022-21/
MISC:www.mozilla.org:/security/advisories/mfsa2022-22/
MISC:www.mozilla.org:/security/advisories/mfsa2022-25/
MISC:www.mozilla.org:/security/advisories/mfsa2022-26/
RHSA-2022:4870
RHSA-2022:4871
RHSA-2022:4872
RHSA-2022:4873
RHSA-2022:4875
RHSA-2022:4876
RHSA-2022:4887
RHSA-2022:4888
RHSA-2022:4889
RHSA-2022:4890
RHSA-2022:4891
RHSA-2022:4892
RHSA-2022:5469
RHSA-2022:5470
RHSA-2022:5472
RHSA-2022:5473
RHSA-2022:5474
RHSA-2022:5475
RHSA-2022:5477
RHSA-2022:5478
RHSA-2022:5479
RHSA-2022:5480
RHSA-2022:5481
RHSA-2022:5482
SMASH Issue 333185
bnc#1200027
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/
rh#2092018
rh#2092019
rh#2092021
rh#2092022
rh#2092023
rh#2092024
rh#2092025
rh#2092026
rh#2092416
rh#2102165
CVE-2022-31739mozilla-nss:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2022-1919
CVE-2022-31736
CVE-2022-31737
CVE-2022-31738
CVE-2022-31739
CVE-2022-31740
CVE-2022-31742
CVE-2022-31743
CVE-2022-31744
CVE-2022-31745
CVE-2022-31747
CVE-2022-31748
D:CVE-2022-1919
DSA-5156
DSA-5158
DSA-5172
DSA-5175
GLSA-202208-08
Google Chrome Releases Web site
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:crbug.com:CVE-2022-1919
MISC:www.mozilla.org:/security/advisories/mfsa2022-20/
MISC:www.mozilla.org:/security/advisories/mfsa2022-21/
MISC:www.mozilla.org:/security/advisories/mfsa2022-22/
MISC:www.mozilla.org:/security/advisories/mfsa2022-25/
MISC:www.mozilla.org:/security/advisories/mfsa2022-26/
RHSA-2022:4870
RHSA-2022:4871
RHSA-2022:4872
RHSA-2022:4873
RHSA-2022:4875
RHSA-2022:4876
RHSA-2022:4887
RHSA-2022:4888
RHSA-2022:4889
RHSA-2022:4890
RHSA-2022:4891
RHSA-2022:4892
RHSA-2022:5469
RHSA-2022:5470
RHSA-2022:5472
RHSA-2022:5473
RHSA-2022:5474
RHSA-2022:5475
RHSA-2022:5477
RHSA-2022:5478
RHSA-2022:5479
RHSA-2022:5480
RHSA-2022:5481
RHSA-2022:5482
SMASH Issue 333185
bnc#1200027
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/
rh#2092018
rh#2092019
rh#2092021
rh#2092022
rh#2092023
rh#2092024
rh#2092025
rh#2092026
rh#2092416
rh#2102165
CVE-2022-31740mozilla-nss:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2022-1919
CVE-2022-31736
CVE-2022-31737
CVE-2022-31738
CVE-2022-31739
CVE-2022-31740
CVE-2022-31742
CVE-2022-31743
CVE-2022-31744
CVE-2022-31745
CVE-2022-31747
CVE-2022-31748
D:CVE-2022-1919
DSA-5156
DSA-5158
DSA-5172
DSA-5175
GLSA-202208-08
Google Chrome Releases Web site
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:crbug.com:CVE-2022-1919
MISC:www.mozilla.org:/security/advisories/mfsa2022-20/
MISC:www.mozilla.org:/security/advisories/mfsa2022-21/
MISC:www.mozilla.org:/security/advisories/mfsa2022-22/
MISC:www.mozilla.org:/security/advisories/mfsa2022-25/
MISC:www.mozilla.org:/security/advisories/mfsa2022-26/
RHSA-2022:4870
RHSA-2022:4871
RHSA-2022:4872
RHSA-2022:4873
RHSA-2022:4875
RHSA-2022:4876
RHSA-2022:4887
RHSA-2022:4888
RHSA-2022:4889
RHSA-2022:4890
RHSA-2022:4891
RHSA-2022:4892
RHSA-2022:5469
RHSA-2022:5470
RHSA-2022:5472
RHSA-2022:5473
RHSA-2022:5474
RHSA-2022:5475
RHSA-2022:5477
RHSA-2022:5478
RHSA-2022:5479
RHSA-2022:5480
RHSA-2022:5481
RHSA-2022:5482
SMASH Issue 333185
bnc#1200027
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/
rh#2092018
rh#2092019
rh#2092021
rh#2092022
rh#2092023
rh#2092024
rh#2092025
rh#2092026
rh#2092416
rh#2102165
CVE-2022-31741mozilla-nss:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2022-31741
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:www.mozilla.org:/security/advisories/mfsa2022-20/
MISC:www.mozilla.org:/security/advisories/mfsa2022-21/
MISC:www.mozilla.org:/security/advisories/mfsa2022-22/
RHSA-2022:4870
RHSA-2022:4871
RHSA-2022:4872
RHSA-2022:4873
RHSA-2022:4875
RHSA-2022:4876
RHSA-2022:4887
RHSA-2022:4888
RHSA-2022:4889
RHSA-2022:4890
RHSA-2022:4891
RHSA-2022:4892
SMASH Issue 349979
bnc#1200027
rh#2092024
CVE-2022-31742mozilla-nss:Releasedimportant6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)CVE-2022-1919
CVE-2022-31736
CVE-2022-31737
CVE-2022-31738
CVE-2022-31739
CVE-2022-31740
CVE-2022-31742
CVE-2022-31743
CVE-2022-31744
CVE-2022-31745
CVE-2022-31747
CVE-2022-31748
D:CVE-2022-1919
DSA-5156
DSA-5158
DSA-5172
DSA-5175
GLSA-202208-08
Google Chrome Releases Web site
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:crbug.com:CVE-2022-1919
MISC:www.mozilla.org:/security/advisories/mfsa2022-20/
MISC:www.mozilla.org:/security/advisories/mfsa2022-21/
MISC:www.mozilla.org:/security/advisories/mfsa2022-22/
MISC:www.mozilla.org:/security/advisories/mfsa2022-25/
MISC:www.mozilla.org:/security/advisories/mfsa2022-26/
RHSA-2022:4870
RHSA-2022:4871
RHSA-2022:4872
RHSA-2022:4873
RHSA-2022:4875
RHSA-2022:4876
RHSA-2022:4887
RHSA-2022:4888
RHSA-2022:4889
RHSA-2022:4890
RHSA-2022:4891
RHSA-2022:4892
RHSA-2022:5469
RHSA-2022:5470
RHSA-2022:5472
RHSA-2022:5473
RHSA-2022:5474
RHSA-2022:5475
RHSA-2022:5477
RHSA-2022:5478
RHSA-2022:5479
RHSA-2022:5480
RHSA-2022:5481
RHSA-2022:5482
SMASH Issue 333185
bnc#1200027
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/
rh#2092018
rh#2092019
rh#2092021
rh#2092022
rh#2092023
rh#2092024
rh#2092025
rh#2092026
rh#2092416
rh#2102165
CVE-2022-31743mozilla-nss:Releasedimportant ()CVE-2022-1919
CVE-2022-31736
CVE-2022-31737
CVE-2022-31738
CVE-2022-31739
CVE-2022-31740
CVE-2022-31742
CVE-2022-31743
CVE-2022-31744
CVE-2022-31745
CVE-2022-31747
CVE-2022-31748
D:CVE-2022-1919
DSA-5156
DSA-5158
DSA-5172
DSA-5175
GLSA-202208-08
Google Chrome Releases Web site
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:crbug.com:CVE-2022-1919
MISC:www.mozilla.org:/security/advisories/mfsa2022-20/
MISC:www.mozilla.org:/security/advisories/mfsa2022-21/
MISC:www.mozilla.org:/security/advisories/mfsa2022-22/
MISC:www.mozilla.org:/security/advisories/mfsa2022-25/
MISC:www.mozilla.org:/security/advisories/mfsa2022-26/
RHSA-2022:4870
RHSA-2022:4871
RHSA-2022:4872
RHSA-2022:4873
RHSA-2022:4875
RHSA-2022:4876
RHSA-2022:4887
RHSA-2022:4888
RHSA-2022:4889
RHSA-2022:4890
RHSA-2022:4891
RHSA-2022:4892
RHSA-2022:5469
RHSA-2022:5470
RHSA-2022:5472
RHSA-2022:5473
RHSA-2022:5474
RHSA-2022:5475
RHSA-2022:5477
RHSA-2022:5478
RHSA-2022:5479
RHSA-2022:5480
RHSA-2022:5481
RHSA-2022:5482
SMASH Issue 333185
bnc#1200027
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/
rh#2092018
rh#2092019
rh#2092021
rh#2092022
rh#2092023
rh#2092024
rh#2092025
rh#2092026
rh#2092416
rh#2102165
CVE-2022-31744mozilla-nss:Releasedimportant ()CVE-2022-1919
CVE-2022-31736
CVE-2022-31737
CVE-2022-31738
CVE-2022-31739
CVE-2022-31740
CVE-2022-31742
CVE-2022-31743
CVE-2022-31744
CVE-2022-31745
CVE-2022-31747
CVE-2022-31748
D:CVE-2022-1919
DSA-5156
DSA-5158
DSA-5172
DSA-5175
GLSA-202208-08
Google Chrome Releases Web site
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:crbug.com:CVE-2022-1919
MISC:www.mozilla.org:/security/advisories/mfsa2022-20/
MISC:www.mozilla.org:/security/advisories/mfsa2022-21/
MISC:www.mozilla.org:/security/advisories/mfsa2022-22/
MISC:www.mozilla.org:/security/advisories/mfsa2022-25/
MISC:www.mozilla.org:/security/advisories/mfsa2022-26/
RHSA-2022:4870
RHSA-2022:4871
RHSA-2022:4872
RHSA-2022:4873
RHSA-2022:4875
RHSA-2022:4876
RHSA-2022:4887
RHSA-2022:4888
RHSA-2022:4889
RHSA-2022:4890
RHSA-2022:4891
RHSA-2022:4892
RHSA-2022:5469
RHSA-2022:5470
RHSA-2022:5472
RHSA-2022:5473
RHSA-2022:5474
RHSA-2022:5475
RHSA-2022:5477
RHSA-2022:5478
RHSA-2022:5479
RHSA-2022:5480
RHSA-2022:5481
RHSA-2022:5482
SMASH Issue 333185
bnc#1200027
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/
rh#2092018
rh#2092019
rh#2092021
rh#2092022
rh#2092023
rh#2092024
rh#2092025
rh#2092026
rh#2092416
rh#2102165
CVE-2022-31745mozilla-nss:Releasedimportant ()CVE-2022-1919
CVE-2022-31736
CVE-2022-31737
CVE-2022-31738
CVE-2022-31739
CVE-2022-31740
CVE-2022-31742
CVE-2022-31743
CVE-2022-31744
CVE-2022-31745
CVE-2022-31747
CVE-2022-31748
D:CVE-2022-1919
DSA-5156
DSA-5158
DSA-5172
DSA-5175
GLSA-202208-08
Google Chrome Releases Web site
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:crbug.com:CVE-2022-1919
MISC:www.mozilla.org:/security/advisories/mfsa2022-20/
MISC:www.mozilla.org:/security/advisories/mfsa2022-21/
MISC:www.mozilla.org:/security/advisories/mfsa2022-22/
MISC:www.mozilla.org:/security/advisories/mfsa2022-25/
MISC:www.mozilla.org:/security/advisories/mfsa2022-26/
RHSA-2022:4870
RHSA-2022:4871
RHSA-2022:4872
RHSA-2022:4873
RHSA-2022:4875
RHSA-2022:4876
RHSA-2022:4887
RHSA-2022:4888
RHSA-2022:4889
RHSA-2022:4890
RHSA-2022:4891
RHSA-2022:4892
RHSA-2022:5469
RHSA-2022:5470
RHSA-2022:5472
RHSA-2022:5473
RHSA-2022:5474
RHSA-2022:5475
RHSA-2022:5477
RHSA-2022:5478
RHSA-2022:5479
RHSA-2022:5480
RHSA-2022:5481
RHSA-2022:5482
SMASH Issue 333185
bnc#1200027
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/
rh#2092018
rh#2092019
rh#2092021
rh#2092022
rh#2092023
rh#2092024
rh#2092025
rh#2092026
rh#2092416
rh#2102165
CVE-2022-31747mozilla-nss:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2022-1919
CVE-2022-31736
CVE-2022-31737
CVE-2022-31738
CVE-2022-31739
CVE-2022-31740
CVE-2022-31742
CVE-2022-31743
CVE-2022-31744
CVE-2022-31745
CVE-2022-31747
CVE-2022-31748
D:CVE-2022-1919
DSA-5156
DSA-5158
DSA-5172
DSA-5175
GLSA-202208-08
Google Chrome Releases Web site
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:crbug.com:CVE-2022-1919
MISC:www.mozilla.org:/security/advisories/mfsa2022-20/
MISC:www.mozilla.org:/security/advisories/mfsa2022-21/
MISC:www.mozilla.org:/security/advisories/mfsa2022-22/
MISC:www.mozilla.org:/security/advisories/mfsa2022-25/
MISC:www.mozilla.org:/security/advisories/mfsa2022-26/
RHSA-2022:4870
RHSA-2022:4871
RHSA-2022:4872
RHSA-2022:4873
RHSA-2022:4875
RHSA-2022:4876
RHSA-2022:4887
RHSA-2022:4888
RHSA-2022:4889
RHSA-2022:4890
RHSA-2022:4891
RHSA-2022:4892
RHSA-2022:5469
RHSA-2022:5470
RHSA-2022:5472
RHSA-2022:5473
RHSA-2022:5474
RHSA-2022:5475
RHSA-2022:5477
RHSA-2022:5478
RHSA-2022:5479
RHSA-2022:5480
RHSA-2022:5481
RHSA-2022:5482
SMASH Issue 333185
bnc#1200027
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/
rh#2092018
rh#2092019
rh#2092021
rh#2092022
rh#2092023
rh#2092024
rh#2092025
rh#2092026
rh#2092416
rh#2102165
CVE-2022-31748mozilla-nss:Releasedimportant ()CVE-2022-1919
CVE-2022-31736
CVE-2022-31737
CVE-2022-31738
CVE-2022-31739
CVE-2022-31740
CVE-2022-31742
CVE-2022-31743
CVE-2022-31744
CVE-2022-31745
CVE-2022-31747
CVE-2022-31748
D:CVE-2022-1919
DSA-5156
DSA-5158
DSA-5172
DSA-5175
GLSA-202208-08
Google Chrome Releases Web site
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:crbug.com:CVE-2022-1919
MISC:www.mozilla.org:/security/advisories/mfsa2022-20/
MISC:www.mozilla.org:/security/advisories/mfsa2022-21/
MISC:www.mozilla.org:/security/advisories/mfsa2022-22/
MISC:www.mozilla.org:/security/advisories/mfsa2022-25/
MISC:www.mozilla.org:/security/advisories/mfsa2022-26/
RHSA-2022:4870
RHSA-2022:4871
RHSA-2022:4872
RHSA-2022:4873
RHSA-2022:4875
RHSA-2022:4876
RHSA-2022:4887
RHSA-2022:4888
RHSA-2022:4889
RHSA-2022:4890
RHSA-2022:4891
RHSA-2022:4892
RHSA-2022:5469
RHSA-2022:5470
RHSA-2022:5472
RHSA-2022:5473
RHSA-2022:5474
RHSA-2022:5475
RHSA-2022:5477
RHSA-2022:5478
RHSA-2022:5479
RHSA-2022:5480
RHSA-2022:5481
RHSA-2022:5482
SMASH Issue 333185
bnc#1200027
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YKLJ3B3D5BCVWE3QNP4N7HHF26OHD567/
rh#2092018
rh#2092019
rh#2092021
rh#2092022
rh#2092023
rh#2092024
rh#2092025
rh#2092026
rh#2092416
rh#2102165
CVE-2022-3176kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-3176
DSA-5257
L3:64743
MISC:git.kernel.org:CVE-2022-3176
MISC:kernel.dance:CVE-2022-3176
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/Q4/30
SMASH Issue 342371
SMASH Issue 342372
ZDI-22-1462
bnc#1203391
bnc#1203511
https://security.netapp.com/advisory/ntap-20230216-0003/
jsc#CAR-2032
rh#2123056
rh#2127890
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2139586
rh#2139598
CVE-2022-3202kernel-source-rt:Not affectedmoderate6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20221228-0007/
CVE-2022-3202
MISC:github.com:CVE-2022-3202
SMASH Issue 342199
bnc#1203389
rh#2126423
CVE-2022-3219gpg2:Won't fixmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3219
SMASH Issue 342465
bnc#1203440
https://access.redhat.com/security/cve/CVE-2022-3219
https://dev.gnupg.org/D556
https://dev.gnupg.org/T5993
https://marc.info/?l=oss-security&m=165696590211434&w=4
https://security.netapp.com/advisory/ntap-20230324-0001/
jsc#CAR-2030
rh#2127010
CVE-2022-32205curl:Not affectedmoderate4.9 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-333517.pdf
CONFIRM:security.netapp.com:CVE-2022-32208
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-32205
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
DSA-5197
FEDORA:FEDORA-2022-1b3d7f6973
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202212-01
MISC:curl.se:OSS:2022/Q2/209
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2022-32205
OSS:2022/Q2/209
OSS:2023/02/15/3
OSS:2023/03/20/6
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
SMASH Issue 335196
SMASH Issue 335197
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1200734
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099296
rh#2099300
rh#2099305
rh#2099306
CVE-2022-32206curl:Releasedmoderate4.9 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-333517.pdf
CONFIRM:security.netapp.com:CVE-2022-32208
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-32206
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
DSA-5197
FEDORA:FEDORA-2022-1b3d7f6973
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202212-01
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2022-32206
MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
OSS:2022/Q2/210
OSS:2023/02/15/3
OSS:2023/03/20/6
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
RHSA-2022:6157
RHSA-2022:6159
RHSA-2022:8840
RHSA-2022:8841
RHSA-2023:3460
SMASH Issue 335198
SMASH Issue 335199
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1200735
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
jsc#CAR-1873
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099300
rh#2099305
rh#2099306
CVE-2022-32207curl:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-32208
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-32207
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
DSA-5197
FEDORA:FEDORA-2022-1b3d7f6973
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202212-01
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/211
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2022-32207
OSS:2022/Q2/211
OSS:2023/02/15/3
OSS:2023/03/20/6
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
RHSA-2022:6157
RHSA-2022:8840
RHSA-2022:8841
SMASH Issue 335200
SMASH Issue 335201
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1200736
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099300
rh#2099305
rh#2099306
CVE-2022-32208curl:Releasedmoderate6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-32208
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2022-32208
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
DSA-5197
FEDORA:FEDORA-2022-1b3d7f6973
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202212-01
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/212
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2022-32208
MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
OSS:2022/Q2/212
OSS:2023/02/15/3
OSS:2023/03/20/6
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
RHSA-2022:6157
RHSA-2022:6159
RHSA-2022:8840
RHSA-2022:8841
SMASH Issue 335202
SMASH Issue 335203
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1200737
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
jsc#CAR-1874
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099300
rh#2099305
rh#2099306
CVE-2022-32221curl:Releasedimportant7.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)CONFIRM:security.netapp.com:/advisory/ntap-20230110-0006/
CONFIRM:support.apple.com:/kb/HT213604
CONFIRM:support.apple.com:/kb/HT213605
CVE-2022-32221
CVE-2023-28322
D:CVE-2022-32221
DSA-5330
FULLDISC:20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2
FULLDISC:20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3
GLSA-202212-01
L3:64595
L3:64729
L3:64816
L3:65222
L3:67177
MISC:github.com:OSS:2023/05/17/4
MISC:hackerone.com:/reports/1704017
MLIST:[debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update
OSS:2022/Q4/47
OSS:2023/05/17/4
OSS:2023/Q2/168
Oracle:CVE-2022-32221
RHSA-2022:8840
RHSA-2022:8841
RHSA-2023:0333
RHSA-2023:4139
RHSA-2023:4354
RHSA-2023:4628
RHSA-2023:4629
RHSA-2023:5598
SMASH Issue 345343
SMASH Issue 345344
SMASH Issue 347686
SMASH Issue 349077
SMASH Issue 350078
SMASH Issue 357312
SMASH Issue 365644
bnc#1204383
bnc#1205287
bnc#1205834
bnc#1206236
bnc#1208340
bnc#1211233
http://seclists.org/fulldisclosure/2023/Jul/47
http://seclists.org/fulldisclosure/2023/Jul/48
http://seclists.org/fulldisclosure/2023/Jul/52
https://hackerone.com/reports/1954658
https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230208-0002/
https://security.netapp.com/advisory/ntap-20230609-0009/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
jsc#CAR-2142
rh#2135411
rh#2196793
CVE-2022-32250kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-32250
CVE-2022-1966
CVE-2022-32250
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32250
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
FEDORA:FEDORA-2022-80cc9873be
FEDORA:FEDORA-2022-8269eaf361
L3:63532
L3:64043
L3:64051
L3:64053
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/04/1
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:OSS:2022/04/02/2
MISC:github.com:OSS:2022/07/02/3
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.cve.org:OSS:2022/Q2/202
MISC:www.debian.org:CVE-2022-32250
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/03/1
OSS:2022/06/04/1
OSS:2022/06/20/1
OSS:2022/06/22/1
OSS:2022/07/02/3
OSS:2022/07/03/5
OSS:2022/07/03/6
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q2/165
OSS:2022/Q2/202
OSS:2022/Q3/141
OSS:2022/Q3/7
Oracle:CVE-2022-21123
RHSA-2022:5214
RHSA-2022:5216
RHSA-2022:5220
RHSA-2022:5224
RHSA-2022:5232
RHSA-2022:5236
RHSA-2022:5249
RHSA-2022:5267
RHSA-2022:5439
RHSA-2022:5476
RHSA-2022:5626
RHSA-2022:5633
RHSA-2022:5636
RHSA-2022:5641
RHSA-2022:5648
RHSA-2022:5802
RHSA-2022:5804
RHSA-2022:5805
RHSA-2022:5806
RHSA-2022:5819
RHSA-2022:5834
RHSA-2022:5839
RHSA-2022:6073
RHSA-2022:6075
RHSA-2022:6551
SMASH Issue 333177
SMASH Issue 333630
SMASH Issue 334440
SMASH Issue 341246
SMASH Issue 341247
SMASH Issue 341256
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1200015
bnc#1200268
bnc#1200494
bnc#1200529
bnc#1202992
bnc#1202993
bnc#1203002
jsc#CAR-1820
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084183
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-32296kernel-source-rt:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-32296
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
MISC:arxiv.org:CVE-2022-32296
MISC:cdn.kernel.org:CVE-2022-32296
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:CVE-2022-32296
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:CVE-2022-32296
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/141
Oracle:CVE-2022-21123
SMASH Issue 333685
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1200288
jsc#CAR-1909
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-3234vim:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:huntr.dev:CVE-2022-3234
CVE-2022-3234
D:CVE-2022-3234
FEDORA:FEDORA-2022-40161673a3
FEDORA:FEDORA-2022-4bc60c32a2
FEDORA:FEDORA-2022-fff548cfab
L3:64818
L3:65162
L3:65211
L3:65303
L3:65457
MISC:github.com:CVE-2022-3234
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 342850
bnc#1203508
https://security.gentoo.org/glsa/202305-16
rh#2129370
CVE-2022-3235vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-3235
CVE-2022-3235
D:CVE-2022-3235
FEDORA:FEDORA-2022-40161673a3
FEDORA:FEDORA-2022-4bc60c32a2
FEDORA:FEDORA-2022-fff548cfab
MISC:github.com:CVE-2022-3235
MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
SMASH Issue 342857
bnc#1203509
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2034
rh#2129371
CVE-2022-3238kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-3238
SMASH Issue 346058
bnc#1204655
rh#2127927
CVE-2022-3239kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-3239
MISC:git.kernel.org:CVE-2022-3239
RHSA-2022:7933
RHSA-2022:8267
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 342879
bnc#1203552
bnc#1203557
https://security.netapp.com/advisory/ntap-20230214-0006/
jsc#CAR-2038
rh#2127985
CVE-2022-3256vim:Not affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-3256
CVE-2022-3256
FEDORA:FEDORA-2022-40161673a3
FEDORA:FEDORA-2022-4bc60c32a2
FEDORA:FEDORA-2022-fff548cfab
MISC:github.com:CVE-2022-3256
MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
SMASH Issue 343249
bnc#1204117
https://security.gentoo.org/glsa/202305-16
rh#2132571
CVE-2022-3278vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-3278
CVE-2022-3278
D:CVE-2022-3278
FEDORA:FEDORA-2022-40161673a3
FEDORA:FEDORA-2022-4bc60c32a2
FEDORA:FEDORA-2022-fff548cfab
MISC:github.com:CVE-2022-3278
SMASH Issue 343398
bnc#1203799
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2058
rh#2129831
CVE-2022-3296vim:Releasedmoderate3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)CONFIRM:huntr.dev:CVE-2022-3296
CVE-2022-3296
D:CVE-2022-3296
FEDORA:FEDORA-2022-40161673a3
FEDORA:FEDORA-2022-4bc60c32a2
FEDORA:FEDORA-2022-fff548cfab
L3:64619
MISC:github.com:CVE-2022-3296
SMASH Issue 343565
bnc#1203796
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2056
rh#2129835
CVE-2022-3297vim:Releasedmoderate3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:CVE-2022-3297
CVE-2022-3297
D:CVE-2022-3297
FEDORA:FEDORA-2022-40161673a3
FEDORA:FEDORA-2022-4bc60c32a2
FEDORA:FEDORA-2022-fff548cfab
MISC:github.com:CVE-2022-3297
SMASH Issue 343566
bnc#1203797
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2057
rh#2129838
CVE-2022-32981kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-32981
MISC:git.kernel.org:CVE-2022-32981
OSS:2022/06/14/3
OSS:2022/Q2/196
SMASH Issue 334200
bnc#1200470
rh#2097387
CVE-2022-3303kernel-source-rt:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3303
D:CVE-2022-3303
DSA-5257
L3:66058
MISC:git.kernel.org:CVE-2022-3303
MISC:lore.kernel.org:CVE-2022-3303
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/Q4/30
SMASH Issue 343591
ZDI-22-1462
bnc#1203769
jsc#CAR-2059
jsc#CAR-2061
linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f
linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc
linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f
linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f
linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6
rh#2123056
rh#2129859
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2139586
rh#2139598
CVE-2022-33099lua53:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2022-33099
D:CVE-2022-33099
FEDORA:FEDORA-2022-5b5889f43a
FEDORA:FEDORA-2022-b9ed35a7ad
MISC:github.com:CVE-2022-33099
MISC:lua-users.org:CVE-2022-33099
MISC:www.lua.org:CVE-2022-33099
RHSA-2022:7329
SMASH Issue 336077
bnc#1201146
rh#2104427
CVE-2022-3324vim:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:huntr.dev:CVE-2022-3324
CVE-2022-3324
FEDORA:FEDORA-2022-40161673a3
FEDORA:FEDORA-2022-4bc60c32a2
FEDORA:FEDORA-2022-fff548cfab
L3:64320
L3:64527
L3:64619
L3:64621
L3:64818
L3:64822
MISC:github.com:CVE-2022-3324
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 343731
bnc#1203820
bnc#1204102
bnc#1205060
bnc#1205396
bnc#1206245
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2062
jsc#CAR-2063
rh#2132558
CVE-2022-3344kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)CVE-2022-3344
MISC:lore.kernel.org:CVE-2022-3344
SMASH Issue 346003
bnc#1204652
linux.git:commit:16ae56d7e0528559bf8dc9070e3bfd8ba3de80df
linux.git:commit:ed129ec9057f89d615ba0c81a4984a90345a1684
rh#2130278
CVE-2022-3352vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:huntr.dev:CVE-2022-3352
CVE-2022-3352
FEDORA:FEDORA-2022-40161673a3
FEDORA:FEDORA-2022-4bc60c32a2
FEDORA:FEDORA-2022-fff548cfab
MISC:github.com:CVE-2022-3352
MLIST:[debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
SMASH Issue 344055
bnc#1203924
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2066
rh#2131087
CVE-2022-3358openssl:Not affected, openssl-1_1:Not affectedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)CONFIRM:git.openssl.org:CVE-2022-3358
CONFIRM:psirt.global.sonicwall.com:CVE-2022-3786
CONFIRM:security.netapp.com:CVE-2022-3358
CONFIRM:www.openssl.org:CVE-2022-3358
CVE-2022-3358
RHSA-2023:2523
SMASH Issue 344658
bnc#1204226
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=5485c56679d7c49b96e8fc8ca708b0b7e7c03c4b
https://security.gentoo.org/glsa/202402-08
openssl.git:commit:25d47cccf203c3b71171e78865e48ea061a039a8
rh#2134740
CVE-2022-33740kernel-source-rt:Releasedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CONFIRM:xenbits.xen.org:CVE-2022-33742
CVE-2022-26365
CVE-2022-33740
CVE-2022-33741
CVE-2022-33742
D:CVE-2022-26365
D:CVE-2022-33740
D:CVE-2022-33741
DSA-5191
FEDORA:FEDORA-2022-2c9f8224f8
FEDORA:FEDORA-2022-c4ec706488
MISC:github.com:OSS:2022/07/02/3
MISC:xenbits.xenproject.org:CVE-2022-33742
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
OSS:2022/07/02/3
OSS:2022/07/05/6
OSS:2022/Q3/22
SMASH Issue 335219
SMASH Issue 335223
ZDI-23-1834
bnc#1200762
jsc#CAR-1882
linux.git:commit:2400617da7eebf9167d71a46122828bc479d64c9
linux.git:commit:2f446ffe9d737e9a844b97887919c4fda18246e7
linux.git:commit:307c8de2b02344805ebead3440d8feed28f2f010
linux.git:commit:4491001c2e0fa69efbb748c96ec96b100a5cdb7e
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:e35e5b6f695d241ffb1d223207da58a1fbcdff4b
linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26
rh#2092427
rh#2093146
rh#2104114
rh#2104423
rh#2104746
rh#2107924
rh#2108691
CVE-2022-33741kernel-source-rt:Releasedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CONFIRM:xenbits.xen.org:CVE-2022-33742
CVE-2022-26365
CVE-2022-33740
CVE-2022-33741
CVE-2022-33742
D:CVE-2022-26365
D:CVE-2022-33740
D:CVE-2022-33741
DSA-5191
FEDORA:FEDORA-2022-2c9f8224f8
FEDORA:FEDORA-2022-c4ec706488
MISC:github.com:OSS:2022/07/02/3
MISC:xenbits.xenproject.org:CVE-2022-33742
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
OSS:2022/07/02/3
OSS:2022/07/05/6
OSS:2022/Q3/22
SMASH Issue 335222
SMASH Issue 335223
ZDI-23-1834
bnc#1200762
jsc#CAR-1882
linux.git:commit:2400617da7eebf9167d71a46122828bc479d64c9
linux.git:commit:2f446ffe9d737e9a844b97887919c4fda18246e7
linux.git:commit:307c8de2b02344805ebead3440d8feed28f2f010
linux.git:commit:4491001c2e0fa69efbb748c96ec96b100a5cdb7e
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:e35e5b6f695d241ffb1d223207da58a1fbcdff4b
linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26
rh#2092427
rh#2093146
rh#2104114
rh#2104423
rh#2104746
rh#2107924
rh#2108691
CVE-2022-33742kernel-source-rt:Releasedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CONFIRM:xenbits.xen.org:CVE-2022-33742
CVE-2022-26365
CVE-2022-33740
CVE-2022-33741
CVE-2022-33742
D:CVE-2022-26365
D:CVE-2022-33740
D:CVE-2022-33741
DSA-5191
FEDORA:FEDORA-2022-2c9f8224f8
FEDORA:FEDORA-2022-c4ec706488
MISC:github.com:OSS:2022/07/02/3
MISC:xenbits.xenproject.org:CVE-2022-33742
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
OSS:2022/07/02/3
OSS:2022/07/05/6
OSS:2022/Q3/22
SMASH Issue 335220
SMASH Issue 335223
ZDI-23-1834
bnc#1200762
jsc#CAR-1882
linux.git:commit:2400617da7eebf9167d71a46122828bc479d64c9
linux.git:commit:2f446ffe9d737e9a844b97887919c4fda18246e7
linux.git:commit:307c8de2b02344805ebead3440d8feed28f2f010
linux.git:commit:4491001c2e0fa69efbb748c96ec96b100a5cdb7e
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:e35e5b6f695d241ffb1d223207da58a1fbcdff4b
linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26
rh#2092427
rh#2093146
rh#2104114
rh#2104423
rh#2104746
rh#2107924
rh#2108691
CVE-2022-33743kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:xenbits.xen.org:CVE-2022-33743
CVE-2022-33743
DSA-5191
MISC:github.com:OSS:2022/07/02/3
MISC:xenbits.xenproject.org:CVE-2022-33743
OSS:2022/07/02/3
OSS:2022/07/05/5
OSS:2022/Q3/21
RHSA-2023:2148
RHSA-2023:2458
SMASH Issue 335224
SMASH Issue 336060
ZDI-23-1834
bnc#1200763
bnc#1201629
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26
rh#2092427
rh#2093146
rh#2104114
rh#2104423
rh#2107924
rh#2108691
CVE-2022-33744kernel-source-rt:Not affectedmoderate ()CONFIRM:xenbits.xen.org:CVE-2022-33744
CVE-2022-33744
DSA-5191
MISC:github.com:OSS:2022/07/02/3
MISC:xenbits.xenproject.org:CVE-2022-33744
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
OSS:2022/07/02/3
OSS:2022/07/05/4
OSS:2022/Q3/20
SMASH Issue 335225
SMASH Issue 336061
ZDI-23-1834
bnc#1200764
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:b75cd218274e01d026dc5240e86fdeb44bbed0c8
linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26
rh#2092427
rh#2093146
rh#2104114
rh#2104423
rh#2107924
rh#2108691
CVE-2022-33981kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-1836
CVE-2022-33981
D:CVE-2022-1016
D:CVE-2022-2153
D:CVE-2022-32296
DSA-5161
DSA-5173
DSA-5184
L3:64743
MISC:cdn.kernel.org:CVE-2022-33981
MISC:exchange.xforce.ibmcloud.com:CVE-2022-33981
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:OSS:2022/06/22/1
MISC:github.com:CVE-2022-1198
MISC:github.com:CVE-2022-1199
MISC:github.com:CVE-2022-1205
MISC:github.com:CVE-2022-33981
MISC:github.com:OSS:2022/04/02/2
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:seclists.org:CVE-2022-33981
MLIST:[debian-lts-announce] 20220701 [SECURITY] [DLA 3065-1] linux security update
OSS:2022/04/02/2
OSS:2022/04/02/3
OSS:2022/04/02/4
OSS:2022/04/02/5
OSS:2022/05/20/2
OSS:2022/05/31/1
OSS:2022/06/22/1
OSS:2022/08/25/1
OSS:2022/08/25/2
OSS:2022/09/02/9
OSS:2022/Q3/141
Oracle:CVE-2022-21123
SMASH Issue 330078
SMASH Issue 335107
ZDI-23-1834
bdo#1006346
bdo#1013299
bdo#922204
bnc#1198866
bnc#1200692
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#1832397
rh#2039448
rh#2056381
rh#2058395
rh#2058955
rh#2061633
rh#2062284
rh#2064604
rh#2066614
rh#2066706
rh#2066819
rh#2069736
rh#2070694
rh#2071047
rh#2073064
rh#2074208
rh#2074441
rh#2080330
rh#2084435
rh#2084458
rh#2085300
rh#2086753
rh#2088021
rh#2089815
rh#2090237
rh#2090240
rh#2090241
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2099504
rh#2104423
rh#2141026
CVE-2022-3424kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-3424
L3:64459
L3:64743
L3:65176
L3:66061
SMASH Issue 344423
bnc#1204166
bnc#1204167
https://github.com/torvalds/linux/commit/643a16a0eb1d6ac23744bb6e90a00fc21148a9dc
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lore.kernel.org/all/20221019031445.901570-1-zyytlz.wz@163.com/
https://security.netapp.com/advisory/ntap-20230406-0005/
https://www.spinics.net/lists/kernel/msg4518970.html
jsc#CAR-2090
rh#2132640
CVE-2022-3435kernel-source-rt:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2022-3435
D:CVE-2022-3435
FEDORA:FEDORA-2022-1a5b125ac6
FEDORA:FEDORA-2022-2cfbe17910
FEDORA:FEDORA-2022-b948fc3cfb
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
RHSA-2023:2148
RHSA-2023:2458
SMASH Issue 344554
ZDI-22-1405
bnc#1204171
jsc#CAR-2092
lore.kernel.org:CVE-2022-3435
rh#2133490
vuldb.com:CVE-2022-3435
CVE-2022-34494kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-34494
D:CVE-2022-34494
MISC:cdn.kernel.org:CVE-2022-34495
MISC:github.com:CVE-2022-34494
SMASH Issue 335612
bnc#1201158
rh#2102205
CVE-2022-34495kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-34495
D:CVE-2022-34495
MISC:cdn.kernel.org:CVE-2022-34495
MISC:github.com:CVE-2022-34495
SMASH Issue 335613
bnc#1201159
rh#2102218
CVE-2022-3479mozilla-nss:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3479
GLSA-202212-05
MISC:bugzilla.mozilla.org:CVE-2022-3479
Oracle:CVE-2022-3479
SMASH Issue 344985
bnc#1204272
jsc#CAR-2100
rh#2134331
CVE-2022-34903gpg2:Releasedmoderate6.8 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N)CONFIRM:security.netapp.com:CVE-2022-34903
CVE-2022-34903
D:CVE-2022-34903
DSA-5174
FEDORA:FEDORA-2022-0dbfb7e270
FEDORA:FEDORA-2022-1124e5882d
FEDORA:FEDORA-2022-1747eea46c
FEDORA:FEDORA-2022-aa14d396dd
MISC:dev.gnupg.org:CVE-2022-34903
OSS:2022/06/30/1
OSS:2022/07/02/1
OSS:2022/Q3/0
RHSA-2022:6463
RHSA-2022:6602
SMASH Issue 336147
bdo#1014157
bnc#1201225
jsc#CAR-1881
rh#2102868
rh#2103242
CVE-2022-3491vim:Releasedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:/bounties/6e6e05c2-2cf7-4aa5-a817-a62007bf92cb
CVE-2022-3491
D:CVE-2022-3491
L3:64806
MISC:github.com:/vim/vim/commit/3558afe9e9e904cabb8475392d859f2d2fc21041
SMASH Issue 349719
bnc#1206028
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2221
jsc#PED-1802
rh#2150770
CVE-2022-34918kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-34918
CVE-2022-34918
DSA-5161
DSA-5191
MISC:git.kernel.org:CVE-2022-32250
MISC:git.kernel.org:CVE-2022-34918
MISC:github.com:OSS:2022/07/02/3
MISC:lore.kernel.org:CVE-2022-34918
MISC:packetstormsecurity.com:CVE-2022-34918
MISC:research.nccgroup.com:OSS:2022/09/02/9
MISC:www.randorisec.fr:CVE-2022-34918
OSS:2022/05/31/1
OSS:2022/07/02/3
OSS:2022/07/05/1
OSS:2022/08/06/5
OSS:2022/08/25/1
OSS:2022/09/02/9
OSS:2022/Q3/141
OSS:2022/Q3/17
RHSA-2022:6582
RHSA-2022:6592
RHSA-2022:6610
SMASH Issue 336246
SMASH Issue 336265
ZDI-23-1834
bnc#1201171
bnc#1201177
bnc#1201222
linux.git:commit:7cd4c5c2101cb092db00f61f69d24380cf7a0ee8
linux.git:commit:f63c2c2032c2e3caad9add3b82cc6e91c376fd26
linux.git:commit:fee060cd52d69c114b62d1a2948ea9648b5131f9
rh#2039448
rh#2058395
rh#2064604
rh#2074208
rh#2086753
rh#2089815
rh#2092427
rh#2092537
rh#2093146
rh#2096178
rh#2096901
rh#2104114
rh#2104423
rh#2107924
rh#2108691
CVE-2022-3509protobuf:Already fixedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3509
MISC:github.com:/protocolbuffers/protobuf/commit/a3888f53317a8018e7a439bac4abeb8f3425d5e9
Oracle:CVE-2022-3171
Oracle:CVE-2022-3510
RHSA-2023:1855
RHSA-2023:3815
SMASH Issue 350310
bnc#1206544
jsc#CAR-2247
rh#2137645
rh#2184161
rh#2184176
CVE-2022-3510protobuf:Already fixedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3510
MISC:github.com:/protocolbuffers/protobuf/commit/db7c17803320525722f45c1d26fc08bc41d1bf48
Oracle:CVE-2022-3171
Oracle:CVE-2022-3510
RHSA-2023:1855
RHSA-2023:3815
SMASH Issue 350309
bnc#1206545
jsc#CAR-2251
rh#2137645
rh#2184161
rh#2184176
CVE-2022-3515libksba:Releasedcritical9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2022-3515
DSA-5255
L3:64462
L3:64547
L3:64676
L3:64691
L3:64821
L3:65108
L3:65223
MISC:access.redhat.com:/security/cve/CVE-2022-3515
MISC:dev.gnupg.org:/rK4b7d9cd4a018898d7714ce06f3faf2626c14582b
MISC:www.gnupg.org:/blog/20221017-pepe-left-the-ksba.html
RHSA-2022:7088
RHSA-2022:7089
RHSA-2022:7090
RHSA-2022:7209
RHSA-2022:7283
RHSA-2022:7927
RHSA-2022:8598
SMASH Issue 345319
SMASH Issue 345320
bdo#1021928
bnc#1204357
https://security.netapp.com/advisory/ntap-20230706-0008/
jsc#CAR-2114
rh#2135610
CVE-2022-3520vim:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:huntr.dev:/bounties/c1db3b70-f4fe-481f-8a24-0b1449c94246
CVE-2022-3520
L3:64932
L3:65186
L3:65231
L3:65301
L3:65303
MISC:github.com:/vim/vim/commit/36343ae0fb7247e060abfd35fb8e4337b33abb4b
SMASH Issue 349542
bnc#1206071
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2218
jsc#PED-1802
rh#2150924
CVE-2022-3521kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3521
D:CVE-2022-3521
L3:67179
MISC:git.kernel.org:CVE-2022-3521
MISC:vuldb.com:CVE-2022-3521
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
SMASH Issue 345305
bnc#1204355
jsc#CAR-2108
rh#2150975
CVE-2022-3522kernel-source-rt:Won't fixmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-3522
D:CVE-2022-3522
L3:64743
L3:65224
L3:65237
L3:65449
MISC:git.kernel.org:CVE-2022-3522
MISC:vuldb.com:CVE-2022-3522
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 345304
bnc#1204358
rh#2150979
CVE-2022-3523kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-3523
D:CVE-2022-3523
MISC:git.kernel.org:CVE-2022-3523
MISC:vuldb.com:CVE-2022-3523
SMASH Issue 345303
bnc#1204363
jsc#CAR-2144
rh#2143906
CVE-2022-3524kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3524
D:CVE-2022-3524
L3:66071
MISC:git.kernel.org:CVE-2022-3524
MISC:vuldb.com:CVE-2022-3524
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 345302
bnc#1204354
jsc#CAR-2107
rh#2150947
CVE-2022-35252curl:Releasedlow3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:CVE-2022-35252
CONFIRM:support.apple.com:/kb/HT213603
CONFIRM:support.apple.com:/kb/HT213604
CVE-2022-35252
D:CVE-2022-35252
FULLDISC:20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3
FULLDISC:20230123 APPLE-SA-2023-01-23-6 macOS Big Sur 11.7.3
GLSA-202212-01
MISC:hackerone.com:CVE-2022-35252
MLIST:[debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update
Oracle:CVE-2022-2509
RHSA-2022:8840
RHSA-2022:8841
RHSA-2023:2478
RHSA-2023:2963
SMASH Issue 340371
SMASH Issue 340372
bnc#1202593
jsc#CAR-2004
rh#2108977
rh#2120718
CVE-2022-3526kernel-source-rt:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3526
D:CVE-2022-3526
MISC:git.kernel.org:CVE-2022-3526
MISC:vuldb.com:CVE-2022-3526
SMASH Issue 345307
bnc#1204353
rh#2161341
CVE-2022-35260curl:Not affectedmoderate5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230110-0006/
CONFIRM:support.apple.com:/kb/HT213604
CONFIRM:support.apple.com:/kb/HT213605
CVE-2022-35260
FULLDISC:20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2
FULLDISC:20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3
GLSA-202212-01
MISC:hackerone.com:/reports/1721098
OSS:2022/Q4/48
SMASH Issue 345345
SMASH Issue 345346
bnc#1204384
rh#2135412
CVE-2022-3527iproute2:Won't fixlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2022-3527
D:CVE-2022-3527
L3:64410
MISC:git.kernel.org:CVE-2022-3527
MISC:vuldb.com:CVE-2022-3527
SMASH Issue 345308
bnc#1204376
bnc#1204590
CVE-2022-3528iproute2:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2022-3528
D:CVE-2022-3528
L3:64410
MISC:git.kernel.org:CVE-2022-3528
MISC:vuldb.com:CVE-2022-3528
SMASH Issue 345309
bnc#1204374
CVE-2022-3529iproute2:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2022-3529
L3:64410
MISC:git.kernel.org:CVE-2022-3529
MISC:vuldb.com:CVE-2022-3529
SMASH Issue 345311
bnc#1204373
CVE-2022-3530iproute2:Won't fixlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2022-3530
L3:64410
MISC:git.kernel.org:CVE-2022-3530
MISC:vuldb.com:CVE-2022-3530
SMASH Issue 345310
bnc#1204372
jsc#CAR-2110
CVE-2022-3531kernel-source-rt:Not affectedlow0 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N)CVE-2022-3531
D:CVE-2022-3531
SMASH Issue 345334
bnc#1204420
git.kernel.org:CVE-2022-3531
vuldb.com:CVE-2022-3531
CVE-2022-3532kernel-source-rt:Not affectedlow0 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N)CVE-2022-3532
D:CVE-2022-3532
SMASH Issue 345333
bnc#1204418
git.kernel.org:CVE-2022-3532
vuldb.com:CVE-2022-3532
CVE-2022-3533kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3533
D:CVE-2022-3533
SMASH Issue 345332
bnc#1204393
git.kernel.org:CVE-2022-3533
rh#2165625
vuldb.com:CVE-2022-3533
CVE-2022-3534kernel-source-rt:Not affectedimportant7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)CVE-2022-3534
L3:64716
L3:64743
SMASH Issue 345331
bnc#1204391
git.kernel.org:CVE-2022-3534
rh#2165706
vuldb.com:CVE-2022-3534
CVE-2022-3535kernel-source-rt:Releasedlow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2022-3535
SMASH Issue 345330
bnc#1204417
git.kernel.org:CVE-2022-3535
jsc#CAR-2124
vuldb.com:CVE-2022-3535
CVE-2022-3541kernel-source-rt:Not affectedimportant ()CONFIRM:security.netapp.com:/advisory/ntap-20221228-0001/
CVE-2022-3541
SMASH Issue 345388
bnc#1204403
git.kernel.org:CVE-2022-3541
rh#2168174
vuldb.com:CVE-2022-3541
CVE-2022-3542kernel-source-rt:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3542
L3:67179
SMASH Issue 345387
bnc#1204402
git.kernel.org:CVE-2022-3542
jsc#CAR-2125
rh#2156672
vuldb.com:CVE-2022-3542
CVE-2022-3543kernel-source-rt:Not affectedmoderate ()CVE-2022-3543
SMASH Issue 345386
bnc#1204401
git.kernel.org:CVE-2022-3543
rh#2161185
vuldb.com:CVE-2022-3543
CVE-2022-3544kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3544
L3:67179
SMASH Issue 345385
bnc#1204404
git.kernel.org:CVE-2022-3544
rh#2161210
vuldb.com:CVE-2022-3544
CVE-2022-3545kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20221223-0003/
CVE-2022-3545
DSA-5324
L3:64716
L3:64743
L3:65426
L3:67191
SMASH Issue 345384
bnc#1204415
bnc#1204424
git.kernel.org:CVE-2022-3545
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
jsc#CAR-2119
rh#2161310
vuldb.com:CVE-2022-3545
CVE-2022-3560pesign:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-3560
OSS:2023/Q1/66
RHSA-2023:1065
RHSA-2023:1066
RHSA-2023:1067
RHSA-2023:1093
RHSA-2023:1107
RHSA-2023:1572
RHSA-2023:1586
RHSA-2023:1829
SMASH Issue 341148
SMASH Issue 345556
bnc#1202933
jsc#CAR-2347
rh#2135420
CVE-2022-3564kernel-source-rt:Releasedimportant8 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20221223-0001/
CVE-2022-3564
L3:64933
L3:65173
L3:65176
L3:65185
L3:66491
MISC:git.kernel.org:CVE-2022-3564
MISC:vuldb.com:CVE-2022-3564
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
RHSA-2023:0856
RHSA-2023:0858
RHSA-2023:0951
RHSA-2023:0979
RHSA-2023:1008
RHSA-2023:1202
RHSA-2023:1203
RHSA-2023:1220
RHSA-2023:1221
RHSA-2023:1251
RHSA-2023:1435
RHSA-2023:1559
RHSA-2023:1560
RHSA-2023:1666
RHSA-2023:2736
RHSA-2023:2951
RHSA-2023:3277
RHSA-2023:3278
RHSA-2023:3388
RHSA-2023:3431
RHSA-2023:3491
RHSA-2023:4020
RHSA-2023:4021
RHSA-2023:4150
RHSA-2023:4151
RHSA-2023:4215
SMASH Issue 345418
bnc#1206073
bnc#1206314
bnc#1206819
jsc#CAR-2232
rh#2067482
rh#2127890
rh#2150999
CVE-2022-3565kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2022-3565
L3:64459
L3:64743
L3:65176
L3:65224
L3:65237
L3:66074
MISC:git.kernel.org:CVE-2022-3565
MISC:vuldb.com:CVE-2022-3565
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
SMASH Issue 345417
bnc#1204431
bnc#1204432
jsc#CAR-2120
rh#2150953
CVE-2022-3566kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3566
L3:66044
MISC:git.kernel.org:CVE-2022-3566
MISC:vuldb.com:CVE-2022-3566
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 345416
bnc#1204405
bnc#1212288
jsc#CAR-2116
rh#2143893
CVE-2022-3567kernel-source-rt:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3567
MISC:git.kernel.org:CVE-2022-3567
MISC:vuldb.com:CVE-2022-3567
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 345415
bnc#1204414
jsc#CAR-2117
rh#2143943
CVE-2022-35737sqlite3:Releasedmoderate6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N)CONFIRM:security.netapp.com:CVE-2022-35737
CONFIRM:sqlite.org:CVE-2022-35737
CVE-2022-35737
GLSA-202210-40
L3:64120
L3:65975
MISC:blog.trailofbits.com:CVE-2022-35737
MISC:kb.cert.org:CVE-2022-35737
MISC:www.sqlite.org:CVE-2022-35737
Oracle:CVE-2022-35737
RHSA-2023:0110
RHSA-2023:0339
SMASH Issue 338036
SMASH Issue 338037
bnc#1201783
bnc#1203345
jsc#CAR-2023
jsc#CAR-2025
rh#2110291
CVE-2022-3577kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-3577
L3:64716
L3:64743
MISC:git.kernel.org:CVE-2022-3577
SMASH Issue 345587
bnc#1204470
bnc#1204486
jsc#CAR-2127
rh#2135717
CVE-2022-3586kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-3586
L3:64459
L3:64525
L3:64549
L3:64716
L3:64743
L3:65176
L3:65426
L3:66050
MISC:github.com:CVE-2022-3586
MISC:www.zerodayinitiative.com:CVE-2022-3586
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
SMASH Issue 345558
bnc#1204439
bnc#1204576
bnc#1204803
jsc#CAR-2122
jsc#CAR-2123
rh#2120664
rh#2124475
rh#2132640
rh#2150953
CVE-2022-3591vim:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:huntr.dev:/bounties/a5a998c2-4b07-47a7-91be-dbc1886b3921
CVE-2022-3591
L3:64805
L3:64806
L3:64932
L3:65186
L3:65231
L3:65301
MISC:github.com:/vim/vim/commit/8f3c3c6cd044e3b5bf08dbfa3b3f04bb3f711bad
SMASH Issue 349583
bnc#1206072
bnc#1206202
bnc#1206203
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2219
jsc#PED-1802
rh#2150770
rh#2150925
CVE-2022-3593iproute2:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2022-3593
SMASH Issue 345717
bnc#1204484
git.kernel.org:CVE-2022-3593
vuldb.com:CVE-2022-3593
CVE-2022-3594kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3594
L3:67179
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
SMASH Issue 345716
bnc#1204479
git.kernel.org:CVE-2022-3594
jsc#CAR-2126
rh#2149024
vuldb.com:CVE-2022-3594
CVE-2022-3595kernel-source-rt:Not affectedmoderate ()CVE-2022-3595
SMASH Issue 345715
bnc#1204476
git.kernel.org:CVE-2022-3595
rh#2143935
vuldb.com:CVE-2022-3595
CVE-2022-3602openssl:Not affected, openssl-1_1:Not affectedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CERT-VN:VU#794340
CISCO:20221028 Vulnerabilities in OpenSSL Affecting Cisco Products: November 2022
CONFIRM:git.openssl.org:CVE-2022-3602
CONFIRM:git.openssl.org:CVE-2022-3786
CONFIRM:psirt.global.sonicwall.com:CVE-2022-3786
CONFIRM:security.netapp.com:CVE-2022-3786
CONFIRM:www.openssl.org:CVE-2022-3786
CVE-2022-3602
CVE-2022-3786
FEDORA:FEDORA-2022-0f1d2e0537
FEDORA:FEDORA-2022-502f096dce
GLSA-202211-01
MISC:git.openssl.org:CVE-2022-3602
MISC:git.openssl.org:CVE-2022-3786
MISC:lists.fedoraproject.org:CVE-2022-3786
MISC:packetstormsecurity.com:CVE-2022-3786
OSS:2022/11/01/15
OSS:2022/11/01/16
OSS:2022/11/01/17
OSS:2022/11/01/18
OSS:2022/11/01/19
OSS:2022/11/01/20
OSS:2022/11/01/21
OSS:2022/11/01/24
OSS:2022/11/02/1
OSS:2022/11/02/10
OSS:2022/11/02/11
OSS:2022/11/02/12
OSS:2022/11/02/13
OSS:2022/11/02/14
OSS:2022/11/02/15
OSS:2022/11/02/2
OSS:2022/11/02/3
OSS:2022/11/02/5
OSS:2022/11/02/6
OSS:2022/11/02/7
OSS:2022/11/02/9
OSS:2022/11/03/1
OSS:2022/11/03/10
OSS:2022/11/03/11
OSS:2022/11/03/2
OSS:2022/11/03/3
OSS:2022/11/03/5
OSS:2022/11/03/6
OSS:2022/11/03/7
OSS:2022/11/03/9
OSS:2022/Q4/103
OSS:2022/Q4/84
RHSA-2022:7288
RHSA-2022:7384
SMASH Issue 346121
bnc#1204714
openssl.git:commit:3b421ebc64c7b52f1b9feb3812bdc7781c784332
openssl.git:commit:680e65b94c916af259bfdc2e25f1ab6e0c7a97d6
openssl.git:commit:a0af4a3c8b18c435a5a4afb28b3ad1a2730e6ea8
rh#2137723
rh#2139104
CVE-2022-3606kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3606
D:CVE-2022-3606
SMASH Issue 345752
bnc#1204502
git.kernel.org:CVE-2022-3606
rh#2155196
vuldb.com:CVE-2022-3606
CVE-2022-36123kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:cdn.kernel.org:CVE-2022-36123
CONFIRM:github.com:CVE-2022-36123
CONFIRM:security.netapp.com:CVE-2022-36123
CVE-2022-36123
D:CVE-2022-36123
L3:64716
L3:64743
MISC:github.com:CVE-2022-36123
MISC:sick.codes:CVE-2022-36123
SMASH Issue 338514
bnc#1202010
bnc#1202583
jsc#CAR-1948
rh#2115342
CVE-2022-3619kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3619
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 345963
bnc#1204569
git.kernel.org:CVE-2022-3619
rh#2154235
vuldb.com:CVE-2022-3619
CVE-2022-3621kernel-source-rt:Releasedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3621
L3:66051
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
SMASH Issue 345961
bnc#1204574
git.kernel.org:CVE-2022-3621
rh#2140883
vuldb.com:CVE-2022-3621
CVE-2022-36227libarchive:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2022-36227
FEDORA:FEDORA-2022-e15be0091f
MISC:bugs.gentoo.org:CVE-2022-36227
MISC:github.com:/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c
MISC:github.com:CVE-2022-36227
MLIST:[debian-lts-announce] 20230130 [SECURITY] [DLA 3294-1] libarchive security update
RHSA-2023:2532
RHSA-2023:3018
SMASH Issue 348558
bnc#1205629
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V67OO2UUQAUJS3IK4JZPF6F3LUCBU6IS/
https://security.gentoo.org/glsa/202309-14
jsc#CAR-2183
rh#2144972
CVE-2022-3623kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3623
DSA-5324
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 345960
bnc#1204575
git.kernel.org:CVE-2022-3623
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
jsc#CAR-2139
rh#2165721
vuldb.com:CVE-2022-3623
CVE-2022-3624kernel-source-rt:Not affectedlow ()CVE-2022-3624
D:CVE-2022-3624
SMASH Issue 346002
bnc#1204639
git.kernel.org:CVE-2022-3624
rh#2151641
vuldb.com:CVE-2022-3624
CVE-2022-3625kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-3625
D:CVE-2022-3625
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 346001
bnc#1204637
git.kernel.org:CVE-2022-3625
jsc#CAR-2140
rh#2144720
vuldb.com:CVE-2022-3625
CVE-2022-3628kernel-source-rt:Releasedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3628
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/patch/drivers/net/wireless/broadcom/brcm80211/brcmfmac/fweh.c
OSS:2022/Q4/60
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 346607
bnc#1204868
jsc#CAR-2149
linux.git:commit:6788ba8aed4e28e90f72d68a9d794e34eac17295
rh#2150960
CVE-2022-36280kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-36280
DSA-5324
MISC:bugzilla.openanolis.cn:CVE-2022-36280
RHSA-2023:2148
RHSA-2023:2458
SMASH Issue 342043
bnc#1203332
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
rh#2133450
CVE-2022-3629kernel-source-rt:Releasedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2022-3629
D:CVE-2022-3629
MISC:vuldb.com:/
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
SMASH Issue 346000
bnc#1204635
git.kernel.org:CVE-2022-3629
jsc#CAR-2138
rh#2151644
vuldb.com:CVE-2022-3629
CVE-2022-3630kernel-source-rt:Not affectedmoderate ()CVE-2022-3630
D:CVE-2022-3630
SMASH Issue 345999
bnc#1204634
git.kernel.org:CVE-2022-3630
rh#2151651
vuldb.com:CVE-2022-3630
CVE-2022-3633kernel-source-rt:Not affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2022-3633
D:CVE-2022-3633
MISC:git.kernel.org:CVE-2022-3633
MISC:vuldb.com:/
MISC:vuldb.com:CVE-2022-3633
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
SMASH Issue 345997
bnc#1204650
rh#2151655
CVE-2022-3635kernel-source-rt:Releasedimportant7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-36946
CVE-2022-2588
CVE-2022-3635
CVE-2022-42703
D:CVE-2022-26373
D:CVE-2022-3635
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5184
DSA-5207
DSA-5324
L3:63917
L3:64012
L3:64086
L3:64306
L3:64310
L3:64329
L3:64525
L3:64549
L3:64602
L3:64716
L3:64728
L3:64743
L3:65176
L3:65426
L3:66045
MISC:bugs.chromium.org:CVE-2022-42703
MISC:cdn.kernel.org:CVE-2022-42703
MISC:git.kernel.org:CVE-2022-42703
MISC:github.com:CVE-2022-42703
MISC:googleprojectzero.blogspot.com:/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html
MISC:marc.info:CVE-2022-36946
MLIST:[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
RHSA-2022:6551
RHSA-2022:6872
RHSA-2022:6875
RHSA-2022:6978
RHSA-2022:6983
RHSA-2022:6991
RHSA-2022:7110
RHSA-2022:7134
RHSA-2022:7137
RHSA-2022:7146
RHSA-2022:7171
RHSA-2022:7173
RHSA-2022:7279
RHSA-2022:7280
RHSA-2022:7337
RHSA-2022:7338
RHSA-2022:7344
RHSA-2022:7885
RHSA-2023:1091
RHSA-2023:1092
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
RHSA-2023:3388
RHSA-2023:4022
RHSA-2023:4023
RHSA-2023:4137
RHSA-2023:4138
SMASH Issue 338825
SMASH Issue 345996
ZDI-22-1117
ZDI-22-1118
bnc#1201941
bnc#1202096
bnc#1202961
bnc#1203613
bnc#1204168
bnc#1204170
bnc#1204631
bnc#1204636
bnc#1205058
bnc#1205085
git.kernel.org:CVE-2022-3635
https://github.com/Markakd/CVE-2022-2588
https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u
https://ubuntu.com/security/notices/USN-5557-1
https://ubuntu.com/security/notices/USN-5560-1
https://ubuntu.com/security/notices/USN-5560-2
https://ubuntu.com/security/notices/USN-5562-1
https://ubuntu.com/security/notices/USN-5564-1
https://ubuntu.com/security/notices/USN-5565-1
https://ubuntu.com/security/notices/USN-5566-1
https://ubuntu.com/security/notices/USN-5567-1
https://ubuntu.com/security/notices/USN-5582-1
https://ubuntu.com/security/notices/USN-5588-1
https://www.zerodayinitiative.com/advisories/ZDI-22-1117/
jsc#CAR-1930
jsc#CAR-1961
jsc#CAR-2091
jsc#CAR-2137
linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb
linux.git:commit:33172ab50a53578a95691310f49567c9266968b0
linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827
linux.git:commit:42baefac638f06314298087394b982ead9ec444b
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd
linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d
linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638
linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888
linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809
linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066
linux.git:commit:fd3d91ab1c6ab0628fe642dd570b56302c30a792
rh#1832397
rh#2015046
rh#2063236
rh#2066706
rh#2066799
rh#2084125
rh#2084183
rh#2090226
rh#2103148
rh#2108691
rh#2112688
rh#2112693
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119855
rh#2120664
rh#2122960
rh#2124475
rh#2130141
rh#2132640
rh#2133483
rh#2148458
rh#2150953
vuldb.com:CVE-2022-3635
CVE-2022-3636kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-3636
D:CVE-2022-3636
DSA-5333
L3:64716
L3:64743
SMASH Issue 345995
bdo#1011160
bdo#1014494
bdo#1022555
bdo#1024737
bdo#1029653
bnc#1204638
git.kernel.org:CVE-2022-3636
rh#2180984
vuldb.com:CVE-2022-3636
CVE-2022-3640kernel-source-rt:Not affectedimportant7.1 (CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2022-3640
FEDORA:FEDORA-2022-64ab9153c0
FEDORA:FEDORA-2022-65a0a3504a
FEDORA:FEDORA-2022-7aadaadebc
L3:64716
L3:64743
L3:65426
MISC:git.kernel.org:CVE-2022-3640
MISC:vuldb.com:CVE-2022-3640
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
RHSA-2023:2148
RHSA-2023:2458
SMASH Issue 346035
bnc#1204619
bnc#1204624
rh#2139610
CVE-2022-36402kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-36402
MISC:bugzilla.openanolis.cn:CVE-2022-36402
SMASH Issue 342760
bnc#1203517
rh#2133451
CVE-2022-3642kernel-source-rt:Not affectedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2022-3642
MISC:git.kernel.org:CVE-2022-3642
MISC:vuldb.com:CVE-2022-3642
SMASH Issue 346021
bnc#1204626
CVE-2022-3643kernel-source-rt:Releasedmoderate6.3 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2022-3643
D:CVE-2022-3643
MISC:xenbits.xenproject.org:/xsa/advisory-423.txt
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
OSS:2022/12/07/2
OSS:2022/Q4/170
OSS:2022/Q4/174
SMASH Issue 349925
SMASH Issue 349926
bnc#1206113
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
jsc#CAR-2233
linux.git:commit:ad7f402ae4f466647c3a669b8a6f3e5d4271c84a
rh#2158198
CVE-2022-3646kernel-source-rt:Releasedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2022-3646
L3:66078
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
SMASH Issue 346042
bnc#1204646
bnc#1212328
git.kernel.org:CVE-2022-3646
rh#2155501
vuldb.com:CVE-2022-3646
CVE-2022-3649kernel-source-rt:Releasedlow3.1 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2022-3649
L3:66069
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
SMASH Issue 346040
bnc#1204647
git.kernel.org:CVE-2022-3649
https://security.netapp.com/advisory/ntap-20230214-0009/
rh#2140882
vuldb.com:CVE-2022-3649
CVE-2022-36879kernel-source-rt:Releasedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2022-36946
CVE-2022-36879
D:CVE-2022-26373
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5184
DSA-5207
L3:66077
MISC:git.kernel.org:CVE-2022-36879
MISC:github.com:CVE-2022-36879
MLIST:[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
RHSA-2023:5627
SMASH Issue 338283
ZDI-22-1117
ZDI-22-1118
bnc#1201948
jsc#CAR-1932
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
rh#2090226
rh#2103148
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119855
CVE-2022-36946kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:CVE-2022-36946
CVE-2022-36946
D:CVE-2022-26373
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5207
L3:63917
L3:64012
L3:64086
L3:66062
MISC:marc.info:CVE-2022-36946
MLIST:[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
RHSA-2022:7444
RHSA-2022:7683
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 338379
ZDI-22-1117
ZDI-22-1118
bnc#1201940
bnc#1201941
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=99a63d36cb3ed5ca3aa6fcb64cffbeaf3b0fb164
jsc#CAR-1930
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
rh#2090226
rh#2103148
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119855
CVE-2022-3705vim:Releasedmoderate5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L)CONFIRM:security.netapp.com:/advisory/ntap-20221223-0004/
CONFIRM:support.apple.com:/kb/HT213605
CVE-2022-3705
FEDORA:FEDORA-2022-06e4f1dd58
FEDORA:FEDORA-2022-3d354ef0fb
FEDORA:FEDORA-2022-4bc60c32a2
FULLDISC:20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2
MISC:github.com:CVE-2022-3705
MISC:vuldb.com:CVE-2022-3705
MLIST:[debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
SMASH Issue 346313
bnc#1204779
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2228
rh#2139086
CVE-2022-3707kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3707
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 346309
bnc#1204780
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lore.kernel.org/all/20221007013708.1946061-1-zyytlz.wz@163.com/
jsc#CAR-2148
rh#2137979
CVE-2022-3715bash:Not affectedmoderate ()CVE-2022-3715
RHSA-2023:0340
SMASH Issue 346346
bnc#1204787
rh#2126720
CVE-2022-37434rsync:Not affected, zlib:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-37434
CONFIRM:support.apple.com:CVE-2022-1725
CONFIRM:support.apple.com:CVE-2022-28739
CONFIRM:support.apple.com:CVE-2022-37434
CVE-2022-37434
D:CVE-2022-37434
DSA-5218
FEDORA:FEDORA-2022-0b517a5397
FEDORA:FEDORA-2022-15da0cf165
FEDORA:FEDORA-2022-25e4dbedf9
FEDORA:FEDORA-2022-3c28ae0cd8
FEDORA:FEDORA-2022-b8232d1cca
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
L3:63905
L3:63921
L3:64058
L3:64065
L3:64541
L3:64597
L3:66999
MISC:github.com:CVE-2022-37434
MISC:github.com:OSS:2022/08/09/1
MLIST:[debian-lts-announce] 20220912 [SECURITY] [DLA 3103-1] zlib security update
OSS:2022/08/05/2
OSS:2022/08/09/1
OSS:2022/Q3/86
Oracle:CVE-2022-37434
RHSA-2022:7106
RHSA-2022:7314
RHSA-2022:7793
RHSA-2022:8291
RHSA-2022:8841
RHSA-2023:1095
SMASH Issue 338964
bdo#1016710
bnc#1202175
bnc#1202267
bnc#1202315
bnc#1203030
bnc#1203059
http://seclists.org/fulldisclosure/2022/Oct/37
http://seclists.org/fulldisclosure/2022/Oct/38
http://seclists.org/fulldisclosure/2022/Oct/42
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JWN4VE3JQR4O2SOUS5TXNLANRPMHWV4I/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NMBOJ77A7T7PQCARMDUK75TE6LLESZ3O/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PAVPQNCG3XRLCLNSQRM3KAN5ZFMVXVTY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5U7OTKZSHY2I3ZFJSR2SHFHW72RKGDK/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRQAI7H4M4RQZ2IWZUEEXECBE5D56BH2/
https://security.netapp.com/advisory/ntap-20230427-0007/
jsc#CAR-1952
rh#2116639
CVE-2022-37454python3:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2022-37454
D:CVE-2022-37454
DSA-5267
DSA-5269
DSA-5277
FEDORA:FEDORA-2022-1ecc10276e
FEDORA:FEDORA-2022-f2a5082860
L3:64492
L3:64731
MISC:csrc.nist.gov:CVE-2022-37454
MISC:github.com:CVE-2022-37454
MISC:lists.fedoraproject.org:CVE-2022-37454
MISC:mouha.be:CVE-2022-37454
MISC:news.ycombinator.com:CVE-2022-37454
MLIST:[debian-lts-announce] 20221031 [SECURITY] [DLA 3174-1] pysha3 security update
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3175-1] python3.7 security update
Oracle:CVE-2022-37454
RHSA-2023:0848
RHSA-2023:0965
RHSA-2023:2417
RHSA-2023:2903
SMASH Issue 345978
SMASH Issue 345979
bdo#1023030
bnc#1204577
https://eprint.iacr.org/2023/331
https://news.ycombinator.com/item?id=35050307
https://security.gentoo.org/glsa/202305-02
jsc#CAR-2147
openssl.git:commit:56a51b5a1ecd54eadc80bed4bfe5044a340787c1
rh#2140200
CVE-2022-3786openssl:Not affected, openssl-1_1:Not affectedimportant5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CERT-VN:VU#794340
CISCO:20221028 Vulnerabilities in OpenSSL Affecting Cisco Products: November 2022
CONFIRM:git.openssl.org:CVE-2022-3602
CONFIRM:git.openssl.org:CVE-2022-3786
CONFIRM:psirt.global.sonicwall.com:CVE-2022-3786
CONFIRM:security.netapp.com:CVE-2022-3786
CONFIRM:www.openssl.org:CVE-2022-3786
CVE-2022-3602
CVE-2022-3786
FEDORA:FEDORA-2022-0f1d2e0537
FEDORA:FEDORA-2022-502f096dce
GLSA-202211-01
MISC:git.openssl.org:CVE-2022-3602
MISC:git.openssl.org:CVE-2022-3786
MISC:lists.fedoraproject.org:CVE-2022-3786
MISC:packetstormsecurity.com:CVE-2022-3786
OSS:2022/11/01/15
OSS:2022/11/01/16
OSS:2022/11/01/17
OSS:2022/11/01/18
OSS:2022/11/01/19
OSS:2022/11/01/20
OSS:2022/11/01/21
OSS:2022/11/01/24
OSS:2022/11/02/1
OSS:2022/11/02/10
OSS:2022/11/02/11
OSS:2022/11/02/12
OSS:2022/11/02/13
OSS:2022/11/02/14
OSS:2022/11/02/15
OSS:2022/11/02/2
OSS:2022/11/02/3
OSS:2022/11/02/5
OSS:2022/11/02/6
OSS:2022/11/02/7
OSS:2022/11/02/9
OSS:2022/11/03/1
OSS:2022/11/03/10
OSS:2022/11/03/11
OSS:2022/11/03/2
OSS:2022/11/03/3
OSS:2022/11/03/5
OSS:2022/11/03/6
OSS:2022/11/03/7
OSS:2022/11/03/9
OSS:2022/Q4/103
OSS:2022/Q4/84
RHSA-2022:7288
RHSA-2022:7384
SMASH Issue 346121
bnc#1204714
openssl.git:commit:3b421ebc64c7b52f1b9feb3812bdc7781c784332
openssl.git:commit:680e65b94c916af259bfdc2e25f1ab6e0c7a97d6
openssl.git:commit:a0af4a3c8b18c435a5a4afb28b3ad1a2730e6ea8
rh#2137723
rh#2139104
CVE-2022-38096kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-38096
MISC:bugzilla.openanolis.cn:CVE-2022-38096
SMASH Issue 341984
bnc#1203331
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2133452
CVE-2022-38126binutils:Ignoremoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-38126
L3:65870
MISC:sourceware.org:CVE-2022-38126
SMASH Issue 341161
bnc#1202966
bnc#1211485
jsc#CAR-2006
rh#2122662
CVE-2022-38127binutils:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-38127
L3:65870
MISC:sourceware.org:CVE-2022-38127
SMASH Issue 341162
bnc#1202967
jsc#CAR-2007
rh#2122668
CVE-2022-38128binutils:Not affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2022-38128
MISC:sourceware.org:CVE-2022-38128
SMASH Issue 341297
bnc#1203016
rh#2122674
CVE-2022-3821systemd:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3821
FEDORA:FEDORA-2022-8ac4104a02
MISC:github.com:CVE-2022-3821
RHSA-2023:0100
RHSA-2023:0336
SMASH Issue 346908
bnc#1204968
https://lists.debian.org/debian-lts-announce/2023/06/msg00036.html
https://security.gentoo.org/glsa/202305-15
jsc#CAR-2162
rh#2139327
CVE-2022-38457kernel-source-rt:Won't fixmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-38457
MISC:bugzilla.openanolis.cn:CVE-2022-38457
SMASH Issue 341982
bnc#1203330
rh#2133455
CVE-2022-38472mozilla-nss:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2022-38472
CVE-2022-38473
CVE-2022-38474
CVE-2022-38475
CVE-2022-38476
CVE-2022-38477
CVE-2022-38478
D:CVE-2022-38478
DSA-5217
DSA-5221
L3:64727
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:www.mozilla.org:/security/advisories/mfsa2022-33/
MISC:www.mozilla.org:/security/advisories/mfsa2022-34/
MISC:www.mozilla.org:/security/advisories/mfsa2022-35/
MISC:www.mozilla.org:/security/advisories/mfsa2022-36/
MISC:www.mozilla.org:/security/advisories/mfsa2022-37/
Mozilla Foundation Security Advisory 2022-34
Mozilla Foundation Security Advisory 2022-36
RHSA-2022:6164
RHSA-2022:6165
RHSA-2022:6166
RHSA-2022:6167
RHSA-2022:6168
RHSA-2022:6169
RHSA-2022:6174
RHSA-2022:6175
RHSA-2022:6176
RHSA-2022:6177
RHSA-2022:6178
RHSA-2022:6179
SMASH Issue 340541
SMASH Issue 340550
bnc#1202645
rh#2120673
rh#2120674
rh#2120678
rh#2120695
rh#2120696
xf#234199
CVE-2022-38473mozilla-nss:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2022-38472
CVE-2022-38473
CVE-2022-38474
CVE-2022-38475
CVE-2022-38476
CVE-2022-38477
CVE-2022-38478
D:CVE-2022-38478
DSA-5217
DSA-5221
L3:64727
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:www.mozilla.org:/security/advisories/mfsa2022-33/
MISC:www.mozilla.org:/security/advisories/mfsa2022-34/
MISC:www.mozilla.org:/security/advisories/mfsa2022-35/
MISC:www.mozilla.org:/security/advisories/mfsa2022-36/
MISC:www.mozilla.org:/security/advisories/mfsa2022-37/
Mozilla Foundation Security Advisory 2022-34
Mozilla Foundation Security Advisory 2022-36
RHSA-2022:6164
RHSA-2022:6165
RHSA-2022:6166
RHSA-2022:6167
RHSA-2022:6168
RHSA-2022:6169
RHSA-2022:6174
RHSA-2022:6175
RHSA-2022:6176
RHSA-2022:6177
RHSA-2022:6178
RHSA-2022:6179
SMASH Issue 340542
SMASH Issue 340550
bnc#1202645
rh#2120673
rh#2120674
rh#2120678
rh#2120695
rh#2120696
xf#234199
CVE-2022-38474mozilla-nss:Releasedimportant ()CVE-2022-38472
CVE-2022-38473
CVE-2022-38474
CVE-2022-38475
CVE-2022-38476
CVE-2022-38477
CVE-2022-38478
D:CVE-2022-38478
DSA-5217
DSA-5221
L3:64727
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:www.mozilla.org:/security/advisories/mfsa2022-33/
MISC:www.mozilla.org:/security/advisories/mfsa2022-34/
MISC:www.mozilla.org:/security/advisories/mfsa2022-35/
MISC:www.mozilla.org:/security/advisories/mfsa2022-36/
MISC:www.mozilla.org:/security/advisories/mfsa2022-37/
Mozilla Foundation Security Advisory 2022-34
Mozilla Foundation Security Advisory 2022-36
RHSA-2022:6164
RHSA-2022:6165
RHSA-2022:6166
RHSA-2022:6167
RHSA-2022:6168
RHSA-2022:6169
RHSA-2022:6174
RHSA-2022:6175
RHSA-2022:6176
RHSA-2022:6177
RHSA-2022:6178
RHSA-2022:6179
SMASH Issue 340549
SMASH Issue 340550
bnc#1202645
rh#2120673
rh#2120674
rh#2120678
rh#2120695
rh#2120696
xf#234199
CVE-2022-38475mozilla-nss:Releasedimportant ()CVE-2022-38472
CVE-2022-38473
CVE-2022-38474
CVE-2022-38475
CVE-2022-38476
CVE-2022-38477
CVE-2022-38478
D:CVE-2022-38478
DSA-5217
DSA-5221
L3:64727
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:www.mozilla.org:/security/advisories/mfsa2022-33/
MISC:www.mozilla.org:/security/advisories/mfsa2022-34/
MISC:www.mozilla.org:/security/advisories/mfsa2022-35/
MISC:www.mozilla.org:/security/advisories/mfsa2022-36/
MISC:www.mozilla.org:/security/advisories/mfsa2022-37/
Mozilla Foundation Security Advisory 2022-34
Mozilla Foundation Security Advisory 2022-36
RHSA-2022:6164
RHSA-2022:6165
RHSA-2022:6166
RHSA-2022:6167
RHSA-2022:6168
RHSA-2022:6169
RHSA-2022:6174
RHSA-2022:6175
RHSA-2022:6176
RHSA-2022:6177
RHSA-2022:6178
RHSA-2022:6179
SMASH Issue 340548
SMASH Issue 340550
bnc#1202645
rh#2120673
rh#2120674
rh#2120678
rh#2120695
rh#2120696
xf#234199
CVE-2022-38476mozilla-nss:Releasedimportant ()CVE-2022-38472
CVE-2022-38473
CVE-2022-38474
CVE-2022-38475
CVE-2022-38476
CVE-2022-38477
CVE-2022-38478
D:CVE-2022-38478
DSA-5217
DSA-5221
L3:64727
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:www.mozilla.org:/security/advisories/mfsa2022-33/
MISC:www.mozilla.org:/security/advisories/mfsa2022-34/
MISC:www.mozilla.org:/security/advisories/mfsa2022-35/
MISC:www.mozilla.org:/security/advisories/mfsa2022-36/
MISC:www.mozilla.org:/security/advisories/mfsa2022-37/
Mozilla Foundation Security Advisory 2022-34
Mozilla Foundation Security Advisory 2022-36
RHSA-2022:6164
RHSA-2022:6165
RHSA-2022:6166
RHSA-2022:6167
RHSA-2022:6168
RHSA-2022:6169
RHSA-2022:6174
RHSA-2022:6175
RHSA-2022:6176
RHSA-2022:6177
RHSA-2022:6178
RHSA-2022:6179
SMASH Issue 340543
SMASH Issue 340550
bnc#1202645
rh#2120673
rh#2120674
rh#2120678
rh#2120695
rh#2120696
xf#234199
CVE-2022-38477mozilla-nss:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2022-38472
CVE-2022-38473
CVE-2022-38474
CVE-2022-38475
CVE-2022-38476
CVE-2022-38477
CVE-2022-38478
D:CVE-2022-38478
DSA-5217
DSA-5221
L3:64727
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:www.mozilla.org:/security/advisories/mfsa2022-33/
MISC:www.mozilla.org:/security/advisories/mfsa2022-34/
MISC:www.mozilla.org:/security/advisories/mfsa2022-35/
MISC:www.mozilla.org:/security/advisories/mfsa2022-36/
MISC:www.mozilla.org:/security/advisories/mfsa2022-37/
Mozilla Foundation Security Advisory 2022-34
Mozilla Foundation Security Advisory 2022-36
RHSA-2022:6164
RHSA-2022:6165
RHSA-2022:6166
RHSA-2022:6167
RHSA-2022:6168
RHSA-2022:6169
RHSA-2022:6174
RHSA-2022:6175
RHSA-2022:6176
RHSA-2022:6177
RHSA-2022:6178
RHSA-2022:6179
SMASH Issue 340546
SMASH Issue 340550
bnc#1202645
rh#2120673
rh#2120674
rh#2120678
rh#2120695
rh#2120696
xf#234199
CVE-2022-38478mozilla-nss:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2022-38472
CVE-2022-38473
CVE-2022-38474
CVE-2022-38475
CVE-2022-38476
CVE-2022-38477
CVE-2022-38478
D:CVE-2022-38478
DSA-5217
DSA-5221
L3:64727
MISC:bugzilla.mozilla.org:/buglist.cgi
MISC:bugzilla.mozilla.org:/show_bug.cgi
MISC:www.mozilla.org:/security/advisories/mfsa2022-33/
MISC:www.mozilla.org:/security/advisories/mfsa2022-34/
MISC:www.mozilla.org:/security/advisories/mfsa2022-35/
MISC:www.mozilla.org:/security/advisories/mfsa2022-36/
MISC:www.mozilla.org:/security/advisories/mfsa2022-37/
Mozilla Foundation Security Advisory 2022-34
Mozilla Foundation Security Advisory 2022-36
RHSA-2022:6164
RHSA-2022:6165
RHSA-2022:6166
RHSA-2022:6167
RHSA-2022:6168
RHSA-2022:6169
RHSA-2022:6174
RHSA-2022:6175
RHSA-2022:6176
RHSA-2022:6177
RHSA-2022:6178
RHSA-2022:6179
SMASH Issue 340547
SMASH Issue 340550
bnc#1202645
rh#2120673
rh#2120674
rh#2120678
rh#2120695
rh#2120696
xf#234199
CVE-2022-38533binutils:Won't fixmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-38533
CVE-2022-38533
D:CVE-2022-38533
FEDORA:FEDORA-2022-19538a3732
FEDORA:FEDORA-2022-667ee398b1
L3:64795
MISC:sourceware.org:CVE-2022-38533
SMASH Issue 340903
bnc#1202816
https://github.com/bminor/binutils-gdb/commit/45d92439aebd0386ef8af76e1796d08cfe457e1d
https://security.gentoo.org/glsa/202309-15
https://sourceware.org/bugzilla/show_bug.cgi?id=29495
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=45d92439aebd0386ef8af76e1796d08cfe457e1d
jsc#CAR-1996
rh#2124569
CVE-2022-3857libpng16:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2022-3857
SMASH Issue 347910
bnc#1205432
https://security.netapp.com/advisory/ntap-20230406-0004/
https://sourceforge.net/p/libpng/bugs/300/
rh#2142600
CVE-2022-3903kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3903
L3:66053
MISC:lore.kernel.org:CVE-2022-3903
SMASH Issue 347386
bnc#1205220
jsc#CAR-2170
rh#2140985
CVE-2022-39046glibc:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:CVE-2022-39046
CVE-2022-39046
D:CVE-2022-39046
MISC:sourceware.org:CVE-2022-39046
MISC:sourceware.org:OSS:2024/01/30/6
OSS:2024/01/30/6
OSS:2024/01/30/8
SMASH Issue 341242
bnc#1203011
http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2024/Feb/3
https://security.gentoo.org/glsa/202310-03
rh#2123394
CVE-2022-3910kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-3910
MISC:github.com:CVE-2022-3910
MISC:kernel.dance:CVE-2022-3910
SMASH Issue 348698
bnc#1205670
rh#2144960
CVE-2022-39188kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-39188
D:CVE-2022-3522
D:CVE-2022-39188
DSA-5257
DSA-5324
DSA-5333
DSA-5480
L3:64310
L3:64459
L3:64525
L3:64549
L3:64602
L3:64716
L3:64743
L3:64933
L3:65176
L3:65224
L3:65237
L3:65426
L3:66074
L3:66076
MISC:bugs.chromium.org:CVE-2022-39188
MISC:cdn.kernel.org:CVE-2022-39188
MISC:git.kernel.org:CVE-2022-3176
MISC:git.kernel.org:CVE-2022-3522
MISC:git.kernel.org:CVE-2022-3565
MISC:git.kernel.org:CVE-2022-39188
MISC:github.com:CVE-2022-39188
MISC:kernel.dance:CVE-2022-3176
MISC:lore.kernel.org:CVE-2022-39188
MISC:vuldb.com:CVE-2022-3522
MISC:vuldb.com:CVE-2022-3565
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
OSS:2022/08/09/6
OSS:2022/Q4/30
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
RHSA-2023:3388
RHSA-2023:4801
RHSA-2023:4814
SMASH Issue 341411
ZDI-22-1462
bdo#1011160
bdo#1014494
bdo#1022555
bdo#1024737
bdo#1029653
bnc#1203107
bnc#1203116
bnc#1203391
bnc#1203511
bnc#1204167
bnc#1204432
bnc#1205765
bnc#1205883
https://security.netapp.com/advisory/ntap-20230216-0003/
jsc#CAR-2011
jsc#CAR-2032
jsc#CAR-2090
jsc#CAR-2120
linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f
linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f
linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f
linux.git:commit:fd3d91ab1c6ab0628fe642dd570b56302c30a792
linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6
rh#2067482
rh#2099504
rh#2103681
rh#2108696
rh#2114849
rh#2122960
rh#2123056
rh#2124475
rh#2124788
rh#2127890
rh#2130141
rh#2132640
rh#2133483
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2135717
rh#2138818
rh#2139586
rh#2139598
rh#2139610
rh#2148458
rh#2150953
rh#2150979
rh#2161310
rh#2165706
rh#2176035
rh#2180984
CVE-2022-39189kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-39189
DSA-5480
L3:64716
L3:64743
L3:65426
MISC:bugs.chromium.org:CVE-2022-39189
MISC:cdn.kernel.org:CVE-2022-39189
MISC:git.kernel.org:CVE-2022-39189
MISC:github.com:CVE-2022-39189
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 341410
bnc#1203066
bnc#1203067
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://security.netapp.com/advisory/ntap-20230214-0007/
https://www.debian.org/security/2023/dsa-5480
jsc#CAR-2009
rh#2124788
CVE-2022-39190kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-39190
MISC:cdn.kernel.org:CVE-2022-39190
MISC:github.com:CVE-2022-39190
MISC:lore.kernel.org:CVE-2022-39190
MISC:twitter.com:CVE-2022-39190
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 341409
bnc#1203117
rh#2129152
CVE-2022-3977kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-3977
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
OSS:2022/Q4/139
SMASH Issue 347879
bnc#1207048
https://security.netapp.com/advisory/ntap-20230223-0005/
rh#2142371
CVE-2022-39842kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-39842
D:CVE-2022-39842
DSA-5257
L3:64716
L3:64743
MISC:cdn.kernel.org:CVE-2022-39188
MISC:github.com:CVE-2022-39842
MISC:lore.kernel.org:/all/YylaC1wHHyLw22D3@kadam/T/
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/Q4/30
SMASH Issue 341494
ZDI-22-1462
bnc#1203124
https://lore.kernel.org/all/YylaC1wHHyLw22D3%40kadam/T/
linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f
linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc
linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f
linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f
linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6
rh#2123056
rh#2124470
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2139586
rh#2139598
CVE-2022-3996openssl:Not affected, openssl-1_1:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-3996
MISC:github.com:/openssl/openssl/commit/7725e7bfe6f2ce8146b6552b44e0d226be7638e7
MISC:www.openssl.org:/news/secadv/20221213.txt
SMASH Issue 350449
bnc#1206374
openssl.git:commit:4d0340a6d2f327700a059f0b8f954d6160f8eef5
rh#2153239
CVE-2022-40133kernel-source-rt:Won't fixmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-40133
MISC:bugzilla.openanolis.cn:CVE-2022-40133
SMASH Issue 341974
bnc#1203329
rh#2133453
CVE-2022-40303libxml2:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20221209-0003/
CONFIRM:support.apple.com:/kb/HT213531
CONFIRM:support.apple.com:/kb/HT213533
CONFIRM:support.apple.com:/kb/HT213534
CONFIRM:support.apple.com:/kb/HT213535
CONFIRM:support.apple.com:/kb/HT213536
CVE-2022-40303
D:CVE-2022-40303
DSA-5271
FULLDISC:20221220 APPLE-SA-2022-12-13-2 iOS 15.7.2 and iPadOS 15.7.2
FULLDISC:20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2
FULLDISC:20221220 APPLE-SA-2022-12-13-6 macOS Big Sur 11.7.2
FULLDISC:20221220 APPLE-SA-2022-12-13-7 tvOS 16.2
L3:64463
L3:64669
L3:64819
L3:64824
L3:66102
MISC:gitlab.gnome.org:CVE-2022-40303
RHSA-2022:8841
RHSA-2023:0173
RHSA-2023:0338
SMASH Issue 345322
SMASH Issue 345323
bdo#1022224
bdo#1022225
bnc#1204366
jsc#CAR-2112
rh#2136266
CVE-2022-40304libxml2:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20221209-0003/
CONFIRM:support.apple.com:/kb/HT213531
CONFIRM:support.apple.com:/kb/HT213533
CONFIRM:support.apple.com:/kb/HT213534
CONFIRM:support.apple.com:/kb/HT213535
CONFIRM:support.apple.com:/kb/HT213536
CVE-2022-40304
DSA-5271
FULLDISC:20221220 APPLE-SA-2022-12-13-2 iOS 15.7.2 and iPadOS 15.7.2
FULLDISC:20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2
FULLDISC:20221220 APPLE-SA-2022-12-13-6 macOS Big Sur 11.7.2
FULLDISC:20221220 APPLE-SA-2022-12-13-7 tvOS 16.2
L3:64463
L3:64536
L3:64669
L3:64819
L3:64824
L3:65225
L3:66102
MISC:gitlab.gnome.org:CVE-2022-40303
MISC:gitlab.gnome.org:CVE-2022-40304
Oracle:CVE-2022-40304
RHSA-2022:8841
RHSA-2023:0173
RHSA-2023:0338
SMASH Issue 345324
SMASH Issue 345325
bdo#1022224
bdo#1022225
bnc#1204367
jsc#CAR-2113
rh#2136288
CVE-2022-40307kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-40307
D:CVE-2022-40307
DSA-5257
MISC:github.com:CVE-2022-40307
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/Q4/30
SMASH Issue 341969
ZDI-22-1462
bnc#1203322
jsc#CAR-2028
linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f
linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc
linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f
linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f
linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6
rh#2123056
rh#2127424
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2139586
rh#2139598
CVE-2022-40476kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-40476
MISC:git.kernel.org:CVE-2022-40476
MISC:lore.kernel.org:CVE-2022-40476
MISC:mirrors.edge.kernel.org:CVE-2022-40476
SMASH Issue 342456
bnc#1203435
rh#2133407
CVE-2022-40617strongswan:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:www.strongswan.org:CVE-2022-40617
CVE-2022-40617
D:CVE-2022-40617
DSA-5249
FEDORA:FEDORA-2022-525510c815
SMASH Issue 343006
SMASH Issue 343007
bdo#1021271
bnc#1203556
jsc#CAR-2089
rh#2132444
CVE-2022-40674expat:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-40674
CVE-2022-40674
DSA-5236
FEDORA:FEDORA-2022-15ec504440
FEDORA:FEDORA-2022-c22feb71ba
FEDORA:FEDORA-2022-c68d90efc3
FEDORA:FEDORA-2022-d93b3bd8b9
FEDORA:FEDORA-2022-dcb1d7bcb1
GLSA-202209-24
GLSA-202211-06
L3:64174
L3:64317
L3:64328
L3:64394
L3:64544
L3:64594
L3:64660
L3:64679
L3:65221
L3:65340
MISC:github.com:CVE-2022-40674
MLIST:[debian-lts-announce] 20220925 [SECURITY] [DLA 3119-1] expat security update
RHSA-2022:6831
RHSA-2022:6832
RHSA-2022:6833
RHSA-2022:6834
RHSA-2022:6838
RHSA-2022:6878
RHSA-2022:6921
RHSA-2022:6967
RHSA-2022:6995
RHSA-2022:6996
RHSA-2022:6997
RHSA-2022:6998
RHSA-2022:7019
RHSA-2022:7020
RHSA-2022:7021
RHSA-2022:7022
RHSA-2022:7023
RHSA-2022:7024
RHSA-2022:7025
RHSA-2022:7026
RHSA-2022:8598
RHSA-2022:8841
RHSA-2023:3068
SMASH Issue 342404
bdo#1019761
bnc#1203438
bnc#1203571
jsc#CAR-2029
rh#2130769
CVE-2022-40735openssl:Not affected, openssl-1_1:Not affectedimportant ()CVE-2022-40735
MISC:gist.github.com:CVE-2022-40735
MISC:github.com:CVE-2002-20001
MISC:link.springer.com:CVE-2022-40735
MISC:nvlpubs.nist.gov:CVE-2022-40735
MISC:raw.githubusercontent.com:CVE-2022-40735
MISC:www.researchgate.net:CVE-2022-40735
MISC:www.rfc-editor.org:CVE-2022-40735
SMASH Issue 348108
bnc#1205476
https://dheatattack.gitlab.io/
https://ieeexplore.ieee.org/document/10374117
CVE-2022-40768kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-40768
D:CVE-2022-40768
FEDORA:FEDORA-2022-1a5b125ac6
FEDORA:FEDORA-2022-2cfbe17910
FEDORA:FEDORA-2022-b948fc3cfb
MISC:git.kernel.org:CVE-2022-40768
MISC:lore.kernel.org:CVE-2022-40768
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
OSS:2022/09/09/1
OSS:2022/09/19/1
OSS:2022/Q3/208
SMASH Issue 342851
bnc#1203514
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6022f210461fef67e6e676fd8544ca02d1bcfa7a
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GGHENNMLCWIQV2LLA56BJNFIUZ7WB4IY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2KTU5LFZNQS7YNGE56MT46VHMXL3DD2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VNN3VFQPECS6D4PS6ZWD7AFXTOSJDSSR/
https://lore.kernel.org/all/20220908145154.2284098-1-gregkh%40linuxfoundation.org/
jsc#CAR-2036
rh#2128462
CVE-2022-40897python-setuptools:Releasedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:github.com:/pypa/setuptools/compare/v65.5.0...v65.5.1
CVE-2022-40897
D:CVE-2022-40897
MISC:github.com:/pypa/setuptools/blob/fe8a98e696241487ba6ac9f91faa38ade939ec5d/setuptools/package_index.py
MISC:github.com:/pypa/setuptools/commit/43a9c9bfa6aa626ec2a22540bea28d2ca77964be
MISC:pyup.io:/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
MISC:pyup.io:/vulnerabilities/CVE-2022-40897/52495/
RHSA-2023:0835
RHSA-2023:0952
SMASH Issue 351672
bnc#1206667
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADES3NLOE5QJKBLGNZNI2RGVOSQXA37R/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNA2BAH2ACBZ4TVJZKFLCR7L23BG5C3H/
https://security.netapp.com/advisory/ntap-20230214-0001/
https://security.netapp.com/advisory/ntap-20240621-0006/
jsc#CAR-2252
rh#2158559
CVE-2022-40899python3:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2022-40899
D:CVE-2022-40899
MISC:github.com:/PythonCharmers/python-future/blob/master/src/future/backports/http/cookiejar.py
MISC:github.com:/PythonCharmers/python-future/pull/610
MISC:github.com:/python/cpython/pull/17157
MISC:pypi.org:/project/future/
MISC:pyup.io:/posts/pyup-discovers-redos-vulnerabilities-in-top-python-packages/
RHSA-2023:2101
RHSA-2023:4466
SMASH Issue 351670
bnc#1206673
rh#2165866
CVE-2022-4095kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-4095
L3:64728
L3:64999
L3:65173
L3:65185
L3:65224
L3:65237
L3:66070
L3:66496
L3:67104
MISC:git.kernel.org:OSS:2022/11/18/1
OSS:2022/Q4/151
SMASH Issue 348226
SMASH Issue 348515
bnc#1205514
bnc#1205594
https://security.netapp.com/advisory/ntap-20230420-0005/
jsc#CAR-2182
rh#2144991
CVE-2022-40982kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2022-40982
DSA-5474
DSA-5475
L3:66852
OSS:2023/Q3/98
SMASH Issue 350726
bdo#1043305
bnc#1206418
bnc#1214083
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html
https://access.redhat.com/solutions/7027704
https://aws.amazon.com/security/security-bulletins/AWS-2023-007/
https://downfall.page
https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html
https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/
https://security.netapp.com/advisory/ntap-20230811-0001/
https://www.debian.org/security/2023/dsa-5474
https://www.debian.org/security/2023/dsa-5475
https://xenbits.xen.org/xsa/advisory-435.html
jsc#CAR-2837
rh#2223949
CVE-2022-41218kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2022-41218
DSA-5324
L3:64310
L3:64525
L3:64549
L3:64602
L3:64716
L3:64743
L3:65426
MISC:git.kernel.org:CVE-2022-41218
MISC:lore.kernel.org:CVE-2022-41218
OSS:2022/09/23/4
OSS:2022/09/24/1
OSS:2022/09/24/2
OSS:2022/Q3/233
OSS:2022/Q3/234
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 341205
SMASH Issue 343074
bnc#1202960
bnc#1203606
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fd3d91ab1c6ab0628fe642dd570b56302c30a792
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lore.kernel.org/all/20220908132754.30532-1-tiwai%40suse.de/
jsc#CAR-2046
linux.git:commit:fd3d91ab1c6ab0628fe642dd570b56302c30a792
rh#2122960
CVE-2022-41222kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-41222
L3:64716
L3:64743
L3:65426
MISC:bugs.chromium.org:CVE-2022-41222
MISC:cdn.kernel.org:CVE-2021-38205
MISC:git.kernel.org:CVE-2022-41222
MISC:packetstormsecurity.com:CVE-2022-41222
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
RHSA-2023:0832
RHSA-2023:0839
RHSA-2023:0854
RHSA-2023:1130
RHSA-2023:1192
RHSA-2023:3491
SMASH Issue 343137
bnc#1203622
bnc#1203624
http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html
https://security.netapp.com/advisory/ntap-20230214-0008/
jsc#CAR-2047
rh#2138818
rh#2176035
CVE-2022-4127kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-4127
MISC:github.com:CVE-2022-4127
MISC:lore.kernel.org:CVE-2022-4127
SMASH Issue 348786
bnc#1205703
rh#2134370
CVE-2022-4128kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-4128
MISC:github.com:CVE-2022-4128
MISC:lore.kernel.org:CVE-2022-4128
RHSA-2023:2148
RHSA-2023:2458
SMASH Issue 348787
bnc#1205704
rh#2134380
CVE-2022-4129kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-4129
FEDORA:FEDORA-2022-24041b1667
FEDORA:FEDORA-2022-b36cd53dca
FEDORA:FEDORA-2022-e4460c41bc
MISC:lore.kernel.org:CVE-2022-4129
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 348788
bnc#1205711
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7X5SPXMXXFANDASPCKER2JIQO2F3UHCP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AM5KFIE6JNZXHBA5A2KYDZAT3MEX2B67/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOKXNIM2R4FQCDRQV67UMAY6EBC72QFG/
https://lore.kernel.org/all/20221114191619.124659-1-jakub%40cloudflare.com/t
https://lore.kernel.org/netdev/20221121085426.21315-1-jakub%40cloudflare.com/t
jsc#CAR-2185
rh#2134528
CVE-2022-4139kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-4139
L3:65426
MISC:nvd.nist.gov:OSS:2022/11/30/1
OSS:2022/11/30/1
OSS:2022/Q4/163
RHSA-2023:0101
RHSA-2023:0114
RHSA-2023:0123
RHSA-2023:0300
RHSA-2023:0334
RHSA-2023:0348
RHSA-2023:0440
RHSA-2023:0441
RHSA-2023:0496
RHSA-2023:0499
RHSA-2023:0512
RHSA-2023:0526
RHSA-2023:0531
RHSA-2023:0536
RHSA-2023:0859
SMASH Issue 348872
bnc#1205700
bnc#1205815
https://security.netapp.com/advisory/ntap-20230309-0004/
linux.git:commit:04aa64375f48a5d430b5550d9271f8428883e550
rh#2147572
CVE-2022-41409pcre:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-41409
SMASH Issue 372815
bnc#1213514
https://github.com/PCRE2Project/pcre2/commit/94e1c001761373b7d9450768aa15d04c25547a35
https://github.com/PCRE2Project/pcre2/issues/141
jsc#CAR-2760
rh#2260814
CVE-2022-4141vim:Releasedimportant7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)CONFIRM:huntr.dev:CVE-2022-4141
CVE-2022-4141
FEDORA:FEDORA-2022-1e14f3ae45
FEDORA:FEDORA-2022-fc4c513d06
L3:65301
L3:65303
L3:65457
MISC:github.com:CVE-2022-4141
SMASH Issue 348936
bnc#1205797
https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2193
rh#2148991
CVE-2022-41674kernel-source-rt:Releasedimportant8.8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2022-41674
D:CVE-2022-41674
D:CVE-2022-42719
DSA-5257
FEDORA:FEDORA-2022-1a5b125ac6
FEDORA:FEDORA-2022-2cfbe17910
FEDORA:FEDORA-2022-b948fc3cfb
L3:64716
L3:64743
L3:65426
MISC:git.kernel.org:CVE-2022-41674
MISC:packetstormsecurity.com:CVE-2022-42722
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/10/13/2
OSS:2022/10/13/5
OSS:2022/Q4/30
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 343657
ZDI-22-1462
bnc#1203770
bnc#1203994
bnc#1204051
bnc#1204292
jsc#CAR-2102
linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f
linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc
linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f
linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f
linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6
rh#2123056
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2139586
rh#2139598
CVE-2022-41808kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2022-41808
SMASH Issue 365966
bnc#1211315
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html
rh#2209264
CVE-2022-41848kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2022-41848
L3:65869
L3:66068
MISC:git.kernel.org:CVE-2022-41848
MISC:lore.kernel.org:CVE-2022-41848
SMASH Issue 344090
bnc#1203987
jsc#CAR-2068
rh#2131374
CVE-2022-41849kernel-source-rt:Releasedmoderate6.3 (CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-41849
L3:67179
MISC:lore.kernel.org:CVE-2022-41849
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
SMASH Issue 344089
bnc#1203992
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5610bcfe8693c02e2e4c8b31427f1bdbdecc839c
https://lore.kernel.org/all/20220925133243.GA383897%40ubuntu/T/
rh#2135327
CVE-2022-41850kernel-source-rt:Releasedlow4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L)CVE-2022-41850
L3:66065
MISC:lore.kernel.org:CVE-2022-41850
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
SMASH Issue 344088
bnc#1203960
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cacdb14b1c8d3804a3a7d31773bc7569837b71a4
https://lore.kernel.org/all/20220904193115.GA28134%40ubuntu/t/#u
jsc#CAR-2067
rh#2131378
CVE-2022-41858kernel-source-rt:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-41858
L3:65869
L3:66056
MISC:github.com:/torvalds/linux/commit/ec4eb8a86ade4d22633e1da2a7d85a846b7d1798
SMASH Issue 348695
bnc#1205671
https://security.netapp.com/advisory/ntap-20230223-0006/
jsc#CAR-2184
rh#2144379
CVE-2022-42010dbus-1:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2022-42010
D:CVE-2022-42010
D:CVE-2022-42011
D:CVE-2022-42012
DSA-5250
FEDORA:FEDORA-2022-076544c8aa
FEDORA:FEDORA-2022-7a963a79d1
FEDORA:FEDORA-2022-b0c2f2ab74
MISC:gitlab.freedesktop.org:CVE-2022-42010
MISC:gitlab.freedesktop.org:OSS:2022/10/06/1
OSS:2022/10/06/1
OSS:2022/Q4/7
RHSA-2022:8812
RHSA-2022:8977
RHSA-2023:0096
RHSA-2023:0335
SMASH Issue 344317
bdo#1004543
bdo#1005889
bnc#1204111
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
https://security.gentoo.org/glsa/202305-08
jsc#CAR-2086
rh#2133616
rh#2133617
rh#2133618
CVE-2022-42011dbus-1:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2022-42011
D:CVE-2022-42010
D:CVE-2022-42011
D:CVE-2022-42012
DSA-5250
FEDORA:FEDORA-2022-076544c8aa
FEDORA:FEDORA-2022-7a963a79d1
FEDORA:FEDORA-2022-b0c2f2ab74
MISC:gitlab.freedesktop.org:CVE-2022-42011
MISC:gitlab.freedesktop.org:OSS:2022/10/06/1
OSS:2022/10/06/1
OSS:2022/Q4/7
RHSA-2022:8812
RHSA-2022:8977
RHSA-2023:0096
RHSA-2023:0335
SMASH Issue 344339
bdo#1004543
bdo#1005889
bnc#1204112
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
https://security.gentoo.org/glsa/202305-08
jsc#CAR-2087
rh#2133616
rh#2133617
rh#2133618
CVE-2022-42012dbus-1:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2022-42012
D:CVE-2022-42010
D:CVE-2022-42011
D:CVE-2022-42012
DSA-5250
FEDORA:FEDORA-2022-076544c8aa
FEDORA:FEDORA-2022-7a963a79d1
FEDORA:FEDORA-2022-b0c2f2ab74
L3:67797
MISC:gitlab.freedesktop.org:CVE-2022-42012
MISC:gitlab.freedesktop.org:OSS:2022/10/06/1
OSS:2022/10/06/1
OSS:2022/Q4/7
RHSA-2022:8812
RHSA-2022:8977
RHSA-2023:0096
RHSA-2023:0335
SMASH Issue 344340
bdo#1004543
bdo#1005889
bnc#1204113
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CO7N226I3X5FNBR2MACCH6TS764VJP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ND74SKN56BCYL3QLEAAB6E64UUBRA5UG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SQCSLMCK2XGX23R2DKW2MSAICQAK6MT2/
https://security.gentoo.org/glsa/202305-08
jsc#CAR-2088
rh#2133616
rh#2133617
rh#2133618
CVE-2022-4203openssl:Not affected, openssl-1_1:Not affectedmoderate6.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H)CVE-2022-4203
RHSA-2023:0946
RHSA-2023:1199
SMASH Issue 354987
SMASH Issue 354988
bnc#1207535
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c927a3492698c254637da836762f9b1f86cffabc
https://security.gentoo.org/glsa/202402-08
https://www.openssl.org/news/secadv/20230207.txt
openssl.git:commit:399c2da08ab9c6a382f8e9950742a022e847fec0
openssl.git:commit:748f478f814bc8e418542c68599ec7dbcbac97b2
rh#2164488
CVE-2022-42328kernel-source-rt:Releasedmoderate5.7 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-42328
CVE-2022-42329
D:CVE-2022-42328
D:CVE-2022-42329
MISC:xenbits.xenproject.org:/xsa/advisory-424.txt
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
OSS:2022/12/08/2
OSS:2022/12/08/3
OSS:2022/12/09/2
OSS:2022/Q4/171
SMASH Issue 349927
SMASH Issue 349929
bnc#1206114
jsc#CAR-2234
linux.git:commit:74e7e1efdad45580cc3839f2a155174cf158f9b5
rh#2156215
CVE-2022-42329kernel-source-rt:Releasedmoderate5.7 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-42328
CVE-2022-42329
D:CVE-2022-42328
D:CVE-2022-42329
MISC:xenbits.xenproject.org:/xsa/advisory-424.txt
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
OSS:2022/12/08/2
OSS:2022/12/08/3
OSS:2022/12/09/2
OSS:2022/Q4/171
SMASH Issue 349928
SMASH Issue 349929
bnc#1206114
jsc#CAR-2234
linux.git:commit:74e7e1efdad45580cc3839f2a155174cf158f9b5
rh#2156215
CVE-2022-42432kernel-source-rt:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)CVE-2022-42432
RHSA-2022:7933
RHSA-2022:8267
SMASH Issue 346050
ZDI-22-1457
bnc#1204614
https://patchwork.ozlabs.org/project/netfilter-devel/patch/20220907082618.1193201-1-pablo@netfilter.org/
https://www.zerodayinitiative.com/advisories/ZDI-22-1457/
jsc#CAR-2136
rh#2182888
CVE-2022-4269kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-4269
DSA-5480
MISC:lore.kernel.org:/netdev/33dc43f587ec1388ba456b4915c75f02a8aae226.1663945716.git.dcaratti@redhat.com/
RHSA-2023:1130
RHSA-2023:1202
RHSA-2023:1203
RHSA-2023:1220
RHSA-2023:1221
RHSA-2023:1469
RHSA-2023:1470
RHSA-2023:1566
RHSA-2023:1584
SMASH Issue 349329
bnc#1206024
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lore.kernel.org/netdev/33dc43f587ec1388ba456b4915c75f02a8aae226.1663945716.git.dcaratti%40redhat.com/
https://security.netapp.com/advisory/ntap-20230929-0001/
https://www.debian.org/security/2023/dsa-5480
jsc#CAR-2220
rh#2150272
CVE-2022-42703kernel-source-rt:Releasedimportant7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-36946
CVE-2022-2588
CVE-2022-3635
CVE-2022-42703
D:CVE-2022-26373
D:CVE-2022-3635
D:CVE-2022-36879
D:CVE-2022-36946
DSA-5184
DSA-5207
DSA-5324
L3:63917
L3:64012
L3:64086
L3:64306
L3:64310
L3:64329
L3:64525
L3:64549
L3:64602
L3:64716
L3:64728
L3:64743
L3:65176
L3:65426
L3:66045
MISC:bugs.chromium.org:CVE-2022-42703
MISC:cdn.kernel.org:CVE-2022-42703
MISC:git.kernel.org:CVE-2022-42703
MISC:github.com:CVE-2022-42703
MISC:googleprojectzero.blogspot.com:/2022/12/exploiting-CVE-2022-42703-bringing-back-the-stack-attack.html
MISC:marc.info:CVE-2022-36946
MLIST:[debian-lts-announce] 20220911 [SECURITY] [DLA 3102-1] linux-5.10 new package
MLIST:[debian-lts-announce] 20221002 [SECURITY] [DLA 3131-1] linux security update
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/08/09/5
OSS:2022/08/09/6
OSS:2022/08/09/7
OSS:2022/Q3/114
OSS:2022/Q3/115
OSS:2022/Q3/116
RHSA-2022:6551
RHSA-2022:6872
RHSA-2022:6875
RHSA-2022:6978
RHSA-2022:6983
RHSA-2022:6991
RHSA-2022:7110
RHSA-2022:7134
RHSA-2022:7137
RHSA-2022:7146
RHSA-2022:7171
RHSA-2022:7173
RHSA-2022:7279
RHSA-2022:7280
RHSA-2022:7337
RHSA-2022:7338
RHSA-2022:7344
RHSA-2022:7885
RHSA-2023:1091
RHSA-2023:1092
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
RHSA-2023:3388
RHSA-2023:4022
RHSA-2023:4023
RHSA-2023:4137
RHSA-2023:4138
SMASH Issue 338825
SMASH Issue 344558
ZDI-22-1117
ZDI-22-1118
bnc#1201941
bnc#1202096
bnc#1202961
bnc#1203613
bnc#1204168
bnc#1204170
bnc#1204631
bnc#1204636
bnc#1205058
bnc#1205085
git.kernel.org:CVE-2022-3635
https://github.com/Markakd/CVE-2022-2588
https://lore.kernel.org/netdev/20220809170518.164662-1-cascardo@canonical.com/T/#u
https://ubuntu.com/security/notices/USN-5557-1
https://ubuntu.com/security/notices/USN-5560-1
https://ubuntu.com/security/notices/USN-5560-2
https://ubuntu.com/security/notices/USN-5562-1
https://ubuntu.com/security/notices/USN-5564-1
https://ubuntu.com/security/notices/USN-5565-1
https://ubuntu.com/security/notices/USN-5566-1
https://ubuntu.com/security/notices/USN-5567-1
https://ubuntu.com/security/notices/USN-5582-1
https://ubuntu.com/security/notices/USN-5588-1
https://www.zerodayinitiative.com/advisories/ZDI-22-1117/
jsc#CAR-1930
jsc#CAR-1961
jsc#CAR-2091
jsc#CAR-2137
linux.git:commit:31185df7e2b1d2fa1de4900247a12d7b9c7087eb
linux.git:commit:33172ab50a53578a95691310f49567c9266968b0
linux.git:commit:3777ea7bac3113005b7180e6b9dadf16d19a5827
linux.git:commit:42baefac638f06314298087394b982ead9ec444b
linux.git:commit:470ee20e069a6d05ae549f7d0ef2bdbcee6a81b2
linux.git:commit:5cadd4bb1d7fc9ab201ac14620d1a478357e4ebd
linux.git:commit:66e3531b33ee51dad17c463b4d9c9f52e341503d
linux.git:commit:6b1775f26a2da2b05a6dc8ec2b5d14e9a4701a1a
linux.git:commit:9ad36309e2719a884f946678e0296be10f0bb4c1
linux.git:commit:9f46c187e2e680ecd9de7983e4d081c3391acc76
linux.git:commit:abf1fd5919d6238ee3bc5eb4a9b6c3947caa6638
linux.git:commit:b0576cc9c6b843d99c6982888d59a56209341888
linux.git:commit:d3b6372c5881cb54925212abb62c521df8ba4809
linux.git:commit:eadb2f47a3ced5c64b23b90fd2a3463f63726066
linux.git:commit:fd3d91ab1c6ab0628fe642dd570b56302c30a792
rh#1832397
rh#2015046
rh#2063236
rh#2066706
rh#2066799
rh#2084125
rh#2084183
rh#2090226
rh#2103148
rh#2108691
rh#2112688
rh#2112693
rh#2114849
rh#2114874
rh#2114878
rh#2115065
rh#2115278
rh#2119855
rh#2120664
rh#2122960
rh#2124475
rh#2130141
rh#2132640
rh#2133483
rh#2148458
rh#2150953
vuldb.com:CVE-2022-3635
CVE-2022-42719kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230203-0008/
CVE-2022-42719
D:CVE-2022-42719
DSA-5257
FEDORA:FEDORA-2022-1a5b125ac6
FEDORA:FEDORA-2022-2cfbe17910
FEDORA:FEDORA-2022-b948fc3cfb
L3:64716
L3:64743
L3:65426
MISC:git.kernel.org:CVE-2022-42719
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/10/13/2
OSS:2022/10/13/5
OSS:2022/Q4/30
SMASH Issue 344559
ZDI-22-1462
bnc#1204051
bnc#1204292
http://packetstormsecurity.com/files/171005/Kernel-Live-Patch-Security-Notice-LNS-0091-1.html
jsc#CAR-2103
linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f
linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc
linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f
linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f
linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6
rh#2123056
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2139586
rh#2139598
CVE-2022-42720kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230203-0008/
CVE-2022-42720
D:CVE-2022-42720
DSA-5257
FEDORA:FEDORA-2022-1a5b125ac6
FEDORA:FEDORA-2022-2cfbe17910
FEDORA:FEDORA-2022-b948fc3cfb
L3:64716
L3:64743
L3:65426
MISC:git.kernel.org:CVE-2022-42720
MISC:packetstormsecurity.com:CVE-2022-42722
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/10/13/5
OSS:2022/Q4/30
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 344278
ZDI-22-1462
bnc#1204059
bnc#1204291
jsc#CAR-2104
linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f
linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc
linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f
linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f
linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6
rh#2123056
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2139586
rh#2139598
CVE-2022-42721kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230203-0008/
CVE-2022-42721
D:CVE-2022-42721
DSA-5257
FEDORA:FEDORA-2022-1a5b125ac6
FEDORA:FEDORA-2022-2cfbe17910
FEDORA:FEDORA-2022-b948fc3cfb
L3:64716
L3:64743
L3:65426
MISC:git.kernel.org:CVE-2022-42721
MISC:packetstormsecurity.com:CVE-2022-42722
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/10/13/5
OSS:2022/Q4/30
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 344279
ZDI-22-1462
bnc#1204060
bnc#1204290
jsc#CAR-2105
linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f
linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc
linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f
linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f
linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6
rh#2123056
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2139586
rh#2139598
CVE-2022-42722kernel-source-rt:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230203-0008/
CVE-2022-42722
D:CVE-2022-42722
DSA-5257
FEDORA:FEDORA-2022-1a5b125ac6
FEDORA:FEDORA-2022-2cfbe17910
FEDORA:FEDORA-2022-b948fc3cfb
L3:64716
L3:64743
L3:65426
MISC:git.kernel.org:CVE-2022-42722
MISC:packetstormsecurity.com:CVE-2022-42722
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
OSS:2022/10/13/5
OSS:2022/Q4/30
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 344419
ZDI-22-1462
bnc#1204125
bnc#1204289
jsc#CAR-2101
linux.git:commit:0b7808818cb9df6680f98996b8e9a439fa7bcc2f
linux.git:commit:8f033d2becc24aa6bfd2a5c104407963560caabc
linux.git:commit:aebe9f4639b13a1f4e9a6b42cdd2e38c617b442d
linux.git:commit:b2d03cabe2b2e150ff5a381731ea0355459be09f
linux.git:commit:bcca852027e5878aec911a347407ecc88d6fff7f
linux.git:commit:ff05d4b45dd89b922578dac497dcabf57cf771c6
rh#2123056
rh#2134377
rh#2134440
rh#2134451
rh#2134506
rh#2134517
rh#2139586
rh#2139598
CVE-2022-42895kernel-source-rt:Releasedmoderate6.8 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H)CVE-2022-42895
MISC:github.com:OSS:2022/Q4/190
MISC:kernel.dance:CVE-2022-42895
OSS:2022/Q4/190
SMASH Issue 348814
bnc#1205705
jsc#CAR-2186
linux.git:commit:b1a2cd50c0357f243b7435a732b4e62ba3157a2e
rh#2147356
CVE-2022-42896kernel-source-rt:Releasedmoderate6.8 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)CVE-2022-42896
MISC:github.com:OSS:2022/Q4/191
MISC:kernel.dance:CVE-2022-42896
OSS:2022/Q4/191
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:3461
RHSA-2023:3462
RHSA-2023:3517
RHSA-2023:4137
RHSA-2023:4138
RHSA-2023:4230
RHSA-2023:4517
RHSA-2023:4531
RHSA-2023:4541
RHSA-2023:4789
RHSA-2023:4888
RHSA-2023:5580
RHSA-2023:5588
RHSA-2023:5589
SMASH Issue 348813
bnc#1205709
jsc#CAR-2187
linux.git:commit:711f8c3fb3db61897080468586b970c87c61d9e4
rh#2147364
CVE-2022-42915curl:Not affectedimportant7.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)CONFIRM:security.netapp.com:/advisory/ntap-20221209-0010/
CONFIRM:support.apple.com:/kb/HT213604
CONFIRM:support.apple.com:/kb/HT213605
CVE-2022-42915
D:CVE-2022-42915
FEDORA:FEDORA-2022-01ffde372c
FEDORA:FEDORA-2022-39688a779d
FEDORA:FEDORA-2022-e9d65906c4
FULLDISC:20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2
FULLDISC:20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3
GLSA-202212-01
OSS:2022/Q4/49
Oracle:CVE-2022-42915
RHSA-2022:8840
RHSA-2022:8841
SMASH Issue 345347
SMASH Issue 345348
bnc#1204385
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/
rh#2135413
CVE-2022-42916curl:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:/advisory/ntap-20221209-0010/
CONFIRM:security.netapp.com:CVE-2022-30115
CONFIRM:support.apple.com:/kb/HT213604
CONFIRM:support.apple.com:/kb/HT213605
CVE-2022-30115
CVE-2022-42916
CVE-2022-43551
D:CVE-2022-42916
FEDORA:FEDORA-2022-01ffde372c
FEDORA:FEDORA-2022-39688a779d
FEDORA:FEDORA-2022-d7ee33d4ad
FEDORA:FEDORA-2022-e9d65906c4
FULLDISC:20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2
FULLDISC:20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3
GLSA-202212-01
MISC:curl.se:OSS:2022/Q2/97
MISC:github.com:OSS:2022/10/26/4
MISC:github.com:OSS:2022/12/21/1
MISC:hackerone.com:/reports/1755083
MISC:hackerone.com:CVE-2022-30115
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/
OSS:2022/10/26/4
OSS:2022/12/21/1
OSS:2022/Q2/97
OSS:2022/Q4/204
OSS:2022/Q4/50
Oracle:CVE-2022-42916
Oracle:CVE-2022-43551
RHSA-2022:8840
RHSA-2022:8841
RHSA-2023:3354
RHSA-2023:3355
SMASH Issue 330793
SMASH Issue 345349
SMASH Issue 345350
SMASH Issue 350247
bnc#1199225
bnc#1204386
bnc#1206308
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230427-0007/
rh#2082223
rh#2135416
rh#2152639
CVE-2022-42919python3:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:github.com:/python/cpython/compare/v3.10.8...v3.10.9
CONFIRM:github.com:/python/cpython/compare/v3.9.15...v3.9.16
CONFIRM:security.netapp.com:/advisory/ntap-20221209-0006/
CVE-2022-42919
D:CVE-2022-42919
FEDORA:FEDORA-2022-028c09eaa7
FEDORA:FEDORA-2022-1166a1df1e
FEDORA:FEDORA-2022-462f39dd2f
FEDORA:FEDORA-2022-a7cad6bd22
FEDORA:FEDORA-2022-b17bf30e88
FEDORA:FEDORA-2022-f44dd1bec2
FEDORA:FEDORA-2023-097dd40685
FEDORA:FEDORA-2023-af5206f71d
MISC:github.com:/python/cpython/issues/97514
MISC:github.com:CVE-2022-42919
RHSA-2022:8492
RHSA-2022:8493
SMASH Issue 346621
bnc#1204886
https://security.gentoo.org/glsa/202305-02
rh#2138705
CVE-2022-4292vim:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:huntr.dev:/bounties/da3d4c47-e57a-451e-993d-9df0ed31f57b
CONFIRM:security.netapp.com:/advisory/ntap-20230113-0005/
CVE-2022-4292
FEDORA:FEDORA-2023-340f1d6ab9
L3:64932
L3:65186
L3:65231
L3:65301
L3:65303
L3:65540
MISC:github.com:/vim/vim/commit/c3d27ada14acd02db357f2d16347acc22cb17e93
SMASH Issue 349830
bnc#1206075
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2229
jsc#PED-1802
rh#2151558
CVE-2022-4293vim:Releasedmoderate6.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H)CONFIRM:huntr.dev:/bounties/385a835f-6e33-4d00-acce-ac99f3939143
CONFIRM:security.netapp.com:/advisory/ntap-20230203-0007/
CVE-2022-4293
L3:65874
MISC:github.com:/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b
SMASH Issue 349829
bnc#1206077
https://security.gentoo.org/glsa/202305-16
jsc#CAR-2230
jsc#PED-1802
rh#2151566
CVE-2022-4304openssl:Not affected, openssl-1_1:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2022-4304
DSA-5343
L3:65184
L3:65622
L3:66264
L3:66298
L3:66706
RHSA-2023:0946
RHSA-2023:1199
RHSA-2023:1405
RHSA-2023:2165
RHSA-2023:2932
RHSA-2023:3354
RHSA-2023:3355
RHSA-2023:3408
RHSA-2023:3420
RHSA-2023:3421
RHSA-2023:4128
SMASH Issue 354985
SMASH Issue 354986
bdo#1023424
bnc#1207534
bnc#1208070
https://security.gentoo.org/glsa/202402-08
https://www.openssl.org/news/secadv/20230207.txt
jsc#CAR-2339
openssl.git:commit:b1892d21f8f0435deb0250f24a97915dc641c807
openssl.git:commit:f06ef1657a3d4322153b26231a7afa3d55724e52
rh#2164487
CVE-2022-43551curl:Not affectedimportant6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)CONFIRM:security.netapp.com:/advisory/ntap-20221209-0010/
CONFIRM:security.netapp.com:CVE-2022-30115
CONFIRM:support.apple.com:/kb/HT213604
CONFIRM:support.apple.com:/kb/HT213605
CVE-2022-30115
CVE-2022-42916
CVE-2022-43551
D:CVE-2022-42916
FEDORA:FEDORA-2022-01ffde372c
FEDORA:FEDORA-2022-39688a779d
FEDORA:FEDORA-2022-d7ee33d4ad
FEDORA:FEDORA-2022-e9d65906c4
FULLDISC:20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2
FULLDISC:20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3
GLSA-202212-01
MISC:curl.se:OSS:2022/Q2/97
MISC:github.com:OSS:2022/10/26/4
MISC:github.com:OSS:2022/12/21/1
MISC:hackerone.com:/reports/1755083
MISC:hackerone.com:CVE-2022-30115
MISC:lists.fedoraproject.org:/archives/list/package-announce%40lists.fedoraproject.org/message/TVWZW5CNSJ7UYAF2BGSYAWAEXDJYUBHA/
OSS:2022/10/26/4
OSS:2022/12/21/1
OSS:2022/Q2/97
OSS:2022/Q4/204
OSS:2022/Q4/50
Oracle:CVE-2022-42916
Oracle:CVE-2022-43551
RHSA-2022:8840
RHSA-2022:8841
RHSA-2023:3354
RHSA-2023:3355
SMASH Issue 330793
SMASH Issue 345349
SMASH Issue 350247
SMASH Issue 350248
bnc#1199225
bnc#1204386
bnc#1206308
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/37YEVVC6NAF6H7UHH6YAUY5QEVY6LIH2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVU3IMZCKR4VE6KJ4GCWRL2ILLC6OV76/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q27V5YYMXUVI6PRZQVECON32XPVWTKDK/
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230427-0007/
rh#2082223
rh#2135416
rh#2152639
CVE-2022-43552curl:Releasedmoderate5.6 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)CVE-2022-43552
DSA-5330
L3:66794
OSS:2022/Q4/205
RHSA-2023:2478
RHSA-2023:2963
RHSA-2023:3354
RHSA-2023:3355
SMASH Issue 350249
SMASH Issue 350250
bnc#1206309
http://seclists.org/fulldisclosure/2023/Mar/17
https://hackerone.com/reports/1764858
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230214-0002/
https://support.apple.com/kb/HT213670
jsc#CAR-2237
rh#2152652
CVE-2022-43680expat:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:CVE-2022-43680
CVE-2022-43680
DSA-5266
FEDORA:FEDORA-2022-3cf0e7ebc7
FEDORA:FEDORA-2022-49db80f821
FEDORA:FEDORA-2022-5f1e2e9016
FEDORA:FEDORA-2022-ae2559a8f4
FEDORA:FEDORA-2022-c43235716e
FEDORA:FEDORA-2022-f3a939e960
GLSA-202210-38
L3:64675
L3:64679
L3:64732
L3:64817
L3:65221
MISC:github.com:CVE-2022-43680
MLIST:[debian-lts-announce] 20221028 [SECURITY] [DLA 3165-1] expat security update
OSS:2023/12/28/5
OSS:2023/Q4/345
OSS:2024/01/03/5
OSS:2024/Q1/7
Oracle:CVE-2022-43680
RHSA-2023:0103
RHSA-2023:0337
RHSA-2023:3355
SMASH Issue 346080
SMASH Issue 348518
SMASH Issue 348548
SMASH Issue 357311
bdo#1022743
bnc#1204708
bnc#1205590
bnc#1205598
bnc#1205837
bnc#1206239
bnc#1208339
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AJ5VY2VYXE4WTRGQ6LMGLF6FV3SY37YE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BY4OPSIB33ETNUXZY2UPZ4NGQ3OKDY4D/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DPQVIF6TOJNY2T3ZZETFKR4G34FFREBQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FFCOMBSOJKLIKCGCJWHLJXO4EVYBG7AR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IUJ2BULJTZ2BMSKQHB6US674P55UCWWS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5XOOB7CD55CEE6OJYKSACSIMQ4RWQ6/
jsc#CAR-2145
rh#2130769
rh#2140059
CVE-2022-43750kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-43750
D:CVE-2022-43750
L3:65869
MISC:cdn.kernel.org:CVE-2022-43750
MISC:git.kernel.org:CVE-2022-43750
MISC:github.com:CVE-2022-43750
MLIST:[debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
MLIST:[debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
RHSA-2023:1987
RHSA-2023:1988
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 346065
SMASH Issue 346176
bnc#1204653
jsc#CAR-2141
rh#2151270
CVE-2022-4378kernel-source-rt:Releasedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2022-4378
L3:65173
L3:65185
L3:65426
L3:65804
L3:66541
L3:66770
L3:67393
L3:67469
MISC:git.kernel.org:/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-avoid-integer-type-confusion-in-get_proc_long.patch
MISC:git.kernel.org:/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-6.0/proc-proc_skip_spaces-shouldn-t-think-it-is-working-on-c-strings.patch
OSS:2022/Q4/178
RHSA-2023:0856
RHSA-2023:0858
RHSA-2023:0944
RHSA-2023:0945
RHSA-2023:0951
RHSA-2023:0979
RHSA-2023:1008
RHSA-2023:1091
RHSA-2023:1092
RHSA-2023:1101
RHSA-2023:1103
RHSA-2023:1109
RHSA-2023:1110
RHSA-2023:1202
RHSA-2023:1203
RHSA-2023:1220
RHSA-2023:1221
RHSA-2023:1251
RHSA-2023:1435
RHSA-2023:1566
RHSA-2023:1584
RHSA-2023:1659
RHSA-2023:1705
RHSA-2023:1706
RHSA-2023:1822
RHSA-2023:3388
RHSA-2023:3431
RHSA-2023:3491
SMASH Issue 350057
bnc#1206207
bnc#1206228
http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
jsc#CAR-2235
rh#2152548
CVE-2022-4379kernel-source-rt:Not affectedimportant7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H)CVE-2022-4379
FEDORA:FEDORA-2023-3fd7349f60
FEDORA:FEDORA-2023-f4f9182dc8
L3:65871
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
OSS:2022/Q4/185
RHSA-2023:0951
RHSA-2023:0979
RHSA-2023:1008
RHSA-2023:1202
RHSA-2023:1203
RHSA-2023:1435
SMASH Issue 350058
bnc#1206209
bnc#1206373
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LECFVUHKIRBV5JJBE3KQCLGKNYJPBRCN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAVD6JIILAVSRHZ4VXSV3RAAGUXKVXZA/
rh#2152807
CVE-2022-4382kernel-source-rt:Not affectedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2022-4382
OSS:2022/12/14/5
OSS:2022/Q4/187
SMASH Issue 350187
SMASH Issue 350198
bnc#1206258
bnc#1206363
rh#2182440
CVE-2022-43945kernel-source-rt:Releasedimportant8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20221215-0006/
CVE-2022-43945
L3:64728
L3:64999
L3:65173
L3:65185
L3:65426
L3:65628
L3:66491
MISC:git.kernel.org:CVE-2022-43945
OSS:2022/Q4/151
RHSA-2022:8973
RHSA-2022:8974
RHSA-2022:9082
RHSA-2023:0300
RHSA-2023:0334
RHSA-2023:0348
RHSA-2023:0832
RHSA-2023:0839
RHSA-2023:0854
SMASH Issue 347218
bnc#1205128
bnc#1205130
bnc#1205833
bnc#1207075
http://packetstormsecurity.com/files/171289/Kernel-Live-Patch-Security-Notice-LNS-0092-1.html
jsc#CAR-2169
rh#2133483
rh#2141752
rh#2144991
rh#2148458
CVE-2022-44032kernel-source-rt:Not affectedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-44032
D:CVE-2022-44032
L3:66046
MISC:lore.kernel.org:CVE-2022-44032
MISC:lore.kernel.org:CVE-2022-44033
SMASH Issue 346615
bnc#1204894
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b12f050c76f090cc6d0aebe0ef76fed79ec3f15
https://lore.kernel.org/lkml/20220915020834.GA110086%40ubuntu/
https://lore.kernel.org/lkml/20220919040701.GA302806%40ubuntu/
rh#2161999
CVE-2022-44033kernel-source-rt:Not affectedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-44033
D:CVE-2022-44033
L3:66059
MISC:lore.kernel.org:CVE-2022-44033
SMASH Issue 346614
bnc#1204922
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b12f050c76f090cc6d0aebe0ef76fed79ec3f15
https://lore.kernel.org/lkml/20220915020834.GA110086%40ubuntu/
https://lore.kernel.org/lkml/20220919040457.GA302681%40ubuntu/
rh#2162096
CVE-2022-44034kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2022-44034
D:CVE-2022-44034
MISC:lore.kernel.org:CVE-2022-44034
SMASH Issue 346613
bnc#1204901
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9b12f050c76f090cc6d0aebe0ef76fed79ec3f15
https://lore.kernel.org/lkml/20220916050333.GA188358%40ubuntu/
https://lore.kernel.org/lkml/20220919101825.GA313940%40ubuntu/
rh#2162104
CVE-2022-4415systemd:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-4415
MISC:github.com:/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c
OSS:2022/12/21/3
OSS:2022/Q4/206
Oracle:CVE-2022-4415
RHSA-2023:0837
RHSA-2023:0954
SMASH Issue 347034
SMASH Issue 350284
bnc#1205000
jsc#CAR-2216
rh#2155515
CVE-2022-4450openssl:Not affected, openssl-1_1:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-4450
DSA-5343
L3:68186
RHSA-2023:0946
RHSA-2023:1199
RHSA-2023:1405
RHSA-2023:2165
RHSA-2023:2932
RHSA-2023:3354
RHSA-2023:3355
RHSA-2023:3408
RHSA-2023:3420
RHSA-2023:3421
SMASH Issue 354991
SMASH Issue 354992
bdo#1023424
bnc#1207538
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34cca19c766bbddc31683d0858b
https://security.gentoo.org/glsa/202402-08
https://www.openssl.org/news/secadv/20230207.txt
jsc#CAR-2340
openssl.git:commit:bc07d371865095643ec4f7190f26b174830a2f02
openssl.git:commit:dc341a46677fe19f055bd2eea0e3a2af21053903
openssl.git:commit:ee6243f3947107d655f6dee96f63861561a5aaeb
rh#2164494
CVE-2022-45061python3:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20221209-0007/
CVE-2022-45061
FEDORA:FEDORA-2022-18b234c18b
FEDORA:FEDORA-2022-3d7e44dbd5
FEDORA:FEDORA-2022-3e859b6bc6
FEDORA:FEDORA-2022-45d2cfdfa4
FEDORA:FEDORA-2022-50deb53896
FEDORA:FEDORA-2022-6b8b96f883
FEDORA:FEDORA-2022-6ba889e0e3
FEDORA:FEDORA-2022-6d51289820
FEDORA:FEDORA-2022-6f4e6120d7
FEDORA:FEDORA-2022-93c6916349
FEDORA:FEDORA-2022-b2f06fbb62
FEDORA:FEDORA-2022-bcf089dd07
FEDORA:FEDORA-2022-dbb811d203
FEDORA:FEDORA-2022-de755fd092
FEDORA:FEDORA-2022-e1ce71ff40
FEDORA:FEDORA-2022-e699dd5247
FEDORA:FEDORA-2022-e6d0495206
FEDORA:FEDORA-2022-fbf6a320fe
FEDORA:FEDORA-2022-fd3771db30
FEDORA:FEDORA-2022-fdb2739feb
FEDORA:FEDORA-2023-097dd40685
FEDORA:FEDORA-2023-78b4ce2f23
FEDORA:FEDORA-2023-943556a733
FEDORA:FEDORA-2023-a990c93ed0
FEDORA:FEDORA-2023-af5206f71d
FEDORA:FEDORA-2023-f1381c83af
L3:65873
MISC:github.com:CVE-2022-45061
Oracle:CVE-2022-45061
RHSA-2023:0833
RHSA-2023:0953
RHSA-2023:2763
RHSA-2023:2764
RHSA-2023:2860
SMASH Issue 347485
bnc#1205244
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.debian.org/debian-lts-announce/2023/06/msg00039.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4MYQ3IV6NWA4CKSXEHW45CH2YNDHEPH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWJREJHWVRBYDP43YB5WRL3QC7UBA7BR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QCKD4AFBHXIMHS64ZER2U7QRT33HNE7L/
https://security.gentoo.org/glsa/202305-02
jsc#CAR-2171
rh#2144072
CVE-2022-4543kernel-source-rt:Won't fixmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-4543
MISC:www.willsroot.io:/2022/12/entrybleed.html
OSS:2022/12/16/3
OSS:2022/Q4/198
SMASH Issue 350945
SMASH Issue 350946
bnc#1206463
jsc#CAR-2248
rh#2133483
rh#2153871
CVE-2022-45869kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-45869
D:CVE-2022-45869
MISC:git.kernel.org:CVE-2022-45869
RHSA-2023:4377
RHSA-2023:4378
SMASH Issue 349178
bnc#1205882
linux.git:commit:47b0c2e4c220f2251fd8dcfbb44479819c715e15
rh#2151317
CVE-2022-45873systemd:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-45873
FEDORA:FEDORA-2022-ef4f57b072
MISC:github.com:CVE-2022-45873
RHSA-2023:0954
SMASH Issue 348841
bnc#1205713
rh#2149063
CVE-2022-45884kernel-source-rt:Unsupportedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230113-0006/
CVE-2022-45884
D:CVE-2022-45884
MISC:lore.kernel.org:CVE-2022-45884
MISC:lore.kernel.org:CVE-2022-45887
SMASH Issue 348923
bnc#1205756
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=627bb528b086b4136315c25d6a447a98ea9448d3
https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/
https://lore.kernel.org/linux-media/20221115131822.6640-4-imv4bel%40gmail.com/
jsc#CAR-2188
rh#2148510
CVE-2022-45885kernel-source-rt:Won't fixmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230113-0006/
CVE-2022-45885
D:CVE-2022-45885
MISC:lore.kernel.org:CVE-2022-45885
MISC:lore.kernel.org:CVE-2022-45887
SMASH Issue 348922
bnc#1205758
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6769a0b7ee0c3b31e1b22c3fadff2bfb642de23f
https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/
https://lore.kernel.org/linux-media/20221115131822.6640-2-imv4bel%40gmail.com/
jsc#CAR-2189
rh#2148513
CVE-2022-45886kernel-source-rt:Ignoremoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230113-0006/
CVE-2022-45886
D:CVE-2022-45886
MISC:lore.kernel.org:CVE-2022-45886
MISC:lore.kernel.org:CVE-2022-45887
SMASH Issue 348921
bnc#1205760
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4172385b0c9ac366dcab78eda48c26814b87ed1a
https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/
https://lore.kernel.org/linux-media/20221115131822.6640-3-imv4bel%40gmail.com/
jsc#CAR-2190
rh#2148517
CVE-2022-45887kernel-source-rt:Releasedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230113-0006/
CVE-2022-45887
D:CVE-2022-45887
L3:67651
MISC:lore.kernel.org:CVE-2022-45887
SMASH Issue 348920
bnc#1205762
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=517a281338322ff8293f988771c98aaa7205e457
https://lore.kernel.org/linux-media/20221115131822.6640-1-imv4bel%40gmail.com/
https://lore.kernel.org/linux-media/20221115131822.6640-5-imv4bel%40gmail.com/
jsc#CAR-2191
rh#2148520
CVE-2022-45888kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230113-0006/
CVE-2022-45888
D:CVE-2022-45888
MISC:lore.kernel.org:CVE-2022-45888
SMASH Issue 348919
bnc#1205764
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=282a4b71816b6076029017a7bab3a9dcee12a920
https://lore.kernel.org/all/20221022175404.GA375335%40ubuntu/
rh#2148523
CVE-2022-45919kernel-source-rt:Releasedimportant7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230113-0008/
CVE-2022-45919
CVE-2023-1077
CVE-2023-3159
D:CVE-2022-45919
DSA-5480
DSA-5492
L3:65449
L3:66178
L3:66431
L3:66432
L3:66463
L3:66491
L3:66496
L3:66505
L3:66852
L3:67104
MISC:lore.kernel.org:CVE-2022-45919
OSS:2023/Q1/126
SMASH Issue 348997
SMASH Issue 358071
ZDI-24-593
bnc#1205803
bnc#1208600
bnc#1208839
bnc#1208912
bnc#1212128
bnc#1212347
bnc#1212744
bnc#1213937
bnc#1214100
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=280a8ab81733da8bc442253c700a52c4c0886ffd
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97
https://github.com/torvalds/linux/commit/b7c81f80246fac44077166f3e07103affe6db8ff
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lore.kernel.org/linux-media/20221121063308.GA33821%40ubuntu/T/#u
https://security.netapp.com/advisory/ntap-20230511-0002/
jsc#CAR-2403
jsc#CAR-2670
jsc#CAR-2698
linux.git:commit:3e337087c3b5805fe0b8a46ba622a962880b5d64
rh#2150999
rh#2151956
rh#2173436
rh#2179000
rh#2187773
rh#2187931
rh#2192671
rh#2213414
rh#2218672
rh#2226780
CVE-2022-45934kernel-source-rt:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:security.netapp.com:/advisory/ntap-20230113-0008/
CVE-2022-45934
D:CVE-2022-45934
DSA-5324
FEDORA:FEDORA-2022-90162a1d88
L3:66048
MISC:git.kernel.org:CVE-2022-45934
SMASH Issue 348992
bnc#1205796
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
jsc#CAR-2192
rh#2151959
CVE-2022-4662kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-4662
MISC:lore.kernel.org:/all/20220913140355.910732567@linuxfoundation.org/
MISC:lore.kernel.org:CVE-2022-3903
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 351604
bnc#1206664
rh#2155788
CVE-2022-46663less:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2022-46663
D:CVE-2022-46663
OSS:2023/02/07/7
RHSA-2023:3725
SMASH Issue 355855
SMASH Issue 355856
bnc#1207815
http://www.greenwoodsoftware.com/less/news.609.html
https://github.com/gwsw/less/commit/a78e1351113cef564d790a730d657a321624d79c
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LR7AUWB34JD4PCW3HHASBEDGGHFWPAQP/
https://security.gentoo.org/glsa/202310-11
rh#2169621
CVE-2022-46781kernel-source-rt:Not affectedlow ()CONFIRM:developer.arm.com:CVE-2022-28350
CVE-2022-46781
SMASH Issue 362628
bnc#1210235
CVE-2022-46908sqlite3:Releasedimportant7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L)CONFIRM:security.netapp.com:/advisory/ntap-20230203-0005/
CVE-2022-46908
L3:67673
MISC:news.ycombinator.com:/item
MISC:sqlite.org:/forum/forumpost/07beac8056151b2f
MISC:sqlite.org:/src/info/cefc032473ac5ad2
Oracle:CVE-2022-46908
SMASH Issue 350271
bnc#1206337
https://security.gentoo.org/glsa/202311-03
jsc#CAR-2241
rh#2152844
CVE-2022-4696kernel-source-rt:Not affectedimportant ()CVE-2022-4696
D:CVE-2022-4696
DSA-5324
MISC:git.kernel.org:/pub/scm/linux/kernel/git/stable/linux.git/commit/
MISC:kernel.dance:/
SMASH Issue 353441
bnc#1207118
rh#2164424
CVE-2022-47024vim:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2022-47024
MISC:github.com:/vim/vim/commit/a63ad78ed31e36dbdf3a9cd28071dcdbefce7d19
RHSA-2023:0958
SMASH Issue 354444
bnc#1207397
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EX6N2DB75A73MQGVW3CS4VTNPAYVM2M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWIJBSQX53P7DHV77KRXJIXA4GH7XHC/
https://security.gentoo.org/glsa/202305-16
rh#2163613
CVE-2022-4744kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-4744
D:CVE-2022-4744
L3:65564
L3:65952
RHSA-2023:1466
RHSA-2023:1467
RHSA-2023:1468
RHSA-2023:1469
RHSA-2023:1470
RHSA-2023:1471
SMASH Issue 360933
bnc#1209635
bnc#1209672
http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=158b515f703e
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://security.netapp.com/advisory/ntap-20230526-0009/
rh#2156322
CVE-2022-47518kernel-source-rt:Not affectedmoderate5.7 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230113-0007/
CVE-2022-47518
D:CVE-2022-47518
MISC:github.com:/torvalds/linux/commit/0cdfa9e6f0915e3d243e2393bfa8a22e12d553b0
MISC:lore.kernel.org:/r/20221123153543.8568-5-philipturnbull@github.com
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
SMASH Issue 351233
bnc#1206511
rh#2158373
CVE-2022-47519kernel-source-rt:Not affectedimportant8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230113-0007/
CVE-2022-47519
D:CVE-2022-47519
MISC:github.com:/torvalds/linux/commit/051ae669e4505abbe05165bebf6be7922de11f41
MISC:lore.kernel.org:/r/20221123153543.8568-3-philipturnbull@github.com
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
SMASH Issue 351232
bnc#1206512
rh#2158377
CVE-2022-47520kernel-source-rt:Releasedimportant8.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L)CONFIRM:security.netapp.com:/advisory/ntap-20230113-0007/
CVE-2022-47520
D:CVE-2022-47520
MISC:github.com:/torvalds/linux/commit/cd21d99e595ec1d8721e1058dcdd4f1f7de1d793
MISC:lore.kernel.org:/r/20221123153543.8568-2-philipturnbull@github.com
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
SMASH Issue 351231
bnc#1206515
bnc#1207823
jsc#CAR-2245
rh#2158381
CVE-2022-47521kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230113-0007/
CVE-2022-47521
D:CVE-2022-47521
MISC:github.com:/torvalds/linux/commit/f9b62f9843c7b0afdaecabbcebf1dbba18599408
MISC:lore.kernel.org:/r/20221123153543.8568-4-philipturnbull@github.com
MLIST:[debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
SMASH Issue 351230
bnc#1206516
rh#2158399
CVE-2022-47629libksba:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2022-47629
DSA-5305
GLSA-202212-07
L3:64938
L3:65223
L3:65297
L3:65300
L3:65451
L3:65542
MISC:dev.gnupg.org:/T6284
MISC:git.gnupg.org:/cgi-bin/gitweb.cgi
MLIST:[debian-lts-announce] 20221224 [SECURITY] [DLA 3248-1] libksba security update
Oracle:CVE-2022-47629
RHSA-2023:0530
RHSA-2023:0592
RHSA-2023:0593
RHSA-2023:0594
RHSA-2023:0624
RHSA-2023:0625
RHSA-2023:0626
RHSA-2023:0629
RHSA-2023:0756
RHSA-2023:0859
SMASH Issue 351489
bnc#1206579
bnc#1206826
bnc#1208341
bnc#1208643
bnc#1208648
bnc#1209321
bnc#1209710
https://security.netapp.com/advisory/ntap-20230316-0011/
jsc#CAR-2249
rh#2135610
rh#2161571
CVE-2022-47929kernel-source-rt:Releasedmoderate4.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H)CONFIRM:cdn.kernel.org:/pub/linux/kernel/v6.x/ChangeLog-6.1.6
CONFIRM:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
CVE-2022-47929
DSA-5324
MISC:tldp.org:/HOWTO/Traffic-Control-HOWTO/components.html
MISC:www.spinics.net:/lists/netdev/msg555705.html
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 354036
bnc#1207237
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
jsc#CAR-2295
rh#2168246
CVE-2022-47938kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-47938
MISC:cdn.kernel.org:/pub/linux/kernel/v5.x/ChangeLog-5.19.2
MISC:git.kernel.org:/cgit/linux/kernel/git/torvalds/linux.git/commit/
MISC:github.com:/torvalds/linux/commit/824d4f64c20093275f72fc8101394d75ff6a249e
MISC:www.zerodayinitiative.com:OSS:2022/12/23/10
OSS:2022/12/22/8
OSS:2022/12/23/10
OSS:2022/Q4/235
SMASH Issue 351613
ZDI-22-1689
bnc#1206658
rh#2155943
rh#2155945
rh#2155946
rh#2155947
rh#2156340
CVE-2022-47939kernel-source-rt:Not affectedcritical10 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)CVE-2022-47939
MISC:cdn.kernel.org:/pub/linux/kernel/v5.x/ChangeLog-5.19.2
MISC:git.kernel.org:/cgit/linux/kernel/git/torvalds/linux.git/commit/
MISC:github.com:/torvalds/linux/commit/cf6531d98190fa2cf92a6d8bbc8af0a4740a223c
MISC:www.zerodayinitiative.com:OSS:2022/12/23/10
OSS:2022/12/22/8
OSS:2022/12/23/10
OSS:2022/Q4/235
SMASH Issue 351680
ZDI-22-1690
bnc#1206654
https://www.secpod.com/blog/zero-day-server-message-block-smb-server-in-linux-kernel-5-15-has-a-critical-vulnerability-patch-ksmbd-immediately/
rh#2155943
rh#2155945
rh#2155946
rh#2155947
rh#2156340
CVE-2022-47940kernel-source-rt:Not affectedcritical9.6 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H)CVE-2022-47940
MISC:cdn.kernel.org:/pub/linux/kernel/v5.x/ChangeLog-5.18.18
MISC:git.kernel.org:/cgit/linux/kernel/git/torvalds/linux.git/commit/
MISC:github.com:/torvalds/linux/commit/158a66b245739e15858de42c0ba60fcf3de9b8e6
MISC:www.zerodayinitiative.com:OSS:2022/12/23/10
OSS:2022/12/22/8
OSS:2022/12/23/10
OSS:2022/Q4/235
OSS:2022/Q4/269
SMASH Issue 351725
SMASH Issue 351726
bnc#1206679
rh#2155943
rh#2155944
rh#2155945
rh#2155946
rh#2155947
rh#2156340
CVE-2022-47941kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2022-47941
MISC:cdn.kernel.org:/pub/linux/kernel/v5.x/ChangeLog-5.19.2
MISC:git.kernel.org:/cgit/linux/kernel/git/torvalds/linux.git/commit/
MISC:github.com:/torvalds/linux/commit/aa7253c2393f6dcd6a1468b0792f6da76edad917
MISC:www.zerodayinitiative.com:OSS:2022/12/23/10
OSS:2022/12/22/8
OSS:2022/12/23/10
OSS:2022/Q4/235
SMASH Issue 351682
ZDI-22-1687
bnc#1206656
rh#2155943
rh#2155945
rh#2155946
rh#2155947
rh#2156340
CVE-2022-47942kernel-source-rt:Not affectedimportant8.5 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H)CVE-2022-47942
MISC:cdn.kernel.org:/pub/linux/kernel/v5.x/ChangeLog-5.19.2
MISC:git.kernel.org:/cgit/linux/kernel/git/torvalds/linux.git/commit/
MISC:github.com:/torvalds/linux/commit/8f0541186e9ad1b62accc9519cc2b7a7240272a7
MISC:www.zerodayinitiative.com:OSS:2022/12/23/10
OSS:2022/12/22/8
OSS:2022/12/23/10
OSS:2022/Q4/235
SMASH Issue 351683
ZDI-22-1688
bnc#1206657
rh#2155943
rh#2155945
rh#2155946
rh#2155947
rh#2156340
CVE-2022-47943kernel-source-rt:Not affectedcritical9.6 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H)CVE-2022-47943
MISC:cdn.kernel.org:/pub/linux/kernel/v5.x/ChangeLog-5.19.2
MISC:git.kernel.org:/cgit/linux/kernel/git/torvalds/linux.git/commit/
MISC:github.com:/torvalds/linux/commit/ac60778b87e45576d7bfdbd6f53df902654e6f09
MISC:www.zerodayinitiative.com:OSS:2022/12/23/10
OSS:2022/12/22/8
OSS:2022/12/23/10
OSS:2022/Q4/269
SMASH Issue 351681
bnc#1206655
https://security.netapp.com/advisory/ntap-20230216-0006/
rh#2155943
rh#2155945
rh#2155946
rh#2155947
rh#2156340
CVE-2022-47946kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-47946
D:CVE-2022-47946
MISC:git.kernel.org:/pub/scm/linux/kernel/git/stable/linux.git/commit/
OSS:2022/12/22/2
OSS:2022/12/27/1
OSS:2022/Q4/242
SMASH Issue 351737
bnc#1206714
rh#2155840
CVE-2022-48174busybox:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2022-48174
L3:66810
L3:68110
L3:68206
RHSA-2023:5178
SMASH Issue 376060
bnc#1214538
bnc#1215448
https://bugs.busybox.net/show_bug.cgi?id=15216
jsc#CAR-2839
rh#2237153
CVE-2022-48303tar:Releasedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)CVE-2022-48303
D:CVE-2022-48303
L3:65174
MISC:savannah.gnu.org:/bugs/
MISC:savannah.gnu.org:/patch/
RHSA-2023:0842
RHSA-2023:0959
RHSA-2023:5610
SMASH Issue 355635
bnc#1207753
bnc#1208031
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CRY7VEL4AIG3GLIEVCTOXRZNSVYDYYUD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5VQYCO52Z7GAVCLRYUITN7KXHLRZQS4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CRY7VEL4AIG3GLIEVCTOXRZNSVYDYYUD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X5VQYCO52Z7GAVCLRYUITN7KXHLRZQS4/
jsc#CAR-2327
rh#2149722
CVE-2022-4842kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2022-4842
MISC:lore.kernel.org:/ntfs3/784f82c4-de71-b8c3-afd6-468869a369af@paragon-software.com/T/
SMASH Issue 352071
bnc#1202210
bnc#1206749
rh#2156927
CVE-2022-48423kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48423
D:CVE-2022-48423
SMASH Issue 360594
bnc#1209479
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.3
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54e45702b648b7c0000e90b3e9b890e367e16ea8
https://security.netapp.com/advisory/ntap-20230505-0003/
rh#2179832
CVE-2022-48424kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48424
D:CVE-2022-48424
SMASH Issue 360595
bnc#1209475
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.3
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4f1dc7d9756e66f3f876839ea174df2e656b7f79
https://security.netapp.com/advisory/ntap-20230505-0002/
rh#2179836
CVE-2022-48425kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48425
D:CVE-2022-48425
SMASH Issue 360596
bnc#1209501
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=467333af2f7b95eeaa61a5b5369a80063cd971fd
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/fs/ntfs3?id=467333af2f7b95eeaa61a5b5369a80063cd971fd
https://security.netapp.com/advisory/ntap-20230413-0006/
rh#2179841
CVE-2022-48502kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-48502
SMASH Issue 368041
bnc#1211887
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0e8235d28f3a0e9eda9f02ff67ee566d5f42b66b
https://security.netapp.com/advisory/ntap-20230703-0004/
https://syzkaller.appspot.com/bug?extid=8778f030156c6cd16d72
rh#2212763
CVE-2022-48554file:Not affectedmoderate ()CVE-2022-48554
DSA-5489
SMASH Issue 376066
bnc#1214507
http://seclists.org/fulldisclosure/2024/Mar/21
http://seclists.org/fulldisclosure/2024/Mar/24
http://seclists.org/fulldisclosure/2024/Mar/25
https://bugs.astron.com/view.php?id=310
https://security.netapp.com/advisory/ntap-20231116-0002/
https://support.apple.com/kb/HT214081
https://support.apple.com/kb/HT214084
https://support.apple.com/kb/HT214086
https://support.apple.com/kb/HT214088
https://www.debian.org/security/2023/dsa-5489
rh#2235714
CVE-2022-48626kernel-source-rt:Already fixedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2022-48626
SMASH Issue 395112
bnc#1220366
https://git.kernel.org/stable/c/3a0a7ec5574b510b067cfc734b8bdb6564b31d4e
https://git.kernel.org/stable/c/7f901d53f120d1921f84f7b9b118e87e94b403c5
https://git.kernel.org/stable/c/9c25d5ff1856b91bd4365e813f566cb59aaa9552
https://git.kernel.org/stable/c/af0e6c49438b1596e4be8a267d218a0c88a42323
https://git.kernel.org/stable/c/bd2db32e7c3e35bd4d9b8bbff689434a50893546
https://git.kernel.org/stable/c/be93028d306dac9f5b59ebebd9ec7abcfc69c156
https://git.kernel.org/stable/c/e6f580d0b3349646d4ee1ce0057eb273e8fb7e2e
https://git.kernel.org/stable/c/f5dc193167591e88797262ec78515a0cbe79ff5f
rh#2266029
CVE-2022-48628kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2022-48628
SMASH Issue 396047
bnc#1220848
https://git.kernel.org/stable/c/47f82395f04a976d4fa97de7f2acffa1c1096571
https://git.kernel.org/stable/c/89744b64914426cbabceb3d8a149176b5dafdfb5
https://git.kernel.org/stable/c/e3dfcab2080dc1f9a4b09cc1327361bc2845bfcd
rh#2267507
CVE-2022-48630kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48630
SMASH Issue 396332
bnc#1220990
https://git.kernel.org/stable/c/05d4d17475d8d094c519bb51658bc47899c175e3
https://git.kernel.org/stable/c/16287397ec5c08aa58db6acf7dbc55470d78087d
https://git.kernel.org/stable/c/233a3cc60e7a8fe0be8cf9934ae7b67ba25a866c
https://git.kernel.org/stable/c/71a89789552b7faf3ef27969b9bc783fa0df3550
https://git.kernel.org/stable/c/8a06f25f5941c145773204f2f7abef95b4ffb8ce
https://git.kernel.org/stable/c/8be06f62b426801dba43ddf8893952a0e62ab6ae
rh#2267959
CVE-2022-48631kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48631
SMASH Issue 403388
bnc#1223475
https://git.kernel.org/stable/c/29a5b8a137ac8eb410cc823653a29ac0e7b7e1b0
https://git.kernel.org/stable/c/2f5e9de15e4f55fbf56f22d4a2ce406246cc462d
https://git.kernel.org/stable/c/958b0ee23f5ac106e7cc11472b71aa2ea9a033bc
https://git.kernel.org/stable/c/bb7eb3ca4b3b0d2c7872cf1a41c30f5e5bd65df0
https://git.kernel.org/stable/c/be4df018c0be5ebecf1ca510feacc23be415cefc
rh#2277842
CVE-2022-48632kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48632
SMASH Issue 403389
bnc#1223481
https://git.kernel.org/stable/c/3b5ab5fbe69ebbee5692c72b05071a43fc0655d8
https://git.kernel.org/stable/c/48ee0a864d1af02eea98fc825cc230d61517a71e
https://git.kernel.org/stable/c/dc2a0c587006f29b724069740c48654b9dcaebd2
https://git.kernel.org/stable/c/de24aceb07d426b6f1c59f33889d6a964770547b
rh#2277840
CVE-2022-48633kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48633
SMASH Issue 403390
bnc#1223489
https://git.kernel.org/stable/c/55c077d97fa67e9f19952bb24122a8316b089474
https://git.kernel.org/stable/c/b6f25c3b94f2aadbf5cbef954db4073614943d74
rh#2277839
CVE-2022-48634kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48634
SMASH Issue 403391
bnc#1223501
https://git.kernel.org/stable/c/63e37a79f7bd939314997e29c2f5a9f0ef184281
https://git.kernel.org/stable/c/a6ed7624bf4d0a32f2631e74828bca7b7bf15afd
https://git.kernel.org/stable/c/c5812807e416618477d1bb0049727ce8bb8292fd
https://git.kernel.org/stable/c/e5ae504c8623476e13032670f1a6d6344d53ec9b
rh#2277837
CVE-2022-48635kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48635
SMASH Issue 403392
bnc#1223497
https://git.kernel.org/stable/c/17d9c15c9b9e7fb285f7ac5367dfb5f00ff575e3
https://git.kernel.org/stable/c/60644dffac87b1bb47bdb393aa29d5f2ffcf41a0
https://git.kernel.org/stable/c/929ef155e1da41c06f4d8ca86ae12b851a83a744
rh#2277835
CVE-2022-48636kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48636
SMASH Issue 403393
bnc#1223512
https://git.kernel.org/stable/c/2e473351400e3dd66f0b71eddcef82ee45a584c1
https://git.kernel.org/stable/c/49f401a98b318761ca2e15d4c7869a20043fbed4
https://git.kernel.org/stable/c/650a2e79d176db753654d3dde88e53a2033036ac
https://git.kernel.org/stable/c/aaba5ff2742043705bc4c02fd0b2b246e2e16da1
https://git.kernel.org/stable/c/d3a67c21b18f33c79382084af556557c442f12a6
https://git.kernel.org/stable/c/d86b4267834e6d4af62e3073e48166e349ab1b70
https://git.kernel.org/stable/c/db7ba07108a48c0f95b74fabbfd5d63e924f992d
https://git.kernel.org/stable/c/f5fcc9d6d71d9ff7fdbdd4b89074e6e24fffc20b
rh#2277833
CVE-2022-48637kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48637
SMASH Issue 403394
bnc#1223517
https://git.kernel.org/stable/c/08483e4c0c83b221b8891434a04cec405dee94a6
https://git.kernel.org/stable/c/32afa1f23e42cc635ccf4c39f24514d03d1e8338
https://git.kernel.org/stable/c/c31f26c8f69f776759cbbdfb38e40ea91aa0dd65
rh#2277831
CVE-2022-48640kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48640
SMASH Issue 403397
bnc#1223499
https://git.kernel.org/stable/c/0e400d602f46360752e4b32ce842dba3808e15e6
https://git.kernel.org/stable/c/2c8e8ab53acfc78da0b4a65f30cb5d306e7d78f7
https://git.kernel.org/stable/c/ec3a6f4ffe556a28f6f5028bf7c4412557e7051b
rh#2277826
CVE-2022-48641kernel-source-rt:Not affectedmoderate ()CVE-2022-48641
SMASH Issue 403398
bnc#1223476
https://git.kernel.org/stable/c/11ebf32fde46572b0aaf3c2bdd97d923ef5a03ab
https://git.kernel.org/stable/c/1e98318af2f163eadaff815abcef38d27ca92c1e
https://git.kernel.org/stable/c/38cf372b17f0a5f35c1b716a100532d539f0eb33
https://git.kernel.org/stable/c/62ce44c4fff947eebdf10bb582267e686e6835c9
https://git.kernel.org/stable/c/754e8b74281dd54a324698803483f47cf3355ae1
https://git.kernel.org/stable/c/d5917b7af7cae0e2804f9d127a03268035098b7f
https://git.kernel.org/stable/c/ebd97dbe3c55d68346b9c5fb00634a7f5b10bbee
rh#2277825
CVE-2022-48643kernel-source-rt:Not affectedmoderate ()CVE-2022-48643
SMASH Issue 403400
bnc#1223480
https://git.kernel.org/stable/c/710e3f526bd23a0d33435dedc52c3144de284378
https://git.kernel.org/stable/c/8bcad2a931313aeba076b76922d5813ef97d0a91
https://git.kernel.org/stable/c/91aa52652f4b37089aff3cb53e83049d826fef6d
https://git.kernel.org/stable/c/921ebde3c0d22c8cba74ce8eb3cc4626abff1ccd
rh#2277820
CVE-2022-48646kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48646
SMASH Issue 403403
bnc#1223502
https://git.kernel.org/stable/c/589c6eded10c77a12b7b2cf235b6b19a2bdb91fa
https://git.kernel.org/stable/c/a4eadca702dff0768dd01be6789bbec2a18e5b0a
rh#2277816
CVE-2022-48647kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48647
SMASH Issue 403404
bnc#1223519
https://git.kernel.org/stable/c/360910b88d1466a90644a4e0533803b594344a2b
https://git.kernel.org/stable/c/5f623a77cfc2d501d72bcb4f9ee71721e6c766ff
https://git.kernel.org/stable/c/b4afd3878f961d3517f27b3213730fceef77945c
https://git.kernel.org/stable/c/f232af4295653afa4ade3230462b3be15ad16419
rh#2277815
CVE-2022-48648kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48648
SMASH Issue 403405
bnc#1223503
https://git.kernel.org/stable/c/0a242eb2913a4aa3d6fbdb86559f27628e9466f3
https://git.kernel.org/stable/c/8547c7bfc0617e7184e4da65b9b96681fcfe9998
https://git.kernel.org/stable/c/b3b41d4d95d3822b2e459ecbc80d030ea6aec5e7
https://git.kernel.org/stable/c/b3b952168ee1f220ba729fa100fd9d5aa752eb03
rh#2277814
CVE-2022-48649kernel-source-rt:Not affectedmoderate ()CVE-2022-48649
SMASH Issue 403406
bnc#1223500
https://git.kernel.org/stable/c/c673c6ceac53fb2e631c9fbbd79957099a08927f
https://git.kernel.org/stable/c/d71608a877362becdc94191f190902fac1e64d35
rh#2277813
CVE-2022-48650kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48650
SMASH Issue 403407
bnc#1223509
https://git.kernel.org/stable/c/601be20fc6a1b762044d2398befffd6bf236cebf
https://git.kernel.org/stable/c/6a4236ed47f5b0a57eb6b8fb1c351b15b3d341d7
https://git.kernel.org/stable/c/89df49e561b4a8948521fc3f8a013012eaa08f82
rh#2277812
CVE-2022-48652kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48652
SMASH Issue 403409
bnc#1223520
https://git.kernel.org/stable/c/7c945e5b4787db47d728120b56c934ba05f99864
https://git.kernel.org/stable/c/a509702cac95a8b450228a037c8542f57e538e5b
rh#2277810
CVE-2022-48653kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2022-48653
SMASH Issue 403410
bnc#1223474
https://git.kernel.org/stable/c/149979e87eb7a365d3d0b259bed79d84ff585a93
https://git.kernel.org/stable/c/23c619190318376769ad7b61504c2ea0703fb783
https://git.kernel.org/stable/c/34447d64b8d28e4d6a73d73f07c879959d68fbfe
rh#2277809
CVE-2022-48654kernel-source-rt:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2022-48654
SMASH Issue 403411
bnc#1223482
https://git.kernel.org/stable/c/559c36c5a8d730c49ef805a72b213d3bba155cc8
https://git.kernel.org/stable/c/5d75fef3e61e797fab5c3fbba88caa74ab92ad47
https://git.kernel.org/stable/c/633c81c0449663f57d4138326d036dc6cfad674e
https://git.kernel.org/stable/c/721ea8ac063d70c2078c4e762212705de6151764
https://git.kernel.org/stable/c/816eab147e5c6f6621922b8515ad9010ceb1735e
rh#2277808
CVE-2022-48655kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-48655
SMASH Issue 403412
bnc#1223477
https://git.kernel.org/stable/c/1f08a1b26cfc53b7715abc46857c6023bb1b87de
https://git.kernel.org/stable/c/7184491fc515f391afba23d0e9b690caaea72daf
https://git.kernel.org/stable/c/8e65edf0d37698f7a6cb174608d3ec7976baf49e
https://git.kernel.org/stable/c/e9076ffbcaed5da6c182b144ef9f6e24554af268
https://git.kernel.org/stable/c/f2277d9e2a0d092c13bae7ee82d75432bb8b5108
rh#2277807
CVE-2022-48656kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2022-48656
SMASH Issue 403413
bnc#1223479
https://git.kernel.org/stable/c/a17df55bf6d536712da6902a83db82b82e67d5a2
https://git.kernel.org/stable/c/aa11dae059a439af82bae541b134f8f53ac177b5
https://git.kernel.org/stable/c/dd5a6c5a08752b613e83ad2cb5133e72a64b876d
https://git.kernel.org/stable/c/f9fdb0b86f087c2b7f6c6168dd0985a3c1eda87e
rh#2277806
CVE-2022-48657kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2022-48657
SMASH Issue 403414
bnc#1223484
https://git.kernel.org/stable/c/3c3edb82d67b2be9231174ac2af4af60d4af7549
https://git.kernel.org/stable/c/904f881b57360cf85de962d84d8614d94431f60e
https://git.kernel.org/stable/c/bb6d99e27cbe6b30e4e3bbd32927fd3b0bdec6eb
https://git.kernel.org/stable/c/d4955c0ad77dbc684fc716387070ac24801b8bca
rh#2277805
CVE-2022-48658kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48658
SMASH Issue 403415
bnc#1223496
https://git.kernel.org/stable/c/61703b248be993eb4997b00ae5d3318e6d8f3c5b
https://git.kernel.org/stable/c/df6cb39335cf5a1b918e8dbd8ba7cd9f1d00e45a
https://git.kernel.org/stable/c/e45cc288724f0cfd497bb5920bcfa60caa335729
rh#2277803
CVE-2022-48660kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2022-48660
SMASH Issue 403417
bnc#1223487
https://git.kernel.org/stable/c/657803b918e097e47d99d1489da83a603c36bcdd
https://git.kernel.org/stable/c/69bef19d6b9700e96285f4b4e28691cda3dcd0d1
https://git.kernel.org/stable/c/97da736cd11ae73bdf2f5e21e24446b8349e0168
https://git.kernel.org/stable/c/b1489043d3b9004dd8d5a0357b08b5f0e6691c43
rh#2277800
CVE-2022-48661kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2022-48661
SMASH Issue 403418
bnc#1223488
https://git.kernel.org/stable/c/02743c4091ccfb246f5cdbbe3f44b152d5d12933
https://git.kernel.org/stable/c/41f857033c44442a27f591fda8d986e7c9e42872
https://git.kernel.org/stable/c/9b26723e058faaf11b532fb4aa16d6849d581790
rh#2277799
CVE-2022-48662kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-48662
SMASH Issue 403419
bnc#1223505
bnc#1223521
https://git.kernel.org/stable/c/713fa3e4591f65f804bdc88e8648e219fabc9ee1
https://git.kernel.org/stable/c/d119888b09bd567e07c6b93a07f175df88857e02
https://git.kernel.org/stable/c/f799e0568d6c153368b177e0bbbde7dcc4ce7f1d
rh#2277798
CVE-2022-48663kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48663
SMASH Issue 403420
bnc#1223523
https://git.kernel.org/stable/c/18352095a0d581f6aeb1e9fc9d68cc0152cd64b4
https://git.kernel.org/stable/c/af0bfabf06c74c260265c30ba81a34e7dec0e881
https://git.kernel.org/stable/c/b7df41a6f79dfb18ba2203f8c5f0e9c0b9b57f68
https://git.kernel.org/stable/c/bdea98b98f844bd8a983ca880893e509a8b4162f
rh#2277797
CVE-2022-48665kernel-source-rt:Not affectedmoderate6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N)CVE-2022-48665
SMASH Issue 403422
bnc#1223526
https://git.kernel.org/stable/c/17244f71765dfec39e84493993993e896c376d09
https://git.kernel.org/stable/c/2e9ceb6728f1dc2fa4b5d08f37d88cbc49a20a62
rh#2277794
CVE-2022-48666kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48666
SMASH Issue 403423
bnc#1223527
https://git.kernel.org/stable/c/2e7eb4c1e8af8385de22775bd0be552f59b28c9a
https://git.kernel.org/stable/c/8fe4ce5836e932f5766317cb651c1ff2a4cd0506
rh#2277792
CVE-2022-48669kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48669
SMASH Issue 403805
bnc#1223756
https://git.kernel.org/stable/c/1699fb915b9f61794d559b55114c09a390aaf234
https://git.kernel.org/stable/c/7f7d39fe3d80d6143404940b2413010cf6527029
https://git.kernel.org/stable/c/a3f22feb2220a945d1c3282e34199e8bcdc5afc4
https://git.kernel.org/stable/c/cda9c0d556283e2d4adaa9960b2dc19b16156bae
https://git.kernel.org/stable/c/d0647c3e81eff62b66d46fd4e475318cb8cb3610
rh#2278537
CVE-2022-48671kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48671
SMASH Issue 404289
bnc#1223929
https://git.kernel.org/stable/c/07191f984842d50020789ff14c75da436a7f46a9
https://git.kernel.org/stable/c/321488cfac7d0eb6d97de467015ff754f85813ff
https://git.kernel.org/stable/c/43626dade36fa74d3329046f4ae2d7fdefe401c6
https://git.kernel.org/stable/c/5db17805b6ba4c34dab303f49aea3562fc25af75
https://git.kernel.org/stable/c/99bc25748e394d17f9e8b10cc7f273b8e64c1c7e
https://git.kernel.org/stable/c/9f267393b036f1470fb12fb892d59e7ff8aeb58d
rh#2278940
CVE-2022-48674kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-48674
SMASH Issue 404282
bnc#1223942
https://git.kernel.org/stable/c/2f44013e39984c127c6efedf70e6b5f4e9dcf315
https://git.kernel.org/stable/c/8ddd001cef5e82d19192e6861068463ecca5f556
https://git.kernel.org/stable/c/94c34faaafe7b55adc2d8d881db195b646959b9e
rh#2278937
CVE-2022-48675kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48675
SMASH Issue 404291
bnc#1223894
https://git.kernel.org/stable/c/819110054b14d7272b4188db997a3d80f75ab785
https://git.kernel.org/stable/c/83c43fd872e32c8071d5582eb7c40f573a8342f3
https://git.kernel.org/stable/c/85eaeb5058f0f04dffb124c97c86b4f18db0b833
https://git.kernel.org/stable/c/e8de6cb5755eae7b793d8c00c8696c8667d44a7f
rh#2278933
CVE-2022-48682fdupes:Ignoremoderate ()CVE-2022-48682
SMASH Issue 334079
SMASH Issue 403211
bnc#1200381
https://github.com/adrianlopezroche/fdupes/blob/4b6bcde1b3eb1cebe87cd30814f7d6cf4ee46e95/fdupes.c
https://github.com/adrianlopezroche/fdupes/commit/85680897148f1ac33b55418e00334116e419717f
https://github.com/adrianlopezroche/fdupes/compare/v2.1.2...v2.2.0
rh#2277277
CVE-2022-48686kernel-source-rt:Ignoreimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-48686
SMASH Issue 404293
bnc#1223948
bnc#1226337
https://git.kernel.org/stable/c/13c80a6c112467bab5e44d090767930555fc17a5
https://git.kernel.org/stable/c/160f3549a907a50e51a8518678ba2dcf2541abea
https://git.kernel.org/stable/c/19816a0214684f70b49b25075ff8c402fdd611d3
https://git.kernel.org/stable/c/5914fa32ef1b7766fea933f9eed94ac5c00aa7ff
https://git.kernel.org/stable/c/c3eb461aa56e6fa94fb80442ba2586bd223a8886
jsc#CAR-3447
rh#2278931
CVE-2022-48687kernel-source-rt:Already fixedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H)CVE-2022-48687
SMASH Issue 404294
bnc#1223952
bnc#1224043
https://git.kernel.org/stable/c/076f2479fc5a15c4a970ca3b5e57d42ba09a31fa
https://git.kernel.org/stable/c/3df71e11a4773d775c3633c44319f7acdb89011c
https://git.kernel.org/stable/c/55195563ec29f80f984237b743de0e2b6ba4d093
https://git.kernel.org/stable/c/56ad3f475482bca55b0ae544031333018eb145b3
https://git.kernel.org/stable/c/84a53580c5d2138c7361c7c3eea5b31827e63b35
https://git.kernel.org/stable/c/dc9dbd65c803af1607484fed5da50d41dc8dd864
https://git.kernel.org/stable/c/f684c16971ed5e77dfa25a9ad25b5297e1f58eab
rh#2278930
CVE-2022-48688kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48688
SMASH Issue 404295
bnc#1223953
https://git.kernel.org/stable/c/2ed94383f3a2693dbf5bc47c514b42524bd8f9ae
https://git.kernel.org/stable/c/342d77769a6cceb3df7720a1e18baa4339eee3fc
https://git.kernel.org/stable/c/38af35bec59a8431a1eb29da994a0a45cba275d9
https://git.kernel.org/stable/c/5332a094514852d5e58c278cf4193adb937337fc
https://git.kernel.org/stable/c/c49f320e2492738d478bc427dcd54ccfe0cba746
https://git.kernel.org/stable/c/fb8396aeda5872369a8ed6d2301e2c86e303c520
jsc#CAR-3448
rh#2278929
CVE-2022-48689kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48689
SMASH Issue 404296
bnc#1223959
https://git.kernel.org/stable/c/3261400639463a853ba2b3be8bd009c2a8089775
https://git.kernel.org/stable/c/6730c48ed6b0cd939fc9b30b2d621ce0b89bea83
https://git.kernel.org/stable/c/8527c9a6bf8e54fef0a8d3d7d8874a48c725c915
rh#2278932
CVE-2022-48690kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48690
SMASH Issue 404335
bnc#1223960
https://git.kernel.org/stable/c/07f40e9f0ff342eb3e97d5c544783b7cb641689c
https://git.kernel.org/stable/c/7e753eb675f0523207b184558638ee2eed6c9ac2
rh#2279001
CVE-2022-48691kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48691
SMASH Issue 404297
bnc#1223961
https://git.kernel.org/stable/c/1ce55ec5cb7c573c983dffbe290b8d17caf1f157
https://git.kernel.org/stable/c/77972a36ecc4db7fc7c68f0e80714263c5f03f65
https://git.kernel.org/stable/c/910891a2a44cdc49efcc4fe7459c1085ba00d0f4
https://git.kernel.org/stable/c/94ed8eeb8d9aeb00e4f4e19b83a2e28b6442fbc5
rh#2278948
CVE-2022-48692kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48692
SMASH Issue 404298
bnc#1223962
https://git.kernel.org/stable/c/12f35199a2c0551187edbf8eb01379f0598659fa
https://git.kernel.org/stable/c/a8edd49c94b4b08019ed7d6dd794fca8078a4deb
https://git.kernel.org/stable/c/f022576aa03c2385ea7f2b27ee5b331e43abf624
https://git.kernel.org/stable/c/f2c70f56f762e5dc3b0d7dc438fbb137cb116413
rh#2278946
CVE-2022-48694kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48694
SMASH Issue 404300
bnc#1223964
https://git.kernel.org/stable/c/14d148401c5202fec3a071e24785481d540b22c3
https://git.kernel.org/stable/c/5becc531a3fa8da75158a8993f56cc3e0717716e
https://git.kernel.org/stable/c/ead54ced6321099978d30d62dc49c282a6e70574
rh#2278943
CVE-2022-48696kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48696
SMASH Issue 404312
bnc#1223920
https://git.kernel.org/stable/c/15ff1f17847c19174b260bd7dd0de33edcebd45e
https://git.kernel.org/stable/c/f5723cfc01932c7a8d5c78dbf7e067e537c91439
rh#2278959
CVE-2022-48699kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48699
SMASH Issue 404315
bnc#1223996
https://git.kernel.org/stable/c/0c32a93963e03c03e561d5a066eedad211880ba3
https://git.kernel.org/stable/c/26e9a1ded8923510e5529fbb28390b22228700c2
https://git.kernel.org/stable/c/c2e406596571659451f4b95e37ddfd5a8ef1d0dc
rh#2278952
CVE-2022-48700kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2022-48700
SMASH Issue 404316
bnc#1223957
https://git.kernel.org/stable/c/5321908ef74fb593e0dbc8737d25038fc86c9986
https://git.kernel.org/stable/c/578d644edc7d2c1ff53f7e4d0a25da473deb4a03
https://git.kernel.org/stable/c/5d721bf222936f5cf3ee15ced53cc483ecef7e46
https://git.kernel.org/stable/c/873aefb376bbc0ed1dd2381ea1d6ec88106fdbd4
jsc#CAR-3450
rh#2278951
CVE-2022-48703kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48703
SMASH Issue 404319
bnc#1223924
https://git.kernel.org/stable/c/7931e28098a4c1a2a6802510b0cbe57546d2049d
https://git.kernel.org/stable/c/dae42083b045a4ddf71c57cf350cb2412b5915c2
rh#2278960
CVE-2022-48705kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48705
SMASH Issue 404333
bnc#1223895
https://git.kernel.org/stable/c/f7f3001723e337568017e8617974f29bc8b2f595
https://git.kernel.org/stable/c/fa3fbe64037839f448dc569212bafc5a495d8219
rh#2278997
CVE-2022-48706kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2022-48706
SMASH Issue 407153
bnc#1225524
https://git.kernel.org/stable/c/5d2cc32c1c10bd889125d2adc16a6bc3338dcd3e
https://git.kernel.org/stable/c/6b04456e248761cf68f562f2fd7c04e591fcac94
rh#2282602
CVE-2022-48707kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48707
SMASH Issue 407007
bnc#1225519
https://git.kernel.org/stable/c/4fa4302d6dc7de7e8e74dc7405611a2efb4bf54b
https://git.kernel.org/stable/c/a04c7d062b537ff787d00da95bdfe343260d4beb
rh#2282601
CVE-2022-48709kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48709
SMASH Issue 407098
bnc#1225095
https://git.kernel.org/stable/c/47f4ff6f23f00f5501ff2d7054c1a37c170a7aa0
https://git.kernel.org/stable/c/4a606ce68426c88ff2563382b33cc34f3485fe57
rh#2282606
CVE-2022-48711kernel-source-rt:Already fixedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-48711
SMASH Issue 411544
bnc#1226672
https://git.kernel.org/stable/c/175db196e45d6f0e6047eccd09c8ba55465eb131
https://git.kernel.org/stable/c/1f1788616157b0222b0c2153828b475d95e374a7
https://git.kernel.org/stable/c/3c7e5943553594f68bbc070683db6bb6f6e9e78e
https://git.kernel.org/stable/c/59ff7514f8c56f166aadca49bcecfa028e0ad50f
https://git.kernel.org/stable/c/9aa422ad326634b76309e8ff342c246800621216
https://git.kernel.org/stable/c/d692e3406e052dbf9f6d9da0cba36cb763272529
https://git.kernel.org/stable/c/f1af11edd08dd8376f7a84487cbb0ea8203e3a1d
https://git.kernel.org/stable/c/fde4ddeadd099bf9fbb9ccbee8e1b5c20d530a2d
rh#2293291
CVE-2022-48712kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2022-48712
SMASH Issue 411545
bnc#1226673
https://git.kernel.org/stable/c/14aa3f49c7fc6424763f4323bfbc3a807b0727dc
https://git.kernel.org/stable/c/1b6762ecdf3cf12113772427c904aa3c420a1802
https://git.kernel.org/stable/c/62e46e0ffc02daa8fcfc02f7a932cc8a19601b19
https://git.kernel.org/stable/c/cdce59a1549190b66f8e3fe465c2b2f714b98a94
rh#2293290
CVE-2022-48714kernel-source-rt:Not affectedlow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2022-48714
SMASH Issue 411548
bnc#1226622
https://git.kernel.org/stable/c/5e457aeab52a5947619e1f18047f4d2f3212b3eb
https://git.kernel.org/stable/c/6304a613a97d6dcd49b93fbad31e9f39d1e138d6
https://git.kernel.org/stable/c/b293dcc473d22a62dc6d78de2b15e4f49515db56
https://git.kernel.org/stable/c/d578933f6226d5419af9306746efa1c693cbaf9c
rh#2293288
CVE-2022-48716kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2022-48716
SMASH Issue 411550
bnc#1226678
https://git.kernel.org/stable/c/9167f2712dc8c24964840a4d1e2ebf130e846b95
https://git.kernel.org/stable/c/aa7152f9f117b3e66b3c0d4158ca4c6d46ab229f
https://git.kernel.org/stable/c/c5c1546a654f613e291a7c5d6f3660fc1eb6d0c7
rh#2293286
CVE-2022-48718kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48718
SMASH Issue 411553
bnc#1226616
https://git.kernel.org/stable/c/622c9a3a7868e1eeca39c55305ca3ebec4742b64
https://git.kernel.org/stable/c/6f9267e01cca749137349d8ffb0d0ebbadf567f4
https://git.kernel.org/stable/c/86a337bb803040e4401b87c974a7fb92efe3d0e1
rh#2293284
CVE-2022-48719kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48719
SMASH Issue 411554
bnc#1226682
https://git.kernel.org/stable/c/203a35ebb49cdce377416b0690215d3ce090d364
https://git.kernel.org/stable/c/4a81f6da9cb2d1ef911131a6fd8bd15cb61fc772
rh#2293283
CVE-2022-48720kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2022-48720
SMASH Issue 411555
bnc#1226683
https://git.kernel.org/stable/c/2e7f5b6ee1a7a2c628253a95b0a95b582901ef1b
https://git.kernel.org/stable/c/8299be160aad8548071d080518712dec0df92bd5
https://git.kernel.org/stable/c/9cef24c8b76c1f6effe499d2f131807c90f7ce9a
https://git.kernel.org/stable/c/e7a0b3a0806dae3cc81931f0e83055ca2ac6f455
rh#2293282
CVE-2022-48721kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48721
SMASH Issue 411556
bnc#1226685
https://git.kernel.org/stable/c/0ef6049f664941bc0f75828b3a61877635048b27
https://git.kernel.org/stable/c/341adeec9adad0874f29a0a1af35638207352a39
https://git.kernel.org/stable/c/504078fbe9dd570d685361b57784a6050bc40aaa
rh#2293281
CVE-2022-48723kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48723
SMASH Issue 411558
bnc#1226617
https://git.kernel.org/stable/c/37c2c83ca4f1ef4b6908181ac98e18360af89b42
https://git.kernel.org/stable/c/447c3d4046d7b54052d07d8b27e15e6edea5662c
https://git.kernel.org/stable/c/dd00b4f8f768d81c3788a8ac88fdb3d745e55ea3
https://git.kernel.org/stable/c/e895e067d73e154b1ebc84a124e00831e311d9b0
rh#2293279
CVE-2022-48725kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48725
SMASH Issue 411582
bnc#1226618
https://git.kernel.org/stable/c/2989ba9532babac66e79997ccff73c015b69700c
https://git.kernel.org/stable/c/a75badebfdc0b3823054bedf112edb54d6357c75
https://git.kernel.org/stable/c/fa3b844a50845c817660146c27c0fc29b08d3116
rh#2293335
CVE-2022-48726kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-48726
SMASH Issue 411571
bnc#1226686
https://git.kernel.org/stable/c/2923948ffe0835f7114e948b35bcc42bc9b3baa1
https://git.kernel.org/stable/c/36e8169ec973359f671f9ec7213547059cae972e
https://git.kernel.org/stable/c/75c610212b9f1756b9384911d3a2c347eee8031c
https://git.kernel.org/stable/c/ee2477e8ccd3d978eeac0dc5a981b286d9bb7b0a
rh#2293334
CVE-2022-48727kernel-source-rt:Not affectedmoderate4.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2022-48727
SMASH Issue 411590
bnc#1226690
https://git.kernel.org/stable/c/1c71dbc8a179d99dd9bb7e7fc1888db613cf85de
https://git.kernel.org/stable/c/57e2986c3b25092691a6e3d6ee9168caf8978932
https://git.kernel.org/stable/c/e1e852746997500f1873f60b954da5f02cc2dba3
rh#2293333
CVE-2022-48728kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48728
SMASH Issue 411601
bnc#1226691
https://git.kernel.org/stable/c/1899c3cad265c4583658aed5293d02e8af84276b
https://git.kernel.org/stable/c/4a9bd1e6780fc59f81466ec3489d5ad535a37190
https://git.kernel.org/stable/c/5f8f55b92edd621f056bdf09e572092849fabd83
https://git.kernel.org/stable/c/a3dd4d2682f2a796121609e5f3bbeb1243198c53
rh#2293332
CVE-2022-48729kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48729
SMASH Issue 411589
bnc#1226710
https://git.kernel.org/stable/c/1530d84fba1e459ba55f46aa42649b88773210e7
https://git.kernel.org/stable/c/8c83d39cc730378bbac64d67a551897b203a606e
rh#2293331
CVE-2022-48730kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-48730
SMASH Issue 411572
bnc#1226713
https://git.kernel.org/stable/c/24f8e12d965b24f8aea762589e0e9fe2025c005e
https://git.kernel.org/stable/c/5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a
https://git.kernel.org/stable/c/92c4cfaee6872038563c5b6f2e8e613f9d84d47d
https://git.kernel.org/stable/c/cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed
rh#2293330
CVE-2022-48731kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48731
SMASH Issue 411608
bnc#1226620
https://git.kernel.org/stable/c/352715593e81b917ce1b321e794549815b850134
https://git.kernel.org/stable/c/a5389c80992f0001ee505838fe6a8b20897ce96e
https://git.kernel.org/stable/c/c10a0f877fe007021d70f9cada240f42adc2b5db
https://git.kernel.org/stable/c/cebb0aceb21ad91429617a40e3a17444fabf1529
https://git.kernel.org/stable/c/d3533ee20e9a0e2e8f60384da7450d43d1c63d1a
rh#2293328
CVE-2022-48735kernel-source-rt:Unsupportedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-48735
SMASH Issue 411578
bnc#1226719
https://git.kernel.org/stable/c/0e629052f013eeb61494d4df2f1f647c2a9aef47
https://git.kernel.org/stable/c/549f8ffc7b2f7561bea7f90930b6c5104318e87b
https://git.kernel.org/stable/c/813e9f3e06d22e29872d4fd51b54992d89cf66c8
https://git.kernel.org/stable/c/a7de1002135cf94367748ffc695a29812d7633b5
rh#2293324
CVE-2022-48738kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48738
SMASH Issue 411567
bnc#1226674
https://git.kernel.org/stable/c/40f598698129b5ceaf31012f9501b775c7b6e57d
https://git.kernel.org/stable/c/586ef863c94354a7e00e5ae5ef01443d1dc99bc7
https://git.kernel.org/stable/c/65a61b1f56f5386486757930069fbdce94af08bf
https://git.kernel.org/stable/c/68fd718724284788fc5f379e0b7cac541429ece7
https://git.kernel.org/stable/c/817f7c9335ec01e0f5e8caffc4f1dcd5e458a4c0
https://git.kernel.org/stable/c/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830
https://git.kernel.org/stable/c/a9394f21fba027147bf275b083c77955864c366a
https://git.kernel.org/stable/c/bb72d2dda85564c66d909108ea6903937a41679d
rh#2293321
CVE-2022-48739kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2022-48739
SMASH Issue 411546
bnc#1226675
https://git.kernel.org/stable/c/06feec6005c9d9500cd286ec440aabf8b2ddd94d
https://git.kernel.org/stable/c/10007bd96b6c4c3cfaea9e76c311b06a07a5e260
https://git.kernel.org/stable/c/1552e66be325a21d7eff49f46013fb402165a0ac
rh#2293320
CVE-2022-48740kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48740
SMASH Issue 411599
bnc#1226699
https://git.kernel.org/stable/c/186edf7e368c40d06cf727a1ad14698ea67b74ad
https://git.kernel.org/stable/c/70caa32e6d81f45f0702070c0e4dfe945e92fbd7
https://git.kernel.org/stable/c/7ed9cbf7ac0d4ed86b356e1b944304ae9ee450d4
https://git.kernel.org/stable/c/f446089a268c8fc6908488e991d28a9b936293db
rh#2293319
CVE-2022-48741kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48741
SMASH Issue 411560
bnc#1226625
https://git.kernel.org/stable/c/4ee7e4a6c9b298da44029ed9ec8ed23ae49cc209
https://git.kernel.org/stable/c/9c7f8a35c5a83740c0e3ea540b6ad145c50d79aa
https://git.kernel.org/stable/c/e6b678c1a3673de6a5d2f4e22bb725a086a0701a
rh#2293318
CVE-2022-48745kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48745
SMASH Issue 411591
bnc#1226702
https://git.kernel.org/stable/c/2a038dd1d942f8fbc495c58fa592ff24af05f1c2
https://git.kernel.org/stable/c/3c5193a87b0fea090aa3f769d020337662d87b5e
https://git.kernel.org/stable/c/502c37b033fab7cde3e95a570af4f073306be45e
https://git.kernel.org/stable/c/f895ebeb44d09d02674cfdd0cfc2bf687603918c
rh#2293314
CVE-2022-48746kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48746
SMASH Issue 411584
bnc#1226703
https://git.kernel.org/stable/c/4fad499d7fece448e7230d5e5b92f6d8a073e0bb
https://git.kernel.org/stable/c/a01ee1b8165f4161459b5ec4e728bc7130fe8cd4
https://git.kernel.org/stable/c/ec41332e02bd0acf1f24206867bb6a02f5877a62
https://git.kernel.org/stable/c/fe70126da6063c29ca161cdec7ad1dae9af836b3
rh#2293313
CVE-2022-48747kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2022-48747
SMASH Issue 411602
bnc#1226643
https://git.kernel.org/stable/c/3ee859e384d453d6ac68bfd5971f630d9fa46ad3
https://git.kernel.org/stable/c/4633a79ff8bc82770486a063a08b55e5162521d8
https://git.kernel.org/stable/c/6cbf4c731d7812518cd857c2cfc3da9fd120f6ae
https://git.kernel.org/stable/c/941d5180c430ce5b0f7a3622ef9b76077bfa3d82
https://git.kernel.org/stable/c/b63e120189fd92aff00096d11e2fc5253f60248b
rh#2293312
CVE-2022-48748kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2022-48748
SMASH Issue 411593
bnc#1226647
https://git.kernel.org/stable/c/14be8d448fca6fe7b2a413831eedd55aef6c6511
https://git.kernel.org/stable/c/446ff1fc37c74093e81db40811a07b5a19f1d797
https://git.kernel.org/stable/c/c5e216e880fa6f2cd9d4a6541269377657163098
https://git.kernel.org/stable/c/fd20d9738395cf8e27d0a17eba34169699fccdff
rh#2293311
CVE-2022-48749kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48749
SMASH Issue 411600
bnc#1226650
https://git.kernel.org/stable/c/170b22234d5495f5e0844246e23f004639ee89ba
https://git.kernel.org/stable/c/1ebc18836d5df09061657f8c548e594cbb519476
https://git.kernel.org/stable/c/8f069f6dde518dfebe86e848508c07e497bd9298
https://git.kernel.org/stable/c/93a6e920d8ccb4df846c03b6e72f7e08843d294c
rh#2293310
CVE-2022-48750kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48750
SMASH Issue 411566
bnc#1226651
https://git.kernel.org/stable/c/79da533d3cc717ccc05ddbd3190da8a72bc2408b
https://git.kernel.org/stable/c/cfb7d12f2e4a4d694f49e9b4ebb352f7b67cdfbb
rh#2293309
CVE-2022-48752kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48752
SMASH Issue 411583
bnc#1226709
https://git.kernel.org/stable/c/28aaed966e76807a71de79dd40a8eee9042374dd
https://git.kernel.org/stable/c/55402a4618721f350a9ab660bb42717d8aa18e7c
https://git.kernel.org/stable/c/fa4ad064a6bd49208221df5e62adf27b426d1720
https://git.kernel.org/stable/c/fb6433b48a178d4672cb26632454ee0b21056eaa
rh#2293306
CVE-2022-48753kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48753
SMASH Issue 411594
bnc#1226693
https://git.kernel.org/stable/c/83114df32ae779df57e0af99a8ba6c3968b2ba3d
https://git.kernel.org/stable/c/fe4214a07e0b53d2af711f57519e33739c5df23f
rh#2293305
CVE-2022-48761kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48761
SMASH Issue 411598
bnc#1226701
https://git.kernel.org/stable/c/20c51a4c52208f98e27308c456a1951778f41fa5
https://git.kernel.org/stable/c/8b05ad29acb972850ad795fa850e814b2e758b83
https://git.kernel.org/stable/c/9df478463d9feb90dae24f183383961cf123a0ec
https://git.kernel.org/stable/c/d5755832a1e47f5d8773f0776e211ecd4e02da72
rh#2293375
CVE-2022-48762kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48762
SMASH Issue 411573
bnc#1226707
https://git.kernel.org/stable/c/3758a6c74e08bdc15ccccd6872a6ad37d165239a
https://git.kernel.org/stable/c/47fe7a1c5e3e011eeb4ab79f2d54a794fdd1c3eb
rh#2293373
CVE-2022-48763kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48763
SMASH Issue 411587
bnc#1226628
https://git.kernel.org/stable/c/080dbe7e9b86a0392d8dffc00d9971792afc121f
https://git.kernel.org/stable/c/b4c0d89c92e957ecccce12e66b63875d0cc7af7e
https://git.kernel.org/stable/c/e302786233e6bc512986d007c96458ccf5ca21c7
https://git.kernel.org/stable/c/f7e570780efc5cec9b2ed1e0472a7da14e864fdb
rh#2293372
CVE-2022-48764kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48764
SMASH Issue 411607
bnc#1226700
https://git.kernel.org/stable/c/811f95ff95270e6048197821434d9301e3d7f07c
https://git.kernel.org/stable/c/b9ee734a14bb685b2088f2176d82b34cb4e30dbc
rh#2293345
CVE-2022-48765kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48765
SMASH Issue 411603
bnc#1226697
https://git.kernel.org/stable/c/35fe7cfbab2e81f1afb23fc4212210b1de6d9633
https://git.kernel.org/stable/c/54b3439c8e70e0bcfea59aeef9dd98908cbbf655
https://git.kernel.org/stable/c/ce55f63f6cea4cab8ae9212f73285648a5baa30d
rh#2293344
CVE-2022-48766kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48766
SMASH Issue 411580
bnc#1226704
https://git.kernel.org/stable/c/25f1488bdbba63415239ff301fe61a8546140d9f
https://git.kernel.org/stable/c/456ba2433844a6483cc4c933aa8f43d24575e341
rh#2293343
CVE-2022-48767kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48767
SMASH Issue 411604
bnc#1226715
https://git.kernel.org/stable/c/36d433ae3242aa714176378850e6d1a5a3e78f18
https://git.kernel.org/stable/c/932a9b5870d38b87ba0a9923c804b1af7d3605b9
https://git.kernel.org/stable/c/a0c22e970cd78b81c94691e6cb09713e8074d580
https://git.kernel.org/stable/c/e7be12ca7d3947765b0d7c1c7e0537e748da993a
rh#2293342
CVE-2022-48768kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48768
SMASH Issue 411585
bnc#1226720
https://git.kernel.org/stable/c/8a8878ebb596281f50fc0b9a6e1f23f0d7f154e8
https://git.kernel.org/stable/c/d71b06aa995007eafd247626d0669b9364c42ad7
https://git.kernel.org/stable/c/df86e2fe808c3536a9dba353cc2bebdfea00d0cf
https://git.kernel.org/stable/c/e33fa4a46ee22de88a700e2e3d033da8214a5175
https://git.kernel.org/stable/c/e629e7b525a179e29d53463d992bdee759c950fb
rh#2293341
CVE-2022-48770kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-48770
SMASH Issue 411605
bnc#1226730
https://git.kernel.org/stable/c/0bcd484587b3b3092e448d27dc369e347e1810c3
https://git.kernel.org/stable/c/b82ef4985a6d05e80f604624332430351df7b79a
https://git.kernel.org/stable/c/b992f01e66150fc5e90be4a96f5eb8e634c8249e
https://git.kernel.org/stable/c/ff6bdc205fd0a83bd365405d4e31fb5905826996
rh#2293338
CVE-2022-48771kernel-source-rt:Already fixedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2022-48771
SMASH Issue 411581
bnc#1226732
https://git.kernel.org/stable/c/0008a0c78fc33a84e2212a7c04e6b21a36ca6f4d
https://git.kernel.org/stable/c/1d833b27fb708d6fdf5de9f6b3a8be4bd4321565
https://git.kernel.org/stable/c/6066977961fc6f437bc064f628cf9b0e4571c56c
https://git.kernel.org/stable/c/84b1259fe36ae0915f3d6ddcea6377779de48b82
https://git.kernel.org/stable/c/a0f90c8815706981c483a652a6aefca51a5e191c
https://git.kernel.org/stable/c/ae2b20f27732fe92055d9e7b350abc5cdf3e2414
https://git.kernel.org/stable/c/e8d092a62449dcfc73517ca43963d2b8f44d0516
rh#2293337
CVE-2022-4899zstd:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2022-4899
Oracle:CVE-2022-4899
SMASH Issue 360632
bnc#1209533
https://github.com/facebook/zstd/issues/3200
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C63HAGVLQA6FJNDCHR7CNZZL6VSLILB2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEHRBBYYTPA4DETOM5XAKGCP37NUTLOA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QYLDK6ODVC4LJSDULLX6Q2YHTFOWABCN/
https://security.netapp.com/advisory/ntap-20230725-0005/
rh#2179864
CVE-2022-4904c-ares:Releasedmoderate6.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L)CVE-2022-4904
RHSA-2023:1533
RHSA-2023:1582
RHSA-2023:1742
RHSA-2023:1743
RHSA-2023:1744
RHSA-2023:2654
RHSA-2023:2655
RHSA-2023:4035
RHSA-2023:5533
SMASH Issue 356508
SMASH Issue 356565
bnc#1208067
https://github.com/c-ares/c-ares/issues/496
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/33LDNS6RPOPP36Z4MPWXALUQZXJCWJS2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/33LDNS6RPOPP36Z4MPWXALUQZXJCWJS2/
https://security.gentoo.org/glsa/202401-02
jsc#CAR-2350
rh#2168631
CVE-2022-4967strongswan:Not affectedlow ()CVE-2022-4967
SMASH Issue 403518
SMASH Issue 403519
bnc#1223543
https://github.com/strongswan/strongswan/commit/e4b4aabc4996fc61c37deab7858d07bc4d220136
https://security.netapp.com/advisory/ntap-20240614-0006/
https://www.strongswan.org/blog/2024/05/13/strongswan-vulnerability-(cve-2022-4967).html
rh#2280412
CVE-2023-0030kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-0030
L3:67931
SMASH Issue 352485
bnc#1206777
https://github.com/torvalds/linux/commit/729eba3355674f2d9524629b73683ba1d1cd3f10
https://security.netapp.com/advisory/ntap-20230413-0010/
jsc#CAR-2258
rh#2157270
CVE-2023-0045kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-0045
D:CVE-2023-0045
OSS:2023/Q1/81
SMASH Issue 356072
bnc#1207773
https://git.kernel.org/tip/a664ec9158eeddd75121d39c9a0758016097fa96
https://github.com/google/security-research/security/advisories/GHSA-9x5g-vmxf-4qj8
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://security.netapp.com/advisory/ntap-20230714-0001/
jsc#CAR-2336
rh#2167288
CVE-2023-0047kernel-source-rt:Ignoremoderate5.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H)CVE-2023-0047
SMASH Issue 352707
bnc#1206896
jsc#CAR-2269
rh#2144910
CVE-2023-0049vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)CONFIRM:huntr.dev:/bounties/5e6f325c-ba54-4bf0-b050-dca048fd3fd9
CVE-2023-0049
FEDORA:FEDORA-2023-0f6a9433cf
FEDORA:FEDORA-2023-208f2107d5
MISC:github.com:/vim/vim/commit/7b17eb4b063a234376c1ec909ee293e42cff290c
SMASH Issue 352728
bnc#1206866
http://seclists.org/fulldisclosure/2023/Mar/17
https://security.gentoo.org/glsa/202305-16
https://support.apple.com/kb/HT213670
jsc#CAR-2267
rh#2158269
CVE-2023-0051vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)CONFIRM:huntr.dev:/bounties/1c8686db-baa6-42dc-ba45-aed322802de9
CVE-2023-0051
MISC:github.com:/vim/vim/commit/c32949b0779106ed5710ae3bffc5053e49083ab4
SMASH Issue 352715
bnc#1206867
http://seclists.org/fulldisclosure/2023/Mar/17
https://security.gentoo.org/glsa/202305-16
https://support.apple.com/kb/HT213670
jsc#CAR-2266
rh#2161348
CVE-2023-0054vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N)CONFIRM:huntr.dev:/bounties/b289ee0f-fd16-4147-bd01-c6289c45e49d
CVE-2023-0054
MISC:github.com:/vim/vim/commit/3ac1d97a1d9353490493d30088256360435f7731
SMASH Issue 352710
bnc#1206868
http://seclists.org/fulldisclosure/2023/Mar/17
https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html
https://security.gentoo.org/glsa/202305-16
https://support.apple.com/kb/HT213670
jsc#CAR-2265
rh#2161349
CVE-2023-0122kernel-source-rt:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-0122
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
MISC:github.com:OSS:2023/01/18/1
OSS:2023/01/18/1
OSS:2023/Q1/16
SMASH Issue 353113
bnc#1207050
https://security.netapp.com/advisory/ntap-20230302-0002/
rh#2157927
CVE-2023-0179kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2022-1015
CVE-2023-0179
DSA-5324
L3:65449
L3:66739
OSS:2023/01/13/2
OSS:2023/02/23/1
OSS:2023/Q1/20
RHSA-2023:0951
RHSA-2023:0979
RHSA-2023:1008
RHSA-2023:1202
RHSA-2023:1203
RHSA-2023:1435
SMASH Issue 353368
SMASH Issue 353369
bnc#1207034
bnc#1207139
http://packetstormsecurity.com/files/171601/Kernel-Live-Patch-Security-Notice-LNS-0093-1.html
https://security.netapp.com/advisory/ntap-20230511-0003/
linux.git:commit:696e1a48b1a1b01edad542a1ef293665864a4dd0
rh#2065323
rh#2161713
CVE-2023-0210kernel-source-rt:Not affectedimportant ()CVE-2023-0210
OSS:2023/01/04/1
OSS:2023/01/11/1
OSS:2023/Q1/15
SMASH Issue 351900
SMASH Issue 353357
bnc#1206707
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=797805d81baa814f76cf7bdab35f86408a79d707
https://github.com/cifsd-team/ksmbd/commit/8824b7af409f51f1316e92e9887c2fd48c0b26d6
https://security.netapp.com/advisory/ntap-20230517-0002/
https://securityonline.info/cve-2023-0210-flaw-in-linux-kernel-allows-unauthenticated-remote-dos-attacks/
rh#2163499
CVE-2023-0215openssl:Not affected, openssl-1_1:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-0215
D:CVE-2023-0215
DSA-5343
L3:66264
L3:68186
OSS:2023/Q1/129
Oracle:CVE-2023-0215
RHSA-2023:0946
RHSA-2023:1199
RHSA-2023:1405
RHSA-2023:2165
RHSA-2023:2932
RHSA-2023:3354
RHSA-2023:3355
RHSA-2023:3408
RHSA-2023:3420
RHSA-2023:3421
RHSA-2023:4128
SMASH Issue 354989
SMASH Issue 354990
bdo#1023424
bnc#1207536
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8818064ce3c3c0f1b740a5aaba2a987e75bfbafd
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9816136fe31d92ace4037d5da5257f763aeeb4eb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c3829dd8825c654652201e16f8a0a0c46ee3f344
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230427-0007/
https://security.netapp.com/advisory/ntap-20230427-0009/
https://security.netapp.com/advisory/ntap-20240621-0006/
https://www.openssl.org/news/secadv/20230207.txt
jsc#CAR-2341
openssl.git:commit:c400a1fe477b44a5eacbad2be8d50f2eaa92925c
rh#2164492
CVE-2023-0216openssl:Not affected, openssl-1_1:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-0216
RHSA-2023:0946
RHSA-2023:1199
SMASH Issue 354993
SMASH Issue 354994
bnc#1207539
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=934a04f0e775309cadbef0aa6b9692e1b12a76c6
https://security.gentoo.org/glsa/202402-08
https://www.openssl.org/news/secadv/20230207.txt
openssl.git:commit:80253dbdc92bec584f4a9866b43f8674156d838a
rh#2164497
CVE-2023-0217openssl:Not affected, openssl-1_1:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-0217
RHSA-2023:0946
RHSA-2023:1199
SMASH Issue 354995
SMASH Issue 354996
bnc#1207540
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=23985bac83fd50c8e29431009302b5442f985096
https://security.gentoo.org/glsa/202402-08
https://www.openssl.org/news/secadv/20230207.txt
openssl.git:commit:a9e6100bc98439ca787aa1fce541550ad1ff3e84
openssl.git:commit:bcec03c33cc00a7b5eb89ebeeee59e604570a86a
rh#2164499
CVE-2023-0240kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-0240
MISC:git.kernel.org:/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring
MISC:github.com:/gregkh/linux/commit/1e6fa5216a0e59ef02e8b6b40d553238a3b81d49
MISC:kernel.dance:/
SMASH Issue 355667
bnc#1216818
rh#2165852
CVE-2023-0266kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-0266
DSA-5324
L3:65871
L3:65876
L3:66505
MISC:git.kernel.org:/pub/scm/linux/kernel/git/stable/stable-queue.git/tree/queue-5.10/alsa-pcm-move-rwsem-lock-inside-snd_ctl_elem_read-to-prevent-uaf.patch
MISC:github.com:/torvalds/linux/commit/becf9e5d553c2389d857a3c178ce80fdb34a02e1
RHSA-2023:1202
RHSA-2023:1203
RHSA-2023:1435
RHSA-2023:1469
RHSA-2023:1470
RHSA-2023:1471
RHSA-2023:1554
RHSA-2023:1556
RHSA-2023:1557
RHSA-2023:1559
RHSA-2023:1560
RHSA-2023:1566
RHSA-2023:1584
RHSA-2023:1588
RHSA-2023:1590
RHSA-2023:1659
RHSA-2023:1660
RHSA-2023:1662
RHSA-2023:1666
RHSA-2023:1677
SMASH Issue 353695
SMASH Issue 353696
bnc#1207134
bnc#1207190
bnc#1209477
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
jsc#CAR-2319
linux.git:commit:56b88b50565cd8b946a2d00b0c83927b7ebb055e
rh#2163379
CVE-2023-0286openssl:Not affected, openssl-1_1:Releasedimportant7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H)CVE-2023-0286
DSA-5343
L3:65311
L3:65809
L3:65887
L3:66264
L3:66545
L3:67378
L3:67470
L3:68205
RHSA-2023:0946
RHSA-2023:1199
RHSA-2023:1335
RHSA-2023:1405
RHSA-2023:1437
RHSA-2023:1438
RHSA-2023:1439
RHSA-2023:1440
RHSA-2023:1441
RHSA-2023:2022
RHSA-2023:2165
RHSA-2023:2932
RHSA-2023:3354
RHSA-2023:3355
RHSA-2023:3420
RHSA-2023:3421
RHSA-2023:4124
RHSA-2023:4128
RHSA-2023:4252
RHSA-2023:5209
SMASH Issue 354983
SMASH Issue 354984
bdo#1023424
bnc#1207533
bnc#1207569
bnc#1208677
https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.2-relnotes.txt
https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/018_x509.patch.sig
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c6c9d439b484e1ba9830d8454a34fa4f80fdfe9
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2f7530077e0ef79d98718138716bc51ca0cad658
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fd2af07dc083a350c959147097003a14a5e8ac4d
https://security.gentoo.org/glsa/202402-08
https://www.openssl.org/news/secadv/20230207.txt
jsc#CAR-2359
openssl.git:commit:399c2da08ab9c6a382f8e9950742a022e847fec0
openssl.git:commit:7880536fe17c2b5450e279155bedd51771d28c9f
rh#2164440
CVE-2023-0288vim:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)CONFIRM:huntr.dev:/bounties/550a0852-9be0-4abe-906c-f803b34e41d3
CVE-2023-0288
FEDORA:FEDORA-2023-340f1d6ab9
MISC:github.com:/vim/vim/commit/232bdaaca98c34a99ffadf27bf6ee08be6cc8f6a
SMASH Issue 353711
bnc#1207162
http://seclists.org/fulldisclosure/2023/Mar/17
https://support.apple.com/kb/HT213670
jsc#CAR-2293
rh#2163130
CVE-2023-0361gnutls:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2023-0361
DSA-5349
Oracle:CVE-2023-0361
RHSA-2023:1141
RHSA-2023:1200
RHSA-2023:1569
RHSA-2023:3361
SMASH Issue 356679
bnc#1208143
https://access.redhat.com/security/cve/CVE-2023-0361
https://github.com/tlsfuzzer/tlsfuzzer/pull/679
https://gitlab.com/gnutls/gnutls/-/issues/1050
https://lists.debian.org/debian-lts-announce/2023/02/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFIA3X4IZ3CW7SRQ2UHNHNPMRIAWF2FI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WS4KVDOG6QTALWHC2QE4Y7VPDRMLTRWQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z634YBXAJ5VLDI62IOPBVP5K6YFHAWCY/
https://security.netapp.com/advisory/ntap-20230324-0005/
https://security.netapp.com/advisory/ntap-20230725-0005/
jsc#CAR-2362
rh#2162596
CVE-2023-0386kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-0386
DSA-5402
RHSA-2023:1554
RHSA-2023:1566
RHSA-2023:1584
RHSA-2023:1659
RHSA-2023:1660
RHSA-2023:1677
RHSA-2023:1681
RHSA-2023:1691
RHSA-2023:1703
RHSA-2023:1970
RHSA-2023:1980
RHSA-2023:1984
SMASH Issue 360808
bnc#1209615
bnc#1210499
http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f11ada10d0a
https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html
https://security.netapp.com/advisory/ntap-20230420-0004/
https://www.debian.org/security/2023/dsa-5402
jsc#CAR-2468
rh#2159505
CVE-2023-0394kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-0394
DSA-5324
L3:66496
L3:67104
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
OSS:2023/Q1/41
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 353826
SMASH Issue 354210
bnc#1207168
bnc#1207187
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://security.netapp.com/advisory/ntap-20230302-0005/
jsc#CAR-2320
rh#2162120
CVE-2023-0401openssl:Not affected, openssl-1_1:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-0401
RHSA-2023:0946
RHSA-2023:1199
SMASH Issue 354997
SMASH Issue 354998
bnc#1207541
bnc#1210509
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=d3b6dfd70db844c4499bec6ad6601623a565e674
https://security.gentoo.org/glsa/202402-08
https://www.openssl.org/news/secadv/20230207.txt
openssl.git:commit:6eebe6c0238178356114a96a7858f36b24172847
rh#2164500
CVE-2023-0433vim:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CONFIRM:huntr.dev:/bounties/ae933869-a1ec-402a-bbea-d51764c6618e
CVE-2023-0433
D:CVE-2023-0433
MISC:github.com:/vim/vim/commit/11977f917506d950b7e0cae558bd9189260b253b
SMASH Issue 354510
bnc#1207396
http://seclists.org/fulldisclosure/2023/Mar/17
http://seclists.org/fulldisclosure/2023/Mar/18
http://seclists.org/fulldisclosure/2023/Mar/21
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EX6N2DB75A73MQGVW3CS4VTNPAYVM2M/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PZWIJBSQX53P7DHV77KRXJIXA4GH7XHC/
https://support.apple.com/kb/HT213670
https://support.apple.com/kb/HT213675
https://support.apple.com/kb/HT213677
jsc#CAR-2322
rh#2163612
CVE-2023-0458kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-0458
RHSA-2023:4377
RHSA-2023:4378
RHSA-2023:4801
RHSA-2023:4814
SMASH Issue 364554
bnc#1210905
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/diff/kernel/sys.c?id=v6.1.8&id2=v6.1.7
https://github.com/torvalds/linux/commit/739790605705ddcf18f21782b9c99ad7d53a8c11
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
rh#2193219
CVE-2023-0459kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-0459
L3:66852
RHSA-2022:1975
RHSA-2022:1988
SMASH Issue 367485
bnc#1211738
https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c
https://github.com/torvalds/linux/commit/74e19ef0ff8061ef55957c3abd71614ef0f42f47
jsc#CAR-2653
rh#2216383
CVE-2023-0461kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-0461
L3:65394
L3:65952
RHSA-2023:1556
RHSA-2023:1557
RHSA-2023:1662
RHSA-2023:1841
RHSA-2023:1923
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
RHSA-2023:3190
RHSA-2023:3191
RHSA-2023:3465
RHSA-2023:3470
RHSA-2023:3490
RHSA-2023:3491
RHSA-2023:4125
RHSA-2023:4126
RHSA-2023:4146
SMASH Issue 358681
bnc#1208787
bnc#1208911
bnc#1209072
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c
https://kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
jsc#CAR-2395
rh#2176192
CVE-2023-0464openssl:Not affected, openssl-1_1:Ignoremoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2023-0464
CVE-2023-0466
D:CVE-2023-0464
DSA-5417
L3:65602
L3:65615
L3:65958
L3:66080
L3:68186
MISC:www.couchbase.com:/alerts/
OSS:2023/09/28/4
OSS:2023/Q1/187
Oracle:CVE-2023-0464
RHSA-2023:3722
SMASH Issue 360932
bdo#1034720
bnc#1209624
bnc#1209987
bnc#1210039
bnc#1211881
bnc#1212330
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2017771e2db3e2b96f89bbe8766c3209f6a99545
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2dcd4f1e3115f38cefa43e3efbe9b801c27e642e
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=51e8a84ce742db0f6c70510d0159dad8f7825908
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=879f7080d7e141f415c79eaa3a8ac4a3dad0348b
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=959c59c7a0164117e7f8366466a32bb1f8d77ff1
https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20240621-0006/
https://www.debian.org/security/2023/dsa-5417
https://www.openssl.org/news/secadv/20230322.txt
jsc#CAR-2469
openssl.git:commit:3a81370f75b832102e9969533a25ca53fe0b254e
openssl.git:commit:591feddc61f113827883ad8bae05109ee01ccd41
openssl.git:commit:5ab3f71a33cb0140fc29ae9244cd4f8331c2f3a5
openssl.git:commit:986f9a674d49d1e13459e04bd721237c721c44f4
openssl.git:commit:a4e726428608e352283d745cb0716248d29ecf26
openssl.git:commit:e4142ec43bcc08ffdb090580e24c24a7da302a32
rh#2181082
rh#2182561
rh#2182565
CVE-2023-0465openssl:Ignore, openssl-1_1:Ignoremoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N)CVE-2023-0465
CVE-2023-0466
DSA-5417
L3:65958
L3:66081
L3:66706
OSS:2023/09/28/4
OSS:2023/Q1/202
RHSA-2023:3722
SMASH Issue 361662
bdo#1034720
bnc#1209878
bnc#1210513
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=51e8a84ce742db0f6c70510d0159dad8f7825908
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b013765abfa80036dc779dd0e50602c57bb3bf95
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=facfb1ab745646e97a1920977ae4a9965ea61d5c
https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230414-0001/
https://www.debian.org/security/2023/dsa-5417
https://www.openssl.org/news/secadv/20230328.txt
openssl.git:commit:591feddc61f113827883ad8bae05109ee01ccd41
openssl.git:commit:5ab3f71a33cb0140fc29ae9244cd4f8331c2f3a5
openssl.git:commit:986f9a674d49d1e13459e04bd721237c721c44f4
openssl.git:commit:a4e726428608e352283d745cb0716248d29ecf26
openssl.git:commit:e4142ec43bcc08ffdb090580e24c24a7da302a32
rh#2182561
rh#2182565
CVE-2023-0466openssl:Not affected, openssl-1_1:Ignoremoderate2 (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N)BID:92988
CONFIRM:github.com:CVE-2016-7420
CVE-2016-7420
CVE-2023-0464
CVE-2023-0465
CVE-2023-0466
CVE-2023-4863
CVE-2023-4900
CVE-2023-4901
CVE-2023-4902
CVE-2023-4903
CVE-2023-4904
CVE-2023-4905
CVE-2023-4906
CVE-2023-4907
CVE-2023-4908
CVE-2023-4909
CVE-2023-5129
D:CVE-2016-7420
D:CVE-2023-0464
DSA-5417
DSA-5496
DSA-5497
DSA-5497-2
DSA-5498
DSA-5499
L3:65602
L3:65615
L3:65958
L3:66080
L3:66081
L3:66082
L3:66706
L3:66814
L3:67108
L3:67109
L3:68186
MISC:bugs.chromium.org:OSS:2023/09/22/6
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:github.com:OSS:2023/09/21/4
MISC:github.com:OSS:2023/09/22/1
MISC:www.couchbase.com:/alerts/
MISC:www.openwall.com
MLIST:[oss-security] 20160915 Re: Does a documentation bug elevate to CVE status? - Crypto++
OSS:2016/Q3/520
OSS:2016/Q3/527
OSS:2016/Q3/559
OSS:2016/Q3/600
OSS:2023/09/21/4
OSS:2023/09/22/1
OSS:2023/09/22/3
OSS:2023/09/22/4
OSS:2023/09/22/5
OSS:2023/09/22/6
OSS:2023/09/22/7
OSS:2023/09/22/8
OSS:2023/09/26/1
OSS:2023/09/26/7
OSS:2023/09/28/1
OSS:2023/09/28/2
OSS:2023/09/28/4
OSS:2023/Q1/187
OSS:2023/Q1/202
OSS:2023/Q3/204
Oracle:CVE-2023-0464
RHSA-2023:3722
RHSA-2023:5183
RHSA-2023:5184
RHSA-2023:5185
RHSA-2023:5186
RHSA-2023:5187
RHSA-2023:5188
RHSA-2023:5189
RHSA-2023:5190
RHSA-2023:5191
RHSA-2023:5192
RHSA-2023:5197
RHSA-2023:5198
RHSA-2023:5200
RHSA-2023:5201
RHSA-2023:5202
RHSA-2023:5204
RHSA-2023:5205
RHSA-2023:5214
RHSA-2023:5222
RHSA-2023:5223
RHSA-2023:5224
RHSA-2023:5236
RHSA-2023:5309
SMASH Issue 172679
SMASH Issue 360932
SMASH Issue 361662
SMASH Issue 361666
SMASH Issue 377966
SMASH Issue 379829
UBUNTU:CVE-2016-7420
bdo#1034720
bdo#1042111
bnc#1008266
bnc#1209624
bnc#1209873
bnc#1209878
bnc#1209987
bnc#1210039
bnc#1210513
bnc#1211881
bnc#1212330
bnc#1212332
bnc#1215231
bnc#1215245
bnc#1215279
bnc#1215347
bnc#1215349
bnc#1215453
bnc#1215715
https://adamcaudill.com/2023/09/14/whose-cve-is-it-anyway/
https://blog.isosceles.com/the-webp-0day/
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_11.html
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html
https://chromium.googlesource.com/webm/libwebp/+/2af26267cdfcb63a88e5c74a85927a12d6ca1d76
https://chromium.googlesource.com/webm/libwebp/+/902bc9190331343b2017211debcec8d2ab87e17a
https://crbug.com/1430867
https://crbug.com/1441228
https://crbug.com/1446709
https://crbug.com/1449874
https://crbug.com/1451543
https://crbug.com/1453501
https://crbug.com/1454515
https://crbug.com/1459281
https://crbug.com/1462104
https://crbug.com/1463293
https://crbug.com/1479274
https://en.bandisoft.com/honeyview/history/
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0d16b7e99aafc0b4a6d729eec65a411a7e025f0a
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2017771e2db3e2b96f89bbe8766c3209f6a99545
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2dcd4f1e3115f38cefa43e3efbe9b801c27e642e
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=51e8a84ce742db0f6c70510d0159dad8f7825908
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=73398dea26de9899fb4baa94098ad0a61f435c72
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=879f7080d7e141f415c79eaa3a8ac4a3dad0348b
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=959c59c7a0164117e7f8366466a32bb1f8d77ff1
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b013765abfa80036dc779dd0e50602c57bb3bf95
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=facfb1ab745646e97a1920977ae4a9965ea61d5c
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc814a30fc4f0bc54fcea7d9a7462f5457aab061
https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a
https://github.com/webmproject/libwebp/releases/tag/v1.3.2
https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00015.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00016.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FYYKLG6CRGEDTNRBSU26EEWAO6D6U645/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OZDGWWMJREPAGKWCJKSCM4WYLANSKIFX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PYZV7TMKF4QHZ54SFJX54BDN52VHGGCX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHOLML7N2G5KCAZXFWC5IDFFHSQS5SDB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4863
https://news.ycombinator.com/item?id=37478403
https://security-tracker.debian.org/tracker/CVE-2023-4863
https://security.gentoo.org/glsa/202309-05
https://security.gentoo.org/glsa/202401-10
https://security.gentoo.org/glsa/202401-34
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230414-0001/
https://security.netapp.com/advisory/ntap-20230929-0011/
https://security.netapp.com/advisory/ntap-20240621-0006/
https://sethmlarson.dev/security-developer-in-residence-weekly-report-16
https://stackdiary.com/critical-vulnerability-in-webp-codec-cve-2023-4863/
https://www.bentley.com/advisories/be-2023-0001/
https://www.bleepingcomputer.com/news/google/google-fixes-another-chrome-zero-day-bug-exploited-in-attacks/
https://www.debian.org/security/2023/dsa-5417
https://www.debian.org/security/2023/dsa-5496
https://www.debian.org/security/2023/dsa-5497
https://www.debian.org/security/2023/dsa-5498
https://www.debian.org/security/2023/dsa-5499
https://www.mozilla.org/en-US/security/advisories/mfsa2023-40/
https://www.openssl.org/news/secadv/20230322.txt
https://www.openssl.org/news/secadv/20230328.txt
jsc#CAR-2469
jsc#CAR-2478
openssl.git:commit:3a81370f75b832102e9969533a25ca53fe0b254e
openssl.git:commit:591feddc61f113827883ad8bae05109ee01ccd41
openssl.git:commit:5ab3f71a33cb0140fc29ae9244cd4f8331c2f3a5
openssl.git:commit:986f9a674d49d1e13459e04bd721237c721c44f4
openssl.git:commit:a4e726428608e352283d745cb0716248d29ecf26
openssl.git:commit:e4142ec43bcc08ffdb090580e24c24a7da302a32
rh#1376696
rh#2181082
rh#2182561
rh#2182565
rh#2238431
rh#2238821
rh#2238822
rh#2240759
CVE-2023-0468kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-0468
SMASH Issue 354948
bnc#1207511
rh#2164024
CVE-2023-0469kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-0469
D:CVE-2023-2236
SMASH Issue 354947
bnc#1207521
bnc#1210990
rh#2163723
rh#2196759
CVE-2023-0512vim:Releasedimportant7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)CONFIRM:huntr.dev:/bounties/de83736a-1936-4872-830b-f1e9b0ad2a74
CVE-2023-0512
L3:65231
L3:65312
L3:65540
L3:65672
MISC:github.com:/vim/vim/commit/870219c58c0804bdc55419b2e455c06ac715a835
SMASH Issue 355679
bnc#1207780
bnc#1208349
bnc#1208678
bnc#1209706
http://seclists.org/fulldisclosure/2023/Mar/17
http://seclists.org/fulldisclosure/2023/Mar/18
http://seclists.org/fulldisclosure/2023/Mar/21
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
https://support.apple.com/kb/HT213670
https://support.apple.com/kb/HT213675
https://support.apple.com/kb/HT213677
jsc#CAR-2328
rh#2165798
CVE-2023-0590kernel-source-rt:Releasedimportant7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-0590
CVE-2023-23454
CVE-2023-23455
DSA-5324
L3:65098
L3:65173
L3:65176
L3:65185
L3:65224
L3:65237
L3:65449
L3:65869
L3:65871
L3:65876
L3:65879
L3:65952
L3:66496
L3:67104
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
OSS:2023/01/10/1
OSS:2023/01/10/4
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
RHSA-2023:5627
SMASH Issue 353573
SMASH Issue 355766
bnc#1207036
bnc#1207125
bnc#1207188
bnc#1207189
bnc#1207657
bnc#1207795
bnc#1207822
bnc#1208342
bnc#1208355
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lore.kernel.org/all/20221018203258.2793282-1-edumazet%40google.com/
https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/
jsc#CAR-2288
jsc#CAR-2292
jsc#CAR-2329
rh#2150953
rh#2150979
rh#2165741
rh#2168297
rh#2168332
CVE-2023-0597kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-0597
OSS:2023/07/28/1
SMASH Issue 355950
bnc#1207845
https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80
jsc#CAR-2337
rh#2165926
rh#2217523
CVE-2023-0615kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-0615
SMASH Issue 355892
bnc#1207844
rh#2166287
CVE-2023-0634shadow:Not affectedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2023-0634
MISC:access.redhat.com:/security/cve/CVE-2023-0634
MISC:codeql.github.com:/codeql-query-help/cpp/cpp-uncontrolled-process-operation/
MISC:github.com:/shadow-maint/shadow/pull/642
SMASH Issue 355966
bnc#1207857
rh#2166544
CVE-2023-0687glibc:Not affectedlow0 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N)CVE-2023-0687
D:CVE-2023-0687
L3:65252
MISC:patchwork.sourceware.org:/project/glibc/patch/20230204114138.5436-1-leo@yuriev.ru/
MISC:sourceware.org:/bugzilla/show_bug.cgi
MISC:vuldb.com:/
SMASH Issue 356308
bnc#1207975
bnc#1208409
https://patchwork.sourceware.org/project/glibc/patch/20230204114138.5436-1-leo%40yuriev.ru/
jsc#CAR-2335
rh#2167610
CVE-2023-0767mozilla-nss:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2023-0767
DSA-5350
DSA-5353
DSA-5355
L3:66270
L3:66422
L3:66594
L3:67380
L3:67467
L3:68187
RHSA-2023:1252
RHSA-2023:1332
RHSA-2023:1365
RHSA-2023:1366
RHSA-2023:1368
RHSA-2023:1369
RHSA-2023:1370
RHSA-2023:1406
RHSA-2023:1436
RHSA-2023:1479
RHSA-2023:1677
SMASH Issue 356669
SMASH Issue 356670
bnc#1208138
https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html
https://bugzilla.mozilla.org/show_bug.cgi?id=1804640
https://www.mozilla.org/security/advisories/mfsa2023-05/
https://www.mozilla.org/security/advisories/mfsa2023-06/
https://www.mozilla.org/security/advisories/mfsa2023-07/
jsc#CAR-2378
rh#2170377
CVE-2023-1032kernel-source-rt:Not affectedmoderate ()CVE-2023-1032
OSS:2023/03/13/2
OSS:2023/Q1/140
SMASH Issue 359911
bnc#1209240
https://ubuntu.com/security/notices/USN-5977-1
https://ubuntu.com/security/notices/USN-6024-1
https://ubuntu.com/security/notices/USN-6033-1
rh#2179153
CVE-2023-1073kernel-source-rt:Releasedmoderate6.3 (CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-1073
MISC:git.kernel.org:OSS:2023/11/05/1
OSS:2023/01/17/3
OSS:2023/01/18/3
OSS:2023/11/05/2
OSS:2023/11/05/3
SMASH Issue 352501
SMASH Issue 358571
bnc#1206784
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/id=b12fece4c64857e5fab4290bf01b2e0317a88456
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://www.openwall.com/lists/osssecurity/2023/01/17/3
jsc#CAR-2353
jsc#PED-568
rh#2173403
CVE-2023-1074kernel-source-rt:Releasedimportant4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-1074
OSS:2023/01/23/1
OSS:2023/11/05/4
SMASH Issue 351709
SMASH Issue 358573
bnc#1206677
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
jsc#CAR-2351
rh#2173430
CVE-2023-1075kernel-source-rt:Ignorelow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2023-1075
D:CVE-2023-1075
OSS:2023/Q1/125
SMASH Issue 358069
SMASH Issue 358576
bnc#1208598
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb
jsc#CAR-2401
rh#2173434
CVE-2023-1076kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-1076
D:CVE-2023-1076
DSA-5480
DSA-5492
OSS:2023/Q1/124
SMASH Issue 358070
SMASH Issue 358635
bnc#1208599
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=66b2c338adce580dfce2199591e65e2bab889cff
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=a096ccca6e503a5c575717ff8a36ace27510ab0a
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
jsc#CAR-2402
linux.git:commit:5c9241f3ceab3257abe2923a59950db0dc8bb737
linux.git:commit:666c135b2d859a00ee74c8645b2affacfae45421
linux.git:commit:9bc3047374d5bec163e83e743709e23753376f0c
rh#2173435
rh#2229498
CVE-2023-1077kernel-source-rt:Releasedimportant7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230113-0008/
CVE-2022-45919
CVE-2023-1077
CVE-2023-3159
D:CVE-2022-45919
DSA-5480
DSA-5492
L3:65449
L3:66178
L3:66431
L3:66432
L3:66463
L3:66491
L3:66496
L3:66505
L3:66852
L3:67104
MISC:lore.kernel.org:CVE-2022-45919
OSS:2023/Q1/126
SMASH Issue 358071
SMASH Issue 358634
ZDI-24-593
bnc#1205803
bnc#1208600
bnc#1208839
bnc#1208912
bnc#1212128
bnc#1212347
bnc#1212744
bnc#1213937
bnc#1214100
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=280a8ab81733da8bc442253c700a52c4c0886ffd
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97
https://github.com/torvalds/linux/commit/b7c81f80246fac44077166f3e07103affe6db8ff
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lore.kernel.org/linux-media/20221121063308.GA33821%40ubuntu/T/#u
https://security.netapp.com/advisory/ntap-20230511-0002/
jsc#CAR-2403
jsc#CAR-2670
jsc#CAR-2698
linux.git:commit:3e337087c3b5805fe0b8a46ba622a962880b5d64
rh#2150999
rh#2151956
rh#2173436
rh#2179000
rh#2187773
rh#2187931
rh#2192671
rh#2213414
rh#2218672
rh#2226780
CVE-2023-1078kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-1078
MISC:git.kernel.org:OSS:2023/11/05/1
MISC:www.openwall.com:OSS:2023/11/05/1
OSS:2023/01/17/3
OSS:2023/01/18/3
OSS:2023/01/23/1
OSS:2023/11/05/1
SMASH Issue 358072
SMASH Issue 358633
bnc#1208601
bnc#1208603
bnc#1208838
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=66b2c338adce580dfce2199591e65e2bab889cff
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=a096ccca6e503a5c575717ff8a36ace27510ab0a
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=f753a68980cf4b59a80fe677619da2b1804f526d
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://security.netapp.com/advisory/ntap-20230505-0004/
jsc#CAR-2404
rh#2173440
CVE-2023-1079kernel-source-rt:Ignoremoderate6.3 (CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-1079
MISC:git.kernel.org:OSS:2023/11/05/1
MISC:www.openwall.com:OSS:2023/11/05/1
OSS:2023/01/17/3
OSS:2023/01/18/3
OSS:2023/01/23/1
OSS:2023/11/05/1
OSS:2023/Q1/123
SMASH Issue 358077
SMASH Issue 358632
bnc#1208604
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=66b2c338adce580dfce2199591e65e2bab889cff
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=a096ccca6e503a5c575717ff8a36ace27510ab0a
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=f753a68980cf4b59a80fe677619da2b1804f526d
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
jsc#CAR-2406
rh#2173444
CVE-2023-1095kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-1095
L3:65524
RHSA-2022:7933
RHSA-2022:8267
RHSA-2023:2736
RHSA-2023:2951
RHSA-2023:5627
RHSA-2023:5628
SMASH Issue 358675
bnc#1208777
bnc#1209647
https://github.com/torvalds/linux/commit/580077855a40741cf511766129702d97ff02f4d9
jsc#CAR-2394
rh#2173973
CVE-2023-1118kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-1118
L3:65449
L3:65683
L3:65869
L3:65871
L3:65876
L3:65879
L3:66431
L3:66432
OSS:2023/Q1/128
SMASH Issue 358916
bnc#1208837
bnc#1208910
bnc#1211486
bnc#1211491
https://github.com/torvalds/linux/commit/29b0589a865b6f66d141d79b2dd1373e4e50fe17
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://security.netapp.com/advisory/ntap-20230413-0003/
jsc#CAR-2405
linux.git:commit:56b88b50565cd8b946a2d00b0c83927b7ebb055e
rh#2163379
rh#2165741
rh#2174400
rh#2178212
rh#2181847
rh#2182443
CVE-2023-1127vim:Releasedmoderate3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2023-1127
D:CVE-2023-1127
SMASH Issue 358957
bnc#1208828
https://github.com/vim/vim/commit/e0f869196930ef5f25a0ac41c9215b09c9ce2d3c
https://huntr.dev/bounties/2d4d309e-4c96-415f-9070-36d0815f1beb
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PDVN5HSWPNVP4QXBPCEGZDLZKURLJWTE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WJ6TMKKBXHGVUHWFGM4X46VIJO7ZAG2W/
jsc#CAR-2400
rh#2174662
CVE-2023-1170vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CVE-2023-1170
SMASH Issue 359176
bnc#1208959
https://github.com/vim/vim/commit/1c73b65229c25e3c1fd8824ba958f7cc4d604f9c
https://huntr.dev/bounties/286e0090-e654-46d2-ac60-29f81799d0a4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/
rh#2176462
CVE-2023-1175vim:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CVE-2023-1175
D:CVE-2023-1175
SMASH Issue 359192
bnc#1208957
https://github.com/vim/vim/commit/c99cbf8f289bdda5d4a77d7ec415850a520330ba
https://huntr.dev/bounties/7e93fc17-92eb-4ae7-b01a-93bb460b643e
https://lists.debian.org/debian-lts-announce/2023/06/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/
rh#2176457
CVE-2023-1192kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-1192
CVE-2023-52572
SMASH Issue 359331
bnc#1208995
https://access.redhat.com/security/cve/CVE-2023-1192
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=98bea253aa28ad8be2ce565a9ca21beb4a9419e5
https://git.kernel.org/stable/c/76569e3819e0bb59fc19b1b8688b017e627c268a
https://git.kernel.org/stable/c/908b3b5e97d25e879de3d1f172a255665491c2c3
https://git.kernel.org/stable/c/d527f51331cace562393a8038d870b3e9916686f
jsc#CAR-2708
rh#2154178
rh#2267746
CVE-2023-1193kernel-source-rt:Not affectedmoderate ()CVE-2023-1193
SMASH Issue 359262
bnc#1208972
https://access.redhat.com/security/cve/CVE-2023-1193
https://lkml.kernel.org/linux-cifs/20230401084951.6085-2-linkinjeon@kernel.org/T/
rh#2154177
CVE-2023-1194kernel-source-rt:Not affectedimportant7.1 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2023-1194
SMASH Issue 359254
bnc#1208968
https://access.redhat.com/security/cve/CVE-2023-1194
https://security.netapp.com/advisory/ntap-20231221-0006/
https://www.spinics.net/lists/stable-commits/msg303065.html
rh#2154176
CVE-2023-1195kernel-source-rt:Releasedlow2.2 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2023-1195
D:CVE-2023-1195
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 359253
bnc#1208971
https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621
rh#2154171
CVE-2023-1206kernel-source-rt:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-1206
D:CVE-2023-1206
DSA-5480
DSA-5492
L3:67651
RHSA-2023:5603
RHSA-2023:5604
RHSA-2023:5627
SMASH Issue 370454
bnc#1212703
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://security.netapp.com/advisory/ntap-20230929-0006/
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
jsc#CAR-2722
rh#2175903
CVE-2023-1249kernel-source-rt:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2023-1249
SMASH Issue 359384
bnc#1209039
http://packetstormsecurity.com/files/171912/CentOS-Stream-9-Missing-Kernel-Security-Fix.html
https://patchwork.kernel.org/project/linux-fsdevel/patch/87iltzn3nd.fsf_-_@email.froward.int.ebiederm.org/
jsc#CAR-2418
rh#2169719
CVE-2023-1252kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2023-1252
SMASH Issue 359385
bnc#1209045
https://lore.kernel.org/lkml/20211115165433.449951285@linuxfoundation.org/
https://security.netapp.com/advisory/ntap-20230505-0005/
rh#2176140
CVE-2023-1255openssl:Not affected, openssl-1_1:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-1255
D:CVE-2023-1255
OSS:2023/04/20/13
OSS:2023/Q2/86
RHSA-2023:3722
SMASH Issue 364125
bnc#1210714
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=02ac9c9420275868472f33b01def01218742b8bb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bc2f61ad70971869b242fc1cb445b98bad50074a
https://security.netapp.com/advisory/ntap-20230908-0006/
https://www.openssl.org/news/secadv/20230419.txt
openssl.git:commit:72dfe46550ee1f1bbfacd49f071419365bc23304
openssl.git:commit:e6990079c2413625d2039ebed49ea17a5b8cf935
rh#2188461
CVE-2023-1264vim:Unsupportedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)CVE-2023-1264
SMASH Issue 359479
bnc#1209042
https://github.com/vim/vim/commit/7ac5023a5f1a37baafbe1043645f97ba3443d9f6
https://huntr.dev/bounties/b2989095-88f3-413a-9a39-c1c58a6e6815
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIAKPMKJ4OZ6NYRZJO7YWMNQL2BICLYV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X4KDAU76Z7QNSPKZX2JAJ6O7KIEOXWTL/
rh#2176413
CVE-2023-1281kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-1281
L3:65564
L3:65683
L3:65871
L3:65876
L3:65952
OSS:2023/04/11/3
OSS:2023/Q2/14
RHSA-2023:3852
RHSA-2023:3853
RHSA-2023:4125
RHSA-2023:4126
RHSA-2023:4130
RHSA-2023:4145
RHSA-2023:4146
RHSA-2023:4255
RHSA-2023:4256
RHSA-2023:4262
RHSA-2023:4517
RHSA-2023:4531
RHSA-2023:4541
SMASH Issue 360924
bnc#1209634
bnc#1209683
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2
https://kernel.dance/#ee059170b1f7e94e55fa6cadee544e176a6e59c2
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://security.netapp.com/advisory/ntap-20230427-0004/
jsc#CAR-2471
rh#2181847
CVE-2023-1295kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-1295
SMASH Issue 370718
bnc#1212836
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=788d0824269bef539fe31a785b1517882eafed93
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9eac1904d3364254d622bf2c771c4f85cd435fc2
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b5dba59e0cf7e2cc4d3b3b1ac5fe81ddf21959eb
https://kernel.dance/788d0824269bef539fe31a785b1517882eafed93
https://kernel.dance/9eac1904d3364254d622bf2c771c4f85cd435fc2
https://security.netapp.com/advisory/ntap-20230731-0006/
rh#2218350
CVE-2023-1355vim:Already fixedmoderate3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2023-1355
D:CVE-2023-1355
SMASH Issue 359814
bnc#1209187
https://github.com/vim/vim/commit/d13dd30240e32071210f55b587182ff48757ea46
https://huntr.dev/bounties/4d0a9615-d438-4f5c-8dd6-aa22f4b716d9
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/
jsc#CAR-2425
rh#2179911
CVE-2023-1380kernel-source-rt:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2023-1380
DSA-5480
OSS:2023/03/14/1
OSS:2023/Q1/141
SMASH Issue 359978
bnc#1209287
http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang%40yonsei.ac.kr/T/#u
https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang@yonsei.ac.kr/T/#u
https://security.netapp.com/advisory/ntap-20230511-0001/
https://www.debian.org/security/2023/dsa-5480
jsc#CAR-2440
rh#2177883
CVE-2023-1382kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-1382
D:CVE-2023-1382
RHSA-2023:2148
RHSA-2023:2458
SMASH Issue 359983
bnc#1209288
https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin@gmail.com/T/#u
jsc#CAR-2441
rh#2177371
CVE-2023-1390kernel-source-rt:Ignoreimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-1390
L3:65871
L3:65876
L3:65879
L3:65968
RHSA-2021:1578
RHSA-2021:1739
RHSA-2023:3190
RHSA-2023:3191
RHSA-2023:4125
RHSA-2023:4126
RHSA-2023:4146
SMASH Issue 360010
bnc#1209289
bnc#1210779
https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5
https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6
https://infosec.exchange/@_mattata/109427999461122360
https://security.netapp.com/advisory/ntap-20230420-0001/
jsc#CAR-2442
rh#2178212
CVE-2023-1476kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-1476
RHSA-2023:1659
SMASH Issue 360545
bnc#1209476
https://access.redhat.com/errata/RHSA-2023:1659
https://access.redhat.com/security/cve/CVE-2023-1476
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=97113eb39fa7972722ff490b947d8af023e1f6a2
rh#2138818
rh#2176035
CVE-2023-1513kernel-source-rt:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2023-1513
SMASH Issue 360634
bnc#1209532
https://github.com/torvalds/linux/commit/2c10b61421a28e95a46ab489fd56c0f442ff6952
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lore.kernel.org/kvm/20230214103304.3689213-1-gregkh@linuxfoundation.org/
jsc#CAR-2464
rh#2179892
CVE-2023-1579binutils:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2023-1579
D:CVE-2023-1579
L3:65664
L3:66386
L3:66735
SMASH Issue 360828
bnc#1209642
bnc#1210293
https://security.gentoo.org/glsa/202309-15
https://security.netapp.com/advisory/ntap-20230511-0009/
https://sourceware.org/bugzilla/show_bug.cgi?id=29988
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=11d171f1910b508a81d21faa087ad1af573407d8
rh#2180905
CVE-2023-1582kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-1582
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 360934
bnc#1209636
https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0@kroah.com/
rh#2180936
CVE-2023-1583kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-1583
D:CVE-2023-1583
SMASH Issue 360961
bnc#1209637
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=02a4d923e4400a36d340ea12d8058f69ebf3a383
https://git.kernel.org/pub/scm/linux/kernel/git/axboe/linux-block.git/commit/?h=io_uring-6.3&id=761efd55a0227aca3a69deacdaa112fffd44fe37
rh#2180970
CVE-2023-1611kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-1611
D:CVE-2023-1611
SMASH Issue 361101
bnc#1209687
https://github.com/torvalds/linux/commit/2f1a6be12ab6c8470d5776e68644726c94257c54
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5QCM6XO4HSPLGR3DFYWFRIA3GCBIHZR4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZWECAZ7V7EPSXMINO6Q6KWNKDY2CO6ZW/
https://lore.kernel.org/linux-btrfs/35b9a70650ea947387cf352914a8774b4f7e8a6f.1679481128.git.fdmanana@suse.com/
jsc#CAR-2688
rh#2181342
CVE-2023-1637kernel-source-rt:Analysismoderate4.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)CVE-2023-1637
RHSA-2023:4789
RHSA-2023:5069
RHSA-2023:5091
RHSA-2023:5628
SMASH Issue 361373
bnc#1209779
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463
https://sourceware.org/bugzilla/show_bug.cgi?id=27398
rh#2181891
CVE-2023-1652kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-1652
D:CVE-2023-1652
SMASH Issue 361418
bnc#1209788
bnc#1209797
https://access.redhat.com/security/cve/cve-2023-1652
https://security.netapp.com/advisory/ntap-20230511-0006/
rh#2182031
CVE-2023-1670kernel-source-rt:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H)CVE-2023-1670
D:CVE-2023-1670
L3:67931
SMASH Issue 361652
bnc#1209871
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lore.kernel.org/all/20230316161526.1568982-1-zyytlz.wz@163.com/
https://security.netapp.com/advisory/ntap-20230526-0010/
jsc#CAR-2477
rh#2182111
CVE-2023-1801tcpdump:Not affectedmoderate ()CVE-2023-1801
SMASH Issue 362808
SMASH Issue 362821
bnc#1210265
https://github.com/the-tcpdump-group/tcpdump/commit/03c037bbd75588beba3ee09f26d17783d21e30bc
https://github.com/the-tcpdump-group/tcpdump/commit/7578e1c04ee280dda50c4c2813e7d55f539c6501
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOA2BJFERAC3VRQIRHJOWN4HZY4ZA7CH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYL5DEVHRJYF2CM5LTCZKEYFYDZAIZSN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLLZCG23MU6O4QOG2CX3DLEL3YXP6LAI/
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
rh#2185498
CVE-2023-1829kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-1829
D:CVE-2023-1829
L3:67174
L3:67191
L3:67760
OSS:2023/04/11/3
OSS:2023/Q2/14
RHSA-2023:4515
RHSA-2023:4516
RHSA-2023:4517
RHSA-2023:4531
RHSA-2023:4541
RHSA-2023:4789
RHSA-2023:4888
RHSA-2023:4961
RHSA-2023:4962
RHSA-2023:4967
SMASH Issue 363207
ZDI-23-898
bnc#1210335
bnc#1210619
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28
https://kernel.dance/#8c710f75256bb3cf05ac7b1672c82b92c43f3d28
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://security.netapp.com/advisory/ntap-20230601-0001/
jsc#CAR-2805
rh#2181847
rh#2188470
CVE-2023-1838kernel-source-rt:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-1838
SMASH Issue 362333
bnc#1210203
https://lore.kernel.org/netdev/20220516084213.26854-1-jasowang%40redhat.com/T/
https://lore.kernel.org/netdev/20220516084213.26854-1-jasowang@redhat.com/T/
https://security.netapp.com/advisory/ntap-20230517-0003/
rh#2087568
CVE-2023-1855kernel-source-rt:Analysismoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-1855
SMASH Issue 362390
bnc#1210202
https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lore.kernel.org/all/20230318122758.2140868-1-linux@roeck-us.net/
rh#2184578
CVE-2023-1859kernel-source-rt:Releasedlow1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2023-1859
L3:66738
SMASH Issue 362393
bnc#1210169
bnc#1215206
https://lore.kernel.org/all/20230313090002.3308025-1-zyytlz.wz@163.com/
jsc#CAR-2504
rh#2184395
CVE-2023-1872kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-1872
SMASH Issue 363238
bnc#1210414
bnc#1210417
http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=08681391b84da27133deefaaddefd0acfa90c2be
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=da24142b1ef9fd5d36b76e36bab328a5b27523e8
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://security.netapp.com/advisory/ntap-20230601-0002/
jsc#CAR-2528
rh#2186621
CVE-2023-1972binutils:Analysislow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2023-1972
SMASH Issue 362910
bnc#1210297
https://security.gentoo.org/glsa/202309-15
https://sourceware.org/bugzilla/show_bug.cgi?id=30285
rh#2185646
CVE-2023-1989kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-1989
DSA-5492
L3:65968
L3:66431
L3:66432
L3:66491
L3:66496
L3:66505
L3:67104
SMASH Issue 363047
bnc#1210336
bnc#1210500
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=f132c2d13088
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://security.netapp.com/advisory/ntap-20230601-0004/
https://www.debian.org/security/2023/dsa-5492
jsc#CAR-2677
jsc#CAR-2678
rh#2185945
CVE-2023-1990kernel-source-rt:Already fixedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-1990
L3:65564
L3:65763
L3:66491
L3:66496
L3:66505
L3:67104
SMASH Issue 363075
bnc#1209853
bnc#1210337
bnc#1210501
bnc#1210896
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lore.kernel.org/all/20230312160837.2040857-1-zyytlz.wz@163.com/
jsc#CAR-2542
rh#2156322
rh#2181847
rh#2182443
rh#2183247
rh#2187773
CVE-2023-1998kernel-source-rt:Not affectedmoderate5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)CVE-2023-1998
RHSA-2023:4377
RHSA-2023:4378
RHSA-2023:5603
RHSA-2023:5604
SMASH Issue 363668
SMASH Issue 363669
bnc#1210506
https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx
https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d
https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
rh#2187257
CVE-2023-2002kernel-source-rt:Not affectedmoderate7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)BID:46878
BID:47185
BID:50663
BID:53965
BID:55361
BID:62042
BID:62044
BID:62049
BID:62050
BID:63889
BID:64952
BID:64953
BID:64954
BID:65459
BID:65943
BID:66095
BID:67906
BID:68048
BID:68126
BID:68157
BID:68176
BID:68214
BID:68224
BID:68881
BID:69214
BID:69216
BID:69396
BID:69428
BID:69489
BID:69763
BID:69768
BID:69770
BID:69779
BID:69781
BID:69799
BID:70314
BID:70319
BID:70691
BID:70742
BID:70747
BID:70749
BID:70766
BID:70883
BID:70965
BID:71078
BID:71081
BID:71363
BID:71650
BID:71684
BID:72061
BID:72320
BID:72322
BID:72324
BID:72607
BID:74951
BID:74963
BID:74964
BID:75001
BUGTRAQ:20110317 [PRE-SA-2011-02] Information disclosure vulnerability in the OSF partition handling code of the Linux kernel
BUGTRAQ:20111013 VMSA-2011-0012 VMware ESXi and ESX updates to third party libraries and ESX Service Console
CONFIRM:bugs.launchpad.net:CVE-2014-8134
CONFIRM:bugzilla.novell.com:CVE-2014-8134
CONFIRM:code.google.com:CVE-2014-4611
CONFIRM:downloads.avaya.com:CVE-2011-1763
CONFIRM:ftp.osuosl.org:CVE-2011-4914
CONFIRM:ftp.osuosl.org:CVE-2012-4444
CONFIRM:git.busybox.net:CVE-2014-9645
CONFIRM:git.kernel.org:CVE-2010-5313
CONFIRM:git.kernel.org:CVE-2011-1090
CONFIRM:git.kernel.org:CVE-2011-1163
CONFIRM:git.kernel.org:CVE-2011-1476
CONFIRM:git.kernel.org:CVE-2011-1585
CONFIRM:git.kernel.org:CVE-2011-4127
CONFIRM:git.kernel.org:CVE-2011-4132
CONFIRM:git.kernel.org:CVE-2012-0810
CONFIRM:git.kernel.org:CVE-2012-2313
CONFIRM:git.kernel.org:CVE-2012-2319
CONFIRM:git.kernel.org:CVE-2012-3400
CONFIRM:git.kernel.org:CVE-2012-6657
CONFIRM:git.kernel.org:CVE-2013-7281
CONFIRM:git.kernel.org:CVE-2013-7421
CONFIRM:git.kernel.org:CVE-2014-0101
CONFIRM:git.kernel.org:CVE-2014-0181
CONFIRM:git.kernel.org:CVE-2014-0206
CONFIRM:git.kernel.org:CVE-2014-1739
CONFIRM:git.kernel.org:CVE-2014-1874
CONFIRM:git.kernel.org:CVE-2014-2309
CONFIRM:git.kernel.org:CVE-2014-3153
CONFIRM:git.kernel.org:CVE-2014-3181
CONFIRM:git.kernel.org:CVE-2014-3182
CONFIRM:git.kernel.org:CVE-2014-3184
CONFIRM:git.kernel.org:CVE-2014-3186
CONFIRM:git.kernel.org:CVE-2014-3601
CONFIRM:git.kernel.org:CVE-2014-3610
CONFIRM:git.kernel.org:CVE-2014-3646
CONFIRM:git.kernel.org:CVE-2014-3673
CONFIRM:git.kernel.org:CVE-2014-3687
CONFIRM:git.kernel.org:CVE-2014-3688
CONFIRM:git.kernel.org:CVE-2014-3690
CONFIRM:git.kernel.org:CVE-2014-4027
CONFIRM:git.kernel.org:CVE-2014-4608
CONFIRM:git.kernel.org:CVE-2014-4611
CONFIRM:git.kernel.org:CVE-2014-4667
CONFIRM:git.kernel.org:CVE-2014-4943
CONFIRM:git.kernel.org:CVE-2014-5077
CONFIRM:git.kernel.org:CVE-2014-5206
CONFIRM:git.kernel.org:CVE-2014-5207
CONFIRM:git.kernel.org:CVE-2014-5472
CONFIRM:git.kernel.org:CVE-2014-6410
CONFIRM:git.kernel.org:CVE-2014-7842
CONFIRM:git.kernel.org:CVE-2014-7970
CONFIRM:git.kernel.org:CVE-2014-7975
CONFIRM:git.kernel.org:CVE-2014-8160
CONFIRM:git.kernel.org:CVE-2014-8369
CONFIRM:git.kernel.org:CVE-2014-8709
CONFIRM:git.kernel.org:CVE-2014-8884
CONFIRM:git.kernel.org:CVE-2014-9322
CONFIRM:git.kernel.org:CVE-2014-9420
CONFIRM:git.kernel.org:CVE-2014-9644
CONFIRM:git.kernel.org:CVE-2014-9728
CONFIRM:git.kernel.org:CVE-2014-9729
CONFIRM:git.kernel.org:CVE-2014-9730
CONFIRM:git.kernel.org:CVE-2014-9731
CONFIRM:git.kernel.org:CVE-2015-1593
CONFIRM:github.com:CVE-2010-5313
CONFIRM:github.com:CVE-2011-1476
CONFIRM:github.com:CVE-2011-1585
CONFIRM:github.com:CVE-2011-4127
CONFIRM:github.com:CVE-2012-2313
CONFIRM:github.com:CVE-2012-2319
CONFIRM:github.com:CVE-2012-3400
CONFIRM:github.com:CVE-2012-6657
CONFIRM:github.com:CVE-2013-7281
CONFIRM:github.com:CVE-2013-7421
CONFIRM:github.com:CVE-2014-0101
CONFIRM:github.com:CVE-2014-0131
CONFIRM:github.com:CVE-2014-1874
CONFIRM:github.com:CVE-2014-3181
CONFIRM:github.com:CVE-2014-3182
CONFIRM:github.com:CVE-2014-3184
CONFIRM:github.com:CVE-2014-3185
CONFIRM:github.com:CVE-2014-3186
CONFIRM:github.com:CVE-2014-3673
CONFIRM:github.com:CVE-2014-3687
CONFIRM:github.com:CVE-2014-3688
CONFIRM:github.com:CVE-2014-3690
CONFIRM:github.com:CVE-2014-4027
CONFIRM:github.com:CVE-2014-4608
CONFIRM:github.com:CVE-2014-4611
CONFIRM:github.com:CVE-2014-4667
CONFIRM:github.com:CVE-2014-4943
CONFIRM:github.com:CVE-2014-5077
CONFIRM:github.com:CVE-2014-5206
CONFIRM:github.com:CVE-2014-5207
CONFIRM:github.com:CVE-2014-5472
CONFIRM:github.com:CVE-2014-6410
CONFIRM:github.com:CVE-2014-7841
CONFIRM:github.com:CVE-2014-7842
CONFIRM:github.com:CVE-2014-8133
CONFIRM:github.com:CVE-2014-8160
CONFIRM:github.com:CVE-2014-8709
CONFIRM:github.com:CVE-2014-8884
CONFIRM:github.com:CVE-2014-9322
CONFIRM:github.com:CVE-2014-9420
CONFIRM:github.com:CVE-2014-9644
CONFIRM:github.com:CVE-2014-9728
CONFIRM:github.com:CVE-2014-9729
CONFIRM:github.com:CVE-2014-9730
CONFIRM:github.com:CVE-2014-9731
CONFIRM:github.com:CVE-2017-6429
CONFIRM:help.joyent.com:CVE-2014-9322
CONFIRM:kb.juniper.net:CVE-2012-3400
CONFIRM:linux.oracle.com:CVE-2014-1874
CONFIRM:linux.oracle.com:CVE-2014-3153
CONFIRM:linux.oracle.com:CVE-2014-3687
CONFIRM:linux.oracle.com:CVE-2014-4667
CONFIRM:linux.oracle.com:CVE-2014-4943
CONFIRM:linux.oracle.com:CVE-2014-7841
CONFIRM:mirror.linux.org.au:CVE-2010-5313
CONFIRM:ozlabs.org:CVE-2014-4171
CONFIRM:patchwork.kernel.org:CVE-2011-1495
CONFIRM:source.android.com:CVE-2016-2427
CONFIRM:source.android.com:CVE-2017-0404
CONFIRM:source.android.com:CVE-2017-6426
CONFIRM:support.f5.com:CVE-2014-0101
CONFIRM:support.f5.com:CVE-2014-4027
CONFIRM:support.f5.com:CVE-2014-7841
CONFIRM:support.f5.com:CVE-2014-8134
CONFIRM:www.kernel.org:CVE-2011-1163
CONFIRM:www.kernel.org:CVE-2012-2100
CONFIRM:www.kernel.org:CVE-2012-2313
CONFIRM:www.kernel.org:CVE-2012-2384
CONFIRM:www.kernel.org:CVE-2012-3511
CONFIRM:www.kernel.org:CVE-2012-4398
CONFIRM:www.kernel.org:CVE-2013-1826
CONFIRM:www.kernel.org:CVE-2013-2899
CONFIRM:www.kernel.org:CVE-2013-6367
CONFIRM:www.kernel.org:CVE-2014-0181
CONFIRM:www.kernel.org:CVE-2014-0206
CONFIRM:www.kernel.org:CVE-2014-1739
CONFIRM:www.kernel.org:CVE-2014-1874
CONFIRM:www.kernel.org:CVE-2014-3185
CONFIRM:www.kernel.org:CVE-2014-3690
CONFIRM:www.kernel.org:CVE-2014-4508
CONFIRM:www.kernel.org:CVE-2014-7842
CONFIRM:www.kernel.org:CVE-2014-8884
CONFIRM:www.kernel.org:CVE-2014-9322
CONFIRM:www.kernel.org:CVE-2014-9914
CONFIRM:www.kernel.org:CVE-2015-1573
CONFIRM:www.kernel.org:CVE-2015-4167
CONFIRM:www.oracle.com
CONFIRM:www.oracle.com:CVE-2015-1351
CONFIRM:www.oracle.com:CVE-2015-8391
CONFIRM:www.oracle.com:CVE-2015-8472
CONFIRM:www.oracle.com:CVE-2016-2802
CONFIRM:www.oracle.com:CVE-2016-5240
CONFIRM:www.vmware.com:CVE-2011-1659
CVE-2009-4067
CVE-2010-5313
CVE-2011-1090
CVE-2011-1163
CVE-2011-1476
CVE-2011-1494
CVE-2011-1495
CVE-2011-1585
CVE-2011-4127
CVE-2011-4132
CVE-2012-0810
CVE-2012-2313
CVE-2012-2319
CVE-2012-3400
CVE-2012-4398
CVE-2012-6657
CVE-2013-2147
CVE-2013-2888
CVE-2013-2889
CVE-2013-2890
CVE-2013-2891
CVE-2013-2892
CVE-2013-2893
CVE-2013-2894
CVE-2013-2895
CVE-2013-2896
CVE-2013-2897
CVE-2013-2898
CVE-2013-2899
CVE-2013-2929
CVE-2013-4299
CVE-2013-6382
CVE-2013-6405
CVE-2013-6463
CVE-2013-7263
CVE-2013-7421
CVE-2014-0101
CVE-2014-0131
CVE-2014-0181
CVE-2014-0206
CVE-2014-1444
CVE-2014-1445
CVE-2014-1446
CVE-2014-1739
CVE-2014-1874
CVE-2014-2309
CVE-2014-3153
CVE-2014-3181
CVE-2014-3182
CVE-2014-3184
CVE-2014-3185
CVE-2014-3186
CVE-2014-3601
CVE-2014-3610
CVE-2014-3646
CVE-2014-3673
CVE-2014-3687
CVE-2014-3688
CVE-2014-3690
CVE-2014-3917
CVE-2014-4027
CVE-2014-4171
CVE-2014-4508
CVE-2014-4608
CVE-2014-4611
CVE-2014-4652
CVE-2014-4653
CVE-2014-4654
CVE-2014-4655
CVE-2014-4656
CVE-2014-4667
CVE-2014-4943
CVE-2014-5077
CVE-2014-5206
CVE-2014-5207
CVE-2014-5471
CVE-2014-5472
CVE-2014-6410
CVE-2014-7822
CVE-2014-7841
CVE-2014-7842
CVE-2014-7970
CVE-2014-7975
CVE-2014-8133
CVE-2014-8134
CVE-2014-8160
CVE-2014-8369
CVE-2014-8709
CVE-2014-8884
CVE-2014-9090
CVE-2014-9322
CVE-2014-9419
CVE-2014-9420
CVE-2014-9584
CVE-2014-9644
CVE-2014-9645
CVE-2014-9728
CVE-2014-9729
CVE-2014-9730
CVE-2014-9731
CVE-2015-1593
CVE-2015-1805
CVE-2015-4167
CVE-2015-7303
CVE-2015-7838
CVE-2015-7839
CVE-2015-8028
CVE-2015-8029
CVE-2015-8030
CVE-2015-8220
CVE-2015-8561
CVE-2015-8572
CVE-2015-8580
CVE-2015-8843
CVE-2016-1715
CVE-2016-4065
CVE-2023-2002
D:CVE-2010-5313
D:CVE-2013-7263
D:CVE-2013-7421
D:CVE-2014-0181
D:CVE-2014-1739
D:CVE-2014-3153
D:CVE-2014-3601
D:CVE-2014-3690
D:CVE-2014-4027
D:CVE-2014-4508
D:CVE-2014-4608
D:CVE-2014-4611
D:CVE-2014-4667
D:CVE-2014-4943
D:CVE-2014-5077
D:CVE-2014-5206
D:CVE-2014-5207
D:CVE-2014-5471
D:CVE-2014-5472
D:CVE-2014-7842
D:CVE-2014-7970
D:CVE-2014-7975
D:CVE-2014-8134
D:CVE-2014-8369
D:CVE-2014-8709
D:CVE-2014-8884
D:CVE-2014-9420
D:CVE-2014-9644
D:CVE-2014-9645
D:CVE-2015-1593
D:CVE-2022-2590
D:CVE-2023-2002
DSA-2240
DSA-2264
DSA-2389
DSA-2906
DSA-2949
DSA-2992
DSA-3060
DSA-3093
DSA-3128
DSA-3170
DSA-5378
DSA-5480
EXPLOIT-DB:34923
EXPLOIT-DB:35370
EXPLOIT-DB:36266
EXPLOIT-DB:36267
FATE 316723
FATE 318328
FEDORA:FEDORA-2015-0515
FEDORA:FEDORA-2015-0517
GENTOO:GLSA-201503-13
HP:HPSBGN02970
HP:HPSBGN03282
HP:HPSBGN03285
L3:36459
L3:36692
L3:36914
L3:37001
L3:37134
L3:38981
L3:41048
L3:41049
L3:41094
L3:41357
L3:41435
L3:41518
L3:41686
L3:41740
L3:41763
L3:41839
L3:41907
L3:42007
L3:42020
L3:42021
L3:42036
L3:42066
L3:42075
L3:42107
L3:42117
L3:42120
L3:42139
L3:42193
L3:42354
L3:42485
L3:42544
L3:42673
L3:42747
L3:43073
L3:44416
L3:47323
L3:65764
MANDRIVA:MDVSA-2015:057
MANDRIVA:MDVSA-2015:058
MISC:blog.securitymouse.com:CVE-2014-4611
MISC:bugs.launchpad.net:MLIST:[oss-security] 20120902 CVE Request -- kernel: request_module() OOM local DoS
MISC:bugzilla.redhat.com:MLIST:[oss-security] 20141113 Linux kernel: SCTP issues
MISC:code.google.com:CVE-2014-3181
MISC:code.google.com:CVE-2014-3182
MISC:code.google.com:CVE-2014-3184
MISC:code.google.com:CVE-2014-3185
MISC:code.google.com:CVE-2014-3186
MISC:code.google.com:CVE-2014-5472
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:elongl.github.io:MISC:www.openwall.com:CVE-2014-3153
MISC:fastcompression.blogspot.fr:CVE-2014-4611
MISC:git.kernel.org
MISC:git.kernel.org:/
MISC:git.kernel.org:MLIST:[oss-security] 20110415 Re: CVE Request: cifs session reuse
MISC:git.kernel.org:MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding
MISC:git.kernel.org:MLIST:[oss-security] 20140611 Re: CVE request: Linux kernel / target information leak
MISC:git.kernel.org:MLIST:[oss-security] 20140627 Re: CVE request -- Linux kernel: sctp: sk_ack_backlog wrap-around problem
MISC:git.kernel.org:MLIST:[oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces
MISC:git.kernel.org:MLIST:[oss-security] 20140915 Re: CVE request for Linux kernel: udf: Avoid infinite loop when processing indirect ICBs
MISC:git.kernel.org:MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace
MISC:git.kernel.org:MLIST:[oss-security] 20141024 kvm issues
MISC:git.kernel.org:MLIST:[oss-security] 20141113 CVE-2014-7842 Linux kernel: kvm: reporting emulation failures to userspace
MISC:git.kernel.org:MLIST:[oss-security] 20141113 Linux kernel: SCTP issues
MISC:git.kernel.org:MLIST:[oss-security] 20141126 Re: CVE Request: Linux kernel LDT handling bugs
MISC:git.kernel.org:MLIST:[oss-security] 20141215 Linux kernel: multiple x86_64 vulnerabilities
MISC:git.kernel.org:MLIST:[oss-security] 20150320 Re: CVE Request: Linux kernel execution in the early microcode loader.
MISC:git.kernel.org:OSS:2014/03/05/6
MISC:git.kernel.org:OSS:2023/04/16/3
MISC:github.com:MISC:www.openwall.com:CVE-2014-3153
MISC:hmarco.org:CVE-2015-1593
MISC:labs.mwrinfosecurity.com:CVE-2009-4067
MISC:lists.debian.org:MLIST:[oss-security] 20140605 Linux kernel futex local privilege escalation (CVE-2014-3153)
MISC:packetstormsecurity.com:CVE-2014-5207
MISC:patchwork.ozlabs.org:MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding
MISC:patchwork.ozlabs.org:MLIST:[oss-security] 20140725 Re: CVE request Linux Kernel: net: SCTP: NULL pointer dereference
MISC:plus.google.com:CVE-2014-9645
MISC:speirofr.appspot.com:CVE-2014-1739
MISC:twitter.com:CVE-2014-4611
MISC:www.oberhumer.com:CVE-2014-4608
MISC:www.openwall.com:CVE-2014-3153
MISC:www.pre-cert.de:CVE-2011-1163
MISC:www.securitymouse.com:CVE-2014-4608
MISC:www.securitymouse.com:CVE-2014-4611
MISC:www.spinics.net:MLIST:[oss-security] 20140618 CVE-2014-4171 - Linux kernel mm/shmem.c denial of service
MISC:www.zerodayinitiative.com
MISC:xorl.wordpress.com:CVE-2011-4132
MLIST:[kvm] 20141205 [PATCH] x86, kvm: Clear paravirt_enabled on KVM guests for espfix32's benefit
MLIST:[linux-fsdevel] 20141008 [PATCH] mnt: Prevent pivot_root from creating a loop in the mount tree
MLIST:[linux-input] 20130828 [PATCH 01/14] HID: validate HID report id size
MLIST:[linux-input] 20130828 [PATCH 03/14] HID: zeroplus: validate output report details
MLIST:[linux-input] 20130828 [PATCH 04/14] HID: sony: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 05/14] HID: steelseries: validate output report details
MLIST:[linux-input] 20130828 [PATCH 06/14] HID: pantherlord: validate output report details
MLIST:[linux-input] 20130828 [PATCH 07/14] HID: LG: validate HID output report details
MLIST:[linux-input] 20130828 [PATCH 08/14] HID: lenovo-tpkbd: validate output report details
MLIST:[linux-input] 20130828 [PATCH 09/14] HID: logitech-dj: validate output report details
MLIST:[linux-input] 20130828 [PATCH 10/14] HID: ntrig: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 11/14] HID: multitouch: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 12/14] HID: sensor-hub: validate feature report details
MLIST:[linux-input] 20130828 [PATCH 13/14] HID: picolcd_core: validate output report details
MLIST:[linux-kernel] 20110405 [PATCH] drivers/scsi/mpt2sas: prevent heap overflows and unchecked reads
MLIST:[linux-kernel] 20120207 [PATCH 5/5] kmod: make __request_module() killable
MLIST:[linux-kernel] 20130304 Re: user ns: arbitrary module loading
MLIST:[linux-kernel] 20130603 [patch] cciss: info leak in cciss_ioctl32_passthru()
MLIST:[linux-kernel] 20130603 [patch] cpqarray: info leak in ida_locked_ioctl()
MLIST:[linux-kernel] 20140528 [PATCH 1/2] auditsc: audit_krule mask accesses need bounds checking
MLIST:[linux-kernel] 20140616 Re: 3.15: kernel BUG at kernel/auditsc.c:1525!
MLIST:[linux-kernel] 20141024 [PATCH 13/14] kvm: fix excessive pages un-pinning in kvm_iommu_map error path.
MLIST:[linux-kernel] 20150107 Re: [PATH] Fix stack randomization on x86_64 bit
MLIST:[mm-commits] 20110314 + fs-partitions-osfc-corrupted-osf-partition-table-can-cause-information-disclosure.patch added to -mm tree
MLIST:[mm-commits] 20140617 + shmem-fix-faulting-into-a-hole-while-its-punched.patch added to -mm tree
MLIST:[netdev] 20140310 [PATCH 0/5] skbuff: fix skb_segment with zero copy skbs
MLIST:[netdev] 20140310 [PATCH 5/5] skbuff: skb_segment: orphan frags before copying
MLIST:[netdev] 20140423 [PATCH 0/5]: Preventing abuse when passing file descriptors
MLIST:[netfilter-devel] 20140925 [PATCH nf] netfilter: conntrack: disable generic protocol tracking
MLIST:[oss-security] 20110307 CVE request - kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab
MLIST:[oss-security] 20110307 Re: CVE request - kernel: nfs4: Ensure that ACL pages sent over NFS were not allocated from the slab
MLIST:[oss-security] 20110315 CVE Request: kernel: fs/partitions: Corrupted OSF partition table can cause information disclosure
MLIST:[oss-security] 20110315 Re: CVE Request: kernel: fs/partitions: Corrupted OSF partition table can cause information disclosure
MLIST:[oss-security] 20110325 Re: CVE request: kernel: two OSS fixes
MLIST:[oss-security] 20110405 CVE request: kernel: two issues in mpt2sas
MLIST:[oss-security] 20110406 Re: CVE request: kernel: two issues in mpt2sas
MLIST:[oss-security] 20110415 Re: CVE Request: cifs session reuse
MLIST:[oss-security] 20111111 CVE Request -- kernel: jbd/jbd2: invalid value of first log block leads to oops
MLIST:[oss-security] 20111113 Re: CVE Request -- kernel: jbd/jbd2: invalid value of first log block leads to oops
MLIST:[oss-security] 20111222 CVE-2011-4127 kernel: possible privilege escalation via SG_IO ioctl
MLIST:[oss-security] 20120504 Re: CVE Request: more tight ioctl permissions in dl2k driver
MLIST:[oss-security] 20120507 Re: CVE request: Linux kernel: Buffer overflow in HFS plus filesystem
MLIST:[oss-security] 20120709 Re: CVE Request: Stability fixes in UDF Logical Volume Descriptor handling
MLIST:[oss-security] 20120902 CVE Request -- kernel: request_module() OOM local DoS
MLIST:[oss-security] 20130605 Re: CVE request: kernel: cpqarray/c: info leak in ida_locked_ioctl()
MLIST:[oss-security] 20130828 Linux HID security flaws
MLIST:[oss-security] 20131128 Re: CVE Request: Linux kernel: net: uninitialised memory leakage
MLIST:[oss-security] 20140107 oss-sec: CVE split and a missed file
MLIST:[oss-security] 20140115 Re: CVE request: assorted kernel infoleak security fixes
MLIST:[oss-security] 20140206 Re: CVE Request: Linux kernel: SELinux local DoS
MLIST:[oss-security] 20140304 CVE-2014-0101 -- Linux kernel: net: sctp: null pointer dereference when processing authenticated cookie_echo chunk
MLIST:[oss-security] 20140307 Re: CVE Request: Linux kernel: IPv6: crash due to router advertisement flooding
MLIST:[oss-security] 20140310 CVE-2014-0131 -- kernel: net: use-after-free during segmentation with zerocopy
MLIST:[oss-security] 20140423 Re: CVE-2014-0181: Linux network reconfiguration due to incorrect netlink checks
MLIST:[oss-security] 20140529 Re: CVE request: Linux kernel DoS with syscall auditing
MLIST:[oss-security] 20140605 Linux kernel futex local privilege escalation (CVE-2014-3153)
MLIST:[oss-security] 20140605 Re: Linux kernel futex local privilege escalation (CVE-2014-3153)
MLIST:[oss-security] 20140606 Re: Linux kernel futex local privilege escalation (CVE-2014-3153)
MLIST:[oss-security] 20140611 Re: CVE request: Linux kernel / target information leak
MLIST:[oss-security] 20140618 CVE-2014-4171 - Linux kernel mm/shmem.c denial of service
MLIST:[oss-security] 20140619 CVE request: Another Linux syscall auditing bug
MLIST:[oss-security] 20140620 Re: CVE request: Another Linux syscall auditing bug
MLIST:[oss-security] 20140626 LMS-2014-06-16-2: Linux Kernel LZO
MLIST:[oss-security] 20140626 LMS-2014-06-16-5: Linux Kernel LZ4
MLIST:[oss-security] 20140627 Re: CVE request -- Linux kernel: sctp: sk_ack_backlog wrap-around problem
MLIST:[oss-security] 20140716 CVE-2014-4943: Linux privilege escalation in ppp over l2tp sockets
MLIST:[oss-security] 20140725 Re: CVE request Linux Kernel: net: SCTP: NULL pointer dereference
MLIST:[oss-security] 20140812 CVE Request: ro bind mount bypass using user namespaces
MLIST:[oss-security] 20140813 Re: CVE Request: ro bind mount bypass using user namespaces
MLIST:[oss-security] 20140826 CVE Request: Linux Kernel unbound recursion in ISOFS
MLIST:[oss-security] 20140827 Re: CVE Request: Linux Kernel unbound recursion in ISOFS
MLIST:[oss-security] 20140911 Multiple Linux USB driver CVE assignment
MLIST:[oss-security] 20140911 Re: Multiple Linux USB driver CVE assignment
MLIST:[oss-security] 20140915 Re: CVE request Linux kernel: net: guard tcp_set_keepalive against crash
MLIST:[oss-security] 20140915 Re: CVE request for Linux kernel: udf: Avoid infinite loop when processing indirect ICBs
MLIST:[oss-security] 20141008 CVE-2014-7970: Linux VFS denial of service
MLIST:[oss-security] 20141008 CVE-2014-7975: 0-day umount denial of service
MLIST:[oss-security] 20141021 CVE-2014-3690: KVM DoS triggerable by malicious host userspace
MLIST:[oss-security] 20141024 CVE-2014-8369 - Linux kernel iommu.c excessive unpinning
MLIST:[oss-security] 20141024 kvm issues
MLIST:[oss-security] 20141029 Re: CVE-2014-3690: KVM DoS triggerable by malicious host userspace
MLIST:[oss-security] 20141109 Re: CVE Request: Linux kernel mac80211 plain text leak
MLIST:[oss-security] 20141113 CVE-2014-7841 Linux kernel: net: sctp: NULL pointer dereference in af->from_addr_param on malformed packet
MLIST:[oss-security] 20141113 CVE-2014-7842 Linux kernel: kvm: reporting emulation failures to userspace
MLIST:[oss-security] 20141113 Linux kernel: SCTP issues
MLIST:[oss-security] 20141114 Re: CVE Request: Linux kernel: ttusb-dec: overflow by descriptor
MLIST:[oss-security] 20141215 Linux kernel: multiple x86_64 vulnerabilities
MLIST:[oss-security] 20141225 Re: CVE Request Linux kernel: fs: isofs: infinite loop in CE records
MLIST:[oss-security] 20150114 CVE-2014-8160 Linux Kernel: SCTP firewalling fails until SCTP module is loaded
MLIST:[oss-security] 20150124 Re: CVE Request: Linux kernel crypto api unprivileged arbitrary module load
MLIST:[oss-security] 20150213 Re: CVE-Request -- Linux ASLR integer overflow
MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf heap overflow in __udf_adinicb_readpage
MLIST:[oss-security] 20150602 CVE request Linux kernel: fs: udf kernel oops
MLIST:[oss-security] 20150603 CVE request Linux kernel: udf: information leakage when reading symlink
MLIST:[oss-security] 20150606 CVE-2015-1805 Linux kernel: pipe: iovec overrun leading to memory corruption
MLIST:[oss-security] 20201112 CVE-2014-4508
MLIST:[oss-security] 20210201 Re: Linux Kernel: local priv escalation via futexes
MLIST:[stable] 20141008 [PATCH] fs: Add a missing permission check to do_umount
MLIST:[target-devel] 20140616 [PATCH] target: Explicitly clear ramdisk_mcp backend pages
MLIST:[xfs] 20131031 [patch] xfs: underflow bug in xfs_attrlist_by_handle()
OSS:11016
OSS:11654
OSS:11779
OSS:12052
OSS:12309
OSS:2014/03/05/6
OSS:2014/Q2/162
OSS:2014/Q2/163
OSS:2014/Q2/168
OSS:2014/Q2/169
OSS:2014/Q2/170
OSS:2014/Q2/529
OSS:2014/Q2/638
OSS:2014/Q3/357
OSS:2014/Q3/452
OSS:2014/Q4/228
OSS:2014/Q4/229
OSS:2014/Q4/416
OSS:2014/Q4/605
OSS:2015/Q2/652
OSS:2016/Q2/365
OSS:2017/Q2/500
OSS:2020/Q4/121
OSS:2021/Q1/95
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/11/10/2
OSS:2022/12/27/3
OSS:2022/Q3/99
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2022/Q4/244
OSS:2023/04/16/3
OSS:2023/10/10/4
OSS:2023/Q2/31
OSVDB:109277
OSVDB:110055
OSVDB:115919
Oracle:CVE-2015-6937
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2017-0861
Oracle:CVE-2017-5715
RAEDERWERK:38981
RH:CVE-2010-5313
RH:CVE-2011-1090
RH:CVE-2011-1163
RH:CVE-2011-1476
RH:CVE-2011-1494
RH:CVE-2011-1495
RH:CVE-2011-1585
RH:CVE-2011-4127
RH:CVE-2011-4132
RH:CVE-2012-2313
RH:CVE-2012-2319
RH:CVE-2012-3400
RH:CVE-2012-4398
RH:CVE-2012-6657
RH:CVE-2013-2147
RH:CVE-2013-2888
RH:CVE-2013-2889
RH:CVE-2013-2890
RH:CVE-2013-2891
RH:CVE-2013-2892
RH:CVE-2013-2893
RH:CVE-2013-2894
RH:CVE-2013-2895
RH:CVE-2013-2896
RH:CVE-2013-2897
RH:CVE-2013-2898
RH:CVE-2013-2899
RH:CVE-2013-2929
RH:CVE-2013-4299
RH:CVE-2013-6382
RH:CVE-2013-7263
RH:CVE-2013-7421
RH:CVE-2014-0101
RH:CVE-2014-0131
RH:CVE-2014-0181
RH:CVE-2014-0206
RH:CVE-2014-1444
RH:CVE-2014-1445
RH:CVE-2014-1446
RH:CVE-2014-1739
RH:CVE-2014-1874
RH:CVE-2014-2309
RH:CVE-2014-3153
RH:CVE-2014-3181
RH:CVE-2014-3182
RH:CVE-2014-3184
RH:CVE-2014-3185
RH:CVE-2014-3186
RH:CVE-2014-3601
RH:CVE-2014-3610
RH:CVE-2014-3646
RH:CVE-2014-3673
RH:CVE-2014-3687
RH:CVE-2014-3688
RH:CVE-2014-3690
RH:CVE-2014-3917
RH:CVE-2014-4027
RH:CVE-2014-4171
RH:CVE-2014-4508
RH:CVE-2014-4608
RH:CVE-2014-4611
RH:CVE-2014-4667
RH:CVE-2014-4943
RH:CVE-2014-5077
RH:CVE-2014-5206
RH:CVE-2014-5207
RH:CVE-2014-5471
RH:CVE-2014-5472
RH:CVE-2014-6410
RH:CVE-2014-7841
RH:CVE-2014-7842
RH:CVE-2014-7970
RH:CVE-2014-7975
RH:CVE-2014-8133
RH:CVE-2014-8134
RH:CVE-2014-8160
RH:CVE-2014-8369
RH:CVE-2014-8709
RH:CVE-2014-8884
RH:CVE-2014-9090
RH:CVE-2014-9322
RH:CVE-2014-9419
RH:CVE-2014-9420
RH:CVE-2014-9644
RH:CVE-2014-9645
RH:CVE-2014-9728
RH:CVE-2014-9729
RH:CVE-2014-9730
RH:CVE-2014-9731
RH:CVE-2015-1593
RH:CVE-2015-1805
RH:CVE-2015-4167
RHSA-2010:0631
RHSA-2010:0660
RHSA-2010:0661
RHSA-2010:0670
RHSA-2010:0676
RHSA-2010:0677
RHSA-2010:0882
RHSA-2011:0429
RHSA-2011:0500
RHSA-2011:0542
RHSA-2011:0833
RHSA-2011:0883
RHSA-2011:1253
RHSA-2011:1386
RHSA-2011:1849
RHSA-2011:1850
RHSA-2012:0007
RHSA-2012:0010
RHSA-2012:0107
RHSA-2012:0333
RHSA-2012:0350
RHSA-2012:0358
RHSA-2012:1174
RHSA-2012:1282
RHSA-2012:1304
RHSA-2012:1323
RHSA-2012:1347
RHSA-2012:1426
RHSA-2012:1481
RHSA-2012:1491
RHSA-2012:1541
RHSA-2012:1589
RHSA-2013:0223
RHSA-2013:0594
RHSA-2013:1166
RHSA-2013:1264
RHSA-2013:1348
RHSA-2013:1436
RHSA-2013:1449
RHSA-2013:1450
RHSA-2013:1460
RHSA-2013:1490
RHSA-2013:1519
RHSA-2013:1520
RHSA-2013:1527
RHSA-2013:1645
RHSA-2013:1783
RHSA-2013:1860
RHSA-2014:0100
RHSA-2014:0159
RHSA-2014:0285
RHSA-2014:0328
RHSA-2014:0419
RHSA-2014:0432
RHSA-2014:0433
RHSA-2014:0439
RHSA-2014:0520
RHSA-2014:0771
RHSA-2014:0786
RHSA-2014:0800
RHSA-2014:0900
RHSA-2014:0913
RHSA-2014:0923
RHSA-2014:0924
RHSA-2014:0925
RHSA-2014:1023
RHSA-2014:1025
RHSA-2014:1083
RHSA-2014:1143
RHSA-2014:1167
RHSA-2014:1281
RHSA-2014:1318
RHSA-2014:1392
RHSA-2014:1668
RHSA-2014:1724
RHSA-2014:1763
RHSA-2014:1843
RHSA-2014:1872
RHSA-2014:1959
RHSA-2014:1971
RHSA-2014:1997
RHSA-2014:1998
RHSA-2014:2008
RHSA-2014:2009
RHSA-2014:2010
RHSA-2014:2028
RHSA-2014:2029
RHSA-2014:2030
RHSA-2014:2031
RHSA-2015:0009
RHSA-2015:0043
RHSA-2015:0062
RHSA-2015:0087
RHSA-2015:0102
RHSA-2015:0115
RHSA-2015:0126
RHSA-2015:0284
RHSA-2015:0285
RHSA-2015:0290
RHSA-2015:0674
RHSA-2015:0695
RHSA-2015:0782
RHSA-2015:0803
RHSA-2015:0864
RHSA-2015:0869
RHSA-2015:1042
RHSA-2015:1081
RHSA-2015:1082
RHSA-2015:1120
RHSA-2015:1137
RHSA-2015:1138
RHSA-2015:1139
RHSA-2015:1190
RHSA-2015:1199
RHSA-2015:1211
RHSA-2015:1221
RHSA-2015:1272
RHSA-2015:2152
RHSA-2015:2411
RHSA-2016:0068
RHSA-2016:0103
RHSA-2016:0494
RHSA-2016:0617
RHSA-2016:0855
RHSA-2017:1842
RHSA-2017:2077
RHSA-2018:1252
RHSA-2019:3517
RHSA-2021:0181
RHSA-2023:3708
RHSA-2023:3723
RHSA-2023:4137
RHSA-2023:4138
RHSA-2023:4789
RHSA-2023:4961
RHSA-2023:4962
RHSA-2023:5244
RHSA-2023:5255
SECTRACK:1025225
SECTRACK:1025336
SECTRACK:1026325
SECTRACK:1029894
SECTRACK:1030450
SECTRACK:1030451
SECTRACK:1030479
SECTRACK:1030491
SECTRACK:1030610
SECTRACK:1030681
SECTRACK:1030991
SECTRACK:1031180
SECTRACK:1032454
SECTRACK:1033187
SECTRACK:1038201
SECUNIA:46397
SECUNIA:48898
SECUNIA:50506
SECUNIA:50811
SECUNIA:55077
SECUNIA:55882
SECUNIA:56036
SECUNIA:57250
SECUNIA:58500
SECUNIA:58964
SECUNIA:58990
SECUNIA:59029
SECUNIA:59092
SECUNIA:59134
SECUNIA:59153
SECUNIA:59216
SECUNIA:59262
SECUNIA:59278
SECUNIA:59309
SECUNIA:59386
SECUNIA:59406
SECUNIA:59567
SECUNIA:59597
SECUNIA:59599
SECUNIA:59777
SECUNIA:59790
SECUNIA:60011
SECUNIA:60071
SECUNIA:60174
SECUNIA:60220
SECUNIA:60238
SECUNIA:60380
SECUNIA:60393
SECUNIA:60430
SECUNIA:60545
SECUNIA:60564
SECUNIA:60596
SECUNIA:60744
SECUNIA:60830
SECUNIA:61142
SECUNIA:61145
SECUNIA:61310
SECUNIA:62305
SECUNIA:62326
SECUNIA:62336
SECUNIA:62428
SECUNIA:62563
SECUNIA:62597
SECUNIA:62633
SECUNIA:62634
SECUNIA:62735
SECUNIA:62801
SMASH Issue 100007
SMASH Issue 102948
SMASH Issue 102973
SMASH Issue 103001
SMASH Issue 103006
SMASH Issue 103024
SMASH Issue 103042
SMASH Issue 103056
SMASH Issue 103066
SMASH Issue 103072
SMASH Issue 103602
SMASH Issue 104049
SMASH Issue 104985
SMASH Issue 105171
SMASH Issue 105212
SMASH Issue 105429
SMASH Issue 105465
SMASH Issue 106127
SMASH Issue 106129
SMASH Issue 106131
SMASH Issue 106132
SMASH Issue 106168
SMASH Issue 106206
SMASH Issue 108788
SMASH Issue 109023
SMASH Issue 109031
SMASH Issue 110107
SMASH Issue 110127
SMASH Issue 110150
SMASH Issue 110597
SMASH Issue 110719
SMASH Issue 110758
SMASH Issue 111113
SMASH Issue 111199
SMASH Issue 111365
SMASH Issue 111502
SMASH Issue 111768
SMASH Issue 111836
SMASH Issue 112147
SMASH Issue 112357
SMASH Issue 112673
SMASH Issue 112776
SMASH Issue 112827
SMASH Issue 112842
SMASH Issue 112849
SMASH Issue 112850
SMASH Issue 112859
SMASH Issue 113136
SMASH Issue 113141
SMASH Issue 113165
SMASH Issue 113304
SMASH Issue 113891
SMASH Issue 114236
SMASH Issue 114237
SMASH Issue 114238
SMASH Issue 114239
SMASH Issue 114240
SMASH Issue 114241
SMASH Issue 114242
SMASH Issue 114244
SMASH Issue 114245
SMASH Issue 114249
SMASH Issue 114250
SMASH Issue 114251
SMASH Issue 114252
SMASH Issue 114253
SMASH Issue 114255
SMASH Issue 114257
SMASH Issue 114258
SMASH Issue 114261
SMASH Issue 114262
SMASH Issue 114263
SMASH Issue 114264
SMASH Issue 119253
SMASH Issue 149481
SMASH Issue 149674
SMASH Issue 149738
SMASH Issue 149742
SMASH Issue 149750
SMASH Issue 155972
SMASH Issue 155985
SMASH Issue 155986
SMASH Issue 155988
SMASH Issue 155999
SMASH Issue 156000
SMASH Issue 156003
SMASH Issue 156005
SMASH Issue 156023
SMASH Issue 156025
SMASH Issue 156026
SMASH Issue 179211
SMASH Issue 194696
SMASH Issue 217705
SMASH Issue 363659
SMASH Issue 44515
SMASH Issue 44691
SMASH Issue 44693
SMASH Issue 44698
SMASH Issue 45367
SMASH Issue 45388
SMASH Issue 46136
SMASH Issue 46137
SMASH Issue 46138
SMASH Issue 47337
SMASH Issue 47905
SMASH Issue 48577
SMASH Issue 52470
SMASH Issue 52476
SMASH Issue 53236
SMASH Issue 53878
SMASH Issue 54969
SMASH Issue 73595
SMASH Issue 87437
SMASH Issue 89804
SMASH Issue 91755
SMASH Issue 94554
SMASH Issue 95116
SMASH Issue 98234
SMASH Issue 99230
SMASH Issue 99567
SMASH Issue 99607
SMASH Issue 99768
SMASH Issue 99794
SMASH Issue 99968
SMASH Issue 99988
SMASH Issue 99990
SREASON:8189
SUSE:SUSE-SU-2012:0554
SUSE:SUSE-SU-2014:0775
SUSE:SUSE-SU-2014:0796
SUSE:SUSE-SU-2014:0837
SUSE:SUSE-SU-2014:1316
SUSE:SUSE-SU-2014:1319
SUSE:SUSE-SU-2015:0178
SUSE:SUSE-SU-2015:0481
SUSE:SUSE-SU-2015:0529
SUSE:SUSE-SU-2015:0652
SUSE:SUSE-SU-2015:0736
SUSE:SUSE-SU-2015:0812
SUSE:SUSE-SU-2015:1324
SUSE:SUSE-SU-2015:1489
SUSE:SUSE-SU-2015:1490
SUSE:SUSE-SU-2015:1592
SUSE:SUSE-SU-2015:1611
SUSE:openSUSE-SU-2014:0878
SUSE:openSUSE-SU-2014:0924
SUSE:openSUSE-SU-2015:0566
SUSE:openSUSE-SU-2015:0714
SUSE:openSUSE-SU-2015:1382
UBUNTU:CVE-2010-5313
UBUNTU:CVE-2011-1090
UBUNTU:CVE-2011-1163
UBUNTU:CVE-2011-1476
UBUNTU:CVE-2011-1494
UBUNTU:CVE-2011-1495
UBUNTU:CVE-2011-1585
UBUNTU:CVE-2011-4127
UBUNTU:CVE-2011-4132
UBUNTU:CVE-2012-2313
UBUNTU:CVE-2012-2319
UBUNTU:CVE-2012-3400
UBUNTU:CVE-2012-4398
UBUNTU:CVE-2012-6657
UBUNTU:CVE-2013-2147
UBUNTU:CVE-2013-2888
UBUNTU:CVE-2013-2889
UBUNTU:CVE-2013-2890
UBUNTU:CVE-2013-2891
UBUNTU:CVE-2013-2892
UBUNTU:CVE-2013-2893
UBUNTU:CVE-2013-2894
UBUNTU:CVE-2013-2895
UBUNTU:CVE-2013-2896
UBUNTU:CVE-2013-2897
UBUNTU:CVE-2013-2898
UBUNTU:CVE-2013-2899
UBUNTU:CVE-2013-2929
UBUNTU:CVE-2013-4299
UBUNTU:CVE-2013-6382
UBUNTU:CVE-2013-6405
UBUNTU:CVE-2013-7263
UBUNTU:CVE-2013-7421
UBUNTU:CVE-2014-0101
UBUNTU:CVE-2014-0131
UBUNTU:CVE-2014-0181
UBUNTU:CVE-2014-0206
UBUNTU:CVE-2014-1444
UBUNTU:CVE-2014-1445
UBUNTU:CVE-2014-1446
UBUNTU:CVE-2014-1739
UBUNTU:CVE-2014-1874
UBUNTU:CVE-2014-2309
UBUNTU:CVE-2014-3153
UBUNTU:CVE-2014-3181
UBUNTU:CVE-2014-3182
UBUNTU:CVE-2014-3184
UBUNTU:CVE-2014-3185
UBUNTU:CVE-2014-3186
UBUNTU:CVE-2014-3601
UBUNTU:CVE-2014-3610
UBUNTU:CVE-2014-3646
UBUNTU:CVE-2014-3647
UBUNTU:CVE-2014-3673
UBUNTU:CVE-2014-3687
UBUNTU:CVE-2014-3688
UBUNTU:CVE-2014-3690
UBUNTU:CVE-2014-3917
UBUNTU:CVE-2014-4027
UBUNTU:CVE-2014-4171
UBUNTU:CVE-2014-4508
UBUNTU:CVE-2014-4608
UBUNTU:CVE-2014-4611
UBUNTU:CVE-2014-4667
UBUNTU:CVE-2014-4943
UBUNTU:CVE-2014-5077
UBUNTU:CVE-2014-5206
UBUNTU:CVE-2014-5207
UBUNTU:CVE-2014-5471
UBUNTU:CVE-2014-5472
UBUNTU:CVE-2014-6410
UBUNTU:CVE-2014-7826
UBUNTU:CVE-2014-7841
UBUNTU:CVE-2014-7842
UBUNTU:CVE-2014-7970
UBUNTU:CVE-2014-7975
UBUNTU:CVE-2014-8133
UBUNTU:CVE-2014-8134
UBUNTU:CVE-2014-8160
UBUNTU:CVE-2014-8369
UBUNTU:CVE-2014-8709
UBUNTU:CVE-2014-8884
UBUNTU:CVE-2014-9090
UBUNTU:CVE-2014-9322
UBUNTU:CVE-2014-9419
UBUNTU:CVE-2014-9420
UBUNTU:CVE-2014-9644
UBUNTU:CVE-2014-9645
UBUNTU:CVE-2014-9728
UBUNTU:CVE-2014-9729
UBUNTU:CVE-2014-9730
UBUNTU:CVE-2014-9731
UBUNTU:CVE-2015-1593
UBUNTU:CVE-2015-1805
UBUNTU:CVE-2015-4167
UBUNTU:USN-1529-1
UBUNTU:USN-1555-1
UBUNTU:USN-1556-1
UBUNTU:USN-1557-1
UBUNTU:USN-1994-1
UBUNTU:USN-1996-1
UBUNTU:USN-1997-1
UBUNTU:USN-1999-1
UBUNTU:USN-2015-1
UBUNTU:USN-2016-1
UBUNTU:USN-2040-1
UBUNTU:USN-2041-1
UBUNTU:USN-2042-1
UBUNTU:USN-2043-1
UBUNTU:USN-2044-1
UBUNTU:USN-2045-1
UBUNTU:USN-2046-1
UBUNTU:USN-2066-1
UBUNTU:USN-2067-1
UBUNTU:USN-2109-1
UBUNTU:USN-2110-1
UBUNTU:USN-2128-1
UBUNTU:USN-2129-1
UBUNTU:USN-2133-1
UBUNTU:USN-2134-1
UBUNTU:USN-2135-1
UBUNTU:USN-2136-1
UBUNTU:USN-2137-1
UBUNTU:USN-2138-1
UBUNTU:USN-2139-1
UBUNTU:USN-2140-1
UBUNTU:USN-2141-1
UBUNTU:USN-2173-1
UBUNTU:USN-2174-1
UBUNTU:USN-2237-1
UBUNTU:USN-2240-1
UBUNTU:USN-2259-1
UBUNTU:USN-2261-1
UBUNTU:USN-2263-1
UBUNTU:USN-2264-1
UBUNTU:USN-2317-1
UBUNTU:USN-2318-1
UBUNTU:USN-2334-1
UBUNTU:USN-2335-1
UBUNTU:USN-2354-1
UBUNTU:USN-2355-1
UBUNTU:USN-2356-1
UBUNTU:USN-2357-1
UBUNTU:USN-2358-1
UBUNTU:USN-2359-1
UBUNTU:USN-2374-1
UBUNTU:USN-2375-1
UBUNTU:USN-2376-1
UBUNTU:USN-2377-1
UBUNTU:USN-2378-1
UBUNTU:USN-2379-1
UBUNTU:USN-2394-1
UBUNTU:USN-2415-1
UBUNTU:USN-2416-1
UBUNTU:USN-2417-1
UBUNTU:USN-2418-1
UBUNTU:USN-2419-1
UBUNTU:USN-2420-1
UBUNTU:USN-2421-1
UBUNTU:USN-2490-1
UBUNTU:USN-2491-1
UBUNTU:USN-2492-1
UBUNTU:USN-2493-1
UBUNTU:USN-2513-1
UBUNTU:USN-2514-1
UBUNTU:USN-2515-1
UBUNTU:USN-2516-1
UBUNTU:USN-2517-1
UBUNTU:USN-2518-1
UBUNTU:USN-2543-1
UBUNTU:USN-2544-1
UBUNTU:USN-2545-1
UBUNTU:USN-2546-1
UBUNTU:USN-2560-1
UBUNTU:USN-2564-1
UBUNTU:USN-2565-1
UBUNTU:USN-2679-1
UBUNTU:USN-2680-1
UBUNTU:USN-2681-1
XF:linux-kernel-cve20141444-info-disc(90443)
XF:linux-kernel-cve20141445-info-disc(90444)
XF:linux-kernel-cve20141446-info-disc(90445)
XF:linux-kernel-cve20143601-dos(95689)
XF:linux-kernel-cve20144943-priv-esc(94665)
XF:linux-kernel-cve20145077-dos(95134)
XF:linux-kernel-cve20145207-sec-bypass(95266)
XF:linux-kernel-cve20145472-dos(95556)
XF:linux-kernel-cve20147970-dos(96921)
XF:linux-kernel-cve20147975-dos(96994)
XF:linux-kernel-cve20148709-info-disclsoure(98922)
XF:linux-kernel-isofs-bo(95481)
bdo#1033297
bdo#618485
bdo#728705
bdo#766195
bnc#1210533
bnc#1210566
bnc#1210897
bnc#677286
bnc#679812
bnc#681175
bnc#681999
bnc#685402
bnc#687812
bnc#730118
bnc#730200
bnc#738400
bnc#758813
bnc#760902
bnc#769784
bnc#778463
bnc#779488
bnc#816099
bnc#823260
bnc#829110
bnc#835839
bnc#846404
bnc#846656
bnc#847652
bnc#853040
bnc#854722
bnc#856659
bnc#857643
bnc#863335
bnc#864401
bnc#864404
bnc#864409
bnc#864411
bnc#867531
bnc#867723
bnc#875051
bnc#876086
bnc#876594
bnc#877593
bnc#880484
bnc#880892
bnc#881008
bnc#882228
bnc#882639
bnc#882804
bnc#883223
bnc#883518
bnc#883724
bnc#883795
bnc#883948
bnc#883949
bnc#884324
bnc#885389
bnc#885422
bnc#887082
bnc#887597
bnc#889173
bnc#891689
bnc#892235
bnc#892490
bnc#892782
bnc#894213
bnc#895841
bnc#896382
bnc#896385
bnc#896390
bnc#896391
bnc#896392
bnc#896689
bnc#896779
bnc#897995
bnc#899192
bnc#899338
bnc#900392
bnc#900644
bnc#902232
bnc#902346
bnc#902349
bnc#902351
bnc#902675
bnc#903096
bnc#903640
bnc#904013
bnc#904659
bnc#904700
bnc#904876
bnc#905100
bnc#905312
bnc#905522
bnc#905739
bnc#905744
bnc#905748
bnc#905764
bnc#907196
bnc#907551
bnc#907611
bnc#907818
bnc#907822
bnc#908069
bnc#908550
bnc#908551
bnc#908572
bnc#908825
bnc#908926
bnc#909077
bnc#909078
bnc#909088
bnc#909092
bnc#909095
bnc#909264
bnc#909565
bnc#909740
bnc#909846
bnc#910013
bnc#910251
bnc#910321
bnc#911181
bnc#911325
bnc#911326
bnc#912171
bnc#912654
bnc#912705
bnc#913059
bnc#914355
bnc#914423
bnc#915209
bnc#915322
bnc#916515
bnc#917839
bnc#917884
bnc#918554
bnc#922980
bnc#924392
bnc#931125
bnc#959156
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1bb57e940e1958e40d51f2078f50c3a96a9b2d75
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1df2ae31c724e57be9d7ac00d78db8a5dabdd050
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1eafbfeb7bdf59cfe173304c76188f3fd5f1fd05
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1fd819ecb90cc9b822cd84d3056ddba315d3340f
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=206a81c18401c0cde6e579164f752c4b147324ce
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2172fa709ab32ca60e86179dc67d0857be8e2c98
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=26b87c7881006311828bb0ab271a551a62dcceb4
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3cf521f7dc87c031617fd47e4b7aa2593c2f3daf
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3e10986d1d698140747fcfc2761ec9cb64c1d582
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=41bdc78544b8a93a9c6814b8bbbfef966272abbe
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4ff67b720c02c36e54d55b88c2931879b7db1cd2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6817ae225cd650fb1c3295d769298c38b1eba818
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=844817e47eef14141cf59b8d5ac08dd11c0a9189
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2b9e6c1a35afcc0973acb72e591c714e78885ff
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ad3e14d7c5268c2e24477c6ef54bbdf88add5d36
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=adee11b2085bee90bd8f4f52123ffb07882d6256
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b69040d8e39f20d5215a03502a8e8b4c6ab78395
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b769f49463711205d57286e64cf535ed4daf59e9
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c54def7bd64d7c0b6993336abcffb8444795bf38
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d974baa398f34393db76be45f7d4d04fbdbb4a0a
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=db29a9508a9246e77087c5531e45b2c88ec6988b
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e9e3d724e2145f5039b423c290ce2b2c3d8f94bc
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=edfbbf388f293d70bf4b7c0bc38774d05e6f711a
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=8762202dd0d6e46854f786bdb6fb3780a1625efe
http://www.debian.org/security/2014/dsa-2949
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://security.netapp.com/advisory/ntap-20240202-0004/
https://support.f5.com/csp/article/K17120?utm_source=f5support&%3Butm_medium=RSS
https://www.debian.org/security/2023/dsa-5480
jsc#CAR-2540
linux.git:commit:0a9cd0a80ac559357c6a90d26c55270ed752aa26
linux.git:commit:0d0826019e529f21c84687521d03f60cd241ca7d
linux.git:commit:0ef3a56b1c466629cd0bf482b09c7b0e5a085bb5
linux.git:commit:0fb6bd06e06792469acc15bbe427361b56ada528
linux.git:commit:10b5b5361a3c2a7fff9dbfa0f127adc2531e7732
linux.git:commit:1e87a2456b0227ca4ab881e19a11bb99d164e792
linux.git:commit:22e04f6b4b04a8afe9af9239224591d06ba3b24d
linux.git:commit:297502abb32e225fb23801fcdb0e4f6f8e17099a
linux.git:commit:29e8f59cf1ff91f2854563faddc5f61098cf4958
linux.git:commit:29fa6825463c97e5157284db80107d1bfac5d77b
linux.git:commit:2d7a85f4b06e9c27ff629f07a524c48074f07f81
linux.git:commit:2f4073e08f4cc5a41e35d777c240aaadd0257051
linux.git:commit:350b8bdd689cd2ab2c67c8a86a0be86cfa0751a7
linux.git:commit:380cf5ba6b0a0b307f4afb62b186ca801defb203
linux.git:commit:3d32e4dbe71374a6780eaf51d719d76f9a9bf22f
linux.git:commit:412f30105ec6735224535791eed5cdc02888ecb4
linux.git:commit:41df7f6d43723deb7364340b44bc5d94bf717456
linux.git:commit:43622021d2e2b82ea03d883926605bdd0525e1d1
linux.git:commit:47ab1a2de42031021965b81cbab4f3b4c5696d07
linux.git:commit:4e7c22d447bb6d7e37bfe39ff658486ae78e8d77
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:554086d85e71f30abe46fc014fea31929a7c6a8a
linux.git:commit:58f09e00ae095e46ef9edfcf3a5fd9ccdfad065e
linux.git:commit:627aad1c01da6f881e7f98d71fd928ca0c316b1a
linux.git:commit:78214e81a1bf43740ce89bb5efda78eac2f8ef83
linux.git:commit:786235eeba0e1e85e5cbbb9f97d1087ad03dfa21
linux.git:commit:8142b215501f8b291a108a202b3a053a265b03dd
linux.git:commit:84fca9f38c5d646e95cdeef70e41cf15db549b95
linux.git:commit:854e8bb1aa06c578c2c9145fa6bfe3680ef63b23
linux.git:commit:875b4e3763dbc941f15143dd1a18d10bb0be303b
linux.git:commit:8821f5dc187bdf16cfb32ef5aa8c3035273fa79a
linux.git:commit:8e205f779d1443a94b5ae81aa359cb535dd3021e
linux.git:commit:9446edb9a1740989cf6c20daf7510fb9a23be14a
linux.git:commit:9e8910257397372633e74b333ef891f20c800ee4
linux.git:commit:a1480dcc3c706e309a88884723446f2e84fedd5b
linux.git:commit:a642fc305053cc1c6e47e4f4df327895747ab485
linux.git:commit:cc6b54aa54bf40b762cab45a9fc8aa81653146eb
linux.git:commit:ce9d7f7b45930ed16c512aabcfe651d44f1c8619
linux.git:commit:d049f74f2dbe71354d43d393ac3a188947811348
linux.git:commit:d1fc98ba961db83293f804a1037e905c03b301cf
linux.git:commit:e6a623460e5fc960ac3ee9f946d3106233fd28d8
linux.git:commit:e9c243a5a6de0be8e584c604d353412584b592f8
linux.git:commit:e9c6a182649f4259db704ae15a91ac820e63b0ca
linux.git:commit:e9de42d8eeffdc23af0144cafa9e3deacc489fb9
linux.git:commit:edfbbf388f293d70bf4b7c0bc38774d05e6f711a
linux.git:commit:f8567a3845ac05bb28f3c1b478ef752762bd39ef
linux.git:commit:fb21b84e7f809ef04b1e5aed5d463cf0d4866638
rh#1000137
rh#1000360
rh#1000373
rh#1000414
rh#1000429
rh#1000451
rh#1000474
rh#1000494
rh#1000519
rh#1000536
rh#1004233
rh#1007690
rh#1007939
rh#1028148
rh#1033603
rh#1035875
rh#1039845
rh#1053610
rh#1053613
rh#1053620
rh#1062356
rh#1067558
rh#1070618
rh#1070705
rh#1074471
rh#1074589
rh#1094232
rh#1094265
rh#1094602
rh#1102571
rh#1103626
rh#1108744
rh#1109774
rh#1111180
rh#1111590
rh#1112436
rh#1113406
rh#1113409
rh#1113445
rh#1113470
rh#1113899
rh#1113967
rh#1119458
rh#1122982
rh#1129662
rh#1131951
rh#1134099
rh#1141173
rh#1141210
rh#1141391
rh#1141400
rh#1141407
rh#1141742
rh#1141809
rh#1144825
rh#1144883
rh#1147850
rh#1151095
rh#1151108
rh#1153322
rh#1155731
rh#1155745
rh#1156518
rh#1163087
rh#1163762
rh#1163792
rh#1164266
rh#1170691
rh#1172765
rh#1172797
rh#1172806
rh#1173580
rh#1175235
rh#1177260
rh#1182059
rh#1183744
rh#1185469
rh#1185707
rh#1190546
rh#1192519
rh#1202855
rh#1205079
rh#1228204
rh#1228220
rh#1228229
rh#1243852
rh#1303961
rh#1384344
rh#1495089
rh#1519780
rh#2061700
rh#2116175
rh#2119127
rh#2162080
rh#2162082
rh#2162084
rh#2162087
rh#2187308
rh#562582
rh#606611
rh#620300
rh#621435
rh#624327
rh#625688
rh#627440
rh#630551
rh#630804
rh#631623
rh#638085
rh#640036
rh#651264
rh#651892
rh#652508
rh#652529
rh#652534
rh#652957
rh#682641
rh#688021
rh#694021
rh#697394
rh#722393
rh#736425
rh#742846
rh#752375
rh#753341
rh#794557
rh#814278
rh#818820
rh#819471
rh#822754
rh#843139
rh#853474
rh#916646
rh#917012
rh#917013
rh#917017
rh#971242
rh#999890
rh#999960
CVE-2023-2006kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-2006
SMASH Issue 363441
ZDI-23-439
bnc#1210447
bnc#1210457
https://github.com/torvalds/linux/commit/3bcd6c7eaa53
https://security.netapp.com/advisory/ntap-20230609-0004/
https://www.zerodayinitiative.com/advisories/ZDI-23-439/
rh#2189112
CVE-2023-2007kernel-source-rt:Won't fixmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)CVE-2023-2007
D:CVE-2023-2007
DSA-5480
SMASH Issue 363438
ZDI-23-440
bnc#1210448
https://github.com/torvalds/linux/commit/b04e75a4a8a81887386a0d2dbf605a48e779d2a0
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://security.netapp.com/advisory/ntap-20240119-0011/
https://www.debian.org/security/2023/dsa-5480
jsc#CAR-2529
rh#2208311
CVE-2023-2008kernel-source-rt:Ignoremoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-2008
RHSA-2022:7933
RHSA-2022:8267
RHSA-2023:3465
RHSA-2023:3470
RHSA-2023:3490
SMASH Issue 363435
ZDI-23-441
bnc#1210453
https://bugzilla.redhat.com/show_bug.cgiid=2186862
https://github.com/torvalds/linux/commit/05b252cccb2e5c3f56119d25de684b4f810ba4
https://security.netapp.com/advisory/ntap-20230517-0007/
https://www.zerodayinitiative.com/advisories/ZDI-23-441/
jsc#CAR-2530
rh#2186862
CVE-2023-2019kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-2019
SMASH Issue 363434
ZDI-23-442
bnc#1210454
https://github.com/torvalds/linux/commit/180a6a3ee60a
https://www.zerodayinitiative.com/advisories/ZDI-CAN-17811/
rh#2189137
CVE-2023-20569kernel-source-rt:Releasedmoderate5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)CVE-2023-20569
DSA-5475
OSS:2023/08/08/4
OSS:2023/Q3/97
SMASH Issue 372385
SMASH Issue 372386
bnc#1213287
bnc#1214082
http://xenbits.xen.org/xsa/advisory-434.html
https://comsec.ethz.ch/research/microarch/inception/
https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/
https://security.netapp.com/advisory/ntap-20240605-0006/
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005
https://www.debian.org/security/2023/dsa-5475
jsc#CAR-2834
rh#2207625
CVE-2023-20583kernel-source-rt:Analysismoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-20583
SMASH Issue 373919
bnc#1213892
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7006
rh#2228322
CVE-2023-20588kernel-source-rt:Analysismoderate6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N)CVE-2023-20588
DSA-5480
DSA-5492
MISC:git.kernel.org:OSS:2023/09/25/4
MISC:git.kernel.org:OSS:2023/09/25/7
MISC:github.com:OSS:2023/10/03/12
OSS:2023/09/25/3
OSS:2023/09/25/4
OSS:2023/09/25/5
OSS:2023/09/25/7
OSS:2023/09/25/8
OSS:2023/09/26/5
OSS:2023/09/26/8
OSS:2023/09/26/9
OSS:2023/09/27/1
OSS:2023/10/03/12
OSS:2023/10/03/13
OSS:2023/10/03/14
OSS:2023/10/03/15
OSS:2023/10/03/16
OSS:2023/10/03/9
OSS:2023/10/04/1
OSS:2023/10/04/2
OSS:2023/10/04/3
OSS:2023/10/04/4
OSS:2023/Q3/220
OSS:2023/Q3/222
SMASH Issue 374081
SMASH Issue 374082
bnc#1213927
bnc#1215474
http://xenbits.xen.org/xsa/advisory-439.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/
https://security.netapp.com/advisory/ntap-20240531-0005/
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
rh#2230125
CVE-2023-20593kernel-source-rt:Releasedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2023-20593
DSA-5459
DSA-5461
DSA-5462
L3:66447
L3:66852
MISC:git.kernel.org:OSS:2023/07/24/3
MISC:git.kernel.org:OSS:2023/07/25/17
MISC:git.kernel.org:OSS:2023/07/25/6
MISC:git.kernel.org:OSS:2023/09/25/4
MISC:git.kernel.org:OSS:2023/09/25/7
MISC:github.com:OSS:2023/07/26/1
OSS:2023/07/24/3
OSS:2023/07/25/1
OSS:2023/07/25/12
OSS:2023/07/25/13
OSS:2023/07/25/14
OSS:2023/07/25/15
OSS:2023/07/25/16
OSS:2023/07/25/17
OSS:2023/07/25/5
OSS:2023/07/25/6
OSS:2023/07/26/1
OSS:2023/07/31/2
OSS:2023/08/08/6
OSS:2023/08/08/7
OSS:2023/08/08/8
OSS:2023/08/16/4
OSS:2023/08/16/5
OSS:2023/09/14/1
OSS:2023/09/22/11
OSS:2023/09/22/9
OSS:2023/09/25/4
OSS:2023/09/25/7
OSS:2023/Q3/215
OSS:2023/Q3/59
OSS:2023/Q3/80
OSS:2023/Q3/86
RHSA-2023:4696
RHSA-2023:4699
RHSA-2023:4789
RHSA-2023:4819
RHSA-2023:4821
RHSA-2023:5068
RHSA-2023:5069
RHSA-2023:5091
RHSA-2023:5244
RHSA-2023:5245
RHSA-2023:5255
RHSA-2023:5419
RHSA-2023:5591
RHSA-2023:5607
SMASH Issue 372383
SMASH Issue 372384
bdo#1041863
bnc#1213286
bnc#1213616
bnc#1213877
http://seclists.org/fulldisclosure/2023/Jul/43
http://xenbits.xen.org/xsa/advisory-433.html
https://cmpxchg8b.com/zenbleed.html
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/07/msg00033.html
https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CP6WQO3CDPLE5O635N7TAL5KCZ6HZ4FE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SD2G74BXS2SWOE3FIQJ6X76S3A7PDGML/
https://security.netapp.com/advisory/ntap-20240531-0004/
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7008
https://www.debian.org/security/2023/dsa-5459
https://www.debian.org/security/2023/dsa-5461
https://www.debian.org/security/2023/dsa-5462
jsc#CAR-2762
rh#2217845
CVE-2023-20941kernel-source-rt:Not affectedmoderate ()CVE-2023-20941
D:CVE-2023-20941
SMASH Issue 364040
bnc#1210676
https://source.android.com/security/bulletin/2023-04-01
CVE-2023-21102kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-21102
RHSA-2023:5069
RHSA-2023:5091
SMASH Issue 366599
bnc#1212155
bnc#1212346
https://source.android.com/security/bulletin/2023-05-01
rh#2213455
CVE-2023-21106kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-21106
SMASH Issue 366602
bnc#1211654
bnc#1211655
https://source.android.com/security/bulletin/2023-05-01
rh#2209238
CVE-2023-2124kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-2124
DSA-5448
DSA-5480
OSS:2023/Q2/62
RHSA-2023:3708
RHSA-2023:3723
RHSA-2023:4137
RHSA-2023:4138
RHSA-2023:4515
RHSA-2023:4517
RHSA-2023:4541
RHSA-2023:4789
RHSA-2023:4815
RHSA-2023:4817
RHSA-2023:4961
RHSA-2023:4962
SMASH Issue 363666
bnc#1210498
bnc#1211903
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://security.netapp.com/advisory/ntap-20230622-0010/
https://syzkaller.appspot.com/bug?extid=7e9494b8b399902e994e
https://www.debian.org/security/2023/dsa-5448
https://www.debian.org/security/2023/dsa-5480
jsc#CAR-2541
rh#2187439
CVE-2023-21264kernel-source-rt:Not affectedmoderate ()CVE-2023-21264
SMASH Issue 375319
bnc#1214289
https://android.googlesource.com/kernel/common/+/53625a846a7b4
https://android.googlesource.com/kernel/common/+/b35a06182451f
https://source.android.com/security/bulletin/2023-08-01
CVE-2023-2137sqlite3:Analysisimportant8.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2023-2137
DSA-5393
L3:67661
L3:67667
SMASH Issue 363978
bnc#1210660
bnc#1220063
bnc#1220115
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html
https://crbug.com/1430644
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/
https://security.gentoo.org/glsa/202309-17
https://www.debian.org/security/2023/dsa-5393
rh#2187899
CVE-2023-21400kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-21400
DSA-5480
OSS:2023/07/14/2
OSS:2023/07/19/2
OSS:2023/07/19/7
OSS:2023/07/25/7
OSS:2023/Q3/38
SMASH Issue 372327
bnc#1213272
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=788d0824269bef539fe31a785b1517882eafed93
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://security.netapp.com/advisory/ntap-20240119-0012/
https://source.android.com/security/bulletin/pixel/2023-07-01
https://www.debian.org/security/2023/dsa-5480
rh#2222087
CVE-2023-2156kernel-source-rt:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-2156
D:CVE-2023-2156
DSA-5448
DSA-5453
L3:66616
OSS:2023/05/17/8
OSS:2023/05/17/9
OSS:2023/05/18/1
OSS:2023/05/19/1
OSS:2023/Q2/172
SMASH Issue 365193
ZDI-23-547
bnc#1211131
bnc#1211395
bnc#1214541
https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
https://security.netapp.com/advisory/ntap-20230622-0001/
https://www.debian.org/security/2023/dsa-5448
https://www.debian.org/security/2023/dsa-5453
https://www.zerodayinitiative.com/advisories/ZDI-23-547/
linux.git:commit:a2f4c143d76b1a47c91ef9bc46907116b111da0b
rh#2196292
CVE-2023-2162kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-2162
L3:65763
L3:66431
L3:66432
L3:66491
L3:66496
L3:66505
L3:67104
L3:67931
SMASH Issue 363819
bnc#1210647
bnc#1210662
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://www.spinics.net/lists/linux-scsi/msg181542.html
jsc#CAR-2545
rh#2187773
CVE-2023-2163kernel-source-rt:Releasedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)CVE-2023-2163
SMASH Issue 379444
bnc#1215518
bnc#1215519
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=71b547f561247897a0a14f3082730156c0533fed
jsc#CAR-2910
rh#2240249
CVE-2023-21636kernel-source-rt:Not affectedimportant ()CVE-2023-21636
SMASH Issue 377231
bnc#1215069
https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin
CVE-2023-2166kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-2166
D:CVE-2023-2166
SMASH Issue 363822
bnc#1210627
https://lore.kernel.org/lkml/CAO4mrfcV_07hbj8NUuZrA8FH-kaRsrFy-2metecpTuE5kKHn5w@mail.gmail.com/
rh#2187813
CVE-2023-2176kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-2176
L3:66432
L3:66491
L3:66496
L3:67104
SMASH Issue 363981
bnc#1210629
bnc#1210630
https://security.netapp.com/advisory/ntap-20230609-0005/
https://www.spinics.net/lists/linux-rdma/msg114749.html
jsc#CAR-2654
rh#2187931
CVE-2023-2177kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-2177
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 363988
bnc#1210643
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=181d8d2066c0
jsc#CAR-2546
rh#2187953
CVE-2023-2194kernel-source-rt:Ignoremoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L)CVE-2023-2194
RHSA-2023:3708
RHSA-2023:3723
RHSA-2023:4517
RHSA-2023:4541
SMASH Issue 364113
bnc#1210715
https://github.com/torvalds/linux/commit/92fbb6d1296f
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
jsc#CAR-2547
rh#2188396
CVE-2023-22024kernel-source-rt:Not affectedmoderate ()CVE-2023-22024
SMASH Issue 379541
bnc#1215615
https://linux.oracle.com/cve/CVE-2023-22024.html
CVE-2023-2222binutils:Analysislow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2023-2222
L3:66802
SMASH Issue 364165
bnc#1210733
bnc#1215431
rh#2188562
CVE-2023-2235kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-2235
D:CVE-2023-2235
RHSA-2023:3705
RHSA-2023:3708
RHSA-2023:3723
RHSA-2023:4137
RHSA-2023:4138
RHSA-2023:4517
RHSA-2023:4541
RHSA-2023:5627
SMASH Issue 364832
bnc#1210986
bnc#1210987
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2
https://kernel.dance/fd0815f632c24878e325821943edccc7fde947a2
https://security.netapp.com/advisory/ntap-20230609-0002/
jsc#CAR-2559
rh#2192589
CVE-2023-2236kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-2236
D:CVE-2023-2236
SMASH Issue 364833
bnc#1210990
bnc#1210991
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d94c04c0db024922e886c9fd429659f22f48ea4
https://kernel.dance/9d94c04c0db024922e886c9fd429659f22f48ea4
https://security.netapp.com/advisory/ntap-20230601-0010/
rh#2196759
CVE-2023-22387kernel-source-rt:Ignoreimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-22387
SMASH Issue 371182
bnc#1212971
https://www.qualcomm.com/company/product-security/bulletins/july-2023-bulletin
CVE-2023-2248kernel-source-rt:Won't fiximportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-2248
D:CVE-2023-2248
DSA-5402
L3:65968
SMASH Issue 364834
ZDI-24-593
bnc#1210988
bnc#1210989
bnc#1211260
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3037933448f60f9acb705997eae62013ecb81e0d
https://kernel.dance/3037933448f60f9acb705997eae62013ecb81e0d
jsc#CAR-2562
linux.git:commit:3e337087c3b5805fe0b8a46ba622a962880b5d64
rh#2192671
rh#2226780
CVE-2023-2269kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-2269
D:CVE-2023-2269
DSA-5448
DSA-5480
SMASH Issue 364413
bnc#1210806
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/63AJUCJTZCII2JMAF7MGZEM66KY7IALT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FBLBKW2WM5YSTS6OGEU5SYHXSJ5EWSTV/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IXHBLWYNSUBS77TYPOJTADPDXKBH2F4U/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63AJUCJTZCII2JMAF7MGZEM66KY7IALT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FBLBKW2WM5YSTS6OGEU5SYHXSJ5EWSTV/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXHBLWYNSUBS77TYPOJTADPDXKBH2F4U/
https://lore.kernel.org/lkml/ZD1xyZxb3rHot8PV%40redhat.com/t/
https://lore.kernel.org/lkml/ZD1xyZxb3rHot8PV@redhat.com/t/
https://security.netapp.com/advisory/ntap-20230929-0004/
https://www.debian.org/security/2023/dsa-5448
https://www.debian.org/security/2023/dsa-5480
jsc#CAR-2548
rh#2189388
CVE-2023-22995kernel-source-rt:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2023-22995
D:CVE-2023-22995
SMASH Issue 358646
bnc#1208741
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17
https://github.com/torvalds/linux/commit/fa0ef93868a6062babe1144df2807a8b1d4924d2
https://security.netapp.com/advisory/ntap-20230331-0004/
jsc#CAR-2407
rh#2174458
CVE-2023-22996kernel-source-rt:Not affectedmoderate6 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H)CVE-2023-22996
MISC:cdn.kernel.org:CVE-2022-30594
SMASH Issue 358816
bnc#1208781
https://github.com/torvalds/linux/commit/4b41a9d0fe3db5f91078a380f62f0572c3ecf2dd
rh#2182398
CVE-2023-22997kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H)CVE-2023-22997
SMASH Issue 358817
bnc#1208782
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.2
https://github.com/torvalds/linux/commit/45af1d7aae7d5520d2858f8517a1342646f015db
rh#2182422
CVE-2023-22998kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-22998
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
SMASH Issue 358818
bnc#1208776
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.3
https://github.com/torvalds/linux/commit/c24968734abfed81c8f93dc5f44a7b7a9aecadfa
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
rh#2182429
CVE-2023-22999kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CONFIRM:cdn.kernel.org:CVE-2021-44879
CVE-2023-22999
SMASH Issue 358819
bnc#1208785
https://github.com/torvalds/linux/commit/b52fe2dbb3e655eb1483000adfab68a219549e13
rh#2182395
CVE-2023-23000kernel-source-rt:Releasedlow2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2023-23000
SMASH Issue 358958
bnc#1208816
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.17
https://github.com/torvalds/linux/commit/045a31b95509c8f25f5f04ec5e0dec5cd09f2c5f
https://security.netapp.com/advisory/ntap-20230331-0004/
jsc#CAR-2399
rh#2182435
CVE-2023-23001kernel-source-rt:Not affectedlow2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)CONFIRM:cdn.kernel.org:CVE-2021-44879
CVE-2023-23001
SMASH Issue 358963
bnc#1208829
https://github.com/torvalds/linux/commit/3ba880a12df5aa4488c18281701b5b1bc3d4531a
rh#2182473
CVE-2023-23002kernel-source-rt:Not affectedmoderate4.2 (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H)CONFIRM:cdn.kernel.org:CVE-2021-44879
CVE-2023-23002
SMASH Issue 358964
bnc#1208840
https://github.com/torvalds/linux/commit/6845667146a28c09b5dfc401c1ad112374087944
rh#2182493
CVE-2023-23003kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H)CVE-2023-23003
SMASH Issue 358965
bnc#1208842
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16
https://github.com/torvalds/linux/commit/0a515a06c5ebfa46fee3ac519e418f801e718da4
https://security.netapp.com/advisory/ntap-20230331-0003/
rh#2182662
CVE-2023-23004kernel-source-rt:Releasedlow4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H)CVE-2023-23004
MISC:cdn.kernel.org:CVE-2022-39188
SMASH Issue 358966
bnc#1208843
https://github.com/torvalds/linux/commit/15342f930ebebcfe36f2415049736a77d7d2e045
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
rh#2182680
CVE-2023-23005kernel-source-rt:Not affectedlow0 (CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N)CVE-2023-23005
SMASH Issue 358967
bnc#1208844
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2
https://github.com/torvalds/linux/commit/4a625ceee8a0ab0273534cb6b432ce6b331db5ee
rh#2182689
CVE-2023-23006kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H)CVE-2023-23006
SMASH Issue 358968
bnc#1208845
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.13
https://github.com/torvalds/linux/commit/6b8b42585886c59a008015083282aae434349094
rh#2182726
CVE-2023-23039kernel-source-rt:Not affectedmoderate ()CVE-2023-23039
D:CVE-2023-23039
SMASH Issue 357928
bnc#1208641
https://lkml.org/lkml/2023/1/1/169
rh#2174866
CVE-2023-23454kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-0590
CVE-2023-23454
CVE-2023-23455
DSA-5324
L3:65098
L3:65173
L3:65176
L3:65185
L3:65224
L3:65237
L3:65449
L3:65869
L3:65871
L3:65876
L3:65879
L3:65952
L3:66496
L3:67104
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
OSS:2023/01/10/1
OSS:2023/01/10/4
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
RHSA-2023:5627
SMASH Issue 353573
bnc#1207036
bnc#1207125
bnc#1207188
bnc#1207189
bnc#1207657
bnc#1207795
bnc#1207822
bnc#1208342
bnc#1208355
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lore.kernel.org/all/20221018203258.2793282-1-edumazet%40google.com/
https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/
jsc#CAR-2288
jsc#CAR-2292
jsc#CAR-2329
rh#2150953
rh#2150979
rh#2165741
rh#2168297
rh#2168332
CVE-2023-23455kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-0590
CVE-2023-23454
CVE-2023-23455
DSA-5324
L3:65098
L3:65173
L3:65176
L3:65185
L3:65224
L3:65237
L3:65449
L3:65869
L3:65871
L3:65876
L3:65879
L3:65952
L3:66496
L3:67104
MISC:git.kernel.org:/pub/scm/linux/kernel/git/torvalds/linux.git/commit/
OSS:2023/01/10/1
OSS:2023/01/10/4
RHSA-2023:2148
RHSA-2023:2458
RHSA-2023:2736
RHSA-2023:2951
RHSA-2023:5627
SMASH Issue 353572
SMASH Issue 353573
bnc#1207036
bnc#1207125
bnc#1207188
bnc#1207189
bnc#1207657
bnc#1207795
bnc#1207822
bnc#1208342
bnc#1208355
https://lists.debian.org/debian-lts-announce/2023/03/msg00000.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lore.kernel.org/all/20221018203258.2793282-1-edumazet%40google.com/
https://lore.kernel.org/all/20221018203258.2793282-1-edumazet@google.com/
jsc#CAR-2288
jsc#CAR-2292
jsc#CAR-2329
rh#2150953
rh#2150979
rh#2165741
rh#2168297
rh#2168332
CVE-2023-23559kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L)CVE-2023-23559
L3:66496
L3:67104
MISC:patchwork.kernel.org:/project/linux-wireless/patch/20230110173007.57110-1-szymon.heidrich@gmail.com/
SMASH Issue 353426
SMASH Issue 353645
bnc#1207051
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b870e73a56c4cccbec33224233eaf295839f228c
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://patchwork.kernel.org/project/linux-wireless/patch/20230110173007.57110-1-szymon.heidrich%40gmail.com/
https://security.netapp.com/advisory/ntap-20230302-0003/
jsc#CAR-2291
rh#2170114
CVE-2023-23586kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-23586
MISC:git.kernel.org:/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring
MISC:kernel.dance:/
SMASH Issue 357583
bnc#1208474
rh#2174754
CVE-2023-23914curl:Not affectedimportant7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)CVE-2023-23914
CVE-2023-23915
OSS:2023/Q1/98
OSS:2023/Q1/99
Oracle:CVE-2023-23914
RHSA-2023:3354
RHSA-2023:3355
SMASH Issue 356339
SMASH Issue 356340
SMASH Issue 356341
bnc#1207990
bnc#1207991
https://hackerone.com/reports/1813864
https://hackerone.com/reports/1826048
https://hackerone.com/reports/1874716
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230309-0006/
rh#2167797
rh#2167813
CVE-2023-23915curl:Not affectedimportant7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)CVE-2023-23914
CVE-2023-23915
OSS:2023/Q1/98
OSS:2023/Q1/99
Oracle:CVE-2023-23914
RHSA-2023:3354
RHSA-2023:3355
SMASH Issue 356341
bnc#1207991
https://hackerone.com/reports/1826048
https://hackerone.com/reports/1874716
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230309-0006/
rh#2167797
rh#2167813
CVE-2023-23916curl:Released, curl-mini:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-333517.pdf
CONFIRM:cert-portal.siemens.com:CVE-2021-22924
CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2021-22926
CONFIRM:security.netapp.com:CVE-2021-22947
CONFIRM:security.netapp.com:CVE-2022-21380
CONFIRM:security.netapp.com:CVE-2022-27776
CONFIRM:security.netapp.com:CVE-2022-30115
CONFIRM:security.netapp.com:CVE-2022-32208
CONFIRM:support.apple.com:CVE-2022-0158
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2021-22898
CVE-2021-22924
CVE-2021-22945
CVE-2021-22946
CVE-2021-22947
CVE-2022-22576
CVE-2022-27774
CVE-2022-27775
CVE-2022-27776
CVE-2022-27781
CVE-2022-27782
CVE-2022-32205
CVE-2022-32206
CVE-2022-32207
CVE-2022-32208
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
DSA-5197
DSA-5365
FEDORA:FEDORA-2021-1d24845e93
FEDORA:FEDORA-2021-5d21b90a30
FEDORA:FEDORA-2021-83fdddca0f
FEDORA:FEDORA-2021-fc96a3a749
FEDORA:FEDORA-2022-1b3d7f6973
FEDORA:FEDORA-2022-bca2c95559
FEDORA:FEDORA-2022-f83aec6d57
FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202212-01
L3:64216
L3:64537
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:curl.se:MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again
MISC:curl.se:OSS:2021/Q3/166
MISC:curl.se:OSS:2021/Q3/167
MISC:curl.se:OSS:2021/Q3/168
MISC:curl.se:OSS:2021/Q3/26
MISC:curl.se:OSS:2022/Q2/209
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/211
MISC:curl.se:OSS:2022/Q2/212
MISC:curl.se:OSS:2022/Q2/61
MISC:curl.se:OSS:2022/Q2/62
MISC:curl.se:OSS:2022/Q2/63
MISC:curl.se:OSS:2022/Q2/64
MISC:curl.se:OSS:2022/Q2/95
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again
MISC:github.com:OSS:2021/Q2/165
MISC:github.com:OSS:2021/Q3/166
MISC:github.com:OSS:2021/Q3/167
MISC:github.com:OSS:2021/Q3/168
MISC:github.com:OSS:2021/Q3/26
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2021-22898
MISC:hackerone.com:CVE-2021-22924
MISC:hackerone.com:CVE-2021-22945
MISC:hackerone.com:CVE-2021-22946
MISC:hackerone.com:CVE-2021-22947
MISC:hackerone.com:CVE-2022-22576
MISC:hackerone.com:CVE-2022-27774
MISC:hackerone.com:CVE-2022-27775
MISC:hackerone.com:CVE-2022-27776
MISC:hackerone.com:CVE-2022-27781
MISC:hackerone.com:CVE-2022-27782
MISC:hackerone.com:CVE-2022-32205
MISC:hackerone.com:CVE-2022-32206
MISC:hackerone.com:CVE-2022-32207
MISC:hackerone.com:CVE-2022-32208
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20210813 [SECURITY] [DLA 2734-1] curl security update
MLIST:[debian-lts-announce] 20210930 [SECURITY] [DLA 2773-1] curl security update
MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
MLIST:[debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update
MLIST:[guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans.
MLIST:[kafka-dev] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[kafka-users] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[kafka-users] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again
N/A:N/A
OSS:2021/Q2/165
OSS:2021/Q3/166
OSS:2021/Q3/167
OSS:2021/Q3/168
OSS:2021/Q3/26
OSS:2021/Q3/27
OSS:2022/Q2/209
OSS:2022/Q2/210
OSS:2022/Q2/211
OSS:2022/Q2/212
OSS:2022/Q2/61
OSS:2022/Q2/62
OSS:2022/Q2/63
OSS:2022/Q2/64
OSS:2022/Q2/95
OSS:2022/Q2/96
OSS:2023/02/15/3
OSS:2023/03/20/6
OSS:2023/Q1/100
Oracle:CVE-2018-1000007
Oracle:CVE-2021-22946
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
Oracle:CVE-2023-23916
RHSA-2021:3582
RHSA-2021:4059
RHSA-2021:4511
RHSA-2022:0635
RHSA-2022:1354
RHSA-2022:5245
RHSA-2022:5313
RHSA-2022:6157
RHSA-2022:6159
RHSA-2022:8299
RHSA-2022:8840
RHSA-2022:8841
RHSA-2023:1140
RHSA-2023:1701
RHSA-2023:1842
RHSA-2023:3354
RHSA-2023:3355
RHSA-2023:3460
RHSA-2023:4139
SMASH Issue 284454
SMASH Issue 303768
SMASH Issue 309114
SMASH Issue 309781
SMASH Issue 309783
SMASH Issue 329490
SMASH Issue 329491
SMASH Issue 329695
SMASH Issue 329920
SMASH Issue 330789
SMASH Issue 330791
SMASH Issue 335197
SMASH Issue 335198
SMASH Issue 335201
SMASH Issue 335203
SMASH Issue 356343
SMASH Issue 356344
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1186114
bnc#1188219
bnc#1190213
bnc#1190373
bnc#1190374
bnc#1198608
bnc#1198614
bnc#1198723
bnc#1198766
bnc#1199223
bnc#1199224
bnc#1200734
bnc#1200735
bnc#1200736
bnc#1200737
bnc#1207992
https://hackerone.com/reports/1826048
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2023/02/msg00035.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQKE6TXYDHOTFHLTBZ5X73GTKI7II5KO/
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230309-0006/
https://www.debian.org/security/2023/dsa-5365
jsc#CAR-1052
jsc#CAR-1053
jsc#CAR-1715
jsc#CAR-1716
jsc#CAR-1717
jsc#CAR-1718
jsc#CAR-1767
jsc#CAR-1768
jsc#CAR-1873
jsc#CAR-1874
jsc#CAR-2379
jsc#CAR-642
jsc#CAR-990
rh#1955316
rh#1964887
rh#1970902
rh#1981460
rh#2001527
rh#2003175
rh#2003191
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099296
rh#2099300
rh#2099305
rh#2099306
rh#2167815
CVE-2023-23931python-cryptography:Ignorelow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)CVE-2023-23931
Oracle:CVE-2023-23931
RHSA-2023:4693
RHSA-2023:4971
SMASH Issue 356403
bnc#1208036
https://github.com/pyca/cryptography/pull/8230/commits/94a50a9731f35405f0357fa5f3b177d46a726ab3
https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-vj6r
jsc#CAR-2352
rh#2171817
CVE-2023-24023kernel-source-rt:Analysismoderate6.8 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)CVE-2023-24023
SMASH Issue 386272
bnc#1218148
https://dl.acm.org/doi/10.1145/3576915.3623066
https://www.bluetooth.com/learn-about-bluetooth/key-attributes/bluetooth-security/bluffs-vulnerability/
rh#2254961
CVE-2023-2426vim:Ignoremoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H)CVE-2023-2426
D:CVE-2023-2426
SMASH Issue 364825
bnc#1210996
https://github.com/vim/vim/commit/caf642c25de526229264cab9425e7c9979f3509b
https://huntr.dev/bounties/3451be4c-91c8-4d08-926b-cbff7396f425
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LOJP6M7ZTKZQYOGVOOAY6TIE6ACBJL55/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LOJP6M7ZTKZQYOGVOOAY6TIE6ACBJL55/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
jsc#CAR-2560
rh#2196578
CVE-2023-2430kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2023-2430
D:CVE-2023-2430
DSA-5492
SMASH Issue 364828
bnc#1211014
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e12d7a46f65ae4b7d58a5e0c1cbfa825cf8
https://www.debian.org/security/2023/dsa-5492
rh#2192175
CVE-2023-24329python3:Releasedimportant7.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L)CVE-2023-24329
L3:65333
L3:65880
L3:65896
L3:66357
L3:66429
L3:66797
RHSA-2023:3550
RHSA-2023:3555
RHSA-2023:3556
RHSA-2023:3585
RHSA-2023:3591
RHSA-2023:3594
RHSA-2023:3595
RHSA-2023:3776
RHSA-2023:3777
RHSA-2023:3780
RHSA-2023:3781
RHSA-2023:3796
RHSA-2023:3810
RHSA-2023:3811
RHSA-2023:3931
RHSA-2023:3932
RHSA-2023:3934
RHSA-2023:3935
RHSA-2023:3936
RHSA-2023:4004
RHSA-2023:4008
RHSA-2023:4032
RHSA-2023:4038
RHSA-2023:4203
RHSA-2023:4282
SMASH Issue 357592
bnc#1208471
bnc#1208731
bnc#1209324
bnc#1211496
bnc#1211543
https://github.com/python/cpython/issues/102153
https://github.com/python/cpython/pull/99421
https://lists.debian.org/debian-lts-announce/2023/09/msg00022.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PEVICI7YNGGMSL3UCMWGE66QFLATH72/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DSL6NSOAXWBJJ67XPLSSC74MNKZF3BBO/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EM2XLZSTXG44TMFXF4E6VTGKR2MQCW3G/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2NY75GFDZ5T6YPN44D3VMFT5SUVTOTG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GR5US3BYILYJ4SKBV6YBNPRUBAL5P2CN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H23OSKC6UG6IWOQAUPW74YUHWRWVXJP7/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZTLGV2HYFF4AMYJL25VDIGAIHCU7UPA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LWC4WGXER5P6Q75RFGL7QUTPP3N5JR7T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MZEHSXSCMA4WWQKXT6QV7AAR6SWNZ2VP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O5SP4RT3RRS434ZS2HQKQJ3VZW7YPKYR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OHHJHJRLEF3TDT2K3676CAUVRDD4CCMR/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PEUN6T22UJFXR7J5F6UUHCXXPKJ2DVHI/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PURM5CFDABEWAIWZFD2MQ7ZJGCPYSQ44/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Q3J5N24ECS4B6MJDRO6UAYU6GPLYBDCL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QRQHN7RWJQJHYP6E5EKESOYP5VDSHZG4/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RA2MBEEES6L46OD64OBSVUUMGKNGMOWW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T4IDB5OAR5Y4UK3HLMZBW4WEL2B7YFMJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TZH26JGNZ5XYPZ5SAU3NKSBSPRE5OHTG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U2MZOJYGFCB5PPT6AKMAU72N7QOYWLBP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UONZWLB4QVLQIY5CPDLEUEKH6WX4VQMC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTOAUJNDWZDRWVSXJ354AYZYKRMT56HU/
https://pointernull.com/security/python-url-parse-problem.html
https://security.netapp.com/advisory/ntap-20230324-0004/
https://www.kb.cert.org/vuls/id/127587
jsc#CAR-2387
rh#2173917
CVE-2023-24593glib2:Ignoremoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-24593
SMASH Issue 361018
bnc#1209714
jsc#CAR-2474
rh#2181183
CVE-2023-24626screen:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-24626
D:CVE-2023-24626
SMASH Issue 362813
bnc#1210272
https://git.savannah.gnu.org/cgit/screen.git/patch/?id=e9ad41bfedb4537a6f0de20f00b27c7739f168f7
https://savannah.gnu.org/bugs/?63195
https://www.exploit-db.com/exploits/51252
jsc#CAR-2505
rh#2185517
CVE-2023-2483kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-2483
CVE-2023-33203
SMASH Issue 364941
bnc#1210685
bnc#1211037
bnc#1211038
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75
jsc#CAR-2655
rh#2192667
CVE-2023-25012kernel-source-rt:Releasedmoderate6.8 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2023-25012
D:CVE-2023-25012
MISC:git.kernel.org:OSS:2023/11/05/1
MISC:lore.kernel.org:/all/20230125-hid-unregister-leds-v1-1-9a5192dcef16@diag.uniroma1.it/
MISC:seclists.org:/oss-sec/2023/q1/53
MISC:www.openwall.com:OSS:2023/11/05/1
OSS:2023/01/17/3
OSS:2023/01/18/3
OSS:2023/01/23/1
OSS:2023/02/02/1
OSS:2023/11/05/1
OSS:2023/Q1/74
SMASH Issue 355951
bnc#1207560
bnc#1207846
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=27d2a2fd844ec7da70d19fabb482304fd1e0595b
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=76ca8da989c7d97a7f76c75d475fe95a584439d7
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9fefb6201c4f8dd9f58c581b2a66e5cde2895ea2
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=458e279f861d3f61796894cd158b780765a1569f
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=4ab3a086d10eeec1424f2e8a968827a6336203df
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=66b2c338adce580dfce2199591e65e2bab889cff
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=a096ccca6e503a5c575717ff8a36ace27510ab0a
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=f753a68980cf4b59a80fe677619da2b1804f526d
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=ffe2a22562444720b05bdfeb999c03e810d84cbb
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lore.kernel.org/all/20230125-hid-unregister-leds-v1-1-9a5192dcef16%40diag.uniroma1.it/
jsc#CAR-2332
rh#2172948
rh#2173444
CVE-2023-2513kernel-source-rt:Ignoremoderate6.6 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-2513
RHSA-2023:2148
RHSA-2023:2458
SMASH Issue 365100
bnc#1211105
bnc#1211109
https://github.com/torvalds/linux/commit/67d7d8ad99be
https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1@huawei.com/
jsc#CAR-2565
rh#2193097
CVE-2023-25136openssh:Not affectedmoderate ()CVE-2023-25136
MISC:bugzilla.mindrot.org:/show_bug.cgi
MISC:ftp.openbsd.org:/pub/OpenBSD/patches/7.2/common/017_sshd.patch.sig
MISC:github.com:/openssh/openssh-portable/commit/486c4dc3b83b4b67d663fb0fa62bc24138ec3946
OSS:2023/02/02/2
OSS:2023/02/13/1
OSS:2023/02/22/1
OSS:2023/02/22/2
OSS:2023/02/23/3
OSS:2023/03/06/1
OSS:2023/03/09/2
Oracle:CVE-2023-25136
RHSA-2023:2645
SMASH Issue 356036
https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JGAUIXJ3TEKCRKVWFQ6GDAGQFTIIGQQP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R7LKQDFZWKYHQ65TBSH2X2HJQ4V2THS3/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JGAUIXJ3TEKCRKVWFQ6GDAGQFTIIGQQP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R7LKQDFZWKYHQ65TBSH2X2HJQ4V2THS3/
https://news.ycombinator.com/item?id=34711565
https://security.gentoo.org/glsa/202307-01
https://security.netapp.com/advisory/ntap-20230309-0003/
rh#2167636
CVE-2023-25139glibc:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-25139
MISC:sourceware.org:/bugzilla/show_bug.cgi
MISC:sourceware.org:OSS:2023/Q1/91
OSS:2023/02/10/1
OSS:2023/Q1/91
SMASH Issue 356035
bnc#1208189
https://security.netapp.com/advisory/ntap-20230302-0010/
rh#2167666
CVE-2023-25180glib2:Ignoremoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-25180
SMASH Issue 361017
bnc#1209713
jsc#CAR-2475
rh#2181182
CVE-2023-25584binutils:Not affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2023-25584
SMASH Issue 356371
bnc#1208041
https://access.redhat.com/security/cve/CVE-2023-25584
https://security.netapp.com/advisory/ntap-20231103-0002/
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=77c225bdeb410cf60da804879ad41622f5f1aa44
jsc#CAR-2346
rh#2167467
CVE-2023-25586binutils:Not affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2023-25586
SMASH Issue 356373
bnc#1208039
https://access.redhat.com/security/cve/CVE-2023-25586
https://security.netapp.com/advisory/ntap-20231103-0003/
https://sourceware.org/bugzilla/show_bug.cgi?id=29855
https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=5830876a0cca17bef3b2d54908928e72cca53502
rh#2167502
CVE-2023-25775kernel-source-rt:Not affectedmoderate5.6 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)CVE-2023-25775
SMASH Issue 375070
bnc#1216959
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00794.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
https://security.netapp.com/advisory/ntap-20230915-0013/
linux.git:commit:bb6d73d9add68ad270888db327514384dfa44958
rh#2231410
CVE-2023-2593kernel-source-rt:Not affectedmoderate ()CVE-2023-2593
SMASH Issue 366977
ZDI-23-693
bnc#1211527
CVE-2023-2598kernel-source-rt:Not affectedimportant ()CVE-2023-2598
D:CVE-2023-2598
MISC:anatomic.rip:OSS:2024/Q2/172
MISC:blog.exodusintel.com:OSS:2024/Q2/172
MISC:git.kernel.org:OSS:2023/05/08/3
MISC:git.kernel.org:OSS:2024/Q2/172
MISC:ruia-ruia.github.io:OSS:2022/Q3/101
OSS:2023/05/08/3
OSS:2023/Q2/135
OSS:2024/04/24/3
OSS:2024/Q2/172
SMASH Issue 364984
bnc#1211046
https://bugs.chromium.org/p/project-zero/issues/detail?id=2504
https://security.netapp.com/advisory/ntap-20230703-0006/
rh#2203054
CVE-2023-2602libcap:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2023-2602
OSS:2023/Q2/158
RHSA-2023:4524
RHSA-2023:5071
SMASH Issue 366550
bnc#1211418
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/
https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf
rh#2209114
CVE-2023-2603libcap:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2023-2603
D:CVE-2023-2603
L3:66196
OSS:2023/Q2/158
RHSA-2023:4524
RHSA-2023:5071
SMASH Issue 366549
bnc#1211419
bnc#1212804
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/
https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf
jsc#CAR-2656
rh#2209113
CVE-2023-26083kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CONFIRM:developer.arm.com:CVE-2022-28350
CVE-2023-26083
SMASH Issue 362629
bnc#1210236
https://www.cybersecurity-help.cz/vdb/SB2023033049
https://www.cybersecurity-help.cz/vulnerabilities/74210/
CVE-2023-2612kernel-source-rt:Not affectedmoderate ()CVE-2023-2612
SMASH Issue 367948
bnc#1211902
http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
https://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/kinetic/commit/?id=02b47547824b1cd0d55c6744f91886f04de8947e
https://ubuntu.com/security/CVE-2023-2612
https://ubuntu.com/security/notices/USN-6122-1
https://ubuntu.com/security/notices/USN-6123-1
https://ubuntu.com/security/notices/USN-6124-1
https://ubuntu.com/security/notices/USN-6127-1
CVE-2023-26242kernel-source-rt:Not affectedimportant ()CVE-2023-26242
D:CVE-2023-26242
SMASH Issue 357783
bnc#1208518
https://patchwork.kernel.org/project/linux-fpga/patch/20230206054326.89323-1-k1rh4.lee%40gmail.com
https://patchwork.kernel.org/project/linux-fpga/patch/20230206054326.89323-1-k1rh4.lee@gmail.com
https://security.netapp.com/advisory/ntap-20230406-0002/
CVE-2023-26463strongswan:Not affectedcritical9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2023-26463
D:CVE-2023-26463
SMASH Issue 358159
SMASH Issue 358160
bnc#1208608
https://github.com/strongswan/strongswan/releases
https://security.netapp.com/advisory/ntap-20230517-0010/
https://www.strongswan.org/blog/2023/03/02/strongswan-vulnerability-%28cve-2023-26463%29.html
rh#2176444
CVE-2023-2650openssl:Not affected, openssl-1_1:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2023-2650
DSA-5417
L3:66079
L3:66117
L3:66118
L3:66349
L3:66350
OSS:2023/05/30/1
OSS:2023/Q2/204
Oracle:CVE-2023-2650
RHSA-2023:3722
SMASH Issue 366638
bdo#1034720
bnc#1211430
bnc#1212329
bnc#1212459
bnc#1212460
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=423a2bc737a908ad0c77bda470b2b59dc879936b
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=853c5e56ee0b8650c73140816bb8b91d6163422c
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9e209944b35cf82368071f160a744b6178f9b098
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db779b0e10b047f2585615e0b8f2acdf21f8544a
https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0009
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230703-0001/
https://security.netapp.com/advisory/ntap-20231027-0009/
https://www.debian.org/security/2023/dsa-5417
https://www.openssl.org/news/secadv/20230530.txt
jsc#CAR-2660
openssl.git:commit:d63b3e7959e79f98d60760a739f7876dc5adc838
rh#2207947
CVE-2023-26544kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-26544
SMASH Issue 358312
bnc#1208697
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=887bfc546097fbe8071dac13b2fef73b77920899
https://lkml.org/lkml/2023/2/20/128
https://security.netapp.com/advisory/ntap-20230316-0010/
rh#2182441
CVE-2023-26545kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-26545
D:CVE-2022-4744
L3:65564
L3:65683
L3:65763
L3:65871
L3:65876
OSS:2023/04/11/3
OSS:2023/Q2/14
SMASH Issue 358313
bnc#1208700
bnc#1208909
bnc#1209853
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.13
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fda6c89fe3d9aca073495a664e1d5aea28cd4377
https://github.com/torvalds/linux/commit/fda6c89fe3d9aca073495a664e1d5aea28cd4377
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://security.netapp.com/advisory/ntap-20230316-0009/
jsc#CAR-2389
rh#2156322
rh#2181847
rh#2182443
CVE-2023-26604systemd:Ignoreimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-26604
L3:65455
L3:65888
L3:66021
RHSA-2023:3837
SMASH Issue 359129
bnc#1208958
bnc#1209327
bnc#1211504
http://packetstormsecurity.com/files/174130/systemd-246-Local-Root-Privilege-Escalation.html
https://blog.compass-security.com/2012/10/dangerous-sudoers-entries-part-2-insecure-functionality/
https://github.com/systemd/systemd/blob/main/NEWS#L4335-L4340
https://lists.debian.org/debian-lts-announce/2023/03/msg00032.html
https://medium.com/@zenmoviefornotification/saidov-maxim-cve-2023-26604-c1232a526ba7
https://security.netapp.com/advisory/ntap-20230505-0009/
jsc#CAR-2416
rh#2175611
CVE-2023-26605kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-26605
D:CVE-2023-26605
SMASH Issue 358350
bnc#1208699
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=4e3c51f4e805291b057d12f5dda5aeb50a538dc4
https://lkml.org/lkml/2023/2/22/3
https://security.netapp.com/advisory/ntap-20230316-0010/
rh#2179680
CVE-2023-26606kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-26606
D:CVE-2023-26606
SMASH Issue 358351
bnc#1208694
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=557d19675a470bb0a98beccec38c5dc3735c20fa
https://lkml.org/lkml/2023/2/20/860
https://security.netapp.com/advisory/ntap-20230316-0010/
rh#2179668
CVE-2023-26607kernel-source-rt:Not affectedimportant ()CVE-2023-26607
D:CVE-2023-26607
SMASH Issue 358352
bnc#1208703
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=36a4d82dddbbd421d2b8e79e1cab68c8126d5075
https://lkml.org/lkml/2023/2/21/1353
https://security.netapp.com/advisory/ntap-20230316-0010/
rh#2179671
CVE-2023-27043python3:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)CVE-2023-27043
D:CVE-2023-27043
L3:65765
L3:66797
L3:67963
SMASH Issue 363947
bnc#1210638
bnc#1210898
bnc#1215396
http://python.com
http://python.org
https://github.com/python/cpython/issues/102988
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZAEFSFZDNBNJPNOUTLG5COISGQDLMGV/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/75DTHSTNOFFNAWHXKMDXS7EJWC6W2FUC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARI7VDSNTQVXRQFM6IK5GSSLEIYV4VZH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BQAKLUJMHFGVBRDPEY57BJGNCE5UUPHW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HXYVPEZUA3465AEFX5JVFVP7KIFZMF3N/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N6M5I6OQHJABNEYY555HUMMKX3Y4P25Z/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NEUNZSZ3CVSM2QWVYH3N2XGOCDWNYUA3/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ORLXS5YTKN65E2Q2NWKXMFS5FWQHRNZW/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2MAICLFDDO3QVNHTZ2OCERZQ34R2PIC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2W2BZQIHMCKRI5FNBJERFYMS5PK6TAH/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PHVGRKQAGANCSGFI3QMYOCIMS4IFOZA5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PU6Y2S5CBN5BWCBDAJFTGIBZLK3S2G3J/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QDRDDPDN3VFIYXJIYEABY6USX5EU66AG/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RDDC2VOX7OQC6OHMYTVD4HLFZIV6PYBC/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWMBD4LNHWEXRI6YVFWJMTJQUL5WOFTS/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YQVY5C5REXWJIORJIL2FIL3ALOEJEF72/
https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html
https://security.netapp.com/advisory/ntap-20230601-0003/
jsc#CAR-2543
rh#2173917
rh#2196183
CVE-2023-27534curl:Releasedmoderate4.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2023-27534
D:CVE-2023-27534
OSS:2023/Q1/175
RHSA-2023:3354
RHSA-2023:3355
SMASH Issue 359852
SMASH Issue 359853
bnc#1209210
bnc#1219273
https://hackerone.com/reports/1892351
https://lists.debian.org/debian-lts-announce/2024/03/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230420-0012/
jsc#CAR-2458
rh#2179069
CVE-2023-27536curl:Ignoremoderate5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2023-27536
D:CVE-2023-27536
L3:66794
RHSA-2023:4523
SMASH Issue 359856
SMASH Issue 359857
bnc#1209212
https://hackerone.com/reports/1895135
https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230420-0010/
jsc#CAR-2460
rh#2179092
CVE-2023-27537curl:Not affectedmoderate5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2023-27537
OSS:2023/Q1/178
SMASH Issue 359858
SMASH Issue 359859
bnc#1209213
https://hackerone.com/reports/1897203
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230420-0010/
rh#2179097
CVE-2023-27538curl:Released, curl-mini:Releasedmoderate5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-333517.pdf
CONFIRM:cert-portal.siemens.com:CVE-2021-22924
CONFIRM:cert-portal.siemens.com:CVE-2021-3672
CONFIRM:security.netapp.com:CVE-2021-22926
CONFIRM:security.netapp.com:CVE-2021-22947
CONFIRM:security.netapp.com:CVE-2022-21380
CONFIRM:security.netapp.com:CVE-2022-27776
CONFIRM:security.netapp.com:CVE-2022-30115
CONFIRM:security.netapp.com:CVE-2022-32208
CONFIRM:support.apple.com:CVE-2022-0158
CONFIRM:support.apple.com:CVE-2022-1725
CVE-2021-22898
CVE-2021-22924
CVE-2021-22945
CVE-2021-22946
CVE-2021-22947
CVE-2022-22576
CVE-2022-27774
CVE-2022-27775
CVE-2022-27776
CVE-2022-27781
CVE-2022-27782
CVE-2022-32205
CVE-2022-32206
CVE-2022-32207
CVE-2022-32208
CVE-2023-23916
CVE-2023-27538
D:CVE-2022-27774
D:CVE-2023-27538
DSA-5197
FEDORA:FEDORA-2021-1d24845e93
FEDORA:FEDORA-2021-5d21b90a30
FEDORA:FEDORA-2021-83fdddca0f
FEDORA:FEDORA-2021-fc96a3a749
FEDORA:FEDORA-2022-1b3d7f6973
FEDORA:FEDORA-2022-bca2c95559
FEDORA:FEDORA-2022-f83aec6d57
FULLDISC:20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
FULLDISC:20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
FULLDISC:20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
GLSA-202212-01
L3:63557
L3:63635
L3:63745
L3:64216
L3:64537
L3:66794
MISC:cert-portal.siemens.com:CVE-2022-32262
MISC:curl.se:MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again
MISC:curl.se:OSS:2021/Q3/166
MISC:curl.se:OSS:2021/Q3/167
MISC:curl.se:OSS:2021/Q3/168
MISC:curl.se:OSS:2021/Q3/26
MISC:curl.se:OSS:2022/Q2/209
MISC:curl.se:OSS:2022/Q2/210
MISC:curl.se:OSS:2022/Q2/211
MISC:curl.se:OSS:2022/Q2/212
MISC:curl.se:OSS:2022/Q2/61
MISC:curl.se:OSS:2022/Q2/62
MISC:curl.se:OSS:2022/Q2/63
MISC:curl.se:OSS:2022/Q2/64
MISC:curl.se:OSS:2022/Q2/95
MISC:curl.se:OSS:2022/Q2/96
MISC:github.com:MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again
MISC:github.com:OSS:2021/Q2/165
MISC:github.com:OSS:2021/Q3/166
MISC:github.com:OSS:2021/Q3/167
MISC:github.com:OSS:2021/Q3/168
MISC:github.com:OSS:2021/Q3/26
MISC:github.com:OSS:2023/02/15/3
MISC:github.com:OSS:2023/03/20/6
MISC:hackerone.com:CVE-2021-22898
MISC:hackerone.com:CVE-2021-22924
MISC:hackerone.com:CVE-2021-22945
MISC:hackerone.com:CVE-2021-22946
MISC:hackerone.com:CVE-2021-22947
MISC:hackerone.com:CVE-2022-22576
MISC:hackerone.com:CVE-2022-27774
MISC:hackerone.com:CVE-2022-27775
MISC:hackerone.com:CVE-2022-27776
MISC:hackerone.com:CVE-2022-27781
MISC:hackerone.com:CVE-2022-27782
MISC:hackerone.com:CVE-2022-32205
MISC:hackerone.com:CVE-2022-32206
MISC:hackerone.com:CVE-2022-32207
MISC:hackerone.com:CVE-2022-32208
MISC:www.oracle.com:CVE-2021-35666
MISC:www.oracle.com:CVE-2022-21403
MISC:www.oracle.com:CVE-2022-21498
MISC:www.oracle.com:CVE-2022-21586
MLIST:[debian-lts-announce] 20210813 [SECURITY] [DLA 2734-1] curl security update
MLIST:[debian-lts-announce] 20210930 [SECURITY] [DLA 2773-1] curl security update
MLIST:[debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
MLIST:[debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update
MLIST:[guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans.
MLIST:[kafka-dev] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[kafka-users] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[kafka-users] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
MLIST:[oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again
N/A:N/A
OSS:2021/Q2/165
OSS:2021/Q3/166
OSS:2021/Q3/167
OSS:2021/Q3/168
OSS:2021/Q3/26
OSS:2021/Q3/27
OSS:2022/Q2/209
OSS:2022/Q2/210
OSS:2022/Q2/211
OSS:2022/Q2/212
OSS:2022/Q2/61
OSS:2022/Q2/62
OSS:2022/Q2/63
OSS:2022/Q2/64
OSS:2022/Q2/95
OSS:2022/Q2/96
OSS:2023/02/15/3
OSS:2023/03/20/6
OSS:2023/Q1/179
Oracle:CVE-2018-1000007
Oracle:CVE-2021-22946
Oracle:CVE-2022-27782
Oracle:CVE-2022-32206
Oracle:CVE-2022-32207
RHSA-2021:3582
RHSA-2021:4059
RHSA-2021:4511
RHSA-2022:0635
RHSA-2022:1354
RHSA-2022:5245
RHSA-2022:5313
RHSA-2022:6157
RHSA-2022:6159
RHSA-2022:8299
RHSA-2022:8840
RHSA-2022:8841
RHSA-2023:3460
SMASH Issue 284454
SMASH Issue 303768
SMASH Issue 309114
SMASH Issue 309781
SMASH Issue 309783
SMASH Issue 329490
SMASH Issue 329491
SMASH Issue 329695
SMASH Issue 329920
SMASH Issue 330789
SMASH Issue 330791
SMASH Issue 335132
SMASH Issue 335197
SMASH Issue 335198
SMASH Issue 335201
SMASH Issue 335203
SMASH Issue 335905
SMASH Issue 337387
SMASH Issue 343660
SMASH Issue 347191
SMASH Issue 359860
SMASH Issue 359861
bdo#1010252
bdo#1010253
bdo#1010254
bdo#1010295
bdo#989228
bdo#991492
bnc#1186114
bnc#1188219
bnc#1190213
bnc#1190373
bnc#1190374
bnc#1198608
bnc#1198614
bnc#1198723
bnc#1198766
bnc#1199223
bnc#1199224
bnc#1200694
bnc#1200734
bnc#1200735
bnc#1200736
bnc#1200737
bnc#1201032
bnc#1201550
bnc#1203786
bnc#1205070
bnc#1209214
https://hackerone.com/reports/1898475
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/r61db8e7dcb56dc000a5387a88f7a473bacec5ee01b9ff3f55308aacc%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cdev.kafka.apache.org%3E
https://lists.apache.org/thread.html/rbf4ce74b0d1fa9810dec50ba3ace0caeea677af7c27a97111c06ccb7%40%3Cusers.kafka.apache.org%3E
https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
https://lists.debian.org/debian-lts-announce/2023/04/msg00025.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7N5ZBWLNNPZKFK7Q4KEHGCJ2YELQEUJP/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/APOAK4X73EJTAPTSVT7IRVDMUWVXNWGD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEV6BR4MTI3CEWK2YU2HQZUW5FAS3FEY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DKKOQXPYLMBSEVDHFS32BPBR3ZQJKY5B/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FRUCW2UVNYUDZF72DQLFQR4PJEC6CF7V/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/POOC3UV7V6L4CJ5KA2PTWTNUV5Y72T3Q/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RWLEC6YVEM2HWUBX67SDGPSY4CQB72OE/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36NBD5YLJXXEDZLDGNFCERWRYJQ6LAQW/
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230420-0010/
jsc#CAR-1052
jsc#CAR-1053
jsc#CAR-1715
jsc#CAR-1716
jsc#CAR-1717
jsc#CAR-1718
jsc#CAR-1767
jsc#CAR-1768
jsc#CAR-1873
jsc#CAR-1874
jsc#CAR-2461
jsc#CAR-642
jsc#CAR-990
rh#1955316
rh#1964887
rh#1970902
rh#1981460
rh#2001527
rh#2003175
rh#2003191
rh#2077541
rh#2077547
rh#2078388
rh#2078408
rh#2082204
rh#2082215
rh#2099296
rh#2099300
rh#2099305
rh#2099306
rh#2179103
CVE-2023-28319curl:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2023-28319
OSS:2023/Q2/165
RHSA-2023:4628
RHSA-2023:4629
SMASH Issue 365637
SMASH Issue 365638
bnc#1211230
http://seclists.org/fulldisclosure/2023/Jul/47
http://seclists.org/fulldisclosure/2023/Jul/48
http://seclists.org/fulldisclosure/2023/Jul/52
https://hackerone.com/reports/1913733
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230609-0009/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
rh#2196778
CVE-2023-28322curl:Releasedimportant6.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L)CONFIRM:security.netapp.com:/advisory/ntap-20230110-0006/
CONFIRM:support.apple.com:/kb/HT213604
CONFIRM:support.apple.com:/kb/HT213605
CVE-2022-32221
CVE-2023-28322
D:CVE-2022-32221
DSA-5330
FULLDISC:20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2
FULLDISC:20230123 APPLE-SA-2023-01-23-5 macOS Monterey 12.6.3
GLSA-202212-01
L3:64595
L3:64729
L3:64816
L3:65222
L3:67177
MISC:github.com:OSS:2023/05/17/4
MISC:hackerone.com:/reports/1704017
MLIST:[debian-lts-announce] 20230128 [SECURITY] [DLA 3288-1] curl security update
OSS:2022/Q4/47
OSS:2023/05/17/4
OSS:2023/Q2/168
Oracle:CVE-2022-32221
RHSA-2022:8840
RHSA-2022:8841
RHSA-2023:0333
RHSA-2023:4139
RHSA-2023:4354
RHSA-2023:4628
RHSA-2023:4629
RHSA-2023:5598
SMASH Issue 345344
SMASH Issue 347686
SMASH Issue 349077
SMASH Issue 350078
SMASH Issue 357312
SMASH Issue 365643
SMASH Issue 365644
bnc#1204383
bnc#1205287
bnc#1205834
bnc#1206236
bnc#1208340
bnc#1211233
http://seclists.org/fulldisclosure/2023/Jul/47
http://seclists.org/fulldisclosure/2023/Jul/48
http://seclists.org/fulldisclosure/2023/Jul/52
https://hackerone.com/reports/1954658
https://lists.debian.org/debian-lts-announce/2023/12/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F4I75RDGX5ULSSCBE5BF3P5I5SFO7ULQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Z2LIWHWKOVH24COGGBCVOWDXXIUPKOMK/
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20230208-0002/
https://security.netapp.com/advisory/ntap-20230609-0009/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
jsc#CAR-2142
rh#2135411
rh#2196793
CVE-2023-28327kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-28327
D:CVE-2023-28327
RHSA-2023:5603
RHSA-2023:5604
SMASH Issue 359986
bnc#1209290
jsc#CAR-2443
rh#2177382
CVE-2023-28328kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-28328
D:CVE-2023-28328
L3:67931
SMASH Issue 359989
bnc#1209291
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
rh#2177389
CVE-2023-28410kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-28410
SMASH Issue 365865
SMASH Issue 365866
bnc#1211263
bnc#1211819
https://security.netapp.com/advisory/ntap-20230622-0004/
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00886.html
rh#2203831
CVE-2023-28464kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-28464
DSA-5492
L3:65968
L3:67672
OSS:2023/03/28/2
OSS:2023/03/28/3
OSS:2023/Q1/200
SMASH Issue 359519
SMASH Issue 361140
ZDI-24-593
bnc#1209052
bnc#1211111
bnc#1211936
https://lore.kernel.org/lkml/20230309074645.74309-1-wzhmmmmm%40gmail.com/
https://lore.kernel.org/lkml/20230309074645.74309-1-wzhmmmmm@gmail.com/
https://security.netapp.com/advisory/ntap-20230517-0004/
jsc#CAR-2486
linux.git:commit:3e337087c3b5805fe0b8a46ba622a962880b5d64
linux.git:commit:a85fb91e3d728bdfc80833167e8162cce8bc7004
rh#2177759
rh#2178212
rh#2181330
rh#2192671
rh#2226780
rh#2282686
CVE-2023-28466kernel-source-rt:Ignoreimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-28466
D:CVE-2023-28466
L3:65952
L3:66431
L3:66491
L3:66496
L3:67104
RHSA-2023:3708
RHSA-2023:3723
RHSA-2023:3819
RHSA-2023:3847
RHSA-2023:4789
RHSA-2023:4801
RHSA-2023:4814
SMASH Issue 360258
bnc#1209366
bnc#1210452
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=49c47cc21b5b7a3d8deb18fc57b0aa2ab1286962
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://security.netapp.com/advisory/ntap-20230427-0006/
jsc#CAR-2444
rh#2179000
CVE-2023-28484libxml2:Already fixedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-28484
D:CVE-2023-28484
DSA-5391
L3:66798
RHSA-2023:4349
RHSA-2023:4529
RHSA-2023:4628
SMASH Issue 363077
bdo#1034436
bdo#1034437
bnc#1210411
https://gitlab.gnome.org/GNOME/libxml2/-/issues/491
https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4
https://lists.debian.org/debian-lts-announce/2023/04/msg00031.html
https://security.netapp.com/advisory/ntap-20230601-0006/
https://security.netapp.com/advisory/ntap-20240201-0005/
jsc#CAR-2525
rh#2185994
CVE-2023-28531openssh:Not affectedcritical ()CVE-2023-28531
D:CVE-2023-28531
DSA-5586
OSS:2023/03/15/8
SMASH Issue 360496
bdo#1033166
bdo#995130
bnc#1209420
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AN2UDTXEUSKFIOIYMV6JNI5VSBMYZOFT/
https://security.gentoo.org/glsa/202307-01
https://security.netapp.com/advisory/ntap-20230413-0008/
https://www.debian.org/security/2023/dsa-5586
rh#2179334
CVE-2023-2860kernel-source-rt:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)CVE-2023-2860
SMASH Issue 366978
SMASH Issue 367635
ZDI-23-692
bnc#1211592
https://access.redhat.com/security/cve/CVE-2023-2860
https://www.zerodayinitiative.com/advisories/ZDI-CAN-18511
jsc#CAR-2663
rh#2218122
CVE-2023-28772kernel-source-rt:Ignoreimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2023-28772
L3:65561
L3:65968
L3:66573
MISC:cdn.kernel.org:CVE-2021-38205
SMASH Issue 360715
bnc#1209549
bnc#1209832
bnc#1211110
https://github.com/torvalds/linux/commit/d3b16034a24a112bb83aeb669ac5b9b01f744bb7
https://lkml.kernel.org/r/20210626032156.47889-1-yun.zhou@windriver.com
https://lore.kernel.org/lkml/20210625122453.5e2fe304@oasis.local.home/
https://security.netapp.com/advisory/ntap-20230427-0005/
jsc#CAR-2463
rh#2181330
CVE-2023-28866kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2023-28866
D:CVE-2023-28866
SMASH Issue 361390
bnc#1209780
https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=95084403f8c070ccf5d7cbe72352519c1798a40a
https://lore.kernel.org/lkml/20230321015018.1759683-1-iam@sung-woo.kim/
https://patchwork.kernel.org/project/bluetooth/patch/20230322232543.3079578-1-luiz.dentz@gmail.com
rh#2185519
CVE-2023-2898kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-2898
D:CVE-2023-2898
DSA-5480
DSA-5492
SMASH Issue 367493
bnc#1211742
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lore.kernel.org/linux-f2fs-devel/20230522124203.3838360-1-chao%40kernel.org/
https://lore.kernel.org/linux-f2fs-devel/20230522124203.3838360-1-chao@kernel.org/
https://security.netapp.com/advisory/ntap-20230929-0002/
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
rh#2210102
CVE-2023-29383shadow:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-29383
D:CVE-2023-29383
SMASH Issue 363570
bnc#1210507
https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d
https://github.com/shadow-maint/shadow/pull/687
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/
https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797
jsc#CAR-2538
rh#2187184
CVE-2023-29469libxml2:Already fixedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-29469
D:CVE-2023-29469
DSA-5391
L3:66798
RHSA-2023:4349
RHSA-2023:4529
RHSA-2023:4628
SMASH Issue 363076
bdo#1034436
bdo#1034437
bnc#1210412
bnc#1215397
https://gitlab.gnome.org/GNOME/libxml2/-/issues/510
https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4
https://lists.debian.org/debian-lts-announce/2023/04/msg00031.html
https://security.netapp.com/advisory/ntap-20230601-0006/
jsc#CAR-2526
rh#2185984
rh#2185994
CVE-2023-29491ncurses:Ignoremoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H)CVE-2023-29491
D:CVE-2023-29491
L3:65786
L3:66173
L3:66702
OSS:2023/04/12/5
OSS:2023/04/13/4
OSS:2023/04/19/10
OSS:2023/04/19/11
OSS:2023/Q2/19
RHSA-2023:5249
SMASH Issue 363267
bnc#1210434
bnc#1210992
bnc#1212736
bnc#1215011
http://ncurses.scripts.mit.edu/?p=ncurses.git%3Ba=commit%3Bh=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
http://ncurses.scripts.mit.edu/?p=ncurses.git;a=commit;h=eb51b1ea1f75a0ec17c9c5937cb28df1e8eeec56
https://lists.debian.org/debian-lts-announce/2023/12/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LU4MYMKFEZQ5VSCVLRIZGDQOUW3T44GT/
https://security.netapp.com/advisory/ntap-20230517-0009/
https://support.apple.com/kb/HT213843
https://support.apple.com/kb/HT213844
https://support.apple.com/kb/HT213845
jsc#CAR-2558
rh#2191704
CVE-2023-29499glib2:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2023-29499
SMASH Issue 368200
bnc#1211947
https://access.redhat.com/security/cve/CVE-2023-29499
https://gitlab.gnome.org/GNOME/glib/-/issues/2794
https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html
https://security.gentoo.org/glsa/202311-18
https://security.netapp.com/advisory/ntap-20231103-0001/
jsc#CAR-2758
rh#2211828
rh#2211833
CVE-2023-2975openssl:Not affected, openssl-1_1:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)CVE-2023-2975
OSS:2023/07/15/1
OSS:2023/07/19/5
OSS:2023/Q3/39
OSS:2023/Q3/45
SMASH Issue 372553
bnc#1213383
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230725-0004/
https://www.openssl.org/news/secadv/20230714.txt
openssl.git:commit:1e398bec538978b9957e69bf9e12b3c626290bea
openssl.git:commit:c426c281cfc23ab182f7d7d7a35229e7db1494d9
rh#2223016
CVE-2023-2985kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-2985
D:CVE-2023-2985
SMASH Issue 367838
bnc#1211867
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=07db5e247ab5858439b14dd7cc1fe538b9efcf32
jsc#CAR-2664
rh#2211097
CVE-2023-3006kernel-source-rt:Analysismoderate4.8 (CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-3006
SMASH Issue 367972
bnc#1211855
https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/commit/?id=0e5d5ae837c8
linux.git:commit:fc55c23a736cce88f5f975ab93326d25b49ef109
rh#2062284
rh#2141026
CVE-2023-3022kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-3022
RHSA-2022:1975
RHSA-2023:1130
SMASH Issue 368014
bnc#1211906
https://github.com/torvalds/linux/commit/a65120bae4b7
rh#2211440
CVE-2023-30456kernel-source-rt:Won't fixmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L)CVE-2023-30456
D:CVE-2023-30456
SMASH Issue 362849
bnc#1210294
http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.8
https://github.com/torvalds/linux/commit/112e66017bff7f2837030f34c2bc19501e9212d5
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://security.netapp.com/advisory/ntap-20230511-0007/
jsc#CAR-2665
rh#2188468
CVE-2023-30571libarchive:Analysislow3.9 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N)CVE-2023-30571
SMASH Issue 367776
bnc#1211842
https://github.com/libarchive/libarchive/issues/1876
https://groups.google.com/g/libarchive-announce
rh#2210921
CVE-2023-30772kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-30772
SMASH Issue 363510
SMASH Issue 363637
bnc#1210329
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=06615d11cc78162dfd5116efb71f29eb29502d37
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
jsc#CAR-2539
rh#2216121
CVE-2023-3090kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-3090
DSA-5448
DSA-5480
L3:66407
L3:66491
L3:66496
L3:66505
L3:67104
L3:67569
L3:67605
RHSA-2023:4377
RHSA-2023:4378
RHSA-2023:4380
RHSA-2023:4515
RHSA-2023:4516
RHSA-2023:4801
RHSA-2023:4814
RHSA-2023:4815
RHSA-2023:4817
RHSA-2023:4828
RHSA-2023:4829
RHSA-2023:4961
RHSA-2023:4962
RHSA-2023:4967
RHSA-2023:5221
RHSA-2023:5244
RHSA-2023:5255
RHSA-2023:5548
RHSA-2023:5627
SMASH Issue 370835
ZDI-23-900
bnc#1212842
bnc#1212849
bnc#1213727
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e
https://kernel.dance/90cbed5247439a966b645b34eb0a2e037836ea8e
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://security.netapp.com/advisory/ntap-20230731-0002/
https://www.debian.org/security/2023/dsa-5448
https://www.debian.org/security/2023/dsa-5480
jsc#CAR-2718
rh#2217271
rh#2218672
rh#2220892
rh#2221463
CVE-2023-3106kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2023-3106
L3:67931
SMASH Issue 372135
bnc#1213251
https://access.redhat.com/security/cve/CVE-2023-3106
https://github.com/torvalds/linux/commit/1ba5bf993c6a3142e18e68ea6452b347f9cb5635
rh#2221501
CVE-2023-3108kernel-source-rt:Already fixedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-3108
D:CVE-2023-3108
SMASH Issue 371773
bnc#1213195
https://access.redhat.com/security/cve/CVE-2023-3108
https://github.com/torvalds/linux/commit/9399f0c51489ae8c16d6559b82a452fdc1895e91
rh#2221472
CVE-2023-31081kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-31081
D:CVE-2023-31081
SMASH Issue 364288
bnc#1210782
https://lore.kernel.org/all/CA+UBctDXyiosaiR7YNKCs8k0aWu4gU+YutRcnC+TDJkXpHjQag%40mail.gmail.com/
https://lore.kernel.org/all/CA+UBctDXyiosaiR7YNKCs8k0aWu4gU+YutRcnC+TDJkXpHjQag@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20230929-0003/
CVE-2023-31082kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-31082
D:CVE-2023-31082
SMASH Issue 364289
bnc#1210781
https://lore.kernel.org/all/CA+UBctCZok5FSQ=LPRA+A-jocW=L8FuMVZ_7MNqhh483P5yN8A%40mail.gmail.com/
https://lore.kernel.org/all/CA+UBctCZok5FSQ=LPRA+A-jocW=L8FuMVZ_7MNqhh483P5yN8A@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20230929-0003/
rh#2212938
CVE-2023-31083kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-31083
D:CVE-2023-31083
SMASH Issue 364290
bnc#1210780
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9c33663af9ad115f90c076a1828129a3fbadea98
https://lore.kernel.org/all/CA+UBctC3p49aTgzbVgkSZ2+TQcqq4fPDO7yZitFT5uBPDeCO2g%40mail.gmail.com/
https://lore.kernel.org/all/CA+UBctC3p49aTgzbVgkSZ2+TQcqq4fPDO7yZitFT5uBPDeCO2g@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20230929-0003/
jsc#CAR-3006
rh#2213132
CVE-2023-31084kernel-source-rt:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-31084
D:CVE-2023-31084
DSA-5448
DSA-5480
SMASH Issue 364291
bnc#1210783
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b8c75e4a1b325ea0a9433fa8834be97b5836b946
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HIEOLEOURP4BJZMIL7UGGPYRRB44UDN/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AOATNX5UFL7V7W2QDIQKOHFFHYKWFP4W/
https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw%40mail.gmail.com/
https://lore.kernel.org/all/CA+UBctCu7fXn4q41O_3=id1+OdyQ85tZY1x+TkT-6OVBL6KAUw@mail.gmail.com/
https://security.netapp.com/advisory/ntap-20230929-0003/
https://www.debian.org/security/2023/dsa-5448
https://www.debian.org/security/2023/dsa-5480
linux.git:commit:b8c75e4a1b325ea0a9433fa8834be97b5836b946
rh#2213139
CVE-2023-31085kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-31085
D:CVE-2023-31085
L3:67651
SMASH Issue 364292
bnc#1210778
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=017c73a34a661a861712f7cc1393a123e5b2208c
https://lore.kernel.org/all/687864524.118195.1681799447034.JavaMail.zimbra%40nod.at/
https://lore.kernel.org/all/687864524.118195.1681799447034.JavaMail.zimbra@nod.at/
https://security.netapp.com/advisory/ntap-20230929-0003/
jsc#CAR-2961
rh#2213149
CVE-2023-3111kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-3111
DSA-5480
L3:67651
SMASH Issue 368421
bnc#1212051
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://patchwork.kernel.org/project/linux-btrfs/patch/20220721074829.2905233-1-r33s3n6@gmail.com/
https://security.netapp.com/advisory/ntap-20230703-0007/
https://www.debian.org/security/2023/dsa-5480
jsc#CAR-2930
rh#2212513
CVE-2023-3117kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-3117
CVE-2023-3390
D:CVE-2023-3117
DSA-5448
DSA-5461
DSA-5480
DSA-5492
L3:66697
L3:66952
RHSA-2023:4789
RHSA-2023:4888
RHSA-2023:4961
RHSA-2023:4962
RHSA-2023:4967
RHSA-2023:5069
RHSA-2023:5091
RHSA-2023:5093
RHSA-2023:5221
RHSA-2023:5235
RHSA-2023:5238
RHSA-2023:5244
RHSA-2023:5255
SMASH Issue 370938
bnc#1212846
bnc#1212934
bnc#1213245
bnc#1214994
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97
https://kernel.dance/1240eb93f0616b21c675416516ff3d74798fdc97
https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://security.netapp.com/advisory/ntap-20230818-0004/
https://www.debian.org/security/2023/dsa-5448
https://www.debian.org/security/2023/dsa-5461
jsc#CAR-2719
rh#2213260
rh#2218605
rh#2219270
rh#2227020
rh#2231800
CVE-2023-31248kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-31248
DSA-5453
OSS:2023/07/05/2
OSS:2023/Q3/5
RHSA-2023:5069
RHSA-2023:5091
RHSA-2023:5093
RHSA-2023:5575
RHSA-2023:5603
RHSA-2023:5604
SMASH Issue 371263
ZDI-23-899
bnc#1213061
bnc#1213064
http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/
https://lore.kernel.org/netfilter-devel/20230705121627.GC19489@breakpoint.cc/T/
https://security.netapp.com/advisory/ntap-20240201-0001/
https://www.debian.org/security/2023/dsa-5453
rh#2220893
CVE-2023-3141kernel-source-rt:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2023-3141
D:CVE-2023-35825
L3:66852
SMASH Issue 368742
bnc#1211449
bnc#1212129
bnc#1212503
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lore.kernel.org/lkml/CAPDyKFoV9aZObZ5GBm0U_-UVeVkBN_rAG-kH3BKoP4EXdYM4bw@mail.gmail.com/t/
https://security.netapp.com/advisory/ntap-20230706-0004/
jsc#CAR-2669
rh#2213199
rh#2215837
CVE-2023-31436kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-31436
D:CVE-2023-2248
D:CVE-2023-31436
DSA-5402
L3:65968
L3:66431
L3:66432
L3:66491
L3:66496
L3:66505
L3:67104
L3:67994
L3:68106
SMASH Issue 364688
ZDI-24-593
bnc#1210940
bnc#1210988
bnc#1211260
http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.13
https://github.com/torvalds/linux/commit/3037933448f60f9acb705997eae62013ecb81e0d
https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html
https://security.netapp.com/advisory/ntap-20230609-0001/
https://www.debian.org/security/2023/dsa-5402
https://www.spinics.net/lists/stable-commits/msg294885.html
jsc#CAR-2557
linux.git:commit:3e337087c3b5805fe0b8a46ba622a962880b5d64
rh#2192671
rh#2226780
CVE-2023-31437systemd:Won't fix, systemd-mini:Won't fixlow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)CVE-2023-31437
D:CVE-2023-31437
MISC:github.com:CVE-2021-33910
SMASH Issue 369319
bnc#1212353
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
CVE-2023-31438systemd:Won't fix, systemd-mini:Won't fixlow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)CVE-2023-31438
D:CVE-2023-31438
MISC:github.com:CVE-2021-33910
SMASH Issue 369320
bnc#1212354
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28886
CVE-2023-31439systemd:Won't fix, systemd-mini:Won't fixlow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N)CVE-2023-31439
MISC:github.com:CVE-2021-33910
SMASH Issue 369321
bnc#1212355
https://github.com/kastel-security/Journald
https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
https://github.com/systemd/systemd/pull/28885
CVE-2023-31484perl:Already fixedimportant7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)CVE-2023-31484
D:CVE-2023-31484
L3:65805
L3:65970
L3:66174
L3:66175
L3:66435
L3:66493
L3:66504
MISC:github.com:OSS:2023/04/18/14
OSS:2023/04/18/14
OSS:2023/04/29/1
OSS:2023/05/03/3
OSS:2023/05/03/5
OSS:2023/05/07/2
OSS:2023/Q2/106
SMASH Issue 364812
bnc#1210999
bnc#1211123
bnc#1211938
bnc#1212737
bnc#1212738
bnc#1213845
bnc#1214097
bnc#1214113
https://blog.hackeriet.no/perl-http-tiny-insecure-tls-default-affects-cpan-modules/
https://github.com/andk/cpanpm/pull/175
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BM6UW55CNFUTNGD5ZRKGUKKKFDJGMFHL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LEGCEOKFJVBJ2QQ6S2H4NAEWTUERC7SB/
https://metacpan.org/dist/CPAN/changes
https://security.netapp.com/advisory/ntap-20240621-0007/
jsc#CAR-2561
rh#2218667
CVE-2023-3159kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CONFIRM:security.netapp.com:/advisory/ntap-20230113-0008/
CVE-2022-45919
CVE-2023-1077
CVE-2023-3159
D:CVE-2022-45919
DSA-5480
DSA-5492
L3:65449
L3:66178
L3:66431
L3:66432
L3:66463
L3:66491
L3:66496
L3:66505
L3:66852
L3:67104
MISC:lore.kernel.org:CVE-2022-45919
OSS:2023/Q1/126
SMASH Issue 358071
SMASH Issue 368823
ZDI-24-593
bnc#1205803
bnc#1208600
bnc#1208839
bnc#1208912
bnc#1212128
bnc#1212347
bnc#1212744
bnc#1213937
bnc#1214100
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=280a8ab81733da8bc442253c700a52c4c0886ffd
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=7c4a5b89a0b5a57a64b601775b296abf77a9fe97
https://github.com/torvalds/linux/commit/b7c81f80246fac44077166f3e07103affe6db8ff
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lore.kernel.org/linux-media/20221121063308.GA33821%40ubuntu/T/#u
https://security.netapp.com/advisory/ntap-20230511-0002/
jsc#CAR-2403
jsc#CAR-2670
jsc#CAR-2698
linux.git:commit:3e337087c3b5805fe0b8a46ba622a962880b5d64
rh#2150999
rh#2151956
rh#2173436
rh#2179000
rh#2187773
rh#2187931
rh#2192671
rh#2213414
rh#2218672
rh#2226780
CVE-2023-3161kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-3161
L3:66852
RHSA-2023:5603
RHSA-2023:5604
SMASH Issue 368829
bnc#1212154
https://github.com/torvalds/linux/commit/2b09d5d364986f724f17001ccfe4126b9b43a0be
jsc#CAR-2671
rh#2213485
CVE-2023-32001curl:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N)CVE-2023-32001
DSA-5460
OSS:2023/Q3/41
SMASH Issue 372147
SMASH Issue 372148
bnc#1213237
https://hackerone.com/reports/2039870
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BGJ7POX4ATGERTSBFJPW2EQH4Z65PSZJ/
https://www.debian.org/security/2023/dsa-5460
rh#2222604
CVE-2023-3212kernel-source-rt:Not affectedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-3212
DSA-5448
DSA-5480
SMASH Issue 369112
bnc#1212265
https://github.com/torvalds/linux/commit/504a10d9e46bc37b23d0a1ae2f28973c8516e636
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://security.netapp.com/advisory/ntap-20230929-0005/
https://www.debian.org/security/2023/dsa-5448
https://www.debian.org/security/2023/dsa-5480
rh#2214348
CVE-2023-3220kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-3220
SMASH Issue 370020
bnc#1212556
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93340e10b9c5fc86730d149636e0aa8b47bb5a34
rh#2216386
CVE-2023-32233kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-32233
DSA-5402
DSA-5480
DSA-5492
L3:65867
L3:66162
L3:66268
L3:66448
L3:66496
L3:66616
L3:66617
L3:67104
MISC:git.kernel.org:OSS:2023/05/08/4
OSS:2023/05/08/4
OSS:2023/05/15/5
OSS:2023/Q2/133
RHSA-2023:3349
RHSA-2023:3350
RHSA-2023:3351
RHSA-2023:3465
RHSA-2023:3470
RHSA-2023:3490
RHSA-2023:3705
RHSA-2023:3708
RHSA-2023:3723
RHSA-2023:3852
RHSA-2023:3853
RHSA-2023:4125
RHSA-2023:4126
RHSA-2023:4130
RHSA-2023:4145
RHSA-2023:4146
RHSA-2023:4255
RHSA-2023:4256
RHSA-2023:4262
RHSA-2023:4696
RHSA-2023:4699
RHSA-2023:5419
RHSA-2023:5574
RHSA-2023:5621
RHSA-2023:5622
SMASH Issue 364983
SMASH Issue 365249
ZDI-23-547
ZDI-24-593
bnc#1211043
bnc#1211187
bnc#1211475
bnc#1212725
bnc#1213891
bnc#1214105
bnc#1214541
bnc#1214542
http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab
https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab
https://lists.debian.org/debian-lts-announce/2023/06/msg00008.html
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://news.ycombinator.com/item?id=35879660
https://security.netapp.com/advisory/ntap-20230616-0002/
https://www.debian.org/security/2023/dsa-5402
jsc#CAR-2672
linux.git:commit:3e337087c3b5805fe0b8a46ba622a962880b5d64
linux.git:commit:a2f4c143d76b1a47c91ef9bc46907116b111da0b
rh#2151956
rh#2162120
rh#2168297
rh#2173436
rh#2179000
rh#2187773
rh#2187931
rh#2192671
rh#2196105
rh#2196292
rh#2213414
rh#2218672
rh#2226780
CVE-2023-32246kernel-source-rt:Not affectedmoderate ()CVE-2023-32246
SMASH Issue 366976
ZDI-23-694
bnc#1211528
CVE-2023-32247kernel-source-rt:Not affectedimportant ()CVE-2023-32247
SMASH Issue 366975
ZDI-23-695
bnc#1211529
https://access.redhat.com/security/cve/CVE-2023-32247
https://security.netapp.com/advisory/ntap-20230915-0011/
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20478/
rh#2219803
CVE-2023-32248kernel-source-rt:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-32248
SMASH Issue 366974
ZDI-23-696
bnc#1211530
https://access.redhat.com/security/cve/CVE-2023-32248
https://security.netapp.com/advisory/ntap-20230915-0006/
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20479/
rh#2219818
CVE-2023-32249kernel-source-rt:Not affectedmoderate ()CVE-2023-32249
SMASH Issue 366973
ZDI-23-697
bnc#1211531
CVE-2023-32250kernel-source-rt:Not affectedimportant ()CVE-2023-32250
DSA-5448
SMASH Issue 366972
ZDI-23-698
bnc#1211532
https://access.redhat.com/security/cve/CVE-2023-32250
https://security.netapp.com/advisory/ntap-20230824-0004/
https://www.zerodayinitiative.com/advisories/ZDI-23-698/
rh#2208849
CVE-2023-32251kernel-source-rt:Not affectedlow ()CVE-2023-32251
SMASH Issue 366971
ZDI-23-699
bnc#1211533
CVE-2023-32252kernel-source-rt:Not affectedimportant ()CVE-2023-32252
SMASH Issue 366970
ZDI-23-700
bnc#1211534
https://access.redhat.com/security/cve/CVE-2023-32252
https://security.netapp.com/advisory/ntap-20231124-0001/
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20590/
rh#2219815
CVE-2023-32253kernel-source-rt:Not affectedmoderate ()CVE-2023-32253
SMASH Issue 366969
ZDI-23-701
bnc#1211535
CVE-2023-32254kernel-source-rt:Not affectedimportant ()CVE-2023-32254
DSA-5448
SMASH Issue 366968
ZDI-23-702
bnc#1211536
https://access.redhat.com/security/cve/CVE-2023-32254
https://security.netapp.com/advisory/ntap-20230824-0004/
https://www.zerodayinitiative.com/advisories/ZDI-23-702/
rh#2191658
CVE-2023-32255kernel-source-rt:Not affectedmoderate ()CVE-2023-32255
SMASH Issue 366967
ZDI-23-703
bnc#1211537
CVE-2023-32256kernel-source-rt:Not affectedimportant ()CVE-2023-32256
SMASH Issue 366966
ZDI-23-704
bnc#1211538
CVE-2023-32257kernel-source-rt:Not affectedimportant ()CVE-2023-32257
SMASH Issue 366965
ZDI-23-705
bnc#1211539
https://access.redhat.com/security/cve/CVE-2023-32257
https://security.netapp.com/advisory/ntap-20230915-0011/
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20596/
rh#2219806
CVE-2023-32258kernel-source-rt:Not affectedimportant ()CVE-2023-32258
SMASH Issue 366964
ZDI-23-706
bnc#1211540
https://access.redhat.com/security/cve/CVE-2023-32258
https://security.netapp.com/advisory/ntap-20230915-0011/
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20796/
rh#2219809
CVE-2023-32269kernel-source-rt:Ignoremoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-32269
L3:66496
L3:67104
SMASH Issue 365269
bnc#1211186
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.1.11
https://github.com/torvalds/linux/commit/611792920925fb088ddccbe2783c7f92fdfb6b64
jsc#CAR-2673
rh#2210940
CVE-2023-32611glib2:Already fixedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-32611
SMASH Issue 368201
bnc#1211951
https://access.redhat.com/security/cve/CVE-2023-32611
https://gitlab.gnome.org/GNOME/glib/-/issues/2797
https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html
https://security.gentoo.org/glsa/202311-18
https://security.netapp.com/advisory/ntap-20231027-0005/
jsc#CAR-2759
rh#2211829
CVE-2023-32629kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-32629
D:CVE-2023-32629
SMASH Issue 373438
ZDI-23-1009
bnc#1213685
bnc#1213707
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
https://lists.ubuntu.com/archives/kernel-team/2023-July/140920.html
https://ubuntu.com/security/notices/USN-6250-1
https://wiz.io/blog/ubuntu-overlayfs-vulnerability
rh#2229734
CVE-2023-32636glib2:Already fixedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-32636
SMASH Issue 368203
bnc#1211948
https://gitlab.gnome.org/GNOME/glib/-/issues/2841
https://https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835
https://security.netapp.com/advisory/ntap-20231110-0002/
rh#2211827
rh#2211828
rh#2211832
rh#2211833
CVE-2023-32643glib2:Not affectedimportant8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-32643
SMASH Issue 368202
bnc#1211946
https://gitlab.gnome.org/GNOME/glib/-/issues/2840
https://https://discourse.gnome.org/t/multiple-fixes-for-gvariant-normalisation-issues-in-glib/12835
https://security.netapp.com/advisory/ntap-20240426-0005/
rh#2211827
rh#2211828
rh#2211832
rh#2211833
CVE-2023-32665glib2:Already fixedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-32665
SMASH Issue 368199
bnc#1211945
https://access.redhat.com/security/cve/CVE-2023-32665
https://gitlab.gnome.org/GNOME/glib/-/issues/2121
https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html
https://security.gentoo.org/glsa/202311-18
https://security.netapp.com/advisory/ntap-20240426-0006/
jsc#CAR-2757
rh#2211827
rh#2211832
CVE-2023-3268kernel-source-rt:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L)CVE-2023-3268
D:CVE-2023-3268
DSA-5448
DSA-5480
L3:66852
SMASH Issue 369734
bnc#1212502
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lore.kernel.org/lkml/1682238502-1892-1-git-send-email-yangpc@wangsu.com/T/
https://security.netapp.com/advisory/ntap-20230824-0006/
https://www.debian.org/security/2023/dsa-5448
https://www.debian.org/security/2023/dsa-5480
jsc#CAR-2658
rh#2215502
CVE-2023-3269kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H)CVE-2023-3269
D:CVE-2023-3269
DSA-5448
MISC:git.kernel.org:OSS:2023/07/05/1
MLIST:[oss-security] 20190605 Re: CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploit
OSS:2022/02/03/1
OSS:2022/05/15/1
OSS:2023/07/05/1
OSS:2023/07/28/1
OSS:2023/08/25/1
OSS:2023/08/25/4
OSS:2023/Q3/4
SMASH Issue 369589
SMASH Issue 369594
bnc#1212395
bnc#1213760
http://seclists.org/fulldisclosure/2023/Jul/43
https://access.redhat.com/security/cve/CVE-2023-3269
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6AAA64CUPSMBW6XDTXPQJ3KQWYQ4K7L/
https://security.netapp.com/advisory/ntap-20230908-0001/
rh#2165926
rh#2215268
rh#2217523
CVE-2023-3312kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-3312
SMASH Issue 369860
bnc#1212536
https://patchwork.kernel.org/project/linux-pm/patch/20230323174026.950622-1-krzysztof.kozlowski@linaro.org/
https://security.netapp.com/advisory/ntap-20230731-0005/
rh#2215847
CVE-2023-33203kernel-source-rt:Releasedmoderate ()CVE-2023-2483
CVE-2023-33203
SMASH Issue 364941
SMASH Issue 366901
bnc#1210685
bnc#1211037
bnc#1211038
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6b6bc5b8bd2d4ca9e1efa9ae0f98a0b0687ace75
jsc#CAR-2655
rh#2192667
CVE-2023-33250kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-33250
D:CVE-2023-33250
SMASH Issue 367082
bnc#1211597
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=804ca14d04df09bf7924bacc5ad22a4bed80c94f
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dbe245cdf5189e88d680379ed13901356628b650
https://groups.google.com/g/syzkaller/c/G6P9yecsTZ8/m/iiqFVOM9BwAJ
https://lore.kernel.org/linux-iommu/ZDabT%2FuRl%2FjxFhm0%40ip-172-31-85-199.ec2.internal/T/
https://lore.kernel.org/linux-iommu/ZDabT%2FuRl%2FjxFhm0@ip-172-31-85-199.ec2.internal/T/
https://security.netapp.com/advisory/ntap-20230622-0006/
rh#2215758
CVE-2023-33288kernel-source-rt:Releasedmoderate4.8 (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H)CVE-2023-33288
D:CVE-2023-33288
SMASH Issue 367092
bnc#1211590
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.9
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=47c29d69212911f50bdcdd0564b5999a559010d4
https://github.com/torvalds/linux/commit/47c29d69212911f50bdcdd0564b5999a559010d4
https://lore.kernel.org/all/CAHk-=whcaHLNpb7Mu_QX7ABwPgyRyfW-V8=v4Mv0S22fpjY4JQ@mail.gmail.com/
https://lore.kernel.org/lkml/20230309174728.233732-1-zyytlz.wz@163.com/
jsc#CAR-2674
rh#2209244
CVE-2023-3338kernel-source-rt:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-3338
D:CVE-2023-3338
DSA-5480
L3:66432
OSS:2023/Q2/276
SMASH Issue 369945
SMASH Issue 370255
bnc#1212532
https://access.redhat.com/security/cve/CVE-2023-3338
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://security.netapp.com/advisory/ntap-20230824-0005/
https://www.debian.org/security/2023/dsa-5480
rh#2217451
rh#2218618
CVE-2023-3355kernel-source-rt:Not affectedlow1.9 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2023-3355
SMASH Issue 370588
bnc#1212778
https://access.redhat.com/security/cve/CVE-2023-3355
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d839f0811a31322c087a859c2b181e2383daa7be
rh#2217820
CVE-2023-3357kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-3357
D:CVE-2023-3357
SMASH Issue 370120
bnc#1212605
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=53ffa6a9f83b2170c60591da1ead8791d5a42e81
rh#2169482
CVE-2023-3358kernel-source-rt:Already fixedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-3358
D:CVE-2023-3358
SMASH Issue 370119
bnc#1212606
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d40c3ec3dc4ad78017de6c3a38979f57aaaab8
jsc#CAR-2687
rh#2169343
CVE-2023-3359kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-3359
D:CVE-2023-3359
SMASH Issue 370118
bnc#1212608
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b0576ade3aaf24b376ea1a4406ae138e2a22b0c0
rh#2168251
CVE-2023-33595python3:Not affectedmoderate ()CVE-2023-33595
SMASH Issue 368795
bnc#1212127
https://github.com/python/cpython/issues/103824
https://github.com/python/cpython/pull/103993/commits/c120bc2d354ca3d27d0c7a53bf65574ddaabaf3a
CVE-2023-3389kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-3389
DSA-5480
SMASH Issue 370836
bnc#1212838
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=4716c73b188566865bdd79c3a6709696a224ac04
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=0e388fce7aec40992eadee654193cad345d62663
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef7dfac51d8ed961b742218f526bd589f3900a59
https://kernel.dance/0e388fce7aec40992eadee654193cad345d62663
https://kernel.dance/4716c73b188566865bdd79c3a6709696a224ac04
https://kernel.dance/ef7dfac51d8ed961b742218f526bd589f3900a59
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://security.netapp.com/advisory/ntap-20230731-0001/
https://www.debian.org/security/2023/dsa-5480
rh#2218604
CVE-2023-3390kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-3117
CVE-2023-3390
D:CVE-2023-3117
DSA-5448
DSA-5461
DSA-5480
DSA-5492
L3:66697
L3:66952
RHSA-2023:4789
RHSA-2023:4888
RHSA-2023:4961
RHSA-2023:4962
RHSA-2023:4967
RHSA-2023:5069
RHSA-2023:5091
RHSA-2023:5093
RHSA-2023:5221
RHSA-2023:5235
RHSA-2023:5238
RHSA-2023:5244
RHSA-2023:5255
SMASH Issue 370850
SMASH Issue 370938
bnc#1212846
bnc#1212934
bnc#1213245
bnc#1214994
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97
https://kernel.dance/1240eb93f0616b21c675416516ff3d74798fdc97
https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://security.netapp.com/advisory/ntap-20230818-0004/
https://www.debian.org/security/2023/dsa-5448
https://www.debian.org/security/2023/dsa-5461
jsc#CAR-2719
rh#2213260
rh#2218605
rh#2219270
rh#2227020
rh#2231800
CVE-2023-33951kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L)CVE-2023-33951
SMASH Issue 366963
SMASH Issue 367634
ZDI-23-707
bnc#1211593
https://access.redhat.com/errata/RHSA-2023:6583
https://access.redhat.com/errata/RHSA-2023:6901
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-33951
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20110/
rh#2218195
rh#2218212
rh#2245663
CVE-2023-33952kernel-source-rt:Not affectedimportant8.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)CVE-2023-33952
SMASH Issue 366962
SMASH Issue 367633
ZDI-23-708
bnc#1211595
bnc#1212348
https://access.redhat.com/errata/RHSA-2023:6583
https://access.redhat.com/errata/RHSA-2023:6901
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/security/cve/CVE-2023-33952
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20292
rh#2218195
rh#2218212
rh#2245663
CVE-2023-3397kernel-source-rt:Ignoremoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-3397
L3:66407
SMASH Issue 370458
bnc#1212704
bnc#1212935
https://access.redhat.com/security/cve/CVE-2023-3397
https://www.spinics.net/lists/kernel/msg4788636.html
jsc#CAR-2721
rh#2217271
CVE-2023-34255kernel-source-rt:Already fixedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-34255
SMASH Issue 368047
bnc#1211903
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=22ed903eee23a5b174e240f1cdfa9acf393a5210
https://syzkaller.appspot.com/bug?extid=7e9494b8b399902e994e
CVE-2023-34256kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2023-34256
SMASH Issue 368048
bnc#1211895
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.3
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4f04351888a83e595571de672e0a4a8b74f4fb31
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://syzkaller.appspot.com/bug?extid=8785e41224a3afd04321
jsc#CAR-2675
rh#2227263
CVE-2023-34319kernel-source-rt:Releasedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)CVE-2023-34319
DSA-5480
DSA-5492
OSS:2023/Q3/96
SMASH Issue 373186
SMASH Issue 373187
bnc#1213546
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://security.netapp.com/advisory/ntap-20240202-0001/
https://xenbits.xenproject.org/xsa/advisory-432.html
https://xenbits.xenproject.org/xsa/advisory-438.html
jsc#CAR-2808
linux.git:commit:534fc31d09b706a16d83533e16b5dc855caf7576
rh#2230156
CVE-2023-3439kernel-source-rt:Not affectedmoderate ()CVE-2023-3439
D:CVE-2023-3439
MISC:github.com:OSS:2023/Q3/0
OSS:2023/07/02/1
OSS:2023/Q3/0
SMASH Issue 370708
bnc#1212845
https://github.com/torvalds/linux/commit/b561275d633bcd8e0e8055ab86f1a13df75a0269
rh#2217915
CVE-2023-3446openssl:Released, openssl-1_1:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2023-3446
L3:66413
L3:66414
L3:67802
OSS:2023/07/19/4
OSS:2023/07/19/5
OSS:2023/07/19/6
OSS:2023/07/31/1
OSS:2023/09/14/1
OSS:2023/09/22/11
OSS:2023/09/22/9
OSS:2023/11/06/2
OSS:2023/Q3/215
OSS:2023/Q3/44
OSS:2023/Q3/85
OSS:2024/02/08/2
OSS:2024/03/11/1
OSS:2024/05/16/1
OSS:2024/Q1/205
OSS:2024/Q2/243
SMASH Issue 372979
bnc#1213487
bnc#1213735
bnc#1213736
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23
https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3
https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230803-0011/
https://www.openssl.org/news/secadv/20230719.txt
jsc#CAR-2747
openssl.git:commit:1c16253f3c3a8d1e25918c3f404aae6a5b0893de
openssl.git:commit:4b29762802c05fa871f0e1efcf804e86db0ddaa2
openssl.git:commit:4d4657cb6ba364dfa60681948b0a30c40bee31ca
openssl.git:commit:4ec53ad6e1791daafbe26bdbd539f2ba9172959a
openssl.git:commit:9e0094e2aa1b3428a12d5095132f133c078d3c3d
openssl.git:commit:afb19f07aecc84998eeea56c4d65f5e0499abb5a
openssl.git:commit:ede782b4c8868d1f09c9cd237f82b6f35b7dba8b
rh#2224962
rh#2227852
rh#2248616
CVE-2023-34969dbus-1:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-34969
D:CVE-2023-34969
RHSA-2023:4498
RHSA-2023:4569
RHSA-2023:5193
SMASH Issue 368822
bnc#1212126
https://gitlab.freedesktop.org/dbus/dbus/-/issues/457
https://lists.debian.org/debian-lts-announce/2023/10/msg00033.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZYCDRMD7B4XO4HF6C6YTLH4YUD7TANP/
https://security.netapp.com/advisory/ntap-20231208-0007/
jsc#CAR-2676
rh#2213166
CVE-2023-35001kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-35001
DSA-5453
L3:66407
L3:67059
L3:67191
L3:67233
OSS:2023/07/05/3
OSS:2023/Q3/6
RHSA-2023:4961
RHSA-2023:4962
RHSA-2023:4967
RHSA-2023:5069
RHSA-2023:5091
RHSA-2023:5093
RHSA-2023:5221
RHSA-2023:5235
RHSA-2023:5238
RHSA-2023:5244
RHSA-2023:5255
RHSA-2023:5414
RHSA-2023:5548
RHSA-2023:5574
RHSA-2023:5575
RHSA-2023:5603
RHSA-2023:5604
RHSA-2023:5621
RHSA-2023:5622
RHSA-2023:5627
SMASH Issue 371262
ZDI-23-900
bnc#1213059
bnc#1213063
bnc#1216905
http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGZC5XOANA75OJ4XARBBXYSLDKUIJI5E/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UPHI46ROSSLVAV4R5LJWJYU747JGOS6D/
https://lore.kernel.org/netfilter-devel/20230705121515.747251-1-cascardo@canonical.com/T/
https://security.netapp.com/advisory/ntap-20230824-0007/
https://www.debian.org/security/2023/dsa-5453
jsc#CAR-2723
rh#2220892
CVE-2023-3567kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-3567
L3:66407
L3:66432
L3:66730
L3:66852
L3:67174
L3:67191
L3:67233
SMASH Issue 371602
bnc#1213167
bnc#1213244
bnc#1215161
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://access.redhat.com/errata/RHSA-2024:0412
https://access.redhat.com/errata/RHSA-2024:0431
https://access.redhat.com/errata/RHSA-2024:0432
https://access.redhat.com/errata/RHSA-2024:0439
https://access.redhat.com/errata/RHSA-2024:0448
https://access.redhat.com/errata/RHSA-2024:0575
https://access.redhat.com/errata/RHSA-2024:2394
https://access.redhat.com/errata/RHSA-2024:2950
https://access.redhat.com/errata/RHSA-2024:3138
https://access.redhat.com/security/cve/CVE-2023-3567
https://www.spinics.net/lists/stable-commits/msg285184.html
jsc#CAR-2734
rh#2221463
CVE-2023-35788kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H)CVE-2023-35788
DSA-5448
DSA-5480
MISC:git.kernel.org:OSS:2023/06/07/1
OSS:2023/06/07/1
OSS:2023/06/17/1
OSS:2023/Q2/234
RHSA-2023:4377
RHSA-2023:4378
RHSA-2023:4380
RHSA-2023:4515
RHSA-2023:4516
RHSA-2023:4697
RHSA-2023:4698
RHSA-2023:4789
RHSA-2023:4815
RHSA-2023:4817
RHSA-2023:4819
RHSA-2023:4821
RHSA-2023:4829
RHSA-2023:4834
RHSA-2023:4888
RHSA-2023:4961
RHSA-2023:4962
RHSA-2023:4967
RHSA-2023:5221
RHSA-2023:5244
RHSA-2023:5255
RHSA-2023:5575
RHSA-2023:5603
RHSA-2023:5604
SMASH Issue 369796
bnc#1212504
bnc#1212509
http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.7
https://git.kernel.org/linus/4d56304e5827c8cc8cc18c75343d283af7c4825c
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://security.netapp.com/advisory/ntap-20230714-0002/
https://www.debian.org/security/2023/dsa-5448
https://www.debian.org/security/2023/dsa-5480
jsc#CAR-2680
jsc#CAR-2681
rh#2215768
CVE-2023-35823kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-35823
D:CVE-2023-35823
SMASH Issue 369820
bnc#1212494
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30cf57da176cca80f11df0d9b7f71581fe601389
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947@xs4all.nl/
https://lore.kernel.org/lkml/20230318085023.832510-1-zyytlz.wz@163.com/t/
https://security.netapp.com/advisory/ntap-20230803-0002/
rh#2215835
rh#2216007
CVE-2023-35824kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-35824
D:CVE-2023-35824
L3:66852
SMASH Issue 369821
bnc#1212501
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5abda7a16698d4d1f47af1168d8fa2c640116b4a
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lore.kernel.org/all/49bb0b6a-e669-d4e7-d742-a19d2763e947@xs4all.nl/
https://lore.kernel.org/lkml/20230318081506.795147-1-zyytlz.wz@163.com/
https://security.netapp.com/advisory/ntap-20230803-0002/
jsc#CAR-2683
rh#2215836
CVE-2023-35825kernel-source-rt:Ignoremoderate ()CVE-2023-35825
D:CVE-2023-35825
SMASH Issue 369822
bnc#1212503
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63264422785021704c39b38f65a78ab9e4a186d7
https://lore.kernel.org/all/20230523164950.435226211@linuxfoundation.org/
https://lore.kernel.org/lkml/20230501030540.3254928-4-sashal@kernel.org/
rh#2215837
CVE-2023-35826kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-35826
D:CVE-2023-35826
SMASH Issue 369823
bnc#1212505
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=50d0a7aea4809cef87979d4669911276aa23b71f
https://lore.kernel.org/all/a4dafa22-3ee3-dbe1-fd50-fee07883ce1a%40xs4all.nl/
https://lore.kernel.org/all/a4dafa22-3ee3-dbe1-fd50-fee07883ce1a@xs4all.nl/
https://lore.kernel.org/linux-arm-kernel/20230308032333.1893394-1-zyytlz.wz%40163.com/T/
https://lore.kernel.org/linux-arm-kernel/20230308032333.1893394-1-zyytlz.wz@163.com/T/
https://security.netapp.com/advisory/ntap-20230803-0002/
rh#2215838
CVE-2023-35827kernel-source-rt:Not affectedmoderate ()CVE-2023-35827
D:CVE-2023-35827
L3:68095
L3:68137
SMASH Issue 369824
bnc#1212514
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
https://lore.kernel.org/lkml/cca0b40b-d6f8-54c7-1e46-83cb62d0a2f1%40huawei.com/T/
https://lore.kernel.org/lkml/cca0b40b-d6f8-54c7-1e46-83cb62d0a2f1@huawei.com/T/
https://security.netapp.com/advisory/ntap-20230803-0003/
https://www.spinics.net/lists/netdev/msg886947.html
rh#2215840
CVE-2023-35828kernel-source-rt:Already fixedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-35828
D:CVE-2023-35828
SMASH Issue 369825
bnc#1212513
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2b947f8769be8b8181dc795fd292d3e7120f5204
https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html
https://lore.kernel.org/all/20230327121700.52d881e0%40canb.auug.org.au/
https://lore.kernel.org/all/20230327121700.52d881e0@canb.auug.org.au/
https://lore.kernel.org/lkml/CAJedcCwkuznS1kSTvJXhzPoavcZDWNhNMshi-Ux0spSVRwU=RA%40mail.gmail.com/T/
https://lore.kernel.org/lkml/CAJedcCwkuznS1kSTvJXhzPoavcZDWNhNMshi-Ux0spSVRwU=RA@mail.gmail.com/T/
https://security.netapp.com/advisory/ntap-20230803-0002/
jsc#CAR-2682
rh#2215839
CVE-2023-35829kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-35829
D:CVE-2023-35829
SMASH Issue 369826
bnc#1212495
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3228cec23b8b29215e18090c6ba635840190993d
https://lore.kernel.org/all/a4dafa22-3ee3-dbe1-fd50-fee07883ce1a%40xs4all.nl/
https://lore.kernel.org/all/a4dafa22-3ee3-dbe1-fd50-fee07883ce1a@xs4all.nl/
https://lore.kernel.org/lkml/20230307173900.1299387-1-zyytlz.wz%40163.com/T/
https://lore.kernel.org/lkml/20230307173900.1299387-1-zyytlz.wz@163.com/T/
https://security.netapp.com/advisory/ntap-20230803-0002/
rh#2215841
CVE-2023-35945nghttp2:Ignoreimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-35945
DSA-5570
L3:67207
L3:67577
L3:67609
RHSA-2023:4624
RHSA-2023:4625
RHSA-2023:5175
SMASH Issue 372438
bnc#1215713
bnc#1217560
bnc#1219707
https://github.com/envoyproxy/envoy/security/advisories/GHSA-jfxv-29pc-x22r
https://github.com/nghttp2/nghttp2/blob/e7f59406556c80904b81b593d38508591bb7523a/lib/nghttp2_session.c#L3346
jsc#CAR-2915
rh#2217983
rh#2242803
rh#2243296
rh#2243877
rh#2253521
rh#2279365
CVE-2023-3609kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-3609
DSA-5480
L3:67174
L3:67191
RHSA-2023:5574
RHSA-2023:5621
RHSA-2023:5622
RHSA-2023:5628
SMASH Issue 373241
bnc#1213586
bnc#1213587
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=04c55383fa5689357bcdd2c8036725a55ed632bc
https://kernel.dance/04c55383fa5689357bcdd2c8036725a55ed632bc
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://security.netapp.com/advisory/ntap-20230818-0005/
https://www.debian.org/security/2023/dsa-5480
jsc#CAR-2763
rh#2225201
CVE-2023-3610kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-3610
DSA-5461
RHSA-2023:5069
RHSA-2023:5091
RHSA-2023:5093
SMASH Issue 373242
bnc#1213580
bnc#1213584
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=4bedf9eee016286c835e3d8fa981ddece5338795
https://kernel.dance/4bedf9eee016286c835e3d8fa981ddece5338795
https://lists.debian.org/debian-lts-announce/2023/08/msg00001.html
https://security.netapp.com/advisory/ntap-20230818-0005/
https://www.debian.org/security/2023/dsa-5461
rh#2225198
CVE-2023-3611kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-3611
DSA-5480
DSA-5492
L3:67994
L3:68063
SMASH Issue 373243
bnc#1213585
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64
https://kernel.dance/3e337087c3b5805fe0b8a46ba622a962880b5d64
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://security.netapp.com/advisory/ntap-20230908-0002/
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
jsc#CAR-2764
rh#2225191
CVE-2023-36191sqlite3:Won't fixlow0 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N)CVE-2023-36191
D:CVE-2023-36191
L3:66557
SMASH Issue 370250
bnc#1212643
bnc#1214320
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KREKCQTJDVI2AEBG5ECZPSOQXIC2L5XL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH/
https://www.sqlite.org/forum/forumpost/19f55ef73b
jsc#CAR-2696
rh#2216936
CVE-2023-3640kernel-source-rt:Won't fixmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-3640
OSS:2023/07/28/1
SMASH Issue 372250
bnc#1213271
https://access.redhat.com/security/cve/CVE-2023-3640
rh#2165926
rh#2217523
CVE-2023-36632python3:Won't fixlow3.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2023-36632
D:CVE-2023-36632
SMASH Issue 370459
bnc#1212717
https://docs.python.org/3/library/email.html
https://docs.python.org/3/library/email.utils.html
https://github.com/Daybreak2019/PoC_python3.9_Vul/blob/main/RecursionError-email.utils.parseaddr.py
https://github.com/python/cpython/issues/103800
jsc#CAR-2697
rh#2217338
CVE-2023-36660libnettle:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2023-36660
D:CVE-2023-36660
SMASH Issue 368752
SMASH Issue 370462
bnc#1212112
bnc#1212708
https://git.lysator.liu.se/nettle/nettle/-/commit/867a4548b95705291a3afdd66d76e7f17ba2618f
https://git.lysator.liu.se/nettle/nettle/-/compare/nettle_3.9_release_20230514...nettle_3.9.1_release_20230601
https://security.gentoo.org/glsa/202401-24
rh#2217430
CVE-2023-37453kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-37453
SMASH Issue 371496
bnc#1213123
bnc#1226474
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=1e4c574225cc5a0553115e5eb5787d1474db5b0f
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=85d07c55621676d47d873d2749b88f783cd4d5a1
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=de28e469da75359a2bb8cd8778b78aa64b1be1f4
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ff33299ec8bb80cdcc073ad9c506bd79bb2ed20b
https://lore.kernel.org/all/000000000000c0ffe505fe86c9ca%40google.com/T/
https://lore.kernel.org/all/000000000000c0ffe505fe86c9ca@google.com/T/
https://lore.kernel.org/all/000000000000e56434059580f86e%40google.com/T/
https://lore.kernel.org/all/000000000000e56434059580f86e@google.com/T/
https://syzkaller.appspot.com/bug?extid=18996170f8096c6174d0
rh#2221039
CVE-2023-37454kernel-source-rt:Analysismoderate ()CVE-2023-37454
SMASH Issue 371497
bnc#1213122
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-37454
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6f861765464f43a71462d52026fbddfc858239a5
https://lore.kernel.org/all/00000000000056e02f05dfb6e11a%40google.com/T/
https://lore.kernel.org/all/00000000000056e02f05dfb6e11a@google.com/T/
https://syzkaller.appspot.com/bug?extid=26873a72980f8fa8bc55
https://syzkaller.appspot.com/bug?extid=60864ed35b1073540d57
https://syzkaller.appspot.com/bug?extid=61564e5023b7229ec85d
rh#2221038
CVE-2023-3772kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-3772
DSA-5492
OSS:2023/08/10/1
OSS:2023/08/10/3
OSS:2023/Q3/103
SMASH Issue 373392
bnc#1213666
https://access.redhat.com/errata/RHSA-2023:6583
https://access.redhat.com/errata/RHSA-2023:6901
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/errata/RHSA-2024:0412
https://access.redhat.com/errata/RHSA-2024:0575
https://access.redhat.com/security/cve/CVE-2023-3772
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://www.debian.org/security/2023/dsa-5492
jsc#CAR-2769
linux.git:commit:00374d9b6d9f932802b55181be9831aa948e5b7c
rh#2218943
CVE-2023-3773kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-3773
DSA-5492
SMASH Issue 373393
bnc#1213667
https://access.redhat.com/security/cve/CVE-2023-3773
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://www.debian.org/security/2023/dsa-5492
linux.git:commit:55cef78c244d0d076f5a75a35530ca63c92f4426
linux.git:commit:5d6ba607d6cb5c58a4ddf33381e18c83dbb4098f
linux.git:commit:5e2424708da7207087934c5c75211e8584d553a0
linux.git:commit:79c8651587504ba263d2fd67fd4406240fb21f69
linux.git:commit:b3003e1b54e057f5f3124e437b80c3bef26ed3fe
rh#2218944
CVE-2023-3776kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-3776
DSA-5480
DSA-5492
L3:66812
L3:66852
L3:67174
L3:67191
L3:67233
L3:67846
L3:67866
L3:67994
L3:68063
RHSA-2023:5069
RHSA-2023:5091
RHSA-2023:5093
RHSA-2023:5221
RHSA-2023:5244
RHSA-2023:5255
RHSA-2023:5628
SMASH Issue 373244
bnc#1213588
bnc#1215119
bnc#1215450
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f
https://kernel.dance/0323bce598eea038714f941ce2b22541c46d488f
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://security.netapp.com/advisory/ntap-20240202-0003/
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
jsc#CAR-2765
rh#2225097
rh#2225511
rh#2237757
rh#2237760
rh#2237894
rh#2237901
rh#2237902
rh#2245514
rh#2261965
CVE-2023-3777kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-3777
DSA-5492
SMASH Issue 377512
bnc#1215095
bnc#1215097
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8
https://kernel.dance/6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8
https://www.debian.org/security/2023/dsa-5492
rh#2237750
CVE-2023-38039curl:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-38039
L3:67171
OSS:2023/Q3/175
SMASH Issue 377440
SMASH Issue 377441
bnc#1215026
bnc#1217439
http://seclists.org/fulldisclosure/2023/Oct/17
http://seclists.org/fulldisclosure/2024/Jan/34
http://seclists.org/fulldisclosure/2024/Jan/37
http://seclists.org/fulldisclosure/2024/Jan/38
https://hackerone.com/reports/2072338
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/
https://security.gentoo.org/glsa/202310-12
https://security.netapp.com/advisory/ntap-20231013-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214057
https://support.apple.com/kb/HT214058
https://support.apple.com/kb/HT214063
https://www.insyde.com/security-pledge/SA-2023064
jsc#CAR-2866
rh#2239135
CVE-2023-3812kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-3812
L3:67174
L3:67191
SMASH Issue 373089
bnc#1213543
bnc#1213706
https://access.redhat.com/errata/RHSA-2023:6799
https://access.redhat.com/errata/RHSA-2023:6813
https://access.redhat.com/errata/RHSA-2023:7370
https://access.redhat.com/errata/RHSA-2023:7379
https://access.redhat.com/errata/RHSA-2023:7382
https://access.redhat.com/errata/RHSA-2023:7389
https://access.redhat.com/errata/RHSA-2023:7411
https://access.redhat.com/errata/RHSA-2023:7418
https://access.redhat.com/errata/RHSA-2023:7548
https://access.redhat.com/errata/RHSA-2023:7549
https://access.redhat.com/errata/RHSA-2023:7554
https://access.redhat.com/errata/RHSA-2024:0340
https://access.redhat.com/errata/RHSA-2024:0378
https://access.redhat.com/errata/RHSA-2024:0412
https://access.redhat.com/errata/RHSA-2024:0461
https://access.redhat.com/errata/RHSA-2024:0554
https://access.redhat.com/errata/RHSA-2024:0562
https://access.redhat.com/errata/RHSA-2024:0563
https://access.redhat.com/errata/RHSA-2024:0575
https://access.redhat.com/errata/RHSA-2024:0593
https://access.redhat.com/errata/RHSA-2024:1961
https://access.redhat.com/errata/RHSA-2024:2006
https://access.redhat.com/errata/RHSA-2024:2008
https://access.redhat.com/security/cve/CVE-2023-3812
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=363a5328f4b0
jsc#CAR-2761
rh#2224048
CVE-2023-3817openssl:Released, openssl-1_1:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2023-3817
OSS:2023/07/31/1
OSS:2023/09/14/1
OSS:2023/09/22/11
OSS:2023/09/22/9
OSS:2023/11/06/2
OSS:2023/Q3/215
OSS:2023/Q3/85
OSS:2024/02/08/2
OSS:2024/03/11/1
OSS:2024/05/16/1
OSS:2024/Q1/205
OSS:2024/Q2/243
SMASH Issue 373803
bnc#1213853
http://seclists.org/fulldisclosure/2023/Jul/43
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5
https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3
https://lists.debian.org/debian-lts-announce/2023/08/msg00019.html
https://security.gentoo.org/glsa/202402-08
https://security.netapp.com/advisory/ntap-20230818-0014/
https://security.netapp.com/advisory/ntap-20231027-0008/
https://security.netapp.com/advisory/ntap-20240621-0006/
https://www.openssl.org/news/secadv/20230731.txt
jsc#CAR-2778
openssl.git:commit:1c16253f3c3a8d1e25918c3f404aae6a5b0893de
openssl.git:commit:4b29762802c05fa871f0e1efcf804e86db0ddaa2
openssl.git:commit:4d4657cb6ba364dfa60681948b0a30c40bee31ca
openssl.git:commit:4ec53ad6e1791daafbe26bdbd539f2ba9172959a
openssl.git:commit:9e0094e2aa1b3428a12d5095132f133c078d3c3d
openssl.git:commit:afb19f07aecc84998eeea56c4d65f5e0499abb5a
openssl.git:commit:ede782b4c8868d1f09c9cd237f82b6f35b7dba8b
rh#2224962
rh#2227852
rh#2248616
CVE-2023-38325python-cryptography:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-38325
SMASH Issue 372583
bnc#1213378
https://github.com/pyca/cryptography/compare/41.0.1...41.0.2
https://github.com/pyca/cryptography/issues/9207
https://github.com/pyca/cryptography/pull/9208
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NMCCTYY3CSNQBFFYYC5DAV6KATHWCUZK/
https://pypi.org/project/cryptography/#history
https://security.netapp.com/advisory/ntap-20230824-0010/
rh#2231271
CVE-2023-38408openssh:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-38408
D:CVE-2023-38408
L3:66353
L3:66396
L3:66408
L3:66440
L3:66460
L3:66495
L3:66564
L3:66682
L3:67067
L3:67097
L3:67098
L3:67473
L3:67527
L3:68028
MISC:bugs.chromium.org:CVE-2016-10009
MISC:bugs.chromium.org:OSS:2023/07/19/9
MISC:www.openssh.com:CVE-2020-15778
MISC:www.qualys.com:MISC:www.openwall.com:CVE-2021-33909
OSS:2023/07/19/9
OSS:2023/07/20/1
OSS:2023/07/20/2
OSS:2023/09/14/1
OSS:2023/09/22/11
OSS:2023/09/22/9
OSS:2023/Q3/215
OSS:2023/Q3/49
RHSA-2023:4329
RHSA-2023:4381
RHSA-2023:4382
RHSA-2023:4383
RHSA-2023:4384
RHSA-2023:4412
RHSA-2023:4413
RHSA-2023:4419
RHSA-2023:4428
RHSA-2023:4889
SMASH Issue 372998
bnc#1213504
bnc#1213536
bnc#1213703
bnc#1213728
bnc#1213850
bnc#1213924
bnc#1214095
bnc#1214345
bnc#1214843
bnc#1216874
http://packetstormsecurity.com/files/173661/OpenSSH-Forwarded-SSH-Agent-Remote-Code-Execution.html
https://blog.qualys.com/vulnerabilities-threat-research/2023/07/19/cve-2023-38408-remote-code-execution-in-opensshs-forwarded-ssh-agent
https://github.com/openbsd/src/commit/7bc29a9d5cd697290aa056e94ecee6253d3425f8
https://github.com/openbsd/src/commit/f03a4faa55c4ce0818324701dadbf91988d7351d
https://github.com/openbsd/src/commit/f8f5a6b003981bb824329dc987d101977beda7ca
https://lists.debian.org/debian-lts-announce/2023/08/msg00021.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CEBTJJINE2I3FHAUKKNQWMFGYMLSMWKQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RAXVQS6ZYTULFAK3TEJHRLKZALJS3AOU/
https://news.ycombinator.com/item?id=36790196
https://security.gentoo.org/glsa/202307-01
https://security.netapp.com/advisory/ntap-20230803-0010/
https://support.apple.com/kb/HT213940
https://www.openssh.com/txt/release-9.3p2
https://www.qualys.com/2023/07/19/cve-2023-38408/rce-openssh-forwarded-ssh-agent.txt
https://www.vicarius.io/vsociety/posts/exploring-opensshs-agent-forwarding-rce-cve-2023-38408
jsc#CAR-2749
rh#2224173
CVE-2023-38409kernel-source-rt:Not affectedlow2.9 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2023-38409
D:CVE-2023-38409
SMASH Issue 372746
bnc#1213417
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.12
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=fffb0b52d5258554c645c966c6cbef7de50b851d
rh#2230042
CVE-2023-38426kernel-source-rt:Not affectedcritical ()CVE-2023-38426
D:CVE-2023-38426
SMASH Issue 372752
bnc#1213421
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/ksmbd?id=02f76c401d17e409ed45bf7887148fcc22c93c85
https://security.netapp.com/advisory/ntap-20230915-0010/
CVE-2023-38427kernel-source-rt:Not affectedcritical ()CVE-2023-38427
D:CVE-2023-38427
SMASH Issue 372753
bnc#1213422
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=f1a411873c85b642f13b01f21b534c2bab81fc1b
https://security.netapp.com/advisory/ntap-20230824-0011/
rh#2239898
CVE-2023-38428kernel-source-rt:Not affectedcritical ()CVE-2023-38428
D:CVE-2023-38428
SMASH Issue 372754
bnc#1213423
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/ksmbd?id=f0a96d1aafd8964e1f9955c830a3e5cb3c60a90f
https://security.netapp.com/advisory/ntap-20230831-0001/
CVE-2023-38429kernel-source-rt:Not affectedcritical ()CVE-2023-38429
D:CVE-2023-38429
SMASH Issue 372755
bnc#1213424
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.4
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/ksmbd?id=443d61d1fa9faa60ef925513d83742902390100f
CVE-2023-38430kernel-source-rt:Not affectedcritical ()CVE-2023-38430
D:CVE-2023-38430
SMASH Issue 372756
bnc#1213425
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=1c1bcf2d3ea061613119b534f57507c377df20f9
https://security.netapp.com/advisory/ntap-20230831-0003/
CVE-2023-38431kernel-source-rt:Not affectedcritical ()CVE-2023-38431
D:CVE-2023-38431
SMASH Issue 372757
bnc#1213426
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=368ba06881c395f1c9a7ba22203cf8d78b4addc0
https://security.netapp.com/advisory/ntap-20230824-0011/
CVE-2023-38432kernel-source-rt:Not affectedcritical ()CVE-2023-38432
D:CVE-2023-38432
SMASH Issue 372758
bnc#1213427
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.10
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/smb/server?id=2b9b8f3b68edb3d67d79962f02e26dbb5ae3808d
https://security.netapp.com/advisory/ntap-20230831-0002/
rh#2243624
CVE-2023-38545curl:Not affectedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2023-38545
DSA-5523
OSS:2023/Q4/80
Oracle:CVE-2023-38545
SMASH Issue 380621
SMASH Issue 380622
bnc#1215888
http://seclists.org/fulldisclosure/2024/Jan/34
http://seclists.org/fulldisclosure/2024/Jan/37
http://seclists.org/fulldisclosure/2024/Jan/38
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
https://security.netapp.com/advisory/ntap-20231027-0009/
https://security.netapp.com/advisory/ntap-20240201-0005/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214057
https://support.apple.com/kb/HT214058
https://support.apple.com/kb/HT214063
https://www.secpod.com/blog/high-severity-heap-buffer-overflow-vulnerability/
rh#2241933
CVE-2023-38546curl:Releasedmoderate4.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2023-38546
DSA-5523
OSS:2023/Q4/81
SMASH Issue 380623
SMASH Issue 380624
bnc#1215889
http://seclists.org/fulldisclosure/2024/Jan/34
http://seclists.org/fulldisclosure/2024/Jan/37
http://seclists.org/fulldisclosure/2024/Jan/38
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OGMXNRNSJ4ETDK6FRNU3J7SABXPWCHSQ/
https://support.apple.com/kb/HT214036
https://support.apple.com/kb/HT214057
https://support.apple.com/kb/HT214058
https://support.apple.com/kb/HT214063
jsc#CAR-2934
rh#2241938
CVE-2023-3863kernel-source-rt:Releasedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2023-3863
DSA-5480
DSA-5492
L3:66812
L3:67174
L3:67191
L3:67233
L3:67569
L3:67608
SMASH Issue 373296
bnc#1213601
bnc#1213603
https://access.redhat.com/security/cve/CVE-2023-3863
https://github.com/torvalds/linux/commit/6709d4b7bc2e079241fdef15d1160581c5261c10
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://security.netapp.com/advisory/ntap-20240202-0002/
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
jsc#CAR-2766
rh#2225126
CVE-2023-3865kernel-source-rt:Not affectedimportant7.1 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:H)CVE-2023-3865
SMASH Issue 373725
ZDI-23-980
bnc#1213813
CVE-2023-3866kernel-source-rt:Not affectedmoderate ()CVE-2023-3866
SMASH Issue 373726
ZDI-23-979
bnc#1213814
CVE-2023-38851file:Ignoremoderate ()CVE-2023-38851
SMASH Issue 375448
bnc#1214308
https://github.com/libxls/libxls/issues/124
rh#2236660
CVE-2023-38852file:Analysismoderate ()CVE-2023-38852
SMASH Issue 375449
bnc#1214309
https://github.com/libxls/libxls/issues/124
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JQYGEBDBCOWBRHOW44BSSRADUOZBXHUE/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YHBUPYF2NX34HNAWZ3WYHKWU3KWVQUSV/
rh#2232479
CVE-2023-38853file:Analysismoderate ()CVE-2023-38853
SMASH Issue 375450
bnc#1214310
https://github.com/libxls/libxls/issues/124
rh#2236661
CVE-2023-38854file:Analysismoderate ()CVE-2023-38854
SMASH Issue 375451
bnc#1214311
https://github.com/libxls/libxls/issues/124
rh#2236662
CVE-2023-38855file:Analysismoderate ()CVE-2023-38855
SMASH Issue 375452
bnc#1214312
https://github.com/libxls/libxls/issues/124
rh#2236663
CVE-2023-38856file:Analysismoderate ()CVE-2023-38856
SMASH Issue 375453
bnc#1214313
https://github.com/libxls/libxls/issues/124
rh#2236664
CVE-2023-39176kernel-source-rt:Not affectedmoderate5.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N)CVE-2023-39176
SMASH Issue 410023
ZDI-24-586
bnc#1226176
CVE-2023-39179kernel-source-rt:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:L)CVE-2023-39179
SMASH Issue 410021
ZDI-24-588
bnc#1226180
CVE-2023-39180kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:L)CVE-2023-39180
SMASH Issue 410020
ZDI-24-589
bnc#1226179
CVE-2023-39189kernel-source-rt:Releasedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)CVE-2023-39189
L3:67651
SMASH Issue 381121
ZDI-24-592
bnc#1216046
https://access.redhat.com/errata/RHSA-2024:2394
https://access.redhat.com/errata/RHSA-2024:2950
https://access.redhat.com/errata/RHSA-2024:3138
https://access.redhat.com/security/cve/CVE-2023-39189
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-2929
rh#2226777
CVE-2023-39190kernel-source-rt:Not affectedlow ()CVE-2023-39190
SMASH Issue 373697
ZDI-24-593
bnc#1216056
linux.git:commit:3e337087c3b5805fe0b8a46ba622a962880b5d64
rh#2192671
rh#2226780
CVE-2023-39191kernel-source-rt:Not affectedimportant8.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)CVE-2023-39191
SMASH Issue 380410
ZDI-23-1489
bnc#1215863
bnc#1215887
https://access.redhat.com/errata/RHSA-2023:6583
https://access.redhat.com/errata/RHSA-2024:0381
https://access.redhat.com/errata/RHSA-2024:0439
https://access.redhat.com/errata/RHSA-2024:0448
https://access.redhat.com/security/cve/CVE-2023-39191
https://www.zerodayinitiative.com/advisories/ZDI-CAN-19399/
rh#2226783
CVE-2023-39192kernel-source-rt:Releasedmoderate6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H)CVE-2023-39192
L3:67651
SMASH Issue 380409
ZDI-23-1490
bnc#1215858
https://access.redhat.com/errata/RHSA-2024:2950
https://access.redhat.com/errata/RHSA-2024:3138
https://access.redhat.com/security/cve/CVE-2023-39192
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://www.zerodayinitiative.com/advisories/ZDI-CAN-18408/
jsc#CAR-2926
rh#2226784
CVE-2023-39193kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L)CVE-2023-39193
L3:67651
SMASH Issue 380408
ZDI-23-1491
ZDI-23-1492
bnc#1215860
bnc#1215861
https://access.redhat.com/errata/RHSA-2024:2394
https://access.redhat.com/errata/RHSA-2024:2950
https://access.redhat.com/errata/RHSA-2024:3138
https://access.redhat.com/security/cve/CVE-2023-39193
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://www.zerodayinitiative.com/advisories/ZDI-CAN-18866/
jsc#CAR-2924
rh#2226787
rh#2226788
CVE-2023-39194kernel-source-rt:Releasedlow3.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N)CVE-2023-39194
SMASH Issue 380572
ZDI-23-1491
ZDI-23-1492
bnc#1215861
https://access.redhat.com/errata/RHSA-2024:2394
https://access.redhat.com/errata/RHSA-2024:2950
https://access.redhat.com/errata/RHSA-2024:3138
https://access.redhat.com/security/cve/CVE-2023-39194
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://www.zerodayinitiative.com/advisories/ZDI-CAN-18111/
jsc#CAR-2925
rh#2226787
rh#2226788
CVE-2023-39197kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N)CVE-2023-39197
L3:67651
SMASH Issue 384393
bnc#1216976
https://access.redhat.com/security/cve/CVE-2023-39197
rh#2218342
CVE-2023-39198kernel-source-rt:Releasedimportant7.5 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)CVE-2023-39198
L3:67569
L3:67607
SMASH Issue 384365
bnc#1216965
bnc#1217116
https://access.redhat.com/errata/RHSA-2024:2394
https://access.redhat.com/errata/RHSA-2024:2950
https://access.redhat.com/errata/RHSA-2024:3138
https://access.redhat.com/security/cve/CVE-2023-39198
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-2984
rh#2218332
CVE-2023-39615libxml2:Releasedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2023-39615
SMASH Issue 376613
bnc#1214768
https://gitlab.gnome.org/GNOME/libxml2/-/issues/535
jsc#CAR-2842
rh#2235864
CVE-2023-39810busybox:Analysismoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L)CVE-2023-39810
SMASH Issue 376554
bnc#1214733
http://busybox.com
https://www.pentagrid.ch/en/blog/busybox-cpio-directory-traversal-vulnerability/
rh#2235824
CVE-2023-4004kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-4004
DSA-5480
DSA-5492
RHSA-2023:4961
RHSA-2023:4962
RHSA-2023:4967
RHSA-2023:5069
RHSA-2023:5091
RHSA-2023:5093
RHSA-2023:5221
RHSA-2023:5244
RHSA-2023:5255
RHSA-2023:5548
RHSA-2023:5627
SMASH Issue 373771
bnc#1213812
bnc#1214812
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://access.redhat.com/errata/RHSA-2023:4961
https://access.redhat.com/errata/RHSA-2023:4962
https://access.redhat.com/errata/RHSA-2023:4967
https://access.redhat.com/errata/RHSA-2023:5069
https://access.redhat.com/errata/RHSA-2023:5091
https://access.redhat.com/errata/RHSA-2023:5093
https://access.redhat.com/errata/RHSA-2023:5221
https://access.redhat.com/errata/RHSA-2023:5244
https://access.redhat.com/errata/RHSA-2023:5255
https://access.redhat.com/errata/RHSA-2023:5548
https://access.redhat.com/errata/RHSA-2023:5627
https://access.redhat.com/errata/RHSA-2023:7382
https://access.redhat.com/errata/RHSA-2023:7389
https://access.redhat.com/errata/RHSA-2023:7411
https://access.redhat.com/errata/RHSA-2023:7417
https://access.redhat.com/errata/RHSA-2023:7431
https://access.redhat.com/errata/RHSA-2023:7434
https://access.redhat.com/security/cve/CVE-2023-4004
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://patchwork.ozlabs.org/project/netfilter-devel/patch/20230719190824.21196-1-fw@strlen.de/
https://security.netapp.com/advisory/ntap-20231027-0001/
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
rh#2225275
CVE-2023-4010kernel-source-rt:Analysismoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-4010
SMASH Issue 373859
bnc#1214030
https://access.redhat.com/security/cve/CVE-2023-4010
https://github.com/wanrenmi/a-usb-kernel-bug
rh#2227726
CVE-2023-4015kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-4015
DSA-5492
SMASH Issue 377513
bnc#1215104
bnc#1215106
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0a771f7b266b02d262900c75f1e175c7fe76fec2
https://kernel.dance/0a771f7b266b02d262900c75f1e175c7fe76fec2
https://www.debian.org/security/2023/dsa-5492
rh#2237752
CVE-2023-4016procps:Releasedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2023-4016
L3:67181
SMASH Issue 373963
bnc#1214290
bnc#1217469
https://gitlab.com/procps-ng/procps
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUETRRT24OFGPYK6ACPM5VUGHNKH5CQ5/
jsc#CAR-2833
rh#2228494
CVE-2023-40283kernel-source-rt:Releasedmoderate5.7 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2023-40283
DSA-5480
DSA-5492
L3:66697
SMASH Issue 375226
bnc#1214233
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.10
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1728137b33c00d5a2b5110ed7aafb42e7c32e4a1
https://github.com/torvalds/linux/commit/1728137b33c00d5a2b5110ed7aafb42e7c32e4a1
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://security.netapp.com/advisory/ntap-20231020-0007/
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
jsc#CAR-2807
rh#2231800
CVE-2023-4039gcc:Released, gcc7:Releasedimportant8.1 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2023-4039
SMASH Issue 374459
SMASH Issue 374460
bnc#1214052
https://developer.arm.com/Arm%20Security%20Center/GCC%20Stack%20Protector%20Vulnerability%20AArch64
https://github.com/metaredteam/external-disclosures/security/advisories/GHSA-x7ch-h5rf-w2mf
jsc#CAR-2900
jsc#CAR-2906
rh#2233236
CVE-2023-40791kernel-source-rt:Not affectedmoderate ()CVE-2023-40791
SMASH Issue 381907
bnc#1216255
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f443fd5af5dbd531f880d3645d5dd36976cf087f
https://lkml.org/lkml/2023/8/3/323
https://lore.kernel.org/linux-crypto/20571.1690369076%40warthog.procyon.org.uk/
https://lore.kernel.org/linux-crypto/20571.1690369076@warthog.procyon.org.uk/
https://security.netapp.com/advisory/ntap-20231110-0009/
rh#2244712
CVE-2023-4128kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-4128
DSA-5480
DSA-5492
L3:67138
RHSA-2023:5235
RHSA-2023:5238
RHSA-2023:5548
RHSA-2023:5575
RHSA-2023:5580
RHSA-2023:5588
RHSA-2023:5589
RHSA-2023:5603
RHSA-2023:5604
RHSA-2023:5627
RHSA-2023:5628
SMASH Issue 374906
bnc#1214149
bnc#1215113
bnc#1217283
http://packetstormsecurity.com/files/175072/Kernel-Live-Patch-Security-Notice-LSN-0098-1.html
https://access.redhat.com/errata/RHSA-2023:5235
https://access.redhat.com/errata/RHSA-2023:5238
https://access.redhat.com/errata/RHSA-2023:5548
https://access.redhat.com/errata/RHSA-2023:5575
https://access.redhat.com/errata/RHSA-2023:5580
https://access.redhat.com/errata/RHSA-2023:5588
https://access.redhat.com/errata/RHSA-2023:5589
https://access.redhat.com/errata/RHSA-2023:5603
https://access.redhat.com/errata/RHSA-2023:5604
https://access.redhat.com/errata/RHSA-2023:5627
https://access.redhat.com/errata/RHSA-2023:5628
https://access.redhat.com/errata/RHSA-2023:5775
https://access.redhat.com/errata/RHSA-2023:5794
https://access.redhat.com/security/cve/CVE-2023-4128
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8
https://kernel.dance/3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81
https://kernel.dance/76e42ae831991c828cffa8c37736ebfb831ad5ec
https://kernel.dance/b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/
https://lore.kernel.org/netdev/193d6cdf-d6c9-f9be-c36a-b2a7551d5fb6@mojatatu.com/
https://security.netapp.com/advisory/ntap-20231027-0002/
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
jsc#CAR-2802
rh#2225511
rh#2237757
rh#2237894
rh#2237901
rh#2237902
rh#2261965
CVE-2023-4132kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-4132
DSA-5480
DSA-5492
SMASH Issue 374116
bnc#1213969
https://access.redhat.com/errata/RHSA-2023:6901
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/errata/RHSA-2024:0575
https://access.redhat.com/errata/RHSA-2024:0724
https://access.redhat.com/security/cve/CVE-2023-4132
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://security.netapp.com/advisory/ntap-20231020-0005/
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
rh#2221707
CVE-2023-4133kernel-source-rt:Releasedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-4133
SMASH Issue 374115
bnc#1213970
https://access.redhat.com/errata/RHSA-2024:2394
https://access.redhat.com/errata/RHSA-2024:2950
https://access.redhat.com/errata/RHSA-2024:3138
https://access.redhat.com/security/cve/CVE-2023-4133
jsc#CAR-2792
rh#2221702
CVE-2023-4134kernel-source-rt:Releasedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-4134
SMASH Issue 374118
bnc#1213971
jsc#CAR-2793
rh#2221700
CVE-2023-4147kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-4147
DSA-5480
DSA-5492
RHSA-2023:5069
RHSA-2023:5091
RHSA-2023:5093
SMASH Issue 374140
bnc#1213968
bnc#1215118
https://access.redhat.com/errata/RHSA-2023:5069
https://access.redhat.com/errata/RHSA-2023:5091
https://access.redhat.com/errata/RHSA-2023:5093
https://access.redhat.com/errata/RHSA-2023:7382
https://access.redhat.com/errata/RHSA-2023:7389
https://access.redhat.com/errata/RHSA-2023:7411
https://access.redhat.com/security/cve/CVE-2023-4147
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ebc1064e4874d5987722a2ddbc18f94aa53b211
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://security.netapp.com/advisory/ntap-20231020-0006/
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
https://www.spinics.net/lists/stable/msg671573.html
rh#2225239
CVE-2023-4155kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)CVE-2023-4155
DSA-5492
SMASH Issue 374365
bnc#1214022
https://access.redhat.com/security/cve/CVE-2023-4155
linux.git:commit:7588dbcebcbf0193ab5b76987396d0254270b04a
rh#2213802
CVE-2023-41913strongswan:Releasedmoderate7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L)CVE-2023-41913
DSA-5560
L3:67210
SMASH Issue 384174
SMASH Issue 384175
bnc#1216901
bnc#1217563
https://github.com/strongswan/strongswan/releases
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPJZPYHBCRXUQGGKQE6TYH4J4RIJH6HO/
https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-41913%29.html
jsc#CAR-3003
rh#2254560
CVE-2023-4194kernel-source-rt:Releasedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-4194
DSA-5480
DSA-5492
SMASH Issue 374309
bnc#1214019
https://access.redhat.com/errata/RHSA-2023:6583
https://access.redhat.com/security/cve/CVE-2023-4194
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/
https://lore.kernel.org/all/20230731164237.48365-1-lersek@redhat.com/
https://lore.kernel.org/all/20230731164237.48365-2-lersek@redhat.com/
https://lore.kernel.org/all/20230731164237.48365-3-lersek@redhat.com/
https://security.netapp.com/advisory/ntap-20231027-0002/
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
jsc#CAR-2796
linux.git:commit:5c9241f3ceab3257abe2923a59950db0dc8bb737
linux.git:commit:666c135b2d859a00ee74c8645b2affacfae45421
linux.git:commit:9bc3047374d5bec163e83e743709e23753376f0c
rh#2173435
rh#2229498
CVE-2023-4205kernel-source-rt:Not affectedlow0 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N)CVE-2023-4205
SMASH Issue 374367
bnc#1214050
https://access.redhat.com/security/cve/CVE-2023-4205
https://www.spinics.net/lists/kernel/msg4876594.html
rh#2228101
CVE-2023-4206kernel-source-rt:Ignoreimportant ()CVE-2023-4206
DSA-5492
SMASH Issue 377514
bnc#1215110
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8
https://kernel.dance/b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8
https://www.debian.org/security/2023/dsa-5492
rh#2237757
rh#2237894
rh#2237901
rh#2237902
CVE-2023-4207kernel-source-rt:Ignoreimportant ()CVE-2023-4207
DSA-5492
SMASH Issue 377515
bnc#1215113
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec
https://kernel.dance/76e42ae831991c828cffa8c37736ebfb831ad5ec
https://www.debian.org/security/2023/dsa-5492
rh#2237757
rh#2237894
rh#2237901
rh#2237902
CVE-2023-4208kernel-source-rt:Ignoreimportant ()CVE-2023-4208
DSA-5492
SMASH Issue 377516
bnc#1215114
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81
https://kernel.dance/3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81
https://www.debian.org/security/2023/dsa-5492
rh#2237757
rh#2237894
rh#2237901
rh#2237902
CVE-2023-42363busybox:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2023-42363
SMASH Issue 386216
bnc#1217580
https://bugs.busybox.net/show_bug.cgi?id=15865
rh#2252027
CVE-2023-42364busybox:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2023-42364
SMASH Issue 386219
bnc#1217584
https://bugs.busybox.net/show_bug.cgi?id=15868
rh#2251855
CVE-2023-42365busybox:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2023-42365
SMASH Issue 386220
bnc#1217585
https://bugs.busybox.net/show_bug.cgi?id=15871
rh#2251853
CVE-2023-42366busybox:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2023-42366
SMASH Issue 386221
bnc#1217586
https://bugs.busybox.net/show_bug.cgi?id=15874
rh#2251851
CVE-2023-4273kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-4273
DSA-5480
DSA-5492
SMASH Issue 374794
bnc#1214120
bnc#1214123
https://access.redhat.com/security/cve/CVE-2023-4273
https://dfir.ru/2023/08/23/cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver/
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/
https://security.netapp.com/advisory/ntap-20231027-0002/
https://www.debian.org/security/2023/dsa-5480
https://www.debian.org/security/2023/dsa-5492
jsc#CAR-2799
rh#2221609
CVE-2023-42752kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-42752
OSS:2023/Q3/192
SMASH Issue 377729
SMASH Issue 379098
bnc#1215146
bnc#1215468
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://access.redhat.com/security/cve/CVE-2023-42752
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=915d975b2ffa
https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=c3b704d4a4a2
rh#2239828
CVE-2023-42753kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-42753
L3:67695
OSS:2023/09/22/10
OSS:2023/Q3/216
SMASH Issue 377730
SMASH Issue 379116
bnc#1215147
bnc#1215150
bnc#1218613
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://access.redhat.com/errata/RHSA-2023:7370
https://access.redhat.com/errata/RHSA-2023:7379
https://access.redhat.com/errata/RHSA-2023:7382
https://access.redhat.com/errata/RHSA-2023:7389
https://access.redhat.com/errata/RHSA-2023:7411
https://access.redhat.com/errata/RHSA-2023:7418
https://access.redhat.com/errata/RHSA-2023:7539
https://access.redhat.com/errata/RHSA-2023:7558
https://access.redhat.com/errata/RHSA-2024:0089
https://access.redhat.com/errata/RHSA-2024:0113
https://access.redhat.com/errata/RHSA-2024:0134
https://access.redhat.com/errata/RHSA-2024:0340
https://access.redhat.com/errata/RHSA-2024:0346
https://access.redhat.com/errata/RHSA-2024:0347
https://access.redhat.com/errata/RHSA-2024:0371
https://access.redhat.com/errata/RHSA-2024:0376
https://access.redhat.com/errata/RHSA-2024:0378
https://access.redhat.com/errata/RHSA-2024:0402
https://access.redhat.com/errata/RHSA-2024:0403
https://access.redhat.com/errata/RHSA-2024:0412
https://access.redhat.com/errata/RHSA-2024:0461
https://access.redhat.com/errata/RHSA-2024:0562
https://access.redhat.com/errata/RHSA-2024:0563
https://access.redhat.com/errata/RHSA-2024:0593
https://access.redhat.com/errata/RHSA-2024:0999
https://access.redhat.com/security/cve/CVE-2023-42753
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-2952
rh#2239843
rh#2240527
CVE-2023-42754kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-42754
L3:67931
OSS:2023/Q4/14
SMASH Issue 379112
SMASH Issue 379113
bnc#1215467
bnc#1220875
https://access.redhat.com/errata/RHSA-2024:2394
https://access.redhat.com/errata/RHSA-2024:2950
https://access.redhat.com/errata/RHSA-2024:3138
https://access.redhat.com/security/cve/CVE-2023-42754
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/
jsc#CAR-2909
rh#2239845
rh#2267759
CVE-2023-42756kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-42756
OSS:2023/Q3/242
SMASH Issue 379890
SMASH Issue 379891
bnc#1215767
https://access.redhat.com/errata/RHSA-2024:2394
https://access.redhat.com/security/cve/CVE-2023-42756
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/
rh#2239848
CVE-2023-4385kernel-source-rt:Releasedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-4385
L3:66697
L3:67931
SMASH Issue 375580
bnc#1214348
https://access.redhat.com/security/cve/CVE-2023-4385
https://github.com/torvalds/linux/commit/0d4837fdb796f99369cf7691d33de1b856bcaf1f
jsc#CAR-2816
rh#2219272
CVE-2023-4387kernel-source-rt:Releasedmoderate6.6 (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-4387
L3:66697
SMASH Issue 375581
bnc#1214350
https://access.redhat.com/security/cve/CVE-2023-4387
https://github.com/torvalds/linux/commit/9e7fef9521e73ca8afd7da9e58c14654b02dfad8
jsc#CAR-2832
rh#2219270
CVE-2023-4389kernel-source-rt:Releasedmoderate5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2023-4389
SMASH Issue 375582
bnc#1214351
https://access.redhat.com/security/cve/CVE-2023-4389
https://patchwork.kernel.org/project/linux-btrfs/patch/20220324134454.15192-1-baijiaju1990@gmail.com/
jsc#CAR-2815
rh#2219271
CVE-2023-4394kernel-source-rt:Not affectedmoderate6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:H)CVE-2023-4394
SMASH Issue 375624
bnc#1214352
https://access.redhat.com/security/cve/CVE-2023-4394
https://patchwork.kernel.org/project/linux-btrfs/patch/20220815151606.3479183-1-r33s3n6@gmail.com/
rh#2219263
CVE-2023-44466kernel-source-rt:Not affectedimportant ()CVE-2023-44466
SMASH Issue 380312
bnc#1215871
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a282a2f10539dce2aa619e71e1817570d557fc97
https://github.com/google/security-research/security/advisories/GHSA-jg27-jx6w-xwph
https://github.com/torvalds/linux/commit/a282a2f10539dce2aa619e71e1817570d557fc97
https://security.netapp.com/advisory/ntap-20231116-0003/
https://www.spinics.net/lists/ceph-devel/msg57909.html
rh#2241342
CVE-2023-4458kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N)CVE-2023-4458
SMASH Issue 410019
ZDI-24-590
bnc#1226178
CVE-2023-4459kernel-source-rt:Analysismoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-4459
SMASH Issue 375883
bnc#1214451
https://access.redhat.com/errata/RHSA-2024:0412
https://access.redhat.com/errata/RHSA-2024:1250
https://access.redhat.com/errata/RHSA-2024:1306
https://access.redhat.com/errata/RHSA-2024:1367
https://access.redhat.com/errata/RHSA-2024:1382
https://access.redhat.com/errata/RHSA-2024:2006
https://access.redhat.com/errata/RHSA-2024:2008
https://access.redhat.com/security/cve/CVE-2023-4459
https://github.com/torvalds/linux/commit/edf410cb74dc612fd47ef5be319c5a0bcd6e6ccd
rh#2219268
CVE-2023-4527glibc:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2023-4527
MISC:lists.gnu.org:OSS:2023/09/25/1
OSS:2023/09/25/1
OSS:2023/Q3/218
RHSA-2023:5453
RHSA-2023:5455
SMASH Issue 377993
bnc#1215280
https://access.redhat.com/errata/RHSA-2023:5453
https://access.redhat.com/errata/RHSA-2023:5455
https://access.redhat.com/security/cve/CVE-2023-4527
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/
https://security.gentoo.org/glsa/202310-03
https://security.netapp.com/advisory/ntap-20231116-0012/
rh#2234712
CVE-2023-45322libxml2:Ignoremoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2023-45322
L3:67795
OSS:2023/Q4/60
SMASH Issue 381061
bnc#1216129
bnc#1221178
http://www.openwall.com/lists/oss-security/2023/10/06/5
https://gitlab.gnome.org/GNOME/libxml2/-/issues/344
https://gitlab.gnome.org/GNOME/libxml2/-/issues/583
jsc#CAR-2940
rh#2242945
CVE-2023-4563kernel-source-rt:Not affectedlow0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2023-4563
CVE-2023-52433
SMASH Issue 376555
bnc#1214727
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
jsc#CAR-2935
rh#2235306
rh#2265184
CVE-2023-4569kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2023-4569
DSA-5492
SMASH Issue 376556
bnc#1214729
https://access.redhat.com/security/cve/CVE-2023-4569
https://patchwork.ozlabs.org/project/netfilter-devel/patch/20230812110526.49808-1-fw@strlen.de/
https://www.debian.org/security/2023/dsa-5492
rh#2235470
CVE-2023-45853zlib:Releasedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)BID:71846
CVE-2014-9485
CVE-2023-45853
L3:66984
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:github.com:OSS:2024/01/24/10
MLIST:[oss-security] 20141231 cve request: miniunzip directory traversal
MLIST:[oss-security] 20150103 Re: cve request: miniunzip directory traversal
OSS:2023/10/20/9
OSS:2023/Q4/167
OSS:2024/01/24/10
SMASH Issue 112007
SMASH Issue 381862
UBUNTU:CVE-2014-9485
bdo#774321
bnc#1216378
bnc#1216473
https://chromium.googlesource.com/chromium/src/+/d709fb23806858847131027da95ef4c548813356
https://chromium.googlesource.com/chromium/src/+/de29dd6c7151d3cd37cb4cf0036800ddfb1d8b61
https://github.com/madler/zlib/blob/ac8f12c97d1afd9bafa9c710f827d40a407d3266/contrib/README.contrib#L1-L4
https://github.com/madler/zlib/pull/843
https://lists.debian.org/debian-lts-announce/2023/11/msg00026.html
https://pypi.org/project/pyminizip/#history
https://security.gentoo.org/glsa/202401-18
https://security.netapp.com/advisory/ntap-20231130-0009/
https://www.winimage.com/zLibDll/minizip.html
jsc#CAR-2948
rh#2244556
CVE-2023-45862kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2023-45862
SMASH Issue 381141
SMASH Issue 381884
bnc#1216051
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.5
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce33e64c1788912976b61314b56935abd4bc97ef
https://security.netapp.com/advisory/ntap-20231116-0004/
jsc#CAR-2944
rh#2244715
CVE-2023-45863kernel-source-rt:Releasedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-45863
L3:67093
L3:67651
SMASH Issue 381154
SMASH Issue 381885
bnc#1216058
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.2.3
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3bb2a01caa813d3a1845d378bbe4169ef280d394
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
jsc#CAR-2959
rh#2244720
CVE-2023-45871kernel-source-rt:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-45871
L3:67093
SMASH Issue 381887
bnc#1216259
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.3
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=bb5ed01cd2428cd25b1c88a3a9cba87055eb289f
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://security.netapp.com/advisory/ntap-20231110-0001/
jsc#CAR-2962
rh#2244723
CVE-2023-45898kernel-source-rt:Not affectedimportant ()CVE-2023-45898
SMASH Issue 381908
bnc#1216262
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.4
https://github.com/torvalds/linux/commit/768d612f79822d30a1e7d132a4d4b05337ce42ec
https://lkml.org/lkml/2023/8/13/477
https://lore.kernel.org/lkml/aa03f191-445c-0d2e-d6d7-0a3208d7df7a@huawei.com/T/
https://www.spinics.net/lists/stable-commits/msg317086.html
rh#2245711
CVE-2023-4610kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-4610
SMASH Issue 380723
bnc#1215932
rh#2229691
CVE-2023-4611kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-4611
SMASH Issue 376626
bnc#1214772
https://access.redhat.com/security/cve/CVE-2023-4611
https://www.spinics.net/lists/stable-commits/msg310136.html
jsc#CAR-2841
rh#2227244
CVE-2023-46219curl:Not affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2023-46219
DSA-5587
OSS:2023/Q4/262
SMASH Issue 386280
SMASH Issue 386281
bnc#1217574
https://hackerone.com/reports/2236133
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOGXU25FMMT2X6UUITQ7EZZYMJ42YWWD/
https://security.netapp.com/advisory/ntap-20240119-0007/
https://www.debian.org/security/2023/dsa-5587
rh#2252034
CVE-2023-4622kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-4622
DSA-5492
L3:66812
L3:67191
L3:67233
L3:67569
L3:67603
SMASH Issue 377519
bnc#1215117
bnc#1215442
bnc#1217666
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-6.1.y&id=790c2f9d15b594350ae9bca7b236f2b1859de02c
https://kernel.dance/790c2f9d15b594350ae9bca7b236f2b1859de02c
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://www.debian.org/security/2023/dsa-5492
jsc#CAR-2867
rh#2085300
rh#2220892
rh#2221463
rh#2225097
rh#2225511
rh#2237757
rh#2237760
rh#2245514
rh#2261965
CVE-2023-4623kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-4623
DSA-5480
DSA-5492
L3:66812
L3:67174
L3:67191
L3:67233
L3:67569
L3:67602
L3:67846
L3:67866
SMASH Issue 377520
bnc#1215115
bnc#1215440
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f
https://kernel.dance/b3d26c5702c7d6c45456326e56d2ccf3f103e60f
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-2874
rh#2225511
rh#2237757
rh#2237894
rh#2237901
rh#2237902
rh#2261965
CVE-2023-4641shadow:Already fixedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2023-4641
SMASH Issue 376775
bnc#1214806
https://access.redhat.com/errata/RHSA-2023:6632
https://access.redhat.com/errata/RHSA-2023:7112
https://access.redhat.com/errata/RHSA-2024:0417
https://access.redhat.com/errata/RHSA-2024:2577
https://access.redhat.com/security/cve/CVE-2023-4641
jsc#CAR-2847
rh#2215945
CVE-2023-46813kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-46813
SMASH Issue 370298
SMASH Issue 383264
bnc#1212649
bnc#1216898
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.5.9
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=63e44bc52047f182601e7817da969a105aa1f721
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a37cd2a59d0cb270b1bba568fd3a3b8668b9d3ba
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b9cb9c45583b911e0db71d09caa6b56469eb2bdf
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
rh#2246944
CVE-2023-46862kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-46862
SMASH Issue 383410
bnc#1216693
https://bugzilla.kernel.org/show_bug.cgi?id=218032#c4
https://github.com/torvalds/linux/commit/7644b1a1c9a7ae8ab99175989bfc8676055edb46
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
rh#2246980
CVE-2023-47233kernel-source-rt:Releasedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-47233
SMASH Issue 383440
SMASH Issue 384128
bnc#1216702
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0f7352557a35ab7888bc7831411ec8a3cbe20d78
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lore.kernel.org/all/20231104054709.716585-1-zyytlz.wz%40163.com/
https://lore.kernel.org/all/20231104054709.716585-1-zyytlz.wz@163.com/
https://marc.info/?l=linux-kernel&m=169907678011243&w=2
jsc#CAR-3032
linux.git:commit:0f7352557a35ab7888bc7831411ec8a3cbe20d78
rh#2248430
rh#2281213
CVE-2023-4732kernel-source-rt:Not affectedmoderate ()CVE-2023-4732
SMASH Issue 377016
bnc#1214926
https://access.redhat.com/errata/RHSA-2023:6901
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/errata/RHSA-2023:7539
https://access.redhat.com/errata/RHSA-2024:0412
https://access.redhat.com/security/cve/CVE-2023-4732
rh#2236982
CVE-2023-4806glibc:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-4806
MISC:sourceware.org:OSS:2023/10/03/4
OSS:2023/10/03/4
OSS:2023/10/03/5
OSS:2023/10/03/6
OSS:2023/10/03/8
OSS:2023/Q4/20
RHSA-2023:5453
RHSA-2023:5455
SMASH Issue 377994
bnc#1215281
https://access.redhat.com/errata/RHSA-2023:5453
https://access.redhat.com/errata/RHSA-2023:5455
https://access.redhat.com/errata/RHSA-2023:7409
https://access.redhat.com/security/cve/CVE-2023-4806
https://access.redhat.com/security/cve/CVE-2023-5156
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/
https://security.gentoo.org/glsa/202310-03
https://security.netapp.com/advisory/ntap-20240125-0008/
rh#2237782
rh#2240541
CVE-2023-4807openssl:Not affected, openssl-1_1:Not affectedimportant ()CVE-2023-4807
OSS:2023/09/08/1
OSS:2023/09/08/3
OSS:2023/Q3/164
SMASH Issue 377740
bnc#1215170
http://packetstormsecurity.com/files/174593/OpenSSL-Security-Advisory-20230908.html
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4bfac4471f53c4f74c8d81020beb938f92d84ca5
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6754de4a121ec7f261b16723180df6592cbb4508
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a632d534c73eeb3e3db8c7540d811194ef7c79ff
https://security.netapp.com/advisory/ntap-20230921-0001/
https://www.openssl.org/news/secadv/20230908.txt
openssl.git:commit:0be7510f49e498532708fd03628fc3fc62ee7875
rh#2238009
CVE-2023-4813glibc:Releasedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-4813
OSS:2023/10/03/8
RHSA-2023:5453
RHSA-2023:5455
SMASH Issue 377995
bnc#1215286
https://access.redhat.com/errata/RHSA-2023:5453
https://access.redhat.com/errata/RHSA-2023:5455
https://access.redhat.com/errata/RHSA-2023:7409
https://access.redhat.com/security/cve/CVE-2023-4813
https://security.netapp.com/advisory/ntap-20231110-0003/
jsc#CAR-2883
rh#2237798
CVE-2023-4881kernel-source-rt:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L)CVE-2023-4881
SMASH Issue 377878
bnc#1215221
https://access.redhat.com/security/cve/CVE-2023-4881
jsc#CAR-2901
jsc#CAR-2905
rh#2238312
CVE-2023-4911glibc:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2023-4911
DSA-5514
GNU Web site
MISC:git.altlinux.org:OSS:2023/10/03/3
MISC:git.rockylinux.org:OSS:2023/10/14/3
MISC:sourceware.org:OSS:2023/10/03/3
MISC:www.cloudlinux.com:OSS:2017/07/02/2
OSS:2017/07/02/2
OSS:2023/10/03/2
OSS:2023/10/03/3
OSS:2023/10/05/1
OSS:2023/10/13/11
OSS:2023/10/14/3
OSS:2023/10/14/5
OSS:2023/10/14/6
OSS:2023/Q4/18
OSS:2023/Q4/97
RHSA-2023:5453
RHSA-2023:5454
RHSA-2023:5455
RHSA-2023:5476
SMASH Issue 379454
bnc#1215501
bnc#1215502
http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalation.html
http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privilege-Escalation.html
http://seclists.org/fulldisclosure/2023/Oct/11
https://access.redhat.com/errata/RHSA-2023:5453
https://access.redhat.com/errata/RHSA-2023:5454
https://access.redhat.com/errata/RHSA-2023:5455
https://access.redhat.com/errata/RHSA-2023:5476
https://access.redhat.com/errata/RHSA-2024:0033
https://access.redhat.com/security/cve/CVE-2023-4911
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/
https://security.gentoo.org/glsa/202310-03
https://security.netapp.com/advisory/ntap-20231013-0006/
https://www.debian.org/security/2023/dsa-5514
https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt
https://www.qualys.com/cve-2023-4911/
rh#2238352
rh#2241966
xf#267581
CVE-2023-4921kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-4921
L3:66812
L3:67174
L3:67191
L3:67233
L3:67763
L3:67994
L3:68105
SMASH Issue 378087
bnc#1215275
bnc#1215300
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8fc134fee27f2263988ae38920bc03da416b03d8
https://kernel.dance/8fc134fee27f2263988ae38920bc03da416b03d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-2902
jsc#CAR-2904
rh#2245514
CVE-2023-50431kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-50431
SMASH Issue 387509
bnc#1217930
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a9f07790a4b2250f0140e9a61c7f842fd9b618c7
https://lists.freedesktop.org/archives/dri-devel/2023-November/431772.html
rh#2253957
CVE-2023-51042kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-51042
SMASH Issue 391990
bnc#1219128
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.12
https://github.com/torvalds/linux/commit/2e54154b9f27262efd0cb4f903cc7d5ad1fe9628
jsc#CAR-3080
rh#2259866
CVE-2023-51043kernel-source-rt:Releasedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-51043
SMASH Issue 391991
bnc#1219120
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.4.5
https://github.com/torvalds/linux/commit/4e076c73e4f6e90816b30fcd4a0d7ab365087255
jsc#CAR-3077
rh#2260005
CVE-2023-51384openssh:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N)CVE-2023-51384
DSA-5586
L3:67419
OSS:2023/12/18/2
SMASH Issue 388572
bdo#1033166
bdo#995130
bnc#1218214
http://seclists.org/fulldisclosure/2024/Mar/21
https://github.com/openssh/openssh-portable/commit/881d9c6af9da4257c69c327c4e2f1508b2fa754b
https://security.netapp.com/advisory/ntap-20240105-0005/
https://support.apple.com/kb/HT214084
https://www.debian.org/security/2023/dsa-5586
https://www.openssh.com/txt/release-9.6
rh#2255268
CVE-2023-5156glibc:Not affectedlow3.7 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2023-5156
MISC:sourceware.org:OSS:2023/10/03/4
OSS:2023/10/03/4
OSS:2023/10/03/5
OSS:2023/10/03/6
OSS:2023/10/03/8
OSS:2023/Q4/20
SMASH Issue 379740
bnc#1215714
https://access.redhat.com/security/cve/CVE-2023-4806
https://access.redhat.com/security/cve/CVE-2023-5156
https://security.gentoo.org/glsa/202402-01
https://sourceware.org/bugzilla/show_bug.cgi?id=30884
https://sourceware.org/git/?p=glibc.git;a=commitdiff;h=ec6b95c3303c700eb89eebeda2d7264cc184a796
rh#2237782
rh#2240541
CVE-2023-5158kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)CVE-2023-5158
SMASH Issue 379743
bnc#1215710
https://access.redhat.com/security/cve/CVE-2023-5158
rh#2240561
CVE-2023-51767openssh:Won't fixmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2023-51767
L3:67494
L3:67646
L3:67647
L3:67648
L3:67824
MISC:groups.google.com:MLIST:[oss-security] 20211112 Multiple vulnerabilities in Jenkins plugins
MISC:www.jenkins.io:OSS:2024/Q1/190
MISC:www.jenkins.io:OSS:2024/Q2/136
OSS:2024/03/06/3
OSS:2024/04/17/8
OSS:2024/Q1/190
OSS:2024/Q2/136
SMASH Issue 389286
bnc#1218386
bnc#1219946
bnc#1219947
bnc#1219948
https://access.redhat.com/security/cve/CVE-2023-51767
https://arxiv.org/abs/2309.02545
https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/auth-passwd.c#L77
https://github.com/openssh/openssh-portable/blob/8241b9c0529228b4b86d88b1a6076fb9f97e4a99/monitor.c#L878
https://security.netapp.com/advisory/ntap-20240125-0006/
https://ubuntu.com/security/CVE-2023-51767
jsc#CAR-3040
rh#2254210
rh#2255271
rh#2255850
CVE-2023-51779kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-51779
L3:67651
L3:67681
L3:67695
L3:67846
L3:67866
SMASH Issue 390056
bnc#1218559
bnc#1218610
https://github.com/torvalds/linux/commit/2e07e8348ea454615e268222ae3fc240421be768
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
jsc#CAR-3050
rh#2256822
rh#2261903
CVE-2023-5178kernel-source-rt:Not affectedimportant7.2 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-5178
L3:67093
OSS:2023/Q4/106
SMASH Issue 379892
SMASH Issue 379893
bnc#1215768
bnc#1216044
bnc#1217008
https://access.redhat.com/errata/RHSA-2023:7370
https://access.redhat.com/errata/RHSA-2023:7379
https://access.redhat.com/errata/RHSA-2023:7418
https://access.redhat.com/errata/RHSA-2023:7548
https://access.redhat.com/errata/RHSA-2023:7549
https://access.redhat.com/errata/RHSA-2023:7551
https://access.redhat.com/errata/RHSA-2023:7554
https://access.redhat.com/errata/RHSA-2023:7557
https://access.redhat.com/errata/RHSA-2023:7559
https://access.redhat.com/errata/RHSA-2024:0340
https://access.redhat.com/errata/RHSA-2024:0378
https://access.redhat.com/errata/RHSA-2024:0386
https://access.redhat.com/errata/RHSA-2024:0412
https://access.redhat.com/errata/RHSA-2024:0431
https://access.redhat.com/errata/RHSA-2024:0432
https://access.redhat.com/errata/RHSA-2024:0461
https://access.redhat.com/errata/RHSA-2024:0554
https://access.redhat.com/errata/RHSA-2024:0575
https://access.redhat.com/errata/RHSA-2024:1268
https://access.redhat.com/errata/RHSA-2024:1269
https://access.redhat.com/errata/RHSA-2024:1278
https://access.redhat.com/security/cve/CVE-2023-5178
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
https://lore.kernel.org/linux-nvme/20231002105428.226515-1-sagi@grimberg.me/
https://security.netapp.com/advisory/ntap-20231208-0004/
jsc#CAR-2916
rh#2241924
rh#2244720
rh#2244723
rh#2246945
CVE-2023-51781kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-51781
SMASH Issue 390671
bnc#1218731
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8
https://github.com/torvalds/linux/commit/189ff16722ee36ced4d2a2469d4ab65a8fee4198
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
rh#2257683
CVE-2023-5197kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2023-5197
SMASH Issue 380136
bnc#1218216
http://packetstormsecurity.com/files/175963/Kernel-Live-Patch-Security-Notice-LSN-0099-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f15f29fd4779be8a418b66e9d52979bb6d6c2325
https://kernel.dance/f15f29fd4779be8a418b66e9d52979bb6d6c2325
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
rh#2241143
CVE-2023-52071curl:Not affectedlow2.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L)CVE-2023-52071
SMASH Issue 392512
bnc#1219333
https://github.com/curl/curl/commit/73980f9ace6c7577e7fcab8008bbde8a0a231692
https://github.com/curl/curl/commit/af3f4e41#r127212213
CVE-2023-52433kernel-source-rt:Not affectedlow4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2019-25162
CVE-2020-36784
CVE-2021-46906
CVE-2021-46921
CVE-2021-46941
CVE-2021-46963
CVE-2021-46988
CVE-2021-46991
CVE-2021-47013
CVE-2021-47041
CVE-2021-47054
CVE-2021-47078
CVE-2021-47082
CVE-2021-47100
CVE-2021-47103
CVE-2022-48627
CVE-2023-4244
CVE-2023-4563
CVE-2023-51780
CVE-2023-52433
CVE-2023-52445
CVE-2023-52464
CVE-2023-52470
CVE-2023-52475
CVE-2023-52476
CVE-2023-52478
CVE-2023-52482
CVE-2023-52486
CVE-2023-52488
CVE-2023-52500
CVE-2023-52507
CVE-2023-52515
CVE-2023-52530
CVE-2023-52532
CVE-2023-52578
CVE-2023-52595
CVE-2023-52597
CVE-2023-52607
CVE-2024-26584
CVE-2024-26595
CVE-2024-26600
CVE-2024-26614
CVE-2024-26625
L3:67569
L3:67599
L3:67600
L3:67601
L3:67602
L3:67603
L3:67604
L3:67605
L3:67606
L3:67607
L3:67608
L3:67681
L3:67695
L3:67706
L3:67844
L3:67846
L3:67866
L3:68095
L3:68137
MISC:git.kernel.org:OSS:2024/Q2/86
MISC:jonathanspw.com:OSS:2024/Q2/86
OSS:2024/04/10/22
OSS:2024/04/10/23
OSS:2024/04/14/1
OSS:2024/04/15/2
OSS:2024/04/17/5
OSS:2024/Q2/116
OSS:2024/Q2/86
SMASH Issue 376555
SMASH Issue 377517
SMASH Issue 390670
SMASH Issue 393419
SMASH Issue 394578
bnc#1214727
bnc#1215420
bnc#1215424
bnc#1218730
bnc#1218733
bnc#1219466
bnc#1219695
bnc#1219696
bnc#1219697
bnc#1219698
bnc#1219699
bnc#1219700
bnc#1219701
bnc#1219702
bnc#1219703
bnc#1219704
bnc#1220137
bnc#1220294
bnc#1220354
bnc#1221570
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660
https://git.kernel.org/stable/c/00f6abd3509b1d70d0ab0fbe65ce5685cebed8be
https://git.kernel.org/stable/c/0249a4b8a554f2eb6a27b62516fa50168584faa4
https://git.kernel.org/stable/c/03344e843ab6dd3b3f2cadfb65ed910590856c70
https://git.kernel.org/stable/c/03caf75da1059f0460666c826e9f50e13dfd0017
https://git.kernel.org/stable/c/0430bfcd46657d9116a26cd377f112cbc40826a4
https://git.kernel.org/stable/c/04cc361f029c14dd067ad180525c7392334c9bfd
https://git.kernel.org/stable/c/04cfe4a5da57ab9358cdfadea22bcb37324aaf83
https://git.kernel.org/stable/c/05a10b316adaac1f322007ca9a0383b410d759cc
https://git.kernel.org/stable/c/0671f42a9c1084db10d68ac347d08dbf6689ecb3
https://git.kernel.org/stable/c/06beaa1a9f6e501213195e47c30416032fd2bbd5
https://git.kernel.org/stable/c/07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f
https://git.kernel.org/stable/c/084c24e788d9cf29c55564de368bf5284f2bb5db
https://git.kernel.org/stable/c/093af62c023537f097d2ebdfaa0bc7c1a6e874e1
https://git.kernel.org/stable/c/0b813a6a0087451cb702b6eb841f10856f49d088
https://git.kernel.org/stable/c/0c0e566f0387490d16f166808c72e9c772027681
https://git.kernel.org/stable/c/0e280502be1b003c3483ae03fc60dea554fcfa82
https://git.kernel.org/stable/c/12b0606000d0828630c033bf0c74c748464fe87d
https://git.kernel.org/stable/c/13eca403876bbea3716e82cdfe6f1e6febb38754
https://git.kernel.org/stable/c/140cfd9980124aecb6c03ef2e69c72d0548744de
https://git.kernel.org/stable/c/145febd85c3bcc5c74d87ef9a598fc7d9122d532
https://git.kernel.org/stable/c/14bbfaa5df273b26cde6707f6e655585700e6fe1
https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265
https://git.kernel.org/stable/c/14ef61594a5a286ae0d493b8acbf9eac46fd04c4
https://git.kernel.org/stable/c/150a3a3871490e8c454ffbac2e60abeafcecff99
https://git.kernel.org/stable/c/158b515f703e75e7d68289bf4d98c664e1d632df
https://git.kernel.org/stable/c/168e7e599860654876c2a1102a82610285c02f02
https://git.kernel.org/stable/c/16d8c44be52e3650917736d45f5904384a9da834
https://git.kernel.org/stable/c/198bc90e0e734e5f98c3d2833e8390cac3df61b2
https://git.kernel.org/stable/c/1c10fd60c8595ea7ff7e29d3cf1fa88069941da3
https://git.kernel.org/stable/c/1fd5d262e7442192ac7611ff1597a36c5b044323
https://git.kernel.org/stable/c/21883bff0fd854e07429a773ff18f1e9658f50e8
https://git.kernel.org/stable/c/21b1645660717d6126dd4866c850fcc5c4703a41
https://git.kernel.org/stable/c/21e45a7b08d7cd98d6a53c5fc5111879f2d96611
https://git.kernel.org/stable/c/2259e1901b2d8c0e8538fc99e77de443b939e749
https://git.kernel.org/stable/c/22e6d783a33015bcdf0979015e4eac603912bea7
https://git.kernel.org/stable/c/23a191b132cd87f746c62f3dc27da33683d85829
https://git.kernel.org/stable/c/23ceb8462dc6f4b4decdb5536a7e5fc477cdf0b6
https://git.kernel.org/stable/c/25dd54b95abfdca423b65a4ee620a774777d8213
https://git.kernel.org/stable/c/26788a5b48d9d5cd3283d777d238631c8cd7495a
https://git.kernel.org/stable/c/2823db0010c400e4b2b12d02aa5d0d3ecb15d7c7
https://git.kernel.org/stable/c/28ddc1e0b898291323b62d770b1b931de131a528
https://git.kernel.org/stable/c/2afd8fcee0c4d65a482e30c3ad2a92c25e5e92d4
https://git.kernel.org/stable/c/2b298f9181582270d5e95774e5a6c7a7fb5b1206
https://git.kernel.org/stable/c/2c231a247a1d1628e41fa1eefd1a5307c41c5f53
https://git.kernel.org/stable/c/2cf0005d315549b8d2b940ff96a66c2a889aa795
https://git.kernel.org/stable/c/2d59a0ed8b26b8f3638d8afc31f839e27759f1f6
https://git.kernel.org/stable/c/2ee4d79c364914989c80de382c0b1a7259a7e4b3
https://git.kernel.org/stable/c/2ee52ae94baa
https://git.kernel.org/stable/c/2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4
https://git.kernel.org/stable/c/2efe67c581a2a6122b328d4bb6f21b3f36f40d46
https://git.kernel.org/stable/c/2f4e16e39e4f5e78248dd9e51276a83203950b36
https://git.kernel.org/stable/c/30410519328c94367e561fd878e5f0d3a0303585
https://git.kernel.org/stable/c/30773ea47d41773f9611ffb4ebc9bda9d19a9e7e
https://git.kernel.org/stable/c/3151051b787f7cd7e3329ea0016eb9113c248812
https://git.kernel.org/stable/c/319116227e52d49eee671f0aa278bac89b3c1b69
https://git.kernel.org/stable/c/31db78a4923ef5e2008f2eed321811ca79e7f71b
https://git.kernel.org/stable/c/3233d8bf7893550045682192cb227af7fa3defeb
https://git.kernel.org/stable/c/354a6e707e29cb0c007176ee5b8db8be7bd2dee0
https://git.kernel.org/stable/c/35927d7509ab9bf41896b7e44f639504eae08af7
https://git.kernel.org/stable/c/376e21a9e4c2c63ee5d8d3aa74be5082c3882229
https://git.kernel.org/stable/c/38318f23a7ef86a8b1862e5e8078c4de121960c3
https://git.kernel.org/stable/c/3863989497652488a50f00e96de4331e5efabc6c
https://git.kernel.org/stable/c/396e17af6761b3cc9e6e4ca94b4de7f642bfece1
https://git.kernel.org/stable/c/3982fe726a63fb3de6005e534e2ac8ca7e0aca2a
https://git.kernel.org/stable/c/39cdb68c64d84e71a4a717000b6e5de208ee60cc
https://git.kernel.org/stable/c/3a04410b0bc7e056e0843ac598825dd359246d18
https://git.kernel.org/stable/c/3a76ec28824c01b57aa1f0927841d75e4f167cb8
https://git.kernel.org/stable/c/3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5
https://git.kernel.org/stable/c/403d201d1fd144cb249836dafb222f6375871c6c
https://git.kernel.org/stable/c/416b10d2817c94db86829fb92ad43ce7d002c573
https://git.kernel.org/stable/c/41b1e71a2c57366b08dcca1a28b0d45ca69429ce
https://git.kernel.org/stable/c/426fae93c01dffa379225eb2bd4d3cdc42c6eec5
https://git.kernel.org/stable/c/437b5f57732bb4cc32cc9f8895d2010ee9ff521c
https://git.kernel.org/stable/c/44481b244fcaa2b895a53081d6204c574720c38c
https://git.kernel.org/stable/c/44bdb313da57322c9b3c108eb66981c6ec6509f4
https://git.kernel.org/stable/c/475c58e1a471e9b873e3e39958c64a2d278275c8
https://git.kernel.org/stable/c/47aa8fcd5e8b5563af4042a00f25ba89bef8f33d
https://git.kernel.org/stable/c/486218c11e8d1c8f515a3bdd70d62203609d4b6b
https://git.kernel.org/stable/c/4cc198580a7b93a36f5beb923f40f7ae27a3716c
https://git.kernel.org/stable/c/4ebc10aa7cd17fd9857dedac69600465c9dd16d1
https://git.kernel.org/stable/c/55fcdd1258faaecca74b91b88cc0921f9edd775d
https://git.kernel.org/stable/c/57964a5710252bc82fe22d9fa98c180c58c20244
https://git.kernel.org/stable/c/57ca7984806d79b38af528de88fd803babf27feb
https://git.kernel.org/stable/c/5902f9453a313be8fe78cbd7e7ca9dba9319fc6e
https://git.kernel.org/stable/c/5aa514100aaf59868d745196258269a16737c7bd
https://git.kernel.org/stable/c/5c15c60e7be615f05a45cd905093a54b11f461bc
https://git.kernel.org/stable/c/5d12c5d75f7c78b83a738025947651ec5c95b4d4
https://git.kernel.org/stable/c/5da3b6e7196f0b4f3728e4e25eb20233a9ddfaf6
https://git.kernel.org/stable/c/5e63c9ae8055109d805aacdaf2a4fe2c3b371ba1
https://git.kernel.org/stable/c/60ade0d56b06537a28884745059b3801c78e03bc
https://git.kernel.org/stable/c/62f2e79cf9f4f47cc9dea9cebdf58d9f7b5695e0
https://git.kernel.org/stable/c/64babb17e8150771c58575d8f93a35c5296b499f
https://git.kernel.org/stable/c/6584eba7688dcf999542778b07f63828c21521da
https://git.kernel.org/stable/c/65c72a7201704574dace708cbc96a8f367b1491d
https://git.kernel.org/stable/c/6641df81ab799f28a5d564f860233dd26cca0d93
https://git.kernel.org/stable/c/67cace72606baf1758fd60feb358f4c6be92e1cc
https://git.kernel.org/stable/c/67f29896fdc83298eed5a6576ff8f9873f709228
https://git.kernel.org/stable/c/6809da5185141e61401da5b01896b79a4deed1ad
https://git.kernel.org/stable/c/68c34ce11ef23328692aa35fa6aaafdd75913100
https://git.kernel.org/stable/c/69e905beca193125820c201ab3db4fb0e245124e
https://git.kernel.org/stable/c/6a4a396386404e62fb59bc3bde48871a64a82b4f
https://git.kernel.org/stable/c/6a8086a42dfbf548a42bf2ae4faa291645c72c66
https://git.kernel.org/stable/c/6aa7865ba7ff7f0ede0035180fb3b9400ceb405a
https://git.kernel.org/stable/c/6b3f7e4b10f343f05b5fb513b07a9168fbf1172e
https://git.kernel.org/stable/c/6b68c03dfc79cd95a58dfd03f91f6e82829a1b0c
https://git.kernel.org/stable/c/6b950c712a9a05cdda4aea7fcb2848766576c11b
https://git.kernel.org/stable/c/6be388f4a35d2ce5ef7dbf635a8964a5da7f799f
https://git.kernel.org/stable/c/6ce2f297a7168274547d0b5aea6c7c16268b8a96
https://git.kernel.org/stable/c/6d72e7c767acbbdd44ebc7d89c6690b405b32b57
https://git.kernel.org/stable/c/700cf4bead80fac994dcc43ae1ca5d86d8959b21
https://git.kernel.org/stable/c/702cdaa2c6283c135ef16d52e0e4e3c1005aa538
https://git.kernel.org/stable/c/7104ba0f1958adb250319e68a15eff89ec4fd36d
https://git.kernel.org/stable/c/71c17ee02538802ceafc830f0736aa35b564e601
https://git.kernel.org/stable/c/732a3bea7aba5b15026ea42d14953c3425cc7dc2
https://git.kernel.org/stable/c/739b3ccd9486dff04af95f9a890846d088a84957
https://git.kernel.org/stable/c/75a578000ae5e511e5d0e8433c94a14d9c99c412
https://git.kernel.org/stable/c/77509a238547863040a42d57c72403f7d4c89a8f
https://git.kernel.org/stable/c/7a2464fac80d42f6f8819fed97a553e9c2f43310
https://git.kernel.org/stable/c/7ed9d238c7dbb1fdb63ad96a6184985151b0171c
https://git.kernel.org/stable/c/7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1
https://git.kernel.org/stable/c/800f58217626c8b147aa40660e572ed8a0d56e3b
https://git.kernel.org/stable/c/80ef24175df2cba3860d0369d1c662b49ee2de56
https://git.kernel.org/stable/c/817840d125a370626895df269c50c923b79b0a39
https://git.kernel.org/stable/c/81cb31756888bb062e92d2dca21cd629d77a46a9
https://git.kernel.org/stable/c/82808cc026811fbc3ecf0c0b267a12a339eead56
https://git.kernel.org/stable/c/829a713450b8fb127cbabfc1244c1d8179ec5107
https://git.kernel.org/stable/c/82fa9ced35d88581cffa4a1c856fc41fca96d80a
https://git.kernel.org/stable/c/8398d8d735ee93a04fb9e9f490e8cacd737e3bf5
https://git.kernel.org/stable/c/84a24bf8c52e66b7ac89ada5e3cfbe72d65c1896
https://git.kernel.org/stable/c/853dda54ba59ea70d5580a298b7ede4707826848
https://git.kernel.org/stable/c/8590541473188741055d27b955db0777569438e3
https://git.kernel.org/stable/c/8677575c4f39d65bf0d719b5d20e8042e550ccb9
https://git.kernel.org/stable/c/871a1e94929a27bf6e2cd99523865c840bbc2d87
https://git.kernel.org/stable/c/89f9f20b1cbd36d99d5a248a4bf8d11d4fd049a2
https://git.kernel.org/stable/c/8bc97117b51d68d5cea8f5351cca2d8c4153f394
https://git.kernel.org/stable/c/8c064eece9a51856f3f275104520c7e3017fc5c0
https://git.kernel.org/stable/c/8c06f34785068b87e2b560534c77c163d6c6dca7
https://git.kernel.org/stable/c/8cc889b9dea0579726be9520fcc766077890b462
https://git.kernel.org/stable/c/8e51f084b5716653f19e291ed5f026791d4b3ed4
https://git.kernel.org/stable/c/8eb43d635950e27c29f1e9e49a23b31637f37757
https://git.kernel.org/stable/c/8f905c0e7354ef261360fb7535ea079b1082c105
https://git.kernel.org/stable/c/906c538340dde6d891df89fe7dac8eaa724e40da
https://git.kernel.org/stable/c/925229d552724e1bba1abf01d3a0b1318539b012
https://git.kernel.org/stable/c/92e6e36ecd16808866ac6172b9491b5097cde449
https://git.kernel.org/stable/c/94810fc52925eb122a922df7f9966cf3f4ba7391
https://git.kernel.org/stable/c/95733ea130e35ef9ec5949a5908dde3feaba92cb
https://git.kernel.org/stable/c/992649b8b16843d27eb39ceea5f9cf85ffb50a18
https://git.kernel.org/stable/c/999d606a820c36ae9b9e9611360c8b3d8d4bb777
https://git.kernel.org/stable/c/9a8c544158f68f656d1734eb5ba00c4f817b76b1
https://git.kernel.org/stable/c/9af7dfb3c9d7985172a240f85e684c5cd33e29ce
https://git.kernel.org/stable/c/9c333d9891f34cea8af1b229dc754552304c8eee
https://git.kernel.org/stable/c/9db9feb841f7449772f9393c16b9ef4536d8c127
https://git.kernel.org/stable/c/9dbac9fdae6e3b411fc4c3fca3bf48f70609c398
https://git.kernel.org/stable/c/9dc373f74097edd0e35f3393d6248eda8d1ba99d
https://git.kernel.org/stable/c/9dd334a8245011ace45e53298175c7b659edb3e7
https://git.kernel.org/stable/c/a01a4e9f5dc93335c716fa4023b1901956e8c904
https://git.kernel.org/stable/c/a11d965a218f0cd95b13fe44d0bcd8a20ce134a8
https://git.kernel.org/stable/c/a399dd80e697a02cfb23e2fc09b87849994043d9
https://git.kernel.org/stable/c/a424807d860ba816aaafc3064b46b456361c0802
https://git.kernel.org/stable/c/a45fc41beed8e0fe31864619c34aa00797fb60c1
https://git.kernel.org/stable/c/a5ef7d68cea1344cf524f04981c2b3f80bedbb0d
https://git.kernel.org/stable/c/a6191e91c10e50bd51db65a00e03d02b6b0cf8c4
https://git.kernel.org/stable/c/a62225d951d77eb20208fed8fc199e0c9b1df08b
https://git.kernel.org/stable/c/a686f84101680b8442181a8846fbd3c934653729
https://git.kernel.org/stable/c/a73208e3244127ef9f2cdf24e4adb947aaa32053
https://git.kernel.org/stable/c/a910e0f6304726da30a212feecec65cb97ff7a80
https://git.kernel.org/stable/c/aa28eecb43cac6e20ef14dfc50b8892c1fbcda5b
https://git.kernel.org/stable/c/aa2b2eb3934859904c287bf5434647ba72e14c1c
https://git.kernel.org/stable/c/aa7cb4787698add9367b19f7afc667662c9bdb23
https://git.kernel.org/stable/c/ab6397f072e5097f267abf5cb08a8004e6b17694
https://git.kernel.org/stable/c/ac3ed969a40357b0542d20f096a6d43acdfa6cc7
https://git.kernel.org/stable/c/ac6ad7c2a862d682bb584a4bc904d89fa7721af8
https://git.kernel.org/stable/c/ad53127973034c63b5348715a1043d0e80ceb330
https://git.kernel.org/stable/c/ad8d39c7b437fcdab7208a6a56c093d222c008d5
https://git.kernel.org/stable/c/b1e0a68a0cd2a83259c444f638b417a8fffc6855
https://git.kernel.org/stable/c/b1e3596416d74ce95cc0b7b38472329a3818f8a9
https://git.kernel.org/stable/c/b2b000069a4c307b09548dc2243f31f3ca0eac9c
https://git.kernel.org/stable/c/b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43
https://git.kernel.org/stable/c/b4af63da9d94986c529d74499fdfe44289acd551
https://git.kernel.org/stable/c/b5332a9f3f3d884a1b646ce155e664cc558c1722
https://git.kernel.org/stable/c/b67d7b1bfc46d05c1a58b172516454698e8d5004
https://git.kernel.org/stable/c/b988b1bb0053c0dcd26187d29ef07566a565cf55
https://git.kernel.org/stable/c/b9bdffb3f9aaeff8379c83f5449c6b42cb71c2b5
https://git.kernel.org/stable/c/bc99dcedd2f422d602516762b96c8ef1ae6b2882
https://git.kernel.org/stable/c/be3b82e4871ba00e9b5d0ede92d396d579d7b3b3
https://git.kernel.org/stable/c/bfd0feb1b109cb63b87fdcd00122603787c75a1a
https://git.kernel.org/stable/c/bfee93c9a6c395f9aa62268f1cedf64999844926
https://git.kernel.org/stable/c/c1322eaeb8af0d8985b5cc5fa759140fa0e57b84
https://git.kernel.org/stable/c/c13e7331745852d0dd7c35eabbe181cbd5b01172
https://git.kernel.org/stable/c/c323ed65f66e5387ee0a73452118d49f1dae81b8
https://git.kernel.org/stable/c/c3bb4a7e8cbc984e1cdac0fe6af60e880214ed6e
https://git.kernel.org/stable/c/c4ff55408187f2595066967047363ca84e76db85
https://git.kernel.org/stable/c/c5ab9b67d8b061de74e2ca51bf787ee599bd7f89
https://git.kernel.org/stable/c/c5d3c142f2d57d40c55e65d5622d319125a45366
https://git.kernel.org/stable/c/c65391dd9f0a47617e96e38bd27e277cbe1c40b0
https://git.kernel.org/stable/c/c6f8e0dc8da1cd78d640dee392071cc2326ec1b2
https://git.kernel.org/stable/c/c7f75d11fe72913d2619f97b2334b083cd7bb955
https://git.kernel.org/stable/c/c87d7d910775a025e230fd6359b60627e392460f
https://git.kernel.org/stable/c/ca0c4cc1d215dc22ab0e738c9f017c650f3183f5
https://git.kernel.org/stable/c/cb4daf271302d71a6b9a7c01bd0b6d76febd8f0c
https://git.kernel.org/stable/c/cd0e2bf7fb22fe9b989c59c42dca06367fd10e6b
https://git.kernel.org/stable/c/cd1bbca03f3c1d845ce274c0d0a66de8e5929f72
https://git.kernel.org/stable/c/cd2fbfd8b922b7fdd50732e47d797754ab59cb06
https://git.kernel.org/stable/c/cf43b304b6952b549d58feabc342807b334f03d4
https://git.kernel.org/stable/c/d0a1efe417c97a1e9b914056ee6b86f1ef75fe1f
https://git.kernel.org/stable/c/d0b5b1f12429df3cd9751ab8b2f53729b77733b7
https://git.kernel.org/stable/c/d2346e6beb699909ca455d9d20c4e577ce900839
https://git.kernel.org/stable/c/d482d61025e303a2bef3733a011b6b740215cfa1
https://git.kernel.org/stable/c/d540a4370aba378fbedf349ba0bb68e96e24243d
https://git.kernel.org/stable/c/d558fcdb17139728347bccc60a16af3e639649d2
https://git.kernel.org/stable/c/d57ff04e0ed6f3be1682ae861ead33f879225e07
https://git.kernel.org/stable/c/d718c15a2bf9ae082d5ae4d177fb19ef23cb4132
https://git.kernel.org/stable/c/d7afdf360f4ac142832b098b4de974e867cc063c
https://git.kernel.org/stable/c/d86cc6ab33b085eaef27ea88b78fc8e2375c0ef3
https://git.kernel.org/stable/c/dac501397b9d81e4782232c39f94f4307b137452
https://git.kernel.org/stable/c/dbc1b89981f9c5360277071d33d7f04a43ffda4a
https://git.kernel.org/stable/c/dbf4ab821804df071c8b566d9813083125e6d97b
https://git.kernel.org/stable/c/dc1b438a35773d030be0ee80d9c635c3e558a322
https://git.kernel.org/stable/c/ded85b0c0edd8f45fec88783d7555a5b982449c1
https://git.kernel.org/stable/c/e193b7955dfad68035b983a0011f4ef3590c85eb
https://git.kernel.org/stable/c/e1c86511241588efffaa49556196f09a498d5057
https://git.kernel.org/stable/c/e1f113b57ddd18274d7c83618deca25cc880bc48
https://git.kernel.org/stable/c/e3213ff99a35
https://git.kernel.org/stable/c/e3213ff99a355cda811b41e8dbb3472d13167a3a
https://git.kernel.org/stable/c/e407495ba6788a67d1bd41714158c079e340879b
https://git.kernel.org/stable/c/e4c72c06c367758a14f227c847f9d623f1994ecf
https://git.kernel.org/stable/c/e528b1b9d60743e0b26224e3fe7aa74c24b8b2f8
https://git.kernel.org/stable/c/e53899771a02f798d436655efbd9d4b46c0f9265
https://git.kernel.org/stable/c/e6412ba3b6508bdf9c074d310bf4144afa6aec1a
https://git.kernel.org/stable/c/e8e1a046cf87c8b1363e5de835114f2779e2aaf4
https://git.kernel.org/stable/c/ec3634ebe23fc3c44ebc67c6d25917300bc68c08
https://git.kernel.org/stable/c/ec36c134dd020d28e312c2f1766f85525e747aab
https://git.kernel.org/stable/c/efeb7dfea8ee10cdec11b6b6ba4e405edbe75809
https://git.kernel.org/stable/c/f039b43cbaea5e0700980c2f0052da05a70782e0
https://git.kernel.org/stable/c/f090a8b4d2e3ec6f318d6fdab243a2edc5a8cc37
https://git.kernel.org/stable/c/f2ef4cb4d418fa64fe73eb84d10cc5c0e52e00fa
https://git.kernel.org/stable/c/f3783c415bf6d2ead3d7aa2c38802bbe10723646
https://git.kernel.org/stable/c/f46c8a75263f97bda13c739ba1c90aced0d3b071
https://git.kernel.org/stable/c/f55261469be87c55df13db76dc945f6bcd825105
https://git.kernel.org/stable/c/f6781add1c311c17eff43e14c786004bbacf901e
https://git.kernel.org/stable/c/f71edacbd4f99c0e12fe4a4007ab4d687d0688db
https://git.kernel.org/stable/c/f7b2c7d9831af99369fe8ad9b2a68d78942f414e
https://git.kernel.org/stable/c/f88359e1588b85cf0e8209ab7d6620085f3441d9
https://git.kernel.org/stable/c/fb2d8bc9b5e55848b8a7c3c028e2ee8d49f28f97
https://git.kernel.org/stable/c/fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50
https://git.kernel.org/stable/c/fd72ac9556a473fc7daf54efb6ca8a97180d621d
https://git.kernel.org/stable/c/fdb580ed05df8973aa5149cafa598c64bebcd0cb
https://git.kernel.org/stable/c/ffb76a86f8096a8206be03b14adda6092e18e275
https://git.kernel.org/stable/c/ffd29dc45bc0355393859049f6becddc3ed08f74
https://github.com/Notselwyn/CVE-2024-1086
https://github.com/torvalds/linux/commit/24e90b9e34f9e039f56b5f25f6e6eb92cdd8f4b3
https://kernel.dance/3e91b0ebd994635df2346353322ac51ce84ce6d8
https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
https://security.netapp.com/advisory/ntap-20240419-0001/
jsc#CAR-2935
jsc#CAR-3056
jsc#CAR-3060
jsc#CAR-3114
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2218332
rh#2235306
rh#2237755
rh#2237757
rh#2237760
rh#2239843
rh#2246945
rh#2252731
rh#2255283
rh#2255497
rh#2256279
rh#2256786
rh#2256822
rh#2257682
rh#2260046
rh#2261903
rh#2262126
rh#2262983
rh#2263856
rh#2265184
rh#2265519
rh#2265654
rh#2265799
rh#2265800
rh#2265838
rh#2266249
rh#2266270
rh#2266296
rh#2266358
rh#2266440
rh#2266816
rh#2266841
rh#2266894
rh#2266900
rh#2266916
rh#2267006
rh#2267028
rh#2267036
rh#2267041
rh#2267187
rh#2267509
rh#2267529
rh#2267705
rh#2267758
rh#2267787
rh#2267914
rh#2267943
rh#2268218
rh#2268291
rh#2268311
rh#2268315
rh#2269070
rh#2269211
rh#2269217
rh#2270703
rh#2275620
CVE-2023-52436kernel-source-rt:Not affectedimportant ()CVE-2023-52436
SMASH Issue 394647
bnc#1220139
https://git.kernel.org/stable/c/12cf91e23b126718a96b914f949f2cdfeadc7b2a
https://git.kernel.org/stable/c/16ae3132ff7746894894927c1892493693b89135
https://git.kernel.org/stable/c/2525d1ba225b5c167162fa344013c408e8b4de36
https://git.kernel.org/stable/c/32a6cfc67675ee96fe107aeed5af9776fec63f11
https://git.kernel.org/stable/c/3e47740091b05ac8d7836a33afd8646b6863ca52
https://git.kernel.org/stable/c/5de9e9dd1828db9b8b962f7ca42548bd596deb8a
https://git.kernel.org/stable/c/e26b6d39270f5eab0087453d9b544189a38c8564
https://git.kernel.org/stable/c/f6c30bfe5a49bc38cae985083a11016800708fea
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
rh#2265267
CVE-2023-52437kernel-source-rt:Ignoremoderate ()CVE-2023-52437
SMASH Issue 394648
bnc#1220154
https://git.kernel.org/stable/c/0de40f76d567133b871cd6ad46bb87afbce46983
https://git.kernel.org/stable/c/84c39986fe6dd77aa15f08712339f5d4eb7dbe27
https://git.kernel.org/stable/c/87165c64fe1a98bbab7280c58df3c83be2c98478
https://git.kernel.org/stable/c/aab69ef769707ad987ff905d79e0bd6591812580
https://git.kernel.org/stable/c/bed0acf330b2c50c688f6d9cfbcac2aa57a8e613
https://git.kernel.org/stable/c/bed9e27baf52a09b7ba2a3714f1e24e17ced386d
https://git.kernel.org/stable/c/cfa46838285814c3a27faacf7357f0a65bb5d152
https://git.kernel.org/stable/c/e16a0bbdb7e590a6607b0d82915add738c03c069
rh#2265269
CVE-2023-52438kernel-source-rt:Not affectedmoderate6 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H)CVE-2023-52438
SMASH Issue 394649
bnc#1220135
https://git.kernel.org/stable/c/3f489c2067c5824528212b0fc18b28d51332d906
https://git.kernel.org/stable/c/8ad4d580e8aff8de2a4d57c5930fcc29f1ffd4a6
https://git.kernel.org/stable/c/9fa04c93f24138747807fe75b5591bb680098f56
https://git.kernel.org/stable/c/a49087ab93508b60d9b8add91707a22dda832869
https://git.kernel.org/stable/c/a53e15e592b4dcc91c3a3b8514e484a0bdbc53a3
https://git.kernel.org/stable/c/c8c1158ffb007197f31f9d9170cf13e4f34cbb5c
https://git.kernel.org/stable/c/e074686e993ff1be5f21b085a3b1b4275ccd5727
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
rh#2265273
CVE-2023-52440kernel-source-rt:Not affectedimportant ()CVE-2023-52440
CVE-2024-26592
CVE-2024-26594
MISC:lore.kernel.org:OSS:2024/Q1/233
MISC:www.openwall.com:OSS:2024/Q1/233
MISC:www.zerodayinitiative.com:OSS:2024/Q1/233
OSS:2022/12/22/8
OSS:2023/01/04/1
OSS:2024/03/18/2
OSS:2024/Q1/233
SMASH Issue 394723
ZDI-24-229
bnc#1220182
https://git.kernel.org/stable/c/30fd6521b2fbd9b767e438e31945e5ea3e3a2fba
https://git.kernel.org/stable/c/4b081ce0d830b684fdf967abc3696d1261387254
https://git.kernel.org/stable/c/7f1d6cb0eb6af3a8088dc24b7ddee9a9711538c4
https://git.kernel.org/stable/c/bd554ed4fdc3d38404a1c43d428432577573e809
https://git.kernel.org/stable/c/ecd7e1c562cb08e41957fcd4b0e404de5ab38e20
CVE-2023-52441kernel-source-rt:Not affectedimportant ()CVE-2023-52441
CVE-2024-26592
CVE-2024-26594
MISC:lore.kernel.org:OSS:2024/Q1/233
MISC:www.openwall.com:OSS:2024/Q1/233
MISC:www.zerodayinitiative.com:OSS:2024/Q1/233
OSS:2022/12/22/8
OSS:2023/01/04/1
OSS:2024/03/18/2
OSS:2024/Q1/233
SMASH Issue 394724
ZDI-24-228
bnc#1220183
https://git.kernel.org/stable/c/330d900620dfc9893011d725b3620cd2ee0bc2bc
https://git.kernel.org/stable/c/536bb492d39bb6c080c92f31e8a55fe9934f452b
https://git.kernel.org/stable/c/5c0df9d30c289d6b9d7d44e2a450de2f8e3cf40b
https://git.kernel.org/stable/c/aa669ef229ae8dd779da9caa24e254964545895f
CVE-2023-52442kernel-source-rt:Not affectedcritical ()CVE-2023-52442
CVE-2024-26592
CVE-2024-26594
MISC:lore.kernel.org:OSS:2024/Q1/233
MISC:www.openwall.com:OSS:2024/Q1/233
MISC:www.zerodayinitiative.com:OSS:2024/Q1/233
OSS:2022/12/22/8
OSS:2023/01/04/1
OSS:2024/03/18/2
OSS:2024/Q1/233
SMASH Issue 394725
ZDI-24-227
bnc#1220184
https://git.kernel.org/stable/c/017d85c94f02090a87f4a473dbe0d6ee0da72693
https://git.kernel.org/stable/c/3df0411e132ee74a87aa13142dfd2b190275332e
https://git.kernel.org/stable/c/4c2b350b2e269e3fd17bbfa42de1b42775b777ac
https://git.kernel.org/stable/c/becb5191d1d5fdfca0198a2e37457bbbf4fe266f
CVE-2023-52444kernel-source-rt:Not affectedimportant ()CVE-2023-52444
SMASH Issue 394899
bnc#1220234
https://git.kernel.org/stable/c/02160112e6d45c2610b049df6eb693d7a2e57b46
https://git.kernel.org/stable/c/2fb4867f4405aea8c0519d7d188207f232a57862
https://git.kernel.org/stable/c/53edb549565f55ccd0bdf43be3d66ce4c2d48b28
https://git.kernel.org/stable/c/5624a3c1b1ebc8991318e1cce2aa719542991024
https://git.kernel.org/stable/c/6f866885e147d33efc497f1095f35b2ee5ec7310
https://git.kernel.org/stable/c/d3c0b49aaa12a61d560528f5d605029ab57f0728
https://git.kernel.org/stable/c/f0145860c20be6bae6785c7a2249577674702ac7
https://git.kernel.org/stable/c/f100ba617d8be6c98a68f3744ef7617082975b77
CVE-2023-52446kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52446
SMASH Issue 394901
bnc#1220247
https://git.kernel.org/stable/c/59e5791f59dd83e8aa72a4e74217eabb6e8cfd90
https://git.kernel.org/stable/c/d048dced8ea5eac6723ae873a40567e6f101ea42
https://git.kernel.org/stable/c/f9ff6ef1c73cd9e1a6bb1ab3e57c5d141a536306
rh#2265655
CVE-2023-52447kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52447
SMASH Issue 394902
bnc#1220251
https://git.kernel.org/stable/c/37d98fb9c3144c0fddf7f6e99aece9927ac8dce6
https://git.kernel.org/stable/c/62fca83303d608ad4fec3f7428c8685680bb01b0
https://git.kernel.org/stable/c/876673364161da50eed6b472d746ef88242b2368
https://git.kernel.org/stable/c/90c445799fd1dc214d7c6279c144e33a35e29ef2
https://git.kernel.org/stable/c/bfd9b20c4862f41d4590fde11d70a5eeae53dcc5
https://git.kernel.org/stable/c/f91cd728b10c51f6d4a39957ccd56d1e802fc8ee
rh#2265652
CVE-2023-52450kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52450
SMASH Issue 394905
bnc#1220237
https://git.kernel.org/stable/c/1692cf434ba13ee212495b5af795b6a07e986ce4
https://git.kernel.org/stable/c/3d6f4a78b104c65e4256c3776c9949f49a1b459e
https://git.kernel.org/stable/c/bf1bf09e6b599758851457f3999779622a48d015
rh#2265649
CVE-2023-52452kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)CVE-2023-52452
SMASH Issue 394907
bnc#1220257
https://git.kernel.org/stable/c/0954982db8283016bf38e9db2da5adf47a102e19
https://git.kernel.org/stable/c/6b4a64bafd107e521c01eec3453ce94a3fb38529
https://git.kernel.org/stable/c/fbcf372c8eda2290470268e0afb5ab5d5f5d5fde
rh#2265647
CVE-2023-52453kernel-source-rt:Not affectedmoderate ()CVE-2023-52453
SMASH Issue 394966
bnc#1220337
https://git.kernel.org/stable/c/45f80b2f230df10600e6fa1b83b28bf1c334185e
https://git.kernel.org/stable/c/6bda81e24a35a856f58e6a5786de579b07371603
https://git.kernel.org/stable/c/be12ad45e15b5ee0e2526a50266ba1d295d26a88
CVE-2023-52454kernel-source-rt:Already fixedmoderate6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52454
SMASH Issue 394967
bnc#1220320
https://git.kernel.org/stable/c/24e05760186dc070d3db190ca61efdbce23afc88
https://git.kernel.org/stable/c/2871aa407007f6f531fae181ad252486e022df42
https://git.kernel.org/stable/c/4cb3cf7177ae3666be7fb27d4ad4d72a295fb02d
https://git.kernel.org/stable/c/70154e8d015c9b4fb56c1a2ef1fc8b83d45c7f68
https://git.kernel.org/stable/c/ee5e7632e981673f42a50ade25e71e612e543d9d
https://git.kernel.org/stable/c/efa56305908ba20de2104f1b8508c6a7401833be
https://git.kernel.org/stable/c/f775f2621c2ac5cc3a0b3a64665dad4fb146e510
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
rh#2265791
CVE-2023-52455kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52455
SMASH Issue 394968
bnc#1220332
https://git.kernel.org/stable/c/5e23e283910c9f30248732ae0770bcb0c9438abf
https://git.kernel.org/stable/c/98b8a550da83cc392a14298c4b3eaaf0332ae6ad
https://git.kernel.org/stable/c/bb57f6705960bebeb832142ce9abf43220c3eab1
rh#2265793
CVE-2023-52456kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52456
SMASH Issue 394969
bnc#1220364
https://git.kernel.org/stable/c/63ee7be01a3f7d28b1ea8b8d7944f12bb7b0ed06
https://git.kernel.org/stable/c/6e04a9d30509fb53ba6df5d655ed61d607a7cfda
https://git.kernel.org/stable/c/763cd68746317b5d746dc2649a3295c1efb41181
https://git.kernel.org/stable/c/78d60dae9a0c9f09aa3d6477c94047df2fe6f7b0
https://git.kernel.org/stable/c/9a662d06c22ddfa371958c2071dc350436be802b
https://git.kernel.org/stable/c/ff168d4fdb0e1ba35fb413a749b3d6cce918ec19
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
rh#2265792
CVE-2023-52457kernel-source-rt:Not affectedmoderate4.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L)CVE-2023-52457
SMASH Issue 394970
bnc#1220350
https://git.kernel.org/stable/c/828cd829483f0cda920710997aed79130b0af690
https://git.kernel.org/stable/c/887a558d0298d36297daea039954c39940228d9b
https://git.kernel.org/stable/c/95e4e0031effad9837af557ecbfd4294a4d8aeee
https://git.kernel.org/stable/c/ad90d0358bd3b4554f243a425168fc7cebe7d04e
https://git.kernel.org/stable/c/b502fb43f7fb55aaf07f6092ab44657595214b93
https://git.kernel.org/stable/c/bc57f3ef8a9eb0180606696f586a6dcfaa175ed0
https://git.kernel.org/stable/c/d74173bda29aba58f822175d983d07c8ed335494
CVE-2023-52458kernel-source-rt:Not affectedmoderate ()CVE-2023-52458
SMASH Issue 394971
bnc#1220428
https://git.kernel.org/stable/c/5010c27120962c85d2f421d2cf211791c9603503
https://git.kernel.org/stable/c/6f64f866aa1ae6975c95d805ed51d7e9433a0016
https://git.kernel.org/stable/c/8f6dfa1f1efe6dcca2d43e575491d8fcbe922f62
https://git.kernel.org/stable/c/bcdc288e7bc008daf38ef0401b53e4a8bb61bbe5
https://git.kernel.org/stable/c/cb16cc1abda18a9514106d2ac8c8d7abc0be5ed8
https://git.kernel.org/stable/c/ef31cc87794731ffcb578a195a2c47d744e25fb8
rh#2265794
CVE-2023-52459kernel-source-rt:Not affectedmoderate ()CVE-2023-52459
SMASH Issue 394972
bnc#1220318
https://git.kernel.org/stable/c/3de6ee94aae701fa949cd3b5df6b6a440ddfb8f2
https://git.kernel.org/stable/c/49d82811428469566667f22749610b8c132cdb3e
https://git.kernel.org/stable/c/b7062628caeaec90e8f691ebab2d70f31b7b6b91
rh#2265795
CVE-2023-52460kernel-source-rt:Not affectedmoderate ()CVE-2023-52460
SMASH Issue 394973
bnc#1220319
https://git.kernel.org/stable/c/6b80326efff093d037e0971831dca6ebddba9b45
https://git.kernel.org/stable/c/b719a9c15d52d4f56bdea8241a5d90fd9197ce99
CVE-2023-52461kernel-source-rt:Not affectedmoderate ()CVE-2023-52461
SMASH Issue 394974
bnc#1220322
https://git.kernel.org/stable/c/1470d173925d697b497656b93f7c5bddae2e64b2
https://git.kernel.org/stable/c/2bbe6ab2be53858507f11f99f856846d04765ae3
rh#2265796
CVE-2023-52462kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N)CVE-2023-52462
SMASH Issue 394975
bnc#1220325
https://git.kernel.org/stable/c/2757f17972d87773b3677777f5682510f13c66ef
https://git.kernel.org/stable/c/40617d45ea05535105e202a8a819e388a2b1f036
https://git.kernel.org/stable/c/67e6707f07354ed1acb4e65552e97c60cf9d69cf
https://git.kernel.org/stable/c/8dc15b0670594543c356567a1a45b0182ec63174
https://git.kernel.org/stable/c/ab125ed3ec1c10ccc36bc98c7a4256ad114a3dae
https://git.kernel.org/stable/c/fc3e3c50a0a4cac1463967c110686189e4a59104
rh#2265798
CVE-2023-52463kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52463
SMASH Issue 394976
bnc#1220328
https://git.kernel.org/stable/c/0049fe7e4a85849bdd778cdb72e51a791ff3d737
https://git.kernel.org/stable/c/0e8d2444168dd519fea501599d150e62718ed2fe
https://git.kernel.org/stable/c/2aa141f8bc580f8f9811dfe4e0e6009812b73826
https://git.kernel.org/stable/c/94c742324ed7e42c5bd6a9ed22e4ec6d764db4d8
https://git.kernel.org/stable/c/d4a714873db0866cc471521114eeac4a5072d548
https://git.kernel.org/stable/c/d4a9aa7db574a0da64307729cc031fb68597aa8b
rh#2265797
CVE-2023-52465kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52465
SMASH Issue 395129
bnc#1220434
https://git.kernel.org/stable/c/88f04bc3e737155e13caddf0ba8ed19db87f0212
https://git.kernel.org/stable/c/bd3d2ec447ede9da822addf3960a5f4275e3ae76
https://git.kernel.org/stable/c/e2717302fbc20f148bcda362facee0444b949a3a
rh#2266207
CVE-2023-52466kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2023-52466
SMASH Issue 395130
bnc#1220417
https://git.kernel.org/stable/c/3171e46d677a668eed3086da78671f1e4f5b8405
https://git.kernel.org/stable/c/5b3e25efe16e06779a9a7c7610217c1b921ec179
https://git.kernel.org/stable/c/bd26159dcaaa3e9a927070efd348e7ce7e5ee933
rh#2266210
CVE-2023-52467kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52467
SMASH Issue 395131
bnc#1220433
https://git.kernel.org/stable/c/3ef1130deee98997275904d9bfc37af75e1e906c
https://git.kernel.org/stable/c/41673c66b3d0c09915698fec5c13b24336f18dd1
https://git.kernel.org/stable/c/527e8c5f3d00299822612c495d5adf1f8f43c001
https://git.kernel.org/stable/c/7f2c410ac470959b88e03dadd94b7a0b71df7973
https://git.kernel.org/stable/c/927626a2073887ee30ba00633260d4d203f8e875
https://git.kernel.org/stable/c/c3e3a2144bf50877551138ffce9f7aa6ddfe385b
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
rh#2266212
CVE-2023-52468kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52468
SMASH Issue 395132
bnc#1220431
https://git.kernel.org/stable/c/0f1486dafca3398c4c46b9f6e6452fa27e73b559
https://git.kernel.org/stable/c/93ec4a3b76404bce01bd5c9032bef5df6feb1d62
https://git.kernel.org/stable/c/b57196a5ec5e4c0ffecde8348b085b778c7dce04
rh#2266340
CVE-2023-52471kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52471
SMASH Issue 395135
bnc#1220424
https://git.kernel.org/stable/c/3027e7b15b02d2d37e3f82d6b8404f6d37e3b8cf
https://git.kernel.org/stable/c/3cd9b9bee33f39f6c6d52360fe381b89a7b12695
rh#2266347
CVE-2023-52472kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2023-52472
CVE-2023-52473
SMASH Issue 395136
SMASH Issue 395137
bnc#1220427
bnc#1220430
https://git.kernel.org/stable/c/02871710b93058eb1249d5847c0b2d1c2c3c98ae
https://git.kernel.org/stable/c/04e6ccfc93c5a1aa1d75a537cf27e418895e20ea
https://git.kernel.org/stable/c/2831f4d3bfa68e64c5f83e96688be779c87b3511
https://git.kernel.org/stable/c/335176dd8ebaca6493807dceea33c478305667fa
https://git.kernel.org/stable/c/95ad8b6879e2e49d02e3bfc0e1fb46421633fe2a
https://git.kernel.org/stable/c/d872ca165cb67112f2841ef9c37d51ef7e63d1e4
rh#2266363
rh#2266364
CVE-2023-52473kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52472
CVE-2023-52473
SMASH Issue 395137
bnc#1220430
https://git.kernel.org/stable/c/02871710b93058eb1249d5847c0b2d1c2c3c98ae
https://git.kernel.org/stable/c/04e6ccfc93c5a1aa1d75a537cf27e418895e20ea
https://git.kernel.org/stable/c/2831f4d3bfa68e64c5f83e96688be779c87b3511
https://git.kernel.org/stable/c/335176dd8ebaca6493807dceea33c478305667fa
https://git.kernel.org/stable/c/95ad8b6879e2e49d02e3bfc0e1fb46421633fe2a
https://git.kernel.org/stable/c/d872ca165cb67112f2841ef9c37d51ef7e63d1e4
rh#2266363
rh#2266364
CVE-2023-52479kernel-source-rt:Not affectedmoderate ()CVE-2023-52479
SMASH Issue 395796
bnc#1220695
https://git.kernel.org/stable/c/694e13732e830cbbfedb562e57f28644927c33fd
https://git.kernel.org/stable/c/8226ffc759ea59f10067b9acdf7f94bae1c69930
https://git.kernel.org/stable/c/c69813471a1ec081a0b9bf0c6bd7e8afd818afce
https://git.kernel.org/stable/c/d5b0e9d3563e7e314a850e81f42b2ef6f39882f9
rh#2267034
CVE-2023-52480kernel-source-rt:Not affectedimportant ()CVE-2023-52480
SMASH Issue 395797
bnc#1220665
https://git.kernel.org/stable/c/18ced78b0ebccc2d16f426143dc56ab3aad666be
https://git.kernel.org/stable/c/53ff5cf89142b978b1a5ca8dc4d4425e6a09745f
https://git.kernel.org/stable/c/a2ca5fd3dbcc665e1169044fa0c9e3eba779202b
https://git.kernel.org/stable/c/c77fd3e25a51ac92b0f1b347a96eff6a0b4f066f
rh#2267032
CVE-2023-52481kernel-source-rt:Not affectedmoderate6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H)CVE-2023-52481
SMASH Issue 395798
bnc#1220887
https://git.kernel.org/stable/c/32b0a4ffcaea44a00a61e40c0d1bcc50362aee25
https://git.kernel.org/stable/c/471470bc7052d28ce125901877dd10e4c048e513
https://git.kernel.org/stable/c/6e3ae2927b432a3b7c8374f14dbc1bd9ebe4372c
jsc#CAR-3210
rh#2267030
CVE-2023-52483kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52483
SMASH Issue 395800
bnc#1220738
bnc#1223291
https://git.kernel.org/stable/c/1db0724a01b558feb1ecae551782add1951a114a
https://git.kernel.org/stable/c/2405f64a95a7a094eb24cba9bcfaffd1ea264de4
https://git.kernel.org/stable/c/5093bbfc10ab6636b32728e35813cbd79feb063c
https://git.kernel.org/stable/c/6c52b12159049046483fdb0c411a0a1869c41a67
rh#2267026
CVE-2023-52484kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52484
SMASH Issue 395801
bnc#1220797
https://git.kernel.org/stable/c/3283a1bce9bbc978059f790b84f3c10c32492429
https://git.kernel.org/stable/c/d5afb4b47e13161b3f33904d45110f9e6463bad6
https://git.kernel.org/stable/c/f5a604757aa8e37ea9c7011dc9da54fa1b30f29b
https://git.kernel.org/stable/c/f90f4c562003ac3d3b135c5a40a5383313f27264
rh#2267023
CVE-2023-52485kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52485
SMASH Issue 395842
bnc#1220835
https://git.kernel.org/stable/c/303197775a97416b62d4da69280d0c120a20e009
https://git.kernel.org/stable/c/8892780834ae294bc3697c7d0e056d7743900b39
rh#2267195
CVE-2023-52487kernel-source-rt:Not affectedmoderate ()CVE-2023-52487
SMASH Issue 397129
bnc#1221341
https://git.kernel.org/stable/c/74cec142f89bf85c6c99c5db957da9f663f9f16f
https://git.kernel.org/stable/c/d76fdd31f953ac5046555171620f2562715e9b71
https://git.kernel.org/stable/c/e24d6f5a7f2d95a98a46257a5a5a5381d572894f
rh#2269067
CVE-2023-52490kernel-source-rt:Not affectedmoderate ()CVE-2023-52490
SMASH Issue 397131
bnc#1221325
https://git.kernel.org/stable/c/3889a418b6eb9a1113fb989aaadecf2f64964767
https://git.kernel.org/stable/c/9128bfbc5c80d8f4874dd0a0424d1f5fb010df1b
https://git.kernel.org/stable/c/d1adb25df7111de83b64655a80b5a135adbded61
rh#2269187
CVE-2023-52491kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52491
SMASH Issue 397132
bnc#1221281
https://git.kernel.org/stable/c/1b1036c60a37a30caf6759a90fe5ecd06ec35590
https://git.kernel.org/stable/c/206c857dd17d4d026de85866f1b5f0969f2a109e
https://git.kernel.org/stable/c/43872f44eee6c6781fea1348b38885d8e78face9
https://git.kernel.org/stable/c/6e2f37022f0fc0893da4d85a0500c9d547fffd4c
https://git.kernel.org/stable/c/8254d54d00eb6cdb8367399c7f912eb8d354ecd7
https://git.kernel.org/stable/c/9fec4db7fff54d9b0306a332bab31eac47eeb5f6
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2269185
CVE-2023-52492kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52492
SMASH Issue 397133
bnc#1221276
https://git.kernel.org/stable/c/047fce470412ab64cb7345f9ff5d06919078ad79
https://git.kernel.org/stable/c/2ab32986a0b9e329eb7f8f04dd57cc127f797c08
https://git.kernel.org/stable/c/7f0ccfad2031eddcc510caf4e57f2d4aa2d8a50b
https://git.kernel.org/stable/c/9263fd2a63487c6d04cbb7b74a48fb12e1e352d0
https://git.kernel.org/stable/c/9de69732dde4e443c1c7f89acbbed2c45a6a8e17
https://git.kernel.org/stable/c/f5c24d94512f1b288262beda4d3dcb9629222fc7
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2269183
CVE-2023-52493kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52493
SMASH Issue 397134
bnc#1221274
https://git.kernel.org/stable/c/01bd694ac2f682fb8017e16148b928482bc8fa4b
https://git.kernel.org/stable/c/20a6dea2d1c68d4e03c6bb50bc12e72e226b5c0e
https://git.kernel.org/stable/c/3c5ec66b4b3f6816f3a6161538672e389e537690
https://git.kernel.org/stable/c/6e4c84316e2b70709f0d00c33ba3358d9fc8eece
https://git.kernel.org/stable/c/b8eff20d87092e14cac976d057cb0aea2f1d0830
https://git.kernel.org/stable/c/eaefb9464031215d63c0a8a7e2bfaa00736aa17e
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2269181
CVE-2023-52494kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52494
SMASH Issue 397135
bnc#1221273
https://git.kernel.org/stable/c/2df39ac8f813860f79782807c3f7acff40b3c551
https://git.kernel.org/stable/c/94991728c84f8df54fd9eec9b85855ef9057ea08
https://git.kernel.org/stable/c/a9ebfc405fe1be145f414eafadcbf09506082010
https://git.kernel.org/stable/c/ecf8320111822a1ae5d5fc512953eab46d543d0b
https://git.kernel.org/stable/c/eff9704f5332a13b08fbdbe0f84059c9e7051d5f
rh#2269179
CVE-2023-52495kernel-source-rt:Not affectedmoderate ()CVE-2023-52495
SMASH Issue 397136
bnc#1221271
https://git.kernel.org/stable/c/532a5557da6892a6b2d5793052e1bce1f4c9e177
https://git.kernel.org/stable/c/c4fb7d2eac9ff9bfc35a2e4d40c7169a332416e0
https://git.kernel.org/stable/c/d26edf4ee3672cc9828f2a3ffae34086a712574d
rh#2269177
CVE-2023-52496kernel-source-rt:Not affectedmoderate ()CVE-2023-52496
SMASH Issue 396605
bnc#1221163
rh#2268451
CVE-2023-52497kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2023-52497
SMASH Issue 395941
bnc#1220879
https://git.kernel.org/stable/c/33bf23c9940dbd3a22aad7f0cda4c84ed5701847
https://git.kernel.org/stable/c/3c12466b6b7bf1e56f9b32c366a3d83d87afb4de
https://git.kernel.org/stable/c/77cbc04a1a8610e303a0e0d74f2676667876a184
https://git.kernel.org/stable/c/a0180e940cf1aefa7d516e20b259ad34f7a8b379
https://git.kernel.org/stable/c/bffc4cc334c5bb31ded54bc3cfd651735a3cb79e
https://git.kernel.org/stable/c/f36d200a80a3ca025532ed60dd1ac21b620e14ae
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2267333
CVE-2023-52498kernel-source-rt:Analysismoderate ()CVE-2023-52498
SMASH Issue 397137
bnc#1221269
https://git.kernel.org/stable/c/7839d0078e0d5e6cc2fa0b0dfbee71de74f1e557
https://git.kernel.org/stable/c/9bd3dce27b01c51295b60e1433e1dadfb16649f7
https://git.kernel.org/stable/c/a1d62c775b07213c73f81ae842424c74dd14b5f0
https://git.kernel.org/stable/c/e1c9d32c98309ae764893a481552d3f99d46cb34
https://git.kernel.org/stable/c/e681e29d1f59a04ef773296e4bebb17b1b79f8fe
https://git.kernel.org/stable/c/f46eb832389f162ad13cb780d0b8cde93641990d
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2269063
CVE-2023-52499kernel-source-rt:Not affectedmoderate ()CVE-2023-52499
SMASH Issue 396048
bnc#1220881
https://git.kernel.org/stable/c/29017ab1a539101d9c7bec63cc13a019f97b2820
https://git.kernel.org/stable/c/70f6756ad96dd70177dddcfac2fe4bd4bb320746
https://git.kernel.org/stable/c/8ac2689502f986a46f4221e239d4ff2897f1ccb3
https://git.kernel.org/stable/c/f0eee815babed70a749d2496a7678be5b45b4c14
rh#2267784
CVE-2023-52501kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-52501
SMASH Issue 396050
bnc#1220885
https://git.kernel.org/stable/c/344f2f3e61a90f0150c754796ec9a17fcaeec03d
https://git.kernel.org/stable/c/75fc9e99b3a71006720ad1e029db11a4b5c32d4a
https://git.kernel.org/stable/c/95a404bd60af6c4d9d8db01ad14fe8957ece31ca
https://git.kernel.org/stable/c/b08a4938229dbb530a35c41b83002a1457c6ff49
https://git.kernel.org/stable/c/cee5151c5410e868826b8afecfb356f3799ebea3
rh#2267782
CVE-2023-52503kernel-source-rt:Not affectedmoderate4.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2023-52503
SMASH Issue 396052
bnc#1220915
https://git.kernel.org/stable/c/1680c82929bc14d706065f123dab77f2f1293116
https://git.kernel.org/stable/c/1c95574350cd63bc3c5c2fa06658010768f2a0ce
https://git.kernel.org/stable/c/60c3e7a00db954947c265b55099c21b216f2a05c
https://git.kernel.org/stable/c/da7ce52a2f6c468946195b116615297d3d113a27
https://git.kernel.org/stable/c/f4384b3e54ea813868bb81a861bf5b2406e15d8f
rh#2267780
CVE-2023-52504kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52504
SMASH Issue 396053
bnc#1221553
https://git.kernel.org/stable/c/3719d3c36aa853d5a2401af9f8d6b116c91ad5ae
https://git.kernel.org/stable/c/3770c38cd6a60494da29ac2da73ff8156440a2d1
https://git.kernel.org/stable/c/5b784489c8158518bf7a466bb3cc045b0fb66b4b
https://git.kernel.org/stable/c/6788b10620ca6e98575d1e06e72a8974aad7657e
https://git.kernel.org/stable/c/cd287cc208dfe6bd6da98e7f88e723209242c9b4
https://git.kernel.org/stable/c/d35652a5fc9944784f6f50a5c979518ff8dacf61
https://git.kernel.org/stable/c/ecba5afe86f30605eb9dfb7f265a8de0218d4cfc
rh#2267779
CVE-2023-52505kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H)CVE-2023-52505
SMASH Issue 396054
bnc#1220830
https://git.kernel.org/stable/c/139ad1143151a07be93bf741d4ea7c89e59f89ce
https://git.kernel.org/stable/c/6f901f8448c6b25ed843796b114471d2a3fc5dfb
https://git.kernel.org/stable/c/c2d7c79898b427d263c64a4841987eec131f2d4e
rh#2267778
CVE-2023-52506kernel-source-rt:Not affectedmoderate ()CVE-2023-52506
SMASH Issue 396055
bnc#1220867
https://git.kernel.org/stable/c/19878758accf6b2788091a771d9f9fee7bab11ab
https://git.kernel.org/stable/c/b795fb9f5861ee256070d59e33130980a01fadd7
https://git.kernel.org/stable/c/f105e893a8edd48bdf4bef9fef845a9ff402f737
rh#2267777
CVE-2023-52508kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52508
SMASH Issue 396057
bnc#1221015
https://git.kernel.org/stable/c/8ae5b3a685dc59a8cf7ccfe0e850999ba9727a3c
https://git.kernel.org/stable/c/be90c9e29dd59b7d19a73297a1590ff3ec1d22ea
https://git.kernel.org/stable/c/dd46b3ac7322baf3772b33b29726e94f98289db7
rh#2267775
CVE-2023-52509kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52509
L3:68040
SMASH Issue 396058
bnc#1220836
bnc#1223290
https://git.kernel.org/stable/c/105abd68ad8f781985113aee2e92e0702b133705
https://git.kernel.org/stable/c/3971442870713de527684398416970cf025b4f89
https://git.kernel.org/stable/c/616761cf9df9af838c0a1a1232a69322a9eb67e6
https://git.kernel.org/stable/c/65d34cfd4e347054eb4193bc95d9da7eaa72dee5
https://git.kernel.org/stable/c/6f6fa8061f756aedb93af12a8a5d3cf659127965
https://git.kernel.org/stable/c/db9aafa19547833240f58c2998aed7baf414dc82
rh#2267774
CVE-2023-52511kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52511
SMASH Issue 396060
bnc#1221012
https://git.kernel.org/stable/c/171f8a49f212e87a8b04087568e1b3d132e36a18
https://git.kernel.org/stable/c/b3c21c9c7289692f4019f163c3b06d8bdf78b355
https://git.kernel.org/stable/c/e15bb292b24630ee832bfc7fd616bd72c7682bbb
https://git.kernel.org/stable/c/ff05ed4ae214011464a0156f05cac1b0b46b5fbc
jsc#CAR-3201
rh#2267772
CVE-2023-52512kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52512
SMASH Issue 396061
bnc#1221021
https://git.kernel.org/stable/c/6c18c386fd13dbb3ff31a1086dabb526780d9bda
https://git.kernel.org/stable/c/87d315a34133edcb29c4cadbf196ec6c30dfd47b
https://git.kernel.org/stable/c/c9d7cac0fd27c74dd368e80dc4b5d0f9f2e13cf8
rh#2267771
CVE-2023-52514kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2023-52514
SMASH Issue 396063
bnc#1221024
https://git.kernel.org/stable/c/1375d9600c38c231163de584656b07aef9a27b0d
https://git.kernel.org/stable/c/65edea77d7006140c6290e7f46009d75e02d3273
https://git.kernel.org/stable/c/b23c83ad2c638420ec0608a9de354507c41bec29
rh#2267803
CVE-2023-52516kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52516
SMASH Issue 396065
bnc#1221035
https://git.kernel.org/stable/c/ac0d068099349cbca3d93f2e3b15bb329364b08c
https://git.kernel.org/stable/c/be8f49029eca3efbad0d74dbff3cb9129994ffab
https://git.kernel.org/stable/c/c79300599923daaa30f417c75555d5566b3d31ae
https://git.kernel.org/stable/c/fb5a4315591dae307a65fc246ca80b5159d296e1
https://git.kernel.org/stable/c/fe2b811a02c3244ebf6059039e4a9e715e26a9e3
rh#2267801
CVE-2023-52517kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52517
SMASH Issue 396066
bnc#1221055
https://git.kernel.org/stable/c/1f11f4202caf5710204d334fe63392052783876d
https://git.kernel.org/stable/c/36b29974a7ad2ff604c24ad348f940506c7b1209
https://git.kernel.org/stable/c/4e149d524678431638ff378ef6025e4e89b71097
https://git.kernel.org/stable/c/bd1ec7f9983b5cd3c77e0f7cda3fa8aed041af2f
rh#2267800
CVE-2023-52518kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52518
SMASH Issue 396067
bnc#1221056
https://git.kernel.org/stable/c/626535077ba9dc110787540d1fe24881094c15a1
https://git.kernel.org/stable/c/b938790e70540bf4f2e653dcd74b232494d06c8f
https://git.kernel.org/stable/c/eea5a8f0c3b7c884d2351e75fbdd0a3d7def5ae1
rh#2267799
CVE-2023-52519kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52519
SMASH Issue 396068
bnc#1220920
https://git.kernel.org/stable/c/60fb3f054c99608ddb1f2466c07108da6292951e
https://git.kernel.org/stable/c/8781fe259dd5a178fdd1069401bbd1437f9491c5
https://git.kernel.org/stable/c/8f02139ad9a7e6e5c05712f8c1501eebed8eacfd
https://git.kernel.org/stable/c/cdcc04e844a2d22d9d25cef1e8e504a174ea9f8f
rh#2267798
CVE-2023-52520kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52520
SMASH Issue 396069
bnc#1220921
https://git.kernel.org/stable/c/124cf0ea4b82e1444ec8c7420af4e7db5558c293
https://git.kernel.org/stable/c/528ab3e605cabf2f9c9bd5944d3bfe15f6e94f81
https://git.kernel.org/stable/c/af21c9119a37cecb7ff27ce0c2f3cf721e9d0ec4
https://git.kernel.org/stable/c/c6e3023579de8d33256771ac0745239029e81106
rh#2267797
CVE-2023-52521kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52521
SMASH Issue 396070
bnc#1220923
https://git.kernel.org/stable/c/5685f8a6fae1fbe480493b980a1fdbe67c86a094
https://git.kernel.org/stable/c/6a86b5b5cd76d2734304a0173f5f01aa8aa2025e
https://git.kernel.org/stable/c/e562de67dc9196f2415f117796a2108c00ac7fc6
jsc#CAR-3188
rh#2267796
CVE-2023-52523kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52523
SMASH Issue 396072
bnc#1220926
https://git.kernel.org/stable/c/b80e31baa43614e086a9d29dc1151932b1bd7fc5
https://git.kernel.org/stable/c/b8f97e47b6fb84fcf2f5a22e725eefb6cf5070c2
https://git.kernel.org/stable/c/bc8b89b6963803a123f64aa9494155a037b3d728
https://git.kernel.org/stable/c/ded6e448028f0f91b6af35985afca01fa02a9089
rh#2267794
CVE-2023-52525kernel-source-rt:Not affectedlow3.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2023-52525
SMASH Issue 396074
bnc#1220840
https://git.kernel.org/stable/c/10a18c8bac7f60d32b7af22da03b66f350beee38
https://git.kernel.org/stable/c/16cc18b9080892d1a0200a38e36ae52e464bc555
https://git.kernel.org/stable/c/5afb996349cb6d1f14d6ba9aaa7aed3bd82534f6
https://git.kernel.org/stable/c/6b706286473db4fd54b5f869faa67f4a8cb18e99
https://git.kernel.org/stable/c/71b1d2b57f145c8469aa9346f0fd57bf59b2b89c
https://git.kernel.org/stable/c/aef7a0300047e7b4707ea0411dc9597cba108fc8
https://git.kernel.org/stable/c/b8e260654a29de872e7cb85387d8ab8974694e8e
https://git.kernel.org/stable/c/be2ff39b1504c5359f4a083c1cfcad21d666e216
rh#2267792
CVE-2023-52526kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52526
SMASH Issue 396075
bnc#1220897
https://git.kernel.org/stable/c/6a5a8f0a9740f865693d5aa97a42cc4504538e18
https://git.kernel.org/stable/c/75a5221630fe5aa3fedba7a06be618db0f79ba1e
https://git.kernel.org/stable/c/c955751cbf864cf2055117dd3fe7f780d2a57b56
rh#2267791
CVE-2023-52529kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52529
SMASH Issue 396078
bnc#1220929
https://git.kernel.org/stable/c/bb0707fde7492121917fd9ddb43829e96ec0bb9e
https://git.kernel.org/stable/c/e1cd4004cde7c9b694bbdd8def0e02288ee58c74
https://git.kernel.org/stable/c/f237b17611fa3501f43f12d1cb64323e10fdcb4f
https://git.kernel.org/stable/c/f566efa7de1e35e6523f4acbaf85068a540be07d
rh#2267788
CVE-2023-52559kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52559
SMASH Issue 396082
bnc#1220933
https://git.kernel.org/stable/c/29298c85a81abdc512e87537515ed4b1a9601d0e
https://git.kernel.org/stable/c/496c591f0b389eb782f36d9d4c2564b9a865eed0
https://git.kernel.org/stable/c/59df44bfb0ca4c3ee1f1c3c5d0ee8e314844799e
https://git.kernel.org/stable/c/c12ef025add77ca3a0902e8719d552b6d47b4282
rh#2267733
CVE-2023-52560kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52560
SMASH Issue 396083
bnc#1220934
https://git.kernel.org/stable/c/45120b15743fa7c0aa53d5db6dfb4c8f87be4abd
https://git.kernel.org/stable/c/6b522001693aa113d97a985abc5f6932972e8e86
https://git.kernel.org/stable/c/9a4fe81a8644b717d57d81ce5849e16583b13fe8
rh#2267730
CVE-2023-52562kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52562
SMASH Issue 396085
bnc#1220936
https://git.kernel.org/stable/c/46a9ea6681907a3be6b6b0d43776dccc62cad6cf
https://git.kernel.org/stable/c/51988be187b041e5355245957b0b9751fa382e0d
https://git.kernel.org/stable/c/a5569bb187521432f509b69dda7d29f78b2d38b0
rh#2267737
CVE-2023-52563kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52563
SMASH Issue 396086
bnc#1220937
https://git.kernel.org/stable/c/099f0af9d98231bb74956ce92508e87cbcb896be
https://git.kernel.org/stable/c/43b63e088887a8b82750e16762f77100ffa76cba
https://git.kernel.org/stable/c/66cb6d74f5a1b6eafe3370b56bf2cb575a91acbc
https://git.kernel.org/stable/c/ee335e0094add7fc2c7034e0534e1920d61d2078
rh#2267728
CVE-2023-52564kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52564
MISC:lists.openwall.net:OSS:2024/Q2/96
OSS:2024/04/11/11
OSS:2024/04/11/9
OSS:2024/04/12/1
OSS:2024/04/12/2
OSS:2024/Q2/96
OSS:2024/Q2/98
SMASH Issue 396087
bnc#1220938
https://git.kernel.org/stable/c/29346e217b8ab8a52889b88f00b268278d6b7668
https://git.kernel.org/stable/c/2bff660e0ff349dee84dc4f6f6d10da4497f5b28
https://git.kernel.org/stable/c/6d5c8862932d31a810b6545f7d69ecc124402c6e
https://git.kernel.org/stable/c/a48d2bcd23f2c98d575bc2f9b7a3fbd16aeea9eb
https://git.kernel.org/stable/c/c61d0b87a7028c2c10faffc524d748334c7b9827
rh#2267738
CVE-2023-52565kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52565
SMASH Issue 396088
bnc#1220939
https://git.kernel.org/stable/c/09635bf4cdd4adf2160198a6041bcc7ca46c0558
https://git.kernel.org/stable/c/41ebaa5e0eebea4c3bac96b72f9f8ae0d77c0bdb
https://git.kernel.org/stable/c/8bcf70d787f7d53a3b85ad394f926cfef3eed023
rh#2267724
CVE-2023-52566kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52566
SMASH Issue 396089
bnc#1220940
https://git.kernel.org/stable/c/193b5a1c6c67c36b430989dc063fe7ea4e200a33
https://git.kernel.org/stable/c/28df4646ad8b433340772edc90ca709cdefc53e2
https://git.kernel.org/stable/c/3936e8714907cd55e37c7cc50e50229e4a9042e8
https://git.kernel.org/stable/c/7130a87ca32396eb9bf48b71a2d42259ae44c6c7
https://git.kernel.org/stable/c/7ee29facd8a9c5a26079148e36bcf07141b3a6bc
https://git.kernel.org/stable/c/980663f1d189eedafd18d80053d9cf3e2ceb5c8c
https://git.kernel.org/stable/c/bb61224f6abc8e71bfdf06d7c984e23460875f5b
https://git.kernel.org/stable/c/fb1084e63ee56958b0a56e17a50a4fd86445b9c1
jsc#CAR-3196
rh#2267719
CVE-2023-52567kernel-source-rt:Not affectedlow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2023-52567
SMASH Issue 396090
bnc#1220839
https://git.kernel.org/stable/c/2b837f13a818f96304736453ac53b66a70aaa4f2
https://git.kernel.org/stable/c/3345cc5f02f1fb4c4dcb114706f2210d879ab933
https://git.kernel.org/stable/c/bf3c728e3692cc6d998874f0f27d433117348742
https://git.kernel.org/stable/c/c334650150c29234b0923476f51573ae1b2f252a
https://git.kernel.org/stable/c/cce7fc8b29961b64fadb1ce398dc5ff32a79643b
https://git.kernel.org/stable/c/e14afa4450cb7e4cf93e993a765801203d41d014
https://git.kernel.org/stable/c/e14f68a48fd445a083ac0750fafcb064df5f18f7
https://git.kernel.org/stable/c/ee5732caaffba3a37e753fdb89b4958db9a61847
rh#2267739
CVE-2023-52568kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52568
SMASH Issue 396091
bnc#1220941
https://git.kernel.org/stable/c/1348f7f15d7c7798456856bee74a4235c2da994e
https://git.kernel.org/stable/c/811ba2ef0cb6402672e64ba1419d6ef95aa3405d
https://git.kernel.org/stable/c/c6c2adcba50c2622ed25ba5d5e7f05f584711358
rh#2267740
CVE-2023-52570kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52570
SMASH Issue 396093
bnc#1220925
https://git.kernel.org/stable/c/52093779b1830ac184a23848d971f06404cf513e
https://git.kernel.org/stable/c/c01b2e0ee22ef8b4dd7509a93aecc0ac0826bae4
https://git.kernel.org/stable/c/c777b11d34e0f47dbbc4b018ef65ad030f2b283a
rh#2267744
CVE-2023-52571kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52571
SMASH Issue 396094
bnc#1220945
https://git.kernel.org/stable/c/488ef44c068e79752dba8eda0b75f524f111a695
https://git.kernel.org/stable/c/70326b46b6a043f7e7404b2ff678b033c06d6577
https://git.kernel.org/stable/c/fe6406238d5a24e9fb0286c71edd67b99d8db58d
rh#2267745
CVE-2023-52572kernel-source-rt:Releasedmoderate0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2023-1192
CVE-2023-52572
SMASH Issue 359331
SMASH Issue 396095
bnc#1208995
bnc#1220946
https://access.redhat.com/security/cve/CVE-2023-1192
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d527f51331cace562393a8038d870b3e9916686f
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=98bea253aa28ad8be2ce565a9ca21beb4a9419e5
https://git.kernel.org/stable/c/76569e3819e0bb59fc19b1b8688b017e627c268a
https://git.kernel.org/stable/c/908b3b5e97d25e879de3d1f172a255665491c2c3
https://git.kernel.org/stable/c/d527f51331cace562393a8038d870b3e9916686f
jsc#CAR-2708
rh#2154178
rh#2267746
CVE-2023-52575kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52575
SMASH Issue 396098
bnc#1220871
https://git.kernel.org/stable/c/01b057b2f4cc2d905a0bd92195657dbd9a7005ab
https://git.kernel.org/stable/c/13ea4b92e8759d2f6c330a73cde31ad9c313021b
https://git.kernel.org/stable/c/adbcec23c8423e3d5df1839c5ae91599dcf703cb
https://git.kernel.org/stable/c/ae806c74c0634b0c23855066d8ba28d850fd1260
https://git.kernel.org/stable/c/e3cb8b2c391b1f287eb76df4ba37880f4ea56d8a
rh#2267751
CVE-2023-52576kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52576
SMASH Issue 396099
bnc#1220872
https://git.kernel.org/stable/c/34cf99c250d5cd2530b93a57b0de31d3aaf8685b
https://git.kernel.org/stable/c/d2dfbc0e3b7a04c2d941421a958dc31c897fb204
https://git.kernel.org/stable/c/eef16bfdb212da60f5144689f2967fb25b051a2b
rh#2267755
CVE-2023-52577kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52577
SMASH Issue 396100
bnc#1220873
https://git.kernel.org/stable/c/1512d8f45d3c5d0b5baa00bd8e600492fa569f40
https://git.kernel.org/stable/c/26df9ab5de308caa1503d937533c56c35793018d
https://git.kernel.org/stable/c/4600beae416d754a3cedbb1ecea8181ec05073b6
https://git.kernel.org/stable/c/60d73c62e3e4464f375758b6f2459c13d46465b6
https://git.kernel.org/stable/c/62c218124fe58372e0e1f60d5b634d21c264b337
https://git.kernel.org/stable/c/6af289746a636f71f4c0535a9801774118486c7a
https://git.kernel.org/stable/c/73be49248a04746096339a48a33fa2f03bd85969
https://git.kernel.org/stable/c/a6f4d582e25d512c9b492670b6608436694357b3
rh#2267757
CVE-2023-52579kernel-source-rt:Not affectedlow ()CVE-2023-52579
SMASH Issue 396102
bnc#1220875
https://git.kernel.org/stable/c/0113d9c9d1ccc07f5a3710dac4aa24b6d711278c
https://git.kernel.org/stable/c/084c7ac9e8d60bf21a423490021b7c3427312955
https://git.kernel.org/stable/c/2712545e535d7a2e4c53b9c9658a9c88c6055862
https://git.kernel.org/stable/c/810fd23d9715474aa27997584e8fc9396ef3cb67
https://git.kernel.org/stable/c/8689c9ace976d6c078e6dc844b09598796e84099
https://git.kernel.org/stable/c/8860d354f653628b6330e1c5b06b2828948135a4
https://git.kernel.org/stable/c/a2cf7bd75b3992e8df68dd5fdc6499b67d45f6e0
https://git.kernel.org/stable/c/cda20fcddf53f0f959641c8ef4d50ab87ffa5124
rh#2239845
rh#2267759
CVE-2023-52580kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52580
SMASH Issue 396103
bnc#1220876
https://git.kernel.org/stable/c/488ea2a3e2666022f79abfdd7d12e8305fc27a40
https://git.kernel.org/stable/c/48e105a2a1a10adc21c0ae717969f5e8e990ba48
https://git.kernel.org/stable/c/75ad80ed88a182ab2ad5513e448cf07b403af5c3
https://git.kernel.org/stable/c/f90a7b9586d72f907092078a9f394733ca502cc9
rh#2267760
CVE-2023-52581kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52581
SMASH Issue 396104
bnc#1220877
https://git.kernel.org/stable/c/09c85f2d21ab6b5acba31a037985b13e8e6565b8
https://git.kernel.org/stable/c/4aea243b6853d06c1d160a9955b759189aa02b14
https://git.kernel.org/stable/c/7cf055b43756b10aa2b851c927c940f5ed652125
https://git.kernel.org/stable/c/7e5d732e6902eb6a37b35480796838a145ae5f07
https://git.kernel.org/stable/c/a995a68e8a3b48533e47c856865d109a1f1a9d01
https://git.kernel.org/stable/c/cf5000a7787cbc10341091d37245a42c119d26c5
https://git.kernel.org/stable/c/ef99506eaf1dc31feff1adfcfd68bc5535a22171
rh#2267761
CVE-2023-52582kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52582
SMASH Issue 396105
bnc#1220878
https://git.kernel.org/stable/c/d9f5537479d4ec97ea92ff24e81a517d5772581a
https://git.kernel.org/stable/c/df1c357f25d808e30b216188330e708e09e1a412
https://git.kernel.org/stable/c/df9950d37df113db59495fa09d060754366a2b7c
rh#2267762
CVE-2023-52584kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2023-52584
SMASH Issue 396441
bnc#1221079
https://git.kernel.org/stable/c/521f28eedd6b14228c46e3b81e3bf9b90c2818d8
https://git.kernel.org/stable/c/9a3881b1f07db1bb55cb0108e6f05cfd027eaf2e
https://git.kernel.org/stable/c/e821d50ab5b956ed0effa49faaf29912fd4106d9
https://git.kernel.org/stable/c/f8dcafcb54632536684336161da8bdd52120f95e
rh#2268337
CVE-2023-52585kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52585
SMASH Issue 396442
bnc#1221080
https://git.kernel.org/stable/c/0eb296233f86750102aa43b97879b8d8311f249a
https://git.kernel.org/stable/c/195a6289282e039024ad30ba66e6f94a4d0fbe49
https://git.kernel.org/stable/c/467139546f3fb93913de064461b1a43a212d7626
https://git.kernel.org/stable/c/7e6d6f27522bcd037856234b720ff607b9c4a09b
https://git.kernel.org/stable/c/92cb363d16ac1e41c9764cdb513d0e89a6ff4915
https://git.kernel.org/stable/c/b8d55a90fd55b767c25687747e2b24abd1ef8680
https://git.kernel.org/stable/c/c364e7a34c85c2154fb2e47561965d5b5a0b69b1
rh#2268335
CVE-2023-52586kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52586
SMASH Issue 396443
bnc#1221081
https://git.kernel.org/stable/c/14f109bf74dd67e1d0469fed859c8e506b0df53f
https://git.kernel.org/stable/c/45284ff733e4caf6c118aae5131eb7e7cf3eea5a
rh#2268333
CVE-2023-52588kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)CVE-2023-52588
SMASH Issue 396445
bnc#1221083
https://git.kernel.org/stable/c/417b8a91f4e8831cadaf85c3f15c6991c1f54dde
https://git.kernel.org/stable/c/4961acdd65c956e97c1a000c82d91a8c1cdbe44b
https://git.kernel.org/stable/c/7c972c89457511007dfc933814c06786905e515c
https://git.kernel.org/stable/c/7ea0f29d9fd84905051be020c0df7d557e286136
https://git.kernel.org/stable/c/b8094c0f1aae329b1c60a275a780d6c2c9ff7aa3
rh#2268329
CVE-2023-52589kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52589
SMASH Issue 396446
bnc#1221084
https://git.kernel.org/stable/c/7bb1a2822aa2c2de4e09bf7c56dd93bd532f1fa7
https://git.kernel.org/stable/c/870565f063a58576e8a4529f122cac4325c6b395
https://git.kernel.org/stable/c/bf808f58681cab64c81cd814551814fd34e540fe
https://git.kernel.org/stable/c/fab483438342984f2a315fe13c882a80f0f7e545
rh#2268327
CVE-2023-52590kernel-source-rt:Already fixedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2023-52590
SMASH Issue 396447
bnc#1221088
https://git.kernel.org/stable/c/9d618d19b29c2943527e3a43da0a35aea91062fc
https://git.kernel.org/stable/c/de940cede3c41624e2de27f805b490999f419df9
jsc#CAR-3219
rh#2268325
CVE-2023-52592kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52592
SMASH Issue 396449
bnc#1221101
https://git.kernel.org/stable/c/12473265f50c1e27b0dfd9735738ac418c4bfcce
https://git.kernel.org/stable/c/5f3e436832e86b826a6450eb8d1aaa51205a758e
https://git.kernel.org/stable/c/90dbf4535668042fac0d7201ce9e2c8c770c578a
https://git.kernel.org/stable/c/ab26541270c722eedf8eefd62797c3ce3d18a91b
https://git.kernel.org/stable/c/fc3a5534e2a8855427403113cbeb54af5837bbe0
rh#2268321
CVE-2023-52593kernel-source-rt:Not affectedmoderate5.7 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)CVE-2023-52593
SMASH Issue 396450
bnc#1221042
https://git.kernel.org/stable/c/3739121443f5114c6bcf6d841a5124deb006b878
https://git.kernel.org/stable/c/574dcd3126aa2eed75437137843f254b1190dd03
https://git.kernel.org/stable/c/9ab224744a47363f74ea29c6894c405e3bcf5132
https://git.kernel.org/stable/c/fe0a7776d4d19e613bb8dd80fe2d78ae49e8b49d
rh#2268319
CVE-2023-52596kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52596
SMASH Issue 396453
bnc#1221047
https://git.kernel.org/stable/c/15893975e9e382f8294ea8d926f08dc2d8d39ede
https://git.kernel.org/stable/c/2ae7081bc10123b187e36a4f3a8e53768de31489
https://git.kernel.org/stable/c/315552310c7de92baea4e570967066569937a843
rh#2268313
CVE-2023-52599kernel-source-rt:Not affectedimportant ()CVE-2023-52599
SMASH Issue 396456
bnc#1221062
https://git.kernel.org/stable/c/3537f92cd22c672db97fae6997481e678ad14641
https://git.kernel.org/stable/c/49f9637aafa6e63ba686c13cb8549bf5e6920402
https://git.kernel.org/stable/c/5a6660139195f5e2fbbda459eeecb8788f3885fe
https://git.kernel.org/stable/c/6996d43b14486f4a6655b10edc541ada1b580b4b
https://git.kernel.org/stable/c/6aa30020879042d46df9f747e4f0a486eea6fe98
https://git.kernel.org/stable/c/de6a91aed1e0b1a23e9c11e7d7557f088eeeb017
https://git.kernel.org/stable/c/e2b77d107b33bb31c8b1f5c4cb8f277b23728f1e
https://git.kernel.org/stable/c/f423528488e4f9606cef858eceea210bf1163f41
rh#2268307
CVE-2023-52600kernel-source-rt:Not affectedimportant ()CVE-2023-52600
SMASH Issue 396457
bnc#1221071
https://git.kernel.org/stable/c/1696d6d7d4a1b373e96428d0fe1166bd7c3c795e
https://git.kernel.org/stable/c/32e8f2d95528d45828c613417cb2827d866cbdce
https://git.kernel.org/stable/c/81b4249ef37297fb17ba102a524039a05c6c5d35
https://git.kernel.org/stable/c/8e44dc3f96e903815dab1d74fff8faafdc6feb61
https://git.kernel.org/stable/c/93df0a2a0b3cde2d7ab3a52ed46ea1d6d4aaba5f
https://git.kernel.org/stable/c/bacdaa04251382d7efd4f09f9a0686bfcc297e2e
https://git.kernel.org/stable/c/bc6ef64dbe71136f327d63b2b9071b828af2c2a8
https://git.kernel.org/stable/c/e0e1958f4c365e380b17ccb35617345b31ef7bf3
rh#2268305
CVE-2023-52601kernel-source-rt:Not affectedimportant ()CVE-2023-52601
SMASH Issue 396458
bnc#1221068
https://git.kernel.org/stable/c/2037cb9d95f1741885f7daf50e8a028c4ade5317
https://git.kernel.org/stable/c/2e16a1389b5a7983b45cb2aa20b0e3f0ee364d6c
https://git.kernel.org/stable/c/3d3898b4d72c677d47fe3cb554449f2df5c12555
https://git.kernel.org/stable/c/3f8217c323fd6ecd6829a0c3ae7ac3f14eac368e
https://git.kernel.org/stable/c/70780914cb57e2ba711e0ac1b677aaaa75103603
https://git.kernel.org/stable/c/74ecdda68242b174920fe7c6133a856fb7d8559b
https://git.kernel.org/stable/c/8393c80cce45f40c1256d72e21ad351b3650c57e
https://git.kernel.org/stable/c/fc67a2e18f4c4e3f07e9f9ae463da24530470e73
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2268303
CVE-2023-52602kernel-source-rt:Not affectedimportant ()CVE-2023-52602
SMASH Issue 396459
bnc#1221070
https://git.kernel.org/stable/c/1b9d6828589d57f94a23fb1c46112cda39d7efdb
https://git.kernel.org/stable/c/1c40ca3d39d769931b28295b3145c25f1decf5a6
https://git.kernel.org/stable/c/6c6a96c3d74df185ee344977d46944d6f33bb4dd
https://git.kernel.org/stable/c/7110650b85dd2f1cee819acd1345a9013a1a62f7
https://git.kernel.org/stable/c/bff9d4078a232c01e42e9377d005fb2f4d31a472
https://git.kernel.org/stable/c/cab0c265ba182fd266c2aa3c69d7e40640a7f612
https://git.kernel.org/stable/c/ce8bc22e948634a5c0a3fa58a179177d0e3f3950
https://git.kernel.org/stable/c/fa5492ee89463a7590a1449358002ff7ef63529f
rh#2268301
CVE-2023-52603kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52603
SMASH Issue 396460
bnc#1221066
https://git.kernel.org/stable/c/27e56f59bab5ddafbcfe69ad7a4a6ea1279c1b16
https://git.kernel.org/stable/c/6e2902ecc77e9760a9fc447f56d598383e2372d2
https://git.kernel.org/stable/c/7aa33854477d9c346f5560a1a1fcb3fe7783e2a8
https://git.kernel.org/stable/c/e30b52a2ea3d1e0aaee68096957cf90a2f4ec5af
https://git.kernel.org/stable/c/e4cbc857d75d4e22a1f75446e7480b1f305d8d60
https://git.kernel.org/stable/c/e4ce01c25ccbea02a09a5291c21749b1fc358e39
https://git.kernel.org/stable/c/edff092a59260bf0b0a2eba219cb3da6372c2f9f
https://git.kernel.org/stable/c/fd3486a893778770557649fe28afa5e463d4ed07
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2268299
CVE-2023-52604kernel-source-rt:Not affectedimportant ()CVE-2023-52604
SMASH Issue 396461
bnc#1221067
https://git.kernel.org/stable/c/42f433785f108893de0dd5260bafb85d7d51db03
https://git.kernel.org/stable/c/59342822276f753e49d27ef5eebffbba990572b9
https://git.kernel.org/stable/c/6a44065dd604972ec1fbcccbdc4a70d266a89cdd
https://git.kernel.org/stable/c/6fe8b702125aeee6ce83f20092a2341446704e7b
https://git.kernel.org/stable/c/9862ec7ac1cbc6eb5ee4a045b5d5b8edbb2f7e68
https://git.kernel.org/stable/c/98f9537fe61b8382b3cc5dd97347531698517c56
https://git.kernel.org/stable/c/de34de6e57bbbc868e4fcf9e98c76b3587cabb0b
https://git.kernel.org/stable/c/e3e95c6850661c77e6dab079d9b5374a618ebb15
rh#2268297
CVE-2023-52605kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52605
SMASH Issue 396462
bnc#1221039
https://git.kernel.org/stable/c/33650372e3ead97c5ab3b84d9ad97737bc5e00c0
https://git.kernel.org/stable/c/5457b0cbaa0238fc56b855c4ef2c0b9cc9c559ab
https://git.kernel.org/stable/c/72d9b9747e78979510e9aafdd32eb99c7aa30dd1
https://git.kernel.org/stable/c/77846571b3ba6a6125a20ad109bb8514ba884cf9
https://git.kernel.org/stable/c/b17a71435e7e153e949df018244a98b4ede04069
https://git.kernel.org/stable/c/b7b33627be0626b16ca321b982d6a2261ef7f703
https://git.kernel.org/stable/c/d2049af7ddbc361702c3e1f09bd6c5e9488454ca
https://git.kernel.org/stable/c/f066171de33d71ff0f7c46bd17636a5a26db3fb6
jsc#CAR-3203
rh#2268295
CVE-2023-52606kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52606
SMASH Issue 396463
bnc#1221069
https://git.kernel.org/stable/c/0580f4403ad33f379eef865c2a6fe94de37febdf
https://git.kernel.org/stable/c/28b8ba8eebf26f66d9f2df4ba550b6b3b136082c
https://git.kernel.org/stable/c/42084a428a139f1a429f597d44621e3a18f3e414
https://git.kernel.org/stable/c/848e1d7fd710900397e1d0e7584680c1c04e3afd
https://git.kernel.org/stable/c/8f9abaa6d7de0a70fc68acaedce290c1f96e2e59
https://git.kernel.org/stable/c/abd26515d4b767ba48241eea77b28ce0872aef3e
https://git.kernel.org/stable/c/beee482cc4c9a6b1dcffb2e190b4fd8782258678
https://git.kernel.org/stable/c/de4f5ed63b8a199704d8cdcbf810309d7eb4b36b
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3218
rh#2268293
CVE-2023-52608kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52608
SMASH Issue 397442
bnc#1221375
https://git.kernel.org/stable/c/12dc4217f16551d6dee9cbefc23fdb5659558cda
https://git.kernel.org/stable/c/437a310b22244d4e0b78665c3042e5d1c0f45306
https://git.kernel.org/stable/c/614cc65032dcb0b64d23f5c5e338a8a04b12be5d
https://git.kernel.org/stable/c/7f95f6997f4fdd17abec3200cae45420a5489350
https://git.kernel.org/stable/c/9b5e1b93c83ee5fc9f5d7bd2d45b421bd87774a2
rh#2269432
CVE-2023-52609kernel-source-rt:Not affectedmoderate ()CVE-2023-52609
SMASH Issue 398025
bnc#1221609
https://git.kernel.org/stable/c/252a2a5569eb9f8d16428872cc24dea1ac0bb097
https://git.kernel.org/stable/c/6696f76c32ff67fec26823fc2df46498e70d9bf3
https://git.kernel.org/stable/c/67f16bf2cc1698fd50e01ee8a2becc5a8e6d3a3e
https://git.kernel.org/stable/c/77d210e8db4d61d43b2d16df66b1ec46fad2ee01
https://git.kernel.org/stable/c/7e7a0d86542b0ea903006d3f42f33c4f7ead6918
https://git.kernel.org/stable/c/95b1d336b0642198b56836b89908d07b9a0c9608
https://git.kernel.org/stable/c/98fee5bee97ad47b527a997d5786410430d1f0e9
https://git.kernel.org/stable/c/9a9ab0d963621d9d12199df9817e66982582d5a5
rh#2270082
CVE-2023-52611kernel-source-rt:Not affectedmoderate ()CVE-2023-52611
SMASH Issue 398027
bnc#1221611
https://git.kernel.org/stable/c/00384f565a91c08c4bedae167f749b093d10e3fe
https://git.kernel.org/stable/c/0e9ffff72a0674cd6656314dbd99cdd2123a3030
https://git.kernel.org/stable/c/5b5ddf21b978ec315cab9d9e7e6ac7374791a8c7
rh#2270077
CVE-2023-52613kernel-source-rt:Not affectedmoderate ()CVE-2023-52613
SMASH Issue 398029
bnc#1221619
https://git.kernel.org/stable/c/15ef92e9c41124ee9d88b01208364f3fe1f45f84
https://git.kernel.org/stable/c/6010a9fc14eb1feab5cafd84422001134fe8ec58
https://git.kernel.org/stable/c/70481755ed77400e783200e2d022e5fea16060ce
rh#2270073
CVE-2023-52616kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52616
SMASH Issue 398032
bnc#1221612
https://git.kernel.org/stable/c/0c3687822259a7628c85cd21a3445cbe3c367165
https://git.kernel.org/stable/c/2bb86817b33c9d704e127f92b838035a72c315b6
https://git.kernel.org/stable/c/7abdfd45a650c714d5ebab564bb1b988f14d9b49
https://git.kernel.org/stable/c/7ebf812b7019fd2d4d5a7ca45ef4bf3a6f4bda0a
https://git.kernel.org/stable/c/ba3c5574203034781ac4231acf117da917efcd2a
https://git.kernel.org/stable/c/bb44477d4506e52785693a39f03cdc6a2c5e8598
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2270091
CVE-2023-52617kernel-source-rt:Unsupportedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52617
SMASH Issue 398033
bnc#1221613
https://git.kernel.org/stable/c/0233b836312e39a3c763fb53512b3fa455b473b3
https://git.kernel.org/stable/c/1d83c85922647758c1f1e4806a4c5c3cf591a20a
https://git.kernel.org/stable/c/4a5d0528cf19dbf060313dffbe047bc11c90c24c
https://git.kernel.org/stable/c/d8c293549946ee5078ed0ab77793cec365559355
https://git.kernel.org/stable/c/df25461119d987b8c81d232cfe4411e91dcabe66
https://git.kernel.org/stable/c/e129c7fa7070fbce57feb0bfc5eaa65eef44b693
https://git.kernel.org/stable/c/ff1c7e2fb9e9c3f53715fbe04d3ac47b80be7eb8
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3242
rh#2270088
CVE-2023-52618kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N)CVE-2023-52618
SMASH Issue 398034
bnc#1221615
https://git.kernel.org/stable/c/5b9ea86e662035a886ccb5c76d56793cba618827
https://git.kernel.org/stable/c/95bc866c11974d3e4a9d922275ea8127ff809cf7
https://git.kernel.org/stable/c/9e4bf6a08d1e127bcc4bd72557f2dfafc6bc7f41
https://git.kernel.org/stable/c/a2c6206f18104fba7f887bf4dbbfe4c41adc4339
https://git.kernel.org/stable/c/af7bbdac89739e2e7380387fda598848d3b7010f
https://git.kernel.org/stable/c/f6abd5e17da33eba15df2bddc93413e76c2b55f7
rh#2270086
CVE-2023-52621kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52621
SMASH Issue 399006
bnc#1222073
https://git.kernel.org/stable/c/169410eba271afc9f0fb476d996795aa26770c6d
https://git.kernel.org/stable/c/483cb92334cd7f1d5387dccc0ab5d595d27a669d
https://git.kernel.org/stable/c/c7f1b6146f4a46d727c0d046284c28b6882c6304
https://git.kernel.org/stable/c/d6d6fe4bb105595118f12abeed4a7bdd450853f3
rh#2271690
CVE-2023-52624kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52624
SMASH Issue 399008
bnc#1222083
https://git.kernel.org/stable/c/2ef98c6d753a744e333b7e34b9cf687040fba57d
https://git.kernel.org/stable/c/e5ffd1263dd5b44929c676171802e7b6af483f21
rh#2271684
CVE-2023-52625kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52625
SMASH Issue 399009
bnc#1222085
https://git.kernel.org/stable/c/820c3870c491946a78950cdf961bf40e28c1025f
https://git.kernel.org/stable/c/8e57c06bf4b0f51a4d6958e15e1a99c9520d00fa
rh#2271682
CVE-2023-52626kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2023-52626
SMASH Issue 399003
bnc#1222054
https://git.kernel.org/stable/c/33cdeae8c6fb58cc445f859b67c014dc9f60b4e0
https://git.kernel.org/stable/c/3876638b2c7ebb2c9d181de1191db0de8cac143a
https://git.kernel.org/stable/c/40e0d0746390c5b0c31144f4f1688d72f3f8d790
rh#2271680
CVE-2023-52627kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52627
SMASH Issue 399010
bnc#1222051
https://git.kernel.org/stable/c/020e71c7ffc25dfe29ed9be6c2d39af7bd7f661f
https://git.kernel.org/stable/c/137568aa540a9f587c48ff7d4c51cdba08cfe9a4
https://git.kernel.org/stable/c/1eba6f7ffa295a0eec098c107043074be7cc4ec5
https://git.kernel.org/stable/c/49f322ce1f265935f15e5512da69a399f27a5091
https://git.kernel.org/stable/c/55aca2ce91a63740278502066beaddbd841af9c6
https://git.kernel.org/stable/c/89c4e63324e208a23098f7fb15c00487cecbfed2
rh#2271678
CVE-2023-52628kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52628
L3:68040
SMASH Issue 399435
ZDI-24-297
ZDI-24-298
ZDI-24-299
bnc#1222117
bnc#1222118
https://git.kernel.org/stable/c/1ad7b189cc1411048434e8595ffcbe7873b71082
https://git.kernel.org/stable/c/28a97c43c9e32f437ebb8d6126f9bb7f3ca9521a
https://git.kernel.org/stable/c/a7d86a77c33ba1c357a7504341172cc1507f0698
https://git.kernel.org/stable/c/c8f292322ff16b9a2272a67de396c09a50e09dce
https://git.kernel.org/stable/c/d9ebfc0f21377690837ebbd119e679243e0099cc
https://git.kernel.org/stable/c/fd94d9dadee58e09b49075240fe83423eb1dcd36
rh#2272041
CVE-2023-52629kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52629
SMASH Issue 399612
bnc#1222231
https://git.kernel.org/stable/c/246f80a0b17f8f582b2c0996db02998239057c65
https://git.kernel.org/stable/c/610dbd8ac271aa36080aac50b928d700ee3fe4de
rh#2272204
CVE-2023-52630kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52630
SMASH Issue 399954
bnc#1222270
https://git.kernel.org/stable/c/1e4d3f8bd880e02932a9ea179f90bfa74fd2e899
https://git.kernel.org/stable/c/27b216130e64651e76ed583742a1b4e4d08a67c3
https://git.kernel.org/stable/c/2a427b49d02995ea4a6ff93a1432c40fa4d36821
https://git.kernel.org/stable/c/9f56f38331171c9a19754004f0664686d67ee48d
https://git.kernel.org/stable/c/cd33b330cb21675189e747953845f5c3689e4912
https://git.kernel.org/stable/c/e5dc63f01e027721c29f82069f7e97e2149fa131
rh#2272771
CVE-2023-52631kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52631
SMASH Issue 399949
bnc#1222264
https://git.kernel.org/stable/c/686820fe141ea0220fc6fdfc7e5694f915cf64b2
https://git.kernel.org/stable/c/ae4acad41b0f93f1c26cc0fc9135bb79d8282d0b
https://git.kernel.org/stable/c/b2dd7b953c25ffd5912dda17e980e7168bebcf6c
https://git.kernel.org/stable/c/ec1bedd797588fe38fc11cba26d77bb1d9b194c6
https://git.kernel.org/stable/c/fb7bcd1722bc9bc55160378f5f99c01198fd14a7
rh#2272769
CVE-2023-52632kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52632
SMASH Issue 399955
bnc#1222274
https://git.kernel.org/stable/c/1556c242e64cdffe58736aa650b0b395854fe4d4
https://git.kernel.org/stable/c/2a9de42e8d3c82c6990d226198602be44f43f340
https://git.kernel.org/stable/c/752312f6a79440086ac0f9b08d7776870037323c
https://git.kernel.org/stable/c/b602f098f716723fa5c6c96a486e0afba83b7b94
rh#2272804
CVE-2023-52633kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52633
SMASH Issue 399956
bnc#1222263
https://git.kernel.org/stable/c/0c7478a2da3f5fe106b4658338873d50c86ac7ab
https://git.kernel.org/stable/c/4f7dad73df4cdb2b7042103d3922745d040ad025
https://git.kernel.org/stable/c/abe4eaa8618bb36c2b33e9cdde0499296a23448c
https://git.kernel.org/stable/c/b427f55e9d4185f6f17cc1e3296eb8d0c4425283
https://git.kernel.org/stable/c/de3e9d8e8d1ae0a4d301109d1ec140796901306c
rh#2272802
CVE-2023-52634kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52634
SMASH Issue 399957
bnc#1222278
https://git.kernel.org/stable/c/2ce156482a6fef349d2eba98e5070c412d3af662
https://git.kernel.org/stable/c/ce29728ef6485a367934cc100249c66dd3cde5b6
rh#2272806
CVE-2023-52636kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52636
SMASH Issue 399959
bnc#1222247
https://git.kernel.org/stable/c/8e46a2d068c92a905d01cbb018b00d66991585ab
https://git.kernel.org/stable/c/bd9442e553ab8bf74b8be3b3c0a43bf4af4dc9b8
https://git.kernel.org/stable/c/da9c33a70f095d5d55c36d0bfeba969e31de08ae
rh#2272820
CVE-2023-52637kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52637
SMASH Issue 400152
bnc#1222291
https://git.kernel.org/stable/c/08de58abedf6e69396e1207e4f99ef8904b2b532
https://git.kernel.org/stable/c/41ccb5bcbf03f02d820bc6ea8390811859f558f8
https://git.kernel.org/stable/c/4dd684d4bb3cd5454e0bf6e2a1bdfbd5c9c872ed
https://git.kernel.org/stable/c/978e50ef8c38dc71bd14d1b0143d554ff5d188ba
https://git.kernel.org/stable/c/efe7cf828039aedb297c1f9920b638fffee6aabc
https://git.kernel.org/stable/c/f84e7534457dcd7835be743517c35378bb4e7c50
https://git.kernel.org/stable/c/fc74b9cb789cae061bbca7b203a3842e059f6b5d
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273085
CVE-2023-52638kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52638
SMASH Issue 400153
bnc#1222299
https://git.kernel.org/stable/c/03358aba991668d3bb2c65b3c82aa32c36851170
https://git.kernel.org/stable/c/26dfe112ec2e95fe0099681f6aec33da13c2dd8e
https://git.kernel.org/stable/c/559b6322f9480bff68cfa98d108991e945a4f284
https://git.kernel.org/stable/c/6cdedc18ba7b9dacc36466e27e3267d201948c8d
https://git.kernel.org/stable/c/aedda066d717a0b4335d7e0a00b2e3a61e40afcf
rh#2273082
CVE-2023-52639kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52639
SMASH Issue 400155
bnc#1222300
https://git.kernel.org/stable/c/28bb27824f25f36e5f80229a358d66ee09244082
https://git.kernel.org/stable/c/5df3b81a567eb565029563f26f374ae3803a1dfc
https://git.kernel.org/stable/c/f5572c0323cf8b4f1f0618178648a25b8fb8a380
https://git.kernel.org/stable/c/fe752331d4b361d43cfd0b89534b4b2176057c32
rh#2273080
CVE-2023-52640kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52640
SMASH Issue 400205
bnc#1222301
https://git.kernel.org/stable/c/0830c5cf19bdec50d0ede4755ddc463663deb21c
https://git.kernel.org/stable/c/52fff5799e3d1b5803ecd2f5f19c13c65f4f7b23
https://git.kernel.org/stable/c/6ed6cdbe88334ca3430c5aee7754dc4597498dfb
https://git.kernel.org/stable/c/731ab1f9828800df871c5a7ab9ffe965317d3f15
https://git.kernel.org/stable/c/a585faf0591548fe0920641950ebfa8a6eefe1cd
rh#2273089
CVE-2023-52641kernel-source-rt:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52641
SMASH Issue 400206
bnc#1222303
https://git.kernel.org/stable/c/50545eb6cd5f7ff852a01fa29b7372524ef948cc
https://git.kernel.org/stable/c/847b68f58c212f0439c5a8101b3841f32caffccd
https://git.kernel.org/stable/c/947c3f3d31ea185ddc8e7f198873f17d36deb24c
https://git.kernel.org/stable/c/aaab47f204aaf47838241d57bf8662c8840de60a
https://git.kernel.org/stable/c/ee8db6475cb15c8122855f72ad4cfa5375af6a7b
rh#2273087
CVE-2023-52643kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52643
SMASH Issue 402303
bnc#1222960
https://git.kernel.org/stable/c/1c6d19c8cbf6abcea2c8fca2db26abca2cbf0363
https://git.kernel.org/stable/c/359f220d0e753bba840eac19ffedcdc816b532f2
https://git.kernel.org/stable/c/3db312e06851996e7fb27cb5a8ccab4c0f9cdb93
https://git.kernel.org/stable/c/95a0d596bbd0552a78e13ced43f2be1038883c81
https://git.kernel.org/stable/c/b90126c86d83912688501826643ea698f0df1728
rh#2275624
CVE-2023-52645kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52645
SMASH Issue 402447
bnc#1223033
https://git.kernel.org/stable/c/339ddc983bc1622341d95f244c361cda3da3a4ff
https://git.kernel.org/stable/c/3cd1d92ee1dbf3e8f988767eb75f26207397792b
https://git.kernel.org/stable/c/475426ad1ae0bfdfd8f160ed9750903799392438
https://git.kernel.org/stable/c/c41336f4d69057cbf88fed47951379b384540df5
https://git.kernel.org/stable/c/f83b9abee9faa4868a6fac4669b86f4c215dae25
rh#2275771
CVE-2023-52647kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52647
SMASH Issue 403694
bnc#1223764
https://git.kernel.org/stable/c/91c8ce42fcde09f1da24acab9013b3e19cb88a4e
https://git.kernel.org/stable/c/c4bd29bf5b7f67925bc1abd16069f22dadf5f061
https://git.kernel.org/stable/c/c95318607fbe8fdd44991a8dad2e44118e6b8812
https://git.kernel.org/stable/c/eb2f932100288dbb881eadfed02e1459c6b9504c
rh#2278541
CVE-2023-52648kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52648
SMASH Issue 403695
bnc#1223765
https://git.kernel.org/stable/c/0a23f95af7f28dae7c0f7c82578ca5e1a239d461
https://git.kernel.org/stable/c/105f72cc48c4c93f4578fcc61e06276471858e92
https://git.kernel.org/stable/c/27571c64f1855881753e6f33c3186573afbab7ba
https://git.kernel.org/stable/c/75baad63c033b3b900d822bffbc96c9d3649bc75
rh#2278539
CVE-2023-52649kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52649
SMASH Issue 403806
bnc#1223768
https://git.kernel.org/stable/c/046c1184ce60b0a37d48134f17ddbc1f32ce02bd
https://git.kernel.org/stable/c/2fee84030d12d9fddfa874e4562d71761a129277
https://git.kernel.org/stable/c/92800aaeff51b8358d1e0a7eb74daf8aa2d7ce9d
https://git.kernel.org/stable/c/9556c167673057d48ce4a0da675026fe046654c1
rh#2278524
CVE-2023-52654kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52654
SMASH Issue 404881
bnc#1224099
https://git.kernel.org/stable/c/18824f592aad4124d79751bbc1500ea86ac3ff29
https://git.kernel.org/stable/c/3fe1ea5f921bf5b71cbfdc4469fb96c05936610e
https://git.kernel.org/stable/c/5a33d385eb36991a91e3dddb189d8679e2aac2be
https://git.kernel.org/stable/c/705318a99a138c29a512a72c3e0043b3cd7f55f4
https://git.kernel.org/stable/c/bcedd497b3b4a0be56f3adf7c7542720eced0792
https://git.kernel.org/stable/c/f2f57f51b53be153a522300454ddb3887722fb2c
rh#2280458
CVE-2023-52655kernel-source-rt:Analysismoderate ()CVE-2023-52655
SMASH Issue 385277
SMASH Issue 404984
bnc#1217169
https://git.kernel.org/stable/c/2ebf775f0541ae0d474836fa0cf3220e502f8e3e
https://git.kernel.org/stable/c/46412b2fb1f9cc895d6d4036bf24f640b5d86dab
https://git.kernel.org/stable/c/82c386d73689a45d5ee8c1290827bce64056dddd
https://git.kernel.org/stable/c/84f2e5b3e70f08fce3cb1ff73414631c5e490204
https://git.kernel.org/stable/c/ccab434e674ca95d483788b1895a70c21b7f016a
https://git.kernel.org/stable/c/d69581c17608d81824dd497d9a54b6a5b6139975
rh#2280452
CVE-2023-52657kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52657
SMASH Issue 406324
bnc#1224722
https://git.kernel.org/stable/c/2e443ed55fe3ffb08327b331a9f45e9382413c94
https://git.kernel.org/stable/c/955558030954b9637b41c97b730f9b38c92ac488
https://git.kernel.org/stable/c/baac292852c0e347626fb5436916947188e5838f
https://git.kernel.org/stable/c/c51468ac328d3922747be55507c117e47da813e6
rh#2281147
CVE-2023-52658kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52658
SMASH Issue 406339
bnc#1224719
https://git.kernel.org/stable/c/1bcdd66d33edb446903132456c948f0b764ef2f9
https://git.kernel.org/stable/c/3fba8eab2cfc7334e0f132d29dfd2552f2f2a579
https://git.kernel.org/stable/c/8deeefb24786ea7950b37bde4516b286c877db00
rh#2281149
CVE-2023-52659kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52659
SMASH Issue 406356
bnc#1224442
https://git.kernel.org/stable/c/325956b0173f11e98f90462be4829a8b8b0682ce
https://git.kernel.org/stable/c/7e1471888a5e6e846e9b4d306e5327db2b58e64e
https://git.kernel.org/stable/c/814305b5c23cb815ada68d43019f39050472b25f
https://git.kernel.org/stable/c/8e5647a723c49d73b9f108a8bb38e8c29d3948ea
rh#2281145
CVE-2023-52660kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52660
SMASH Issue 406357
bnc#1224443
https://git.kernel.org/stable/c/abd34206f396d3ae50cddbd5aa840b8cd7f68c63
https://git.kernel.org/stable/c/b39b4d207d4f236a74e20d291f6356f2231fd9ee
https://git.kernel.org/stable/c/edcf92bc66d8361c51dff953a55210e5cfd95587
https://git.kernel.org/stable/c/ffb635bb398fc07cb38f8a7b4a82cbe5f412f08e
jsc#CAR-3466
rh#2281143
CVE-2023-52661kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)CVE-2023-52661
SMASH Issue 406473
bnc#1224445
https://git.kernel.org/stable/c/2388c36e028fff7f8ffd515681a14c6c2c07fea7
https://git.kernel.org/stable/c/45c8034db47842b25a3ab6139d71e13b4e67b9b3
https://git.kernel.org/stable/c/5c8dc26e31b8b410ad1895e0d314def50c76eed0
https://git.kernel.org/stable/c/845322a9c06dd1dcf35b6c4e3af89684297c23cc
https://git.kernel.org/stable/c/f3f407ccbe84a34de9be3195d22cdd5969f3fd9f
https://git.kernel.org/stable/c/fa74e4f5d0821829545b9f7034a0e577c205c101
rh#2281362
CVE-2023-52662kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2023-52662
SMASH Issue 406430
bnc#1224449
https://git.kernel.org/stable/c/03b1072616a8f7d6e8594f643b416a9467c83fbf
https://git.kernel.org/stable/c/40624af6674745e174c754a20d7c53c250e65e7a
https://git.kernel.org/stable/c/6fc6233f6db1579b69b54b44571f1a7fde8186e6
https://git.kernel.org/stable/c/83e0f220d1e992fa074157fcf14945bf170ffbc5
https://git.kernel.org/stable/c/89709105a6091948ffb6ec2427954cbfe45358ce
https://git.kernel.org/stable/c/d1e546ab91c670e536a274a75481034ab7534876
rh#2281360
CVE-2023-52663kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52663
SMASH Issue 406420
bnc#1224630
https://git.kernel.org/stable/c/222be59e5eed1554119294edc743ee548c2371d0
https://git.kernel.org/stable/c/7296152e58858f928db448826eb7ba5ae611297b
https://git.kernel.org/stable/c/88028c45d5871dfc449b2b0a27abf6428453a5ec
https://git.kernel.org/stable/c/be4760799c6a7c01184467287f0de41e0dd255f8
rh#2281358
CVE-2023-52665kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52665
SMASH Issue 406450
bnc#1224599
https://git.kernel.org/stable/c/482b718a84f08b6fc84879c3e90cc57dba11c115
https://git.kernel.org/stable/c/d0f0780f03df54d08ced118d27834ee5008724e4
https://git.kernel.org/stable/c/f70557d48215b14a9284ac3a6ae7e4ee1d039f10
rh#2281354
CVE-2023-52666kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2023-52666
SMASH Issue 406415
bnc#1224745
https://git.kernel.org/stable/c/5349fd419e4f685d609c85b781f2b70f0fb14848
https://git.kernel.org/stable/c/6fc0a265e1b932e5e97a038f99e29400a93baad0
https://git.kernel.org/stable/c/e61fc656ceeaec65f19a92f0ffbeb562b7941e8d
https://git.kernel.org/stable/c/e9ec6665de8f706b4f4133b87b2bd02a159ec57b
https://git.kernel.org/stable/c/ecfd93955994ecc2a1308f5ee4bd90c7fca9a8c6
rh#2281352
CVE-2023-52667kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52667
SMASH Issue 406446
bnc#1224603
https://git.kernel.org/stable/c/2897c981ee63e1be5e530b1042484626a10b26d8
https://git.kernel.org/stable/c/65a4ade8a6d205979292e88beeb6a626ddbd4779
https://git.kernel.org/stable/c/72a729868592752b5a294d27453da264106983b1
https://git.kernel.org/stable/c/aef855df7e1bbd5aa4484851561211500b22707e
https://git.kernel.org/stable/c/b2fa86b2aceb4bc9ada51cea90f61546d7512cbe
rh#2281350
CVE-2023-52668kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52668
SMASH Issue 406389
bnc#1224690
https://git.kernel.org/stable/c/1908e9d01e5395adff68d9d308a0fb15337e6272
https://git.kernel.org/stable/c/6f74989f5909cdec9b1274641f0fa306b15bb476
https://git.kernel.org/stable/c/b18f3b60b35a8c01c9a2a0f0d6424c6d73971dc3
rh#2281348
CVE-2023-52671kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2023-52671
SMASH Issue 406461
bnc#1224729
https://git.kernel.org/stable/c/4b6b479b2da6badff099b2e3abf0248936eefbf5
https://git.kernel.org/stable/c/ae62f1dde66a6f0eee98defc4c7a346bd5acd239
https://git.kernel.org/stable/c/e7b2b108cdeab76a7e7324459e50b0c1214c0386
rh#2281342
CVE-2023-52672kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52672
SMASH Issue 406433
bnc#1224614
https://git.kernel.org/stable/c/162ae0e78bdabf84ef10c1293c4ed7865cb7d3c8
https://git.kernel.org/stable/c/3efbd114b91525bb095b8ae046382197d92126b9
https://git.kernel.org/stable/c/68e51bdb1194f11d3452525b99c98aff6f837b24
https://git.kernel.org/stable/c/6fb70694f8d1ac34e45246b0ac988f025e1e5b55
https://git.kernel.org/stable/c/b87a1229d8668fbc78ebd9ca0fc797a76001c60f
https://git.kernel.org/stable/c/e95aada4cb93d42e25c30a0ef9eb2923d9711d4a
rh#2281340
CVE-2023-52673kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52673
SMASH Issue 406439
bnc#1224741
https://git.kernel.org/stable/c/43235db21fc23559f50a62f8f273002eeb506f5a
https://git.kernel.org/stable/c/efb91fea652a42fcc037d2a9ef4ecd1ffc5ff4b7
rh#2281338
CVE-2023-52676kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52676
SMASH Issue 406477
bnc#1224730
bnc#1226336
https://git.kernel.org/stable/c/1d38a9ee81570c4bd61f557832dead4d6f816760
https://git.kernel.org/stable/c/ad140fc856f0b1d5e2215bcb6d0cc247a86805a2
https://git.kernel.org/stable/c/e5ad9ecb84405637df82732ee02ad741a5f782a6
rh#2281332
CVE-2023-52677kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52677
SMASH Issue 406388
bnc#1224693
https://git.kernel.org/stable/c/1d7a03052846f34d624d0ab41a879adf5e85c85f
https://git.kernel.org/stable/c/420370f3ae3d3b883813fd3051a38805160b2b9f
https://git.kernel.org/stable/c/890cfe5337e0aaf03ece1429db04d23c88da72e7
https://git.kernel.org/stable/c/8db56df4a954b774bdc68917046a685a9fa2e4bc
https://git.kernel.org/stable/c/938f70d14618ec72e10d6fcf8a546134136d7c13
rh#2281330
CVE-2023-52678kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52678
SMASH Issue 406429
bnc#1224617
https://git.kernel.org/stable/c/4525525cb7161d08f95d0e47025323dd10214313
https://git.kernel.org/stable/c/499839eca34ad62d43025ec0b46b80e77065f6d8
https://git.kernel.org/stable/c/4ac4e023ed7ab1c7c67d2d12b7b6198fcd099e5c
https://git.kernel.org/stable/c/5024cce888e11e5688f77df81db9e14828495d64
rh#2281328
CVE-2023-52681kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52681
SMASH Issue 406478
bnc#1224505
https://git.kernel.org/stable/c/48be1364dd387e375e1274b76af986cb8747be2c
https://git.kernel.org/stable/c/547713d502f7b4b8efccd409cff84d731a23853b
https://git.kernel.org/stable/c/92be3095c6ca1cdc46237839c6087555be9160e3
https://git.kernel.org/stable/c/ea6b597fcaca99562fa56a473bcbbbd79b40af03
rh#2281322
CVE-2023-52682kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52682
SMASH Issue 406466
bnc#1224734
https://git.kernel.org/stable/c/4535be48780431753505e74e1b1ad4836a189bc2
https://git.kernel.org/stable/c/55fdc1c24a1d6229fe0ecf31335fb9a2eceaaa00
https://git.kernel.org/stable/c/9bfd5ea71521d0e522ba581c6ccc5db93759c0c3
https://git.kernel.org/stable/c/f904c156d8011d8291ffd5b6b398f3747e294986
rh#2281319
CVE-2023-52684kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52684
SMASH Issue 406390
bnc#1224689
https://git.kernel.org/stable/c/6c57d7b593c4a4e60db65d5ce0fe1d9f79ccbe9b
https://git.kernel.org/stable/c/85fdbf6840455be64eac16bdfe0df3368ee3d0f0
rh#2281315
CVE-2023-52685kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52685
SMASH Issue 406465
bnc#1224728
https://git.kernel.org/stable/c/3b333cded94fbe5ce30d699b316c4715151268ae
https://git.kernel.org/stable/c/48dcfc42ce705b652c0619cb99846afc43029de9
https://git.kernel.org/stable/c/86222a8fc16ec517de8da2604d904c9df3a08e5d
https://git.kernel.org/stable/c/8fb12524c86bdd542a54857d5d076b1b6778c78c
https://git.kernel.org/stable/c/a34946ec3de88a16cc3a87fdab50aad06255a22b
https://git.kernel.org/stable/c/acd413da3e1f37582207cd6078a41d57c9011918
https://git.kernel.org/stable/c/d1fe1aede684bd014714dacfdc75586a9ad38657
https://git.kernel.org/stable/c/f9b891a7e8fcf83901f8507241e23e7420103b61
rh#2281313
CVE-2023-52687kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52687
SMASH Issue 406480
bnc#1224501
https://git.kernel.org/stable/c/4c0ac81a172a69a7733290915276672787e904ec
https://git.kernel.org/stable/c/8084b788c2fb1260f7d44c032d5124680b20d2b2
https://git.kernel.org/stable/c/87e02063d07708cac5bfe9fd3a6a242898758ac8
https://git.kernel.org/stable/c/fc0b785802b856566df3ac943e38a072557001c4
rh#2281309
CVE-2023-52688kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52688
SMASH Issue 406421
bnc#1224631
https://git.kernel.org/stable/c/898d8b3e1414cd900492ee6a0b582f8095ba4a1a
https://git.kernel.org/stable/c/b4e593a7a22fa3c7d0550ef51c90b5c21f790aa8
rh#2281307
CVE-2023-52689kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52689
SMASH Issue 406395
bnc#1224684
https://git.kernel.org/stable/c/74e3de7cdcc31ce75ab42350ae0946eff62a2da2
https://git.kernel.org/stable/c/993f7b42fa066b055e3a19b7f76ad8157c0927a0
rh#2281305
CVE-2023-52690kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52690
SMASH Issue 406436
bnc#1224611
https://git.kernel.org/stable/c/1eefa93faf69188540b08b024794fa90b1d82e8b
https://git.kernel.org/stable/c/2a82c4439b903639e0a1f21990cd399fb0a49c19
https://git.kernel.org/stable/c/9a260f2dd827bbc82cc60eb4f4d8c22707d80742
https://git.kernel.org/stable/c/a9c05cbb6644a2103c75b6906e9dafb9981ebd13
https://git.kernel.org/stable/c/dd8422ff271c22058560832fc3006324ded895a9
https://git.kernel.org/stable/c/ed8d023cfa97b559db58c0e1afdd2eec7a83d8f2
https://git.kernel.org/stable/c/f84c1446daa552e9699da8d1f8375eac0f65edc7
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
rh#2281303
CVE-2023-52692kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52692
SMASH Issue 406413
bnc#1224628
https://git.kernel.org/stable/c/145c5aa51486171025ab47f35cff34bff8d0cea3
https://git.kernel.org/stable/c/51d5697e1c0380d482c3eab002bfc8d0be177e99
https://git.kernel.org/stable/c/996fde492ad9b9563ee483b363af40d7696a8467
https://git.kernel.org/stable/c/be96acd3eaa790d10a5b33e65267f52d02f6ad88
https://git.kernel.org/stable/c/ca459dfa7d4ed9098fcf13e410963be6ae9b6bf3
rh#2281298
CVE-2023-52694kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52694
SMASH Issue 406462
bnc#1224598
https://git.kernel.org/stable/c/08ccff6ece35f08e8107e975903c370d849089e5
https://git.kernel.org/stable/c/53926e2a39629702f7f809d614b3ca89c2478205
https://git.kernel.org/stable/c/81f1bd85960b7a089a91e679ff7cd2524390bbf1
https://git.kernel.org/stable/c/a8657406e12aa10412134622c58977ac657f16d2
https://git.kernel.org/stable/c/ce3e112e7ae854249d8755906acc5f27e1542114
https://git.kernel.org/stable/c/e00ec5901954d85b39b5f10f94e60ab9af463eb1
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
rh#2281294
CVE-2023-52695kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52695
SMASH Issue 406479
bnc#1224506
https://git.kernel.org/stable/c/0fe85301b95077ac4fa4a91909d38b7341e81187
https://git.kernel.org/stable/c/dbf5d3d02987faa0eec3710dd687cd912362d7b5
rh#2281292
CVE-2023-52697kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52697
SMASH Issue 406460
bnc#1224596
https://git.kernel.org/stable/c/582231a8c4f73ac153493687ecc1bed853e9c9ef
https://git.kernel.org/stable/c/a410d58117d6da4b7d41f3c91365f191d006bc3d
https://git.kernel.org/stable/c/e38e252dbceeef7d2f848017132efd68e9ae1416
rh#2281288
CVE-2023-52701kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2023-52701
SMASH Issue 407126
bnc#1225021
https://git.kernel.org/stable/c/2558b8039d059342197610498c8749ad294adee5
https://git.kernel.org/stable/c/863a7de987f02a901bf215509276a7de0370e0f9
rh#2282608
CVE-2023-52702kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52702
SMASH Issue 407162
bnc#1224945
https://git.kernel.org/stable/c/1563e998a938f095548054ef09e277b562b79536
https://git.kernel.org/stable/c/2fa28f5c6fcbfc794340684f36d2581b4f2d20b5
https://git.kernel.org/stable/c/c0f65ee0a3329eb4b94beaef0268633696e2d0c6
https://git.kernel.org/stable/c/e336a9e08618203a456fb5367f1387b14554f55e
rh#2282610
CVE-2023-52703kernel-source-rt:Unsupportedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2023-52703
SMASH Issue 407207
bnc#1225549
https://git.kernel.org/stable/c/02df3170c04a8356cd571ab9155a42f030190abc
https://git.kernel.org/stable/c/1b5de7d44890b78519acbcc80d8d1f23ff2872e5
https://git.kernel.org/stable/c/338f826d3afead6e4df521f7972a4bef04a72efb
https://git.kernel.org/stable/c/525bdcb0838d19d918c7786151ee14661967a030
https://git.kernel.org/stable/c/723ef7b66f37c0841f5a451ccbce47ee1641e081
https://git.kernel.org/stable/c/a753352622b4f3c0219e0e9c73114b2848ae6042
https://git.kernel.org/stable/c/c68f345b7c425b38656e1791a0486769a8797016
jsc#CAR-3710
rh#2282612
CVE-2023-52704kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52704
SMASH Issue 407216
bnc#1225226
https://git.kernel.org/stable/c/7f9f6c54da876b3f0bece2b569456ceb96965ed7
https://git.kernel.org/stable/c/eedeb787ebb53de5c5dcf7b7b39d01bf1b0f037d
rh#2282611
CVE-2023-52706kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52706
SMASH Issue 406991
bnc#1225473
https://git.kernel.org/stable/c/79eeab1d85e0fee4c0bc36f3b6ddf3920f39f74b
https://git.kernel.org/stable/c/854e1ecff266033d3149666d3c5b8b0e174b4210
rh#2282614
CVE-2023-52731kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52731
SMASH Issue 407186
bnc#1224929
https://git.kernel.org/stable/c/3efc61d95259956db25347e2a9562c3e54546e20
https://git.kernel.org/stable/c/87b9802ca824fcee7915e717e9a60471af62e8e9
https://git.kernel.org/stable/c/f1d91f0e9d5a240a809698d7d9c5a538e7dcc149
rh#2282787
CVE-2023-52734kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2023-52734
SMASH Issue 407187
bnc#1225234
https://git.kernel.org/stable/c/90fcf55d83b20da1091f926a291af05fb74f61c6
https://git.kernel.org/stable/c/99875ea9b5b47995bfb3c684d21eb17feb4b7e6a
https://git.kernel.org/stable/c/de5ca4c3852f896cacac2bf259597aab5e17d9e3
https://git.kernel.org/stable/c/f6415c9c9a0b3881543d38528a58b54af4351522
https://git.kernel.org/stable/c/fbe71c5dacaa5a9960323215f118958174c81aa0
jsc#CAR-3670
rh#2282728
CVE-2023-52735kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52735
SMASH Issue 406898
bnc#1225475
https://git.kernel.org/stable/c/5b4a79ba65a1ab479903fff2e604865d229b70a9
https://git.kernel.org/stable/c/7499859881488da97589f3c79cc66fa75748ad49
https://git.kernel.org/stable/c/f312367f5246e04df564d341044286e9e37a97ba
rh#2282618
CVE-2023-52737kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52737
SMASH Issue 407195
bnc#1225484
https://git.kernel.org/stable/c/519b7e13b5ae8dd38da1e52275705343be6bb508
https://git.kernel.org/stable/c/d8c594da79bc0244e610a70594e824a401802be1
CVE-2023-52738kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52738
SMASH Issue 407137
bnc#1225005
https://git.kernel.org/stable/c/2bcbbef9cace772f5b7128b11401c515982de34b
https://git.kernel.org/stable/c/2e557c8ca2c585bdef591b8503ba83b85f5d0afd
https://git.kernel.org/stable/c/5ad7bbf3dba5c4a684338df1f285080f2588b535
rh#2282684
CVE-2023-52739kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52739
SMASH Issue 407080
bnc#1225118
bnc#1225119
https://git.kernel.org/stable/c/0a626e27f984dfbe96bd8e4fd08f20a2ede3ea23
https://git.kernel.org/stable/c/3af734f3eac6f70ef8e272a80da40544b9d0f2b5
https://git.kernel.org/stable/c/3b4c045a98f53a8890a94bb5846a390c8e39e673
https://git.kernel.org/stable/c/462a8e08e0e6287e5ce13187257edbf24213ed03
CVE-2023-52740kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52740
SMASH Issue 406911
bnc#1225471
https://git.kernel.org/stable/c/2ea31e2e62bbc4d11c411eeb36f1b02841dbcab1
https://git.kernel.org/stable/c/6f097c24815e67909a1fcc2c605586d02babd673
https://git.kernel.org/stable/c/86f7e423933608d536015a0f2eb9e0338c1227e0
rh#2282741
CVE-2023-52744kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52744
SMASH Issue 407078
bnc#1225121
https://git.kernel.org/stable/c/360682fe7df262d94fae54f737c487bec0f9190d
https://git.kernel.org/stable/c/5d9745cead1f121974322b94ceadfb4d1e67960e
https://git.kernel.org/stable/c/8f5fe1cd8e6a97f94840b55f59ed08cbc397086f
rh#2282775
CVE-2023-52745kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52745
SMASH Issue 407116
bnc#1225032
https://git.kernel.org/stable/c/1b4ef90cbcfa603b3bb536fbd6f261197012b6f6
https://git.kernel.org/stable/c/4a779187db39b2f32d048a752573e56e4e77807f
https://git.kernel.org/stable/c/7197460dcd43ff0e4a502ba855dd82d37c2848cc
https://git.kernel.org/stable/c/b1afb666c32931667c15ad1b58e7203f0119dcaf
https://git.kernel.org/stable/c/e632291a2dbce45a24cddeb5fe28fe71d724ba43
CVE-2023-52746kernel-source-rt:Not affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2023-52746
SMASH Issue 407086
bnc#1225114
https://git.kernel.org/stable/c/419674224390fca298020fc0751a20812f84b12d
https://git.kernel.org/stable/c/5dc688fae6b7be9dbbf5304a3d2520d038e06db5
https://git.kernel.org/stable/c/a893cc644812728e86e9aff517fd5698812ecef0
https://git.kernel.org/stable/c/b6ee896385380aa621102e8ea402ba12db1cabff
rh#2282702
CVE-2023-52748kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2023-52748
SMASH Issue 407099
bnc#1225093
https://git.kernel.org/stable/c/3eebe636cac53886bd5d1cdd55e082ec9e84983f
https://git.kernel.org/stable/c/526dd7540a09ecf87b5f54f3ab4e0a2528f25a79
https://git.kernel.org/stable/c/6fca08fd3085253b48fcb1bd243a0a5e18821a00
https://git.kernel.org/stable/c/c041f5ddef00c731c541e00bc8ae97b8c84c682f
https://git.kernel.org/stable/c/e0d4e8acb3789c5a8651061fbab62ca24a45c063
https://git.kernel.org/stable/c/e4088d7d8f1123006d46a42edf51b8c960a58ef9
CVE-2023-52750kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52750
SMASH Issue 406949
bnc#1225485
https://git.kernel.org/stable/c/146a15b873353f8ac28dc281c139ff611a3c4848
https://git.kernel.org/stable/c/69e619d2fd056fe1f5d0adf01584f2da669e0d28
https://git.kernel.org/stable/c/936c9c10efaefaf1ab3ef020e1f8aaaaff1ad2f9
https://git.kernel.org/stable/c/bd31e534721ab95ef237020fe6995c899ffdf21a
https://git.kernel.org/stable/c/d08a1e75253b4e19ae290b1c35349f12cfcebc0a
https://git.kernel.org/stable/c/ef0224ee5399ea8a46bc07dc6c6494961ed5fdd2
rh#2282617
CVE-2023-52751kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52751
SMASH Issue 407182
bnc#1225489
https://git.kernel.org/stable/c/5c86919455c1edec99ebd3338ad213b59271a71b
https://git.kernel.org/stable/c/6db94d08359c43f2c8fe372811cdee04564a41b9
https://git.kernel.org/stable/c/93877b9afc2994c89362007aac480a7b150f386f
CVE-2023-52755kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52755
SMASH Issue 407087
bnc#1225481
https://git.kernel.org/stable/c/09d9d8b40a3338193619c14ed4dc040f4f119e70
https://git.kernel.org/stable/c/712e01f32e577e7e48ab0adb5fe550646a3d93cb
https://git.kernel.org/stable/c/8387c94d73ec66eb597c7a23a8d9eadf64bfbafa
https://git.kernel.org/stable/c/aaf0a07d60887d6c36fc46a24de0083744f07819
https://git.kernel.org/stable/c/eebff19acaa35820cb09ce2ccb3d21bee2156ffb
rh#2282663
CVE-2023-52756kernel-source-rt:Ignoremoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2023-52756
SMASH Issue 407168
bnc#1225461
https://git.kernel.org/stable/c/1fb3a9c59e7f7d2b1d737a0d6e02e31d5b516455
https://git.kernel.org/stable/c/45d0a298e05adee521f6fe605d6a88341ba07edd
https://git.kernel.org/stable/c/a7ee519e8095d9c834086d0ff40da11415e1e4d7
https://git.kernel.org/stable/c/a98ff250b5af87f92f17bb9725cb21de1931ee57
https://git.kernel.org/stable/c/bce1f7c7e9812da57de1dda293cba87c693e9958
https://git.kernel.org/stable/c/c19a8794bf4fe45cff997f07a75ea84cc9e5d89c
https://git.kernel.org/stable/c/d27abbfd4888d79dd24baf50e774631046ac4732
https://git.kernel.org/stable/c/e52518b9cb9fc98fc043c8fb2b8cfc619ca8a88b
https://git.kernel.org/stable/c/eca19db60f99925461f49c3fd743733881395728
CVE-2023-52758kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2023-52758
SMASH Issue 407085
bnc#1225270
https://git.kernel.org/stable/c/38ada2f304f6f2065dd59613ef236a26f4dd73cd
https://git.kernel.org/stable/c/aff8be2cad74a22525cd89cdff0b72a5c9a4c0c6
https://git.kernel.org/stable/c/bef76b8544939518dafa3325bcd438b111136437
https://git.kernel.org/stable/c/cc9c54232f04aef3a5d7f64a0ece7df00f1aaa3d
https://git.kernel.org/stable/c/fe4eb2157d8c45b127bd88b1376c38c27b741293
rh#2282746
CVE-2023-52759kernel-source-rt:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52759
SMASH Issue 407129
bnc#1225560
https://git.kernel.org/stable/c/119565e566f91ff3588ffcd5812f0c8061586c6b
https://git.kernel.org/stable/c/1c28dace66015b675a343b89b0c87abbfda05ff4
https://git.kernel.org/stable/c/212f112fe5e90e98eb8d48585682880dae139f4c
https://git.kernel.org/stable/c/2a054b87a1b799b391e578597a42ee6e57a987ae
https://git.kernel.org/stable/c/2bb42a27a92ff3984c9fa5fbe128eced3ea693f2
https://git.kernel.org/stable/c/4c6a08125f2249531ec01783a5f4317d7342add5
https://git.kernel.org/stable/c/53fc16c1ad84f5467ec24341670b63aa759335d3
https://git.kernel.org/stable/c/5bfda356e903633d16ae1bac1ee38364e12628a3
https://git.kernel.org/stable/c/b4deec69fe32b58dc5fb4ace52456ece85b75561
rh#2282666
CVE-2023-52760kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52760
SMASH Issue 407143
bnc#1225562
https://git.kernel.org/stable/c/08a28272faa750d4357ea2cb48d2baefd778ea81
https://git.kernel.org/stable/c/bdcb8aa434c6d36b5c215d02a9ef07551be25a37
CVE-2023-52761kernel-source-rt:Not affectedlow ()CVE-2023-52761
SMASH Issue 407213
bnc#1225459
https://git.kernel.org/stable/c/1493baaf09e3c1899959c8a107cd1207e16d1788
https://git.kernel.org/stable/c/be97d0db5f44c0674480cb79ac6f5b0529b84c76
https://git.kernel.org/stable/c/eff53aea3855f71992c043cebb1c00988c17ee20
rh#2282739
CVE-2023-52763kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52763
SMASH Issue 407206
bnc#1225570
https://git.kernel.org/stable/c/39c71357e68e2f03766f9321b9f4882e49ff1442
https://git.kernel.org/stable/c/3cb79a365e7cce8f121bba91312e2ddd206b9781
https://git.kernel.org/stable/c/b53e9758a31c683fc8615df930262192ed5f034b
https://git.kernel.org/stable/c/e64d23dc65810be4e3395d72df0c398f60c991f9
https://git.kernel.org/stable/c/eed74230435c61eeb58abaa275b1820e6a4b7f02
CVE-2023-52765kernel-source-rt:Not affectedlow ()CVE-2023-52765
SMASH Issue 407120
bnc#1225029
https://git.kernel.org/stable/c/4ce77b023d42a9f1062eecf438df1af4b4072eb2
https://git.kernel.org/stable/c/7b439aaa62fee474a0d84d67a25f4984467e7b95
https://git.kernel.org/stable/c/affae18838db5e6b463ee30c821385695af56dc2
https://git.kernel.org/stable/c/db98de0809f12b0edb9cd1be78e1ec1bfeba8f40
CVE-2023-52766kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-52766
SMASH Issue 407167
https://git.kernel.org/stable/c/45a832f989e520095429589d5b01b0c65da9b574
https://git.kernel.org/stable/c/4c86cb2321bd9c72d3b945ce7f747961beda8e65
https://git.kernel.org/stable/c/7c2b91b30d74d7c407118ad72502d4ca28af1af6
https://git.kernel.org/stable/c/8be39f66915b40d26ea2c18ba84b5c3d5da6809b
https://git.kernel.org/stable/c/d23ad76f240c0f597b7a9eb79905d246f27d40df
CVE-2023-52767kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52767
SMASH Issue 407147
bnc#1224998
https://git.kernel.org/stable/c/2214e2bb5489145aba944874d0ee1652a0a63dc8
https://git.kernel.org/stable/c/53f2cb491b500897a619ff6abd72f565933760f0
https://git.kernel.org/stable/c/944900fe2736c07288efe2d9394db4d3ca23f2c9
CVE-2023-52768kernel-source-rt:Not affectedmoderate5.6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H)CVE-2023-52768
SMASH Issue 407138
bnc#1225004
https://git.kernel.org/stable/c/05ac1a198a63ad66bf5ae8b7321407c102d40ef3
https://git.kernel.org/stable/c/3ce1c2c3999b232258f7aabab311d47dda75605c
https://git.kernel.org/stable/c/4b0d6ddb6466d10df878a7787f175a0e4adc3e27
https://git.kernel.org/stable/c/541b3757fd443a68ed8d25968eae511a8275e7c8
https://git.kernel.org/stable/c/6aaf7cd8bdfe245d3c9a8b48fe70c2011965948e
CVE-2023-52769kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52769
SMASH Issue 407141
bnc#1225001
https://git.kernel.org/stable/c/6afc57ea315e0f660b1f870a681737bb7b71faef
https://git.kernel.org/stable/c/afd3425bd69610f318403084fe491e24a1357fb9
https://git.kernel.org/stable/c/d908ca431e20b0e4bfc5d911d1744910ed779bdb
CVE-2023-52770kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52770
SMASH Issue 407112
bnc#1225033
https://git.kernel.org/stable/c/9de787139b0258a5dd1f498780c26d76b61d2958
https://git.kernel.org/stable/c/d83309e7e006cee8afca83523559017c824fbf7a
https://git.kernel.org/stable/c/f803982190f0265fd36cf84670aa6daefc2b0768
rh#2282700
CVE-2023-52771kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52771
SMASH Issue 407133
bnc#1225007
https://git.kernel.org/stable/c/37179fcc916bce8c3cc7b36d67ef814cce55142b
https://git.kernel.org/stable/c/6b2e428e673b3f55965674a426c40922e91388aa
https://git.kernel.org/stable/c/8d2ad999ca3c64cb08cf6a58d227b9d9e746d708
rh#2282720
CVE-2023-52772kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52772
SMASH Issue 407150
bnc#1224989
bnc#1224991
https://git.kernel.org/stable/c/069a3ec329ff43e7869a3d94c62cd03203016bce
https://git.kernel.org/stable/c/4b7b492615cf3017190f55444f7016812b66611d
https://git.kernel.org/stable/c/75bcfc188abf4fae9c1d5f5dc0a03540be602eef
https://git.kernel.org/stable/c/d179189eec426fe4801e4b91efa1889faed12700
https://git.kernel.org/stable/c/eae0b295ce16d8c8b4114c3037993191b4bb92f0
rh#2282771
CVE-2023-52773kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52773
SMASH Issue 407110
bnc#1225041
https://git.kernel.org/stable/c/1d07b7e84276777dad3c8cfebdf8e739606f90c9
https://git.kernel.org/stable/c/5b14cf37b9f01de0b28c6f8960019d4c7883ce42
https://git.kernel.org/stable/c/b71f4ade1b8900d30c661d6c27f87c35214c398c
https://git.kernel.org/stable/c/fb5c134ca589fe670430acc9e7ebf2691ca2476d
rh#2282671
CVE-2023-52775kernel-source-rt:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)CVE-2023-52775
SMASH Issue 406890
bnc#1225088
https://git.kernel.org/stable/c/5ada292b5c504720a0acef8cae9acc62a694d19c
https://git.kernel.org/stable/c/7234d2b5dffa5af77fd4e0deaebab509e130c6b1
https://git.kernel.org/stable/c/90072af9efe8c7bd7d086709014ddd44cebd5e7c
https://git.kernel.org/stable/c/94a0ae698b4d5d5bb598e23228002a1491c50add
https://git.kernel.org/stable/c/e6d71b437abc2f249e3b6a1ae1a7228e09c6e563
rh#2282690
CVE-2023-52776kernel-source-rt:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)CVE-2023-52776
SMASH Issue 407203
bnc#1225090
https://git.kernel.org/stable/c/69bd216e049349886405b1c87a55dce3d35d1ba7
https://git.kernel.org/stable/c/774de37c147fea81f2c2e4be5082304f4f71d535
https://git.kernel.org/stable/c/d7a5f7f76568e48869916d769e28b9f3ca70c78e
rh#2282776
CVE-2023-52777kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52777
SMASH Issue 407149
bnc#1224992
https://git.kernel.org/stable/c/0cf7577b6b3153b4b49deea9719fe43f96469c6d
https://git.kernel.org/stable/c/1dea3c0720a146bd7193969f2847ccfed5be2221
https://git.kernel.org/stable/c/cf9c7d783a2bf9305df4ef5b93d9063a52e18fca
https://git.kernel.org/stable/c/e83246ecd3b193f8d91fce778e8a5ba747fc7d8a
rh#2282642
CVE-2023-52778kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2023-52778
SMASH Issue 407158
bnc#1224948
https://git.kernel.org/stable/c/342b528c0e849bed9def76dadaa470d3af678e94
https://git.kernel.org/stable/c/57ced2eb77343a91d28f4a73675b05fe7b555def
https://git.kernel.org/stable/c/70ff9b65a72885b3a2dfde6709da1f19b85fa696
https://git.kernel.org/stable/c/9fce92f050f448a0d1ddd9083ef967d9930f1e52
rh#2282716
CVE-2023-52779kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52779
SMASH Issue 407122
bnc#1225027
https://git.kernel.org/stable/c/3fb0fa08641903304b9d81d52a379ff031dc41d4
https://git.kernel.org/stable/c/8a924db2d7b5eb69ba08b1a0af46e9f1359a9bdf
rh#2282724
CVE-2023-52780kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52780
SMASH Issue 407178
bnc#1224933
https://git.kernel.org/stable/c/00768b3e90e648227eaa959d9d279f5e32823df1
https://git.kernel.org/stable/c/230dc06e2495487d88b3410da055bb618febb19b
https://git.kernel.org/stable/c/2b0e99072654edd601d05c0061a20337af5008ba
https://git.kernel.org/stable/c/ca8add922f9c7f6e2e3c71039da8e0dcc64b87ed
rh#2282675
CVE-2023-52781kernel-source-rt:Ignoremoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2023-52781
SMASH Issue 407194
bnc#1225092
https://git.kernel.org/stable/c/64c27b7b2357ddb38b6afebaf46d5bff4d250702
https://git.kernel.org/stable/c/7c0244cc311a4038505b73682b7c8ceaa5c7a8c8
https://git.kernel.org/stable/c/974bba5c118f4c2baf00de0356e3e4f7928b4cbc
https://git.kernel.org/stable/c/9ef94ec8e52eaf7b9abc5b5f8f5b911751112223
https://git.kernel.org/stable/c/f89fef7710b2ba0f7a1e46594e530dcf2f77be91
jsc#CAR-3592
rh#2282698
CVE-2023-52782kernel-source-rt:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52782
SMASH Issue 406984
bnc#1225103
https://git.kernel.org/stable/c/4d510506b46504664eacf8a44a9e8f3e54c137b8
https://git.kernel.org/stable/c/7e3f3ba97e6cc6fce5bf62df2ca06c8e59040167
https://git.kernel.org/stable/c/a9d6c0c5a6bd9ca88e964f8843ea41bc085de866
rh#2282705
CVE-2023-52783kernel-source-rt:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52783
SMASH Issue 406858
bnc#1225104
https://git.kernel.org/stable/c/61a55071653974dab172d4c5d699bb365cfd13c9
https://git.kernel.org/stable/c/8ba2c459668cfe2aaacc5ebcd35b4b9ef8643013
rh#2282722
CVE-2023-52785kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52785
SMASH Issue 407156
bnc#1224950
https://git.kernel.org/stable/c/27900d7119c464b43cd9eac69c85884d17bae240
https://git.kernel.org/stable/c/8f15a7e3c054d960bbd1521110700450bbf798a1
https://git.kernel.org/stable/c/f84d461f33a6b27304d468d9cfb56c0cefdb4ee7
rh#2282651
CVE-2023-52786kernel-source-rt:Not affectedlow3.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2023-52786
SMASH Issue 407171
bnc#1224939
https://git.kernel.org/stable/c/7343c23ebcadbedc23a7063d1e24d976eccb0d0d
https://git.kernel.org/stable/c/ce56d21355cd6f6937aca32f1f44ca749d1e4808
https://git.kernel.org/stable/c/e3b83d87c93eb6fc96a80b5e8527f7dc9f5a11bc
rh#2282779
CVE-2023-52787kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52787
SMASH Issue 407199
bnc#1225105
https://git.kernel.org/stable/c/b0077e269f6c152e807fdac90b58caf012cdbaab
https://git.kernel.org/stable/c/b5c8e0ff76d10f6bf70a7237678f27c20cf59bc9
https://git.kernel.org/stable/c/b80056bd75a16e4550873ecefe12bc8fd190b1cf
https://git.kernel.org/stable/c/e9c309ded295b7f8849097d71ae231456ca79f78
rh#2282755
CVE-2023-52788kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52788
SMASH Issue 406969
bnc#1225106
https://git.kernel.org/stable/c/10f49cdfd5fb342a1a9641930dc040c570694e98
https://git.kernel.org/stable/c/1566e8be73fd5fa424e88d2a4cffdc34f970f0e1
https://git.kernel.org/stable/c/471aa951bf1206d3c10d0daa67005b8e4db4ff83
https://git.kernel.org/stable/c/55db76caa782baa4a1bf02296e2773c38a524a3e
https://git.kernel.org/stable/c/bf8e105030083e7b71591cdf437e464bcd8a0c09
rh#2282652
CVE-2023-52789kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52789
SMASH Issue 407095
bnc#1225180
https://git.kernel.org/stable/c/38cd56fc9de78bf3c878790785e8c231116ef9d3
https://git.kernel.org/stable/c/460284dfb10b207980c6f3f7046e33446ceb38ac
https://git.kernel.org/stable/c/4a24a31826246b15477399febd13292b0c9f0ee9
https://git.kernel.org/stable/c/4ef41a7f33ffe1a335e7db7e1564ddc6afad47cc
https://git.kernel.org/stable/c/6c80f48912b5bd4965352d1a9a989e21743a4a06
https://git.kernel.org/stable/c/7cebc86481bf16049e266f6774d90f2fd4f8d5d2
https://git.kernel.org/stable/c/8f8771757b130383732195497e47fba2aba76d3a
https://git.kernel.org/stable/c/909963e0c16778cec28efb1affc21558825f4200
https://git.kernel.org/stable/c/d81ffb87aaa75f842cd7aa57091810353755b3e6
jsc#CAR-3625
rh#2282756
CVE-2023-52790kernel-source-rt:Not affectedmoderate ()CVE-2023-52790
SMASH Issue 407196
bnc#1225107
https://git.kernel.org/stable/c/53c87e846e335e3c18044c397cc35178163d7827
https://git.kernel.org/stable/c/ce7612496a4ba6068bc68aa1fa9d947dadb4ad9b
rh#2282634
CVE-2023-52792kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52792
SMASH Issue 407024
bnc#1225477
https://git.kernel.org/stable/c/0718588c7aaa7a1510b4de972370535b61dddd0d
https://git.kernel.org/stable/c/07ffcd8ec79cf7383e1e45815f4842fd357991c2
https://git.kernel.org/stable/c/9090c5537c93cd0811ab7bfbd925b57addfffb60
https://git.kernel.org/stable/c/90db4c1d5ebaf574d3c3065c055977982c378a83
rh#2282632
CVE-2023-52793kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N)CVE-2023-52793
SMASH Issue 407166
bnc#1224943
https://git.kernel.org/stable/c/61576b7a0f28f924da06bead92a39a6d9aa2404a
https://git.kernel.org/stable/c/9220c3ef6fefbf18f24aeedb1142a642b3de0596
https://git.kernel.org/stable/c/de4825a444560f8cb78b03dda3ba873fab88bc4f
rh#2282769
CVE-2023-52794kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2023-52794
SMASH Issue 407121
bnc#1225028
https://git.kernel.org/stable/c/0a8585281b11e3a0723bba8d8085d61f0b55f37c
https://git.kernel.org/stable/c/6a3866dbdcf39ac93e98708e6abced511733dc18
https://git.kernel.org/stable/c/fae633cfb729da2771b5433f6b84ae7e8b4aa5f7
rh#2282718
CVE-2023-52795kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52795
SMASH Issue 407103
bnc#1225085
https://git.kernel.org/stable/c/ae8ea4e200675a940c365b496ef8e3fb4123601c
https://git.kernel.org/stable/c/bf04132cd64ccde4e9e9765d489c83fe83c09b7f
https://git.kernel.org/stable/c/c0f8b8fb7df9d1a38652eb5aa817afccd3c56111
https://git.kernel.org/stable/c/e07754e0a1ea2d63fb29574253d1fd7405607343
rh#2282701
CVE-2023-52797kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2023-52797
SMASH Issue 407083
bnc#1225115
https://git.kernel.org/stable/c/2c86b24095fcf72cf51bc72d12e4350163b4e11d
https://git.kernel.org/stable/c/45a0de41ec383c8b7c6d442734ba3852dd2fc4a7
https://git.kernel.org/stable/c/c6e316ac05532febb0c966fa9b55f5258ed037be
rh#2282726
CVE-2023-52798kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52798
SMASH Issue 407159
bnc#1224947
https://git.kernel.org/stable/c/1fd878e1750190a612b5de2af357cca422ec0822
https://git.kernel.org/stable/c/21ebb0aba580d347e12f01ce5f6e75044427b3d5
https://git.kernel.org/stable/c/3b6c14833165f689cc5928574ebafe52bbce5f1e
https://git.kernel.org/stable/c/426e718ce9ba60013364a54233feee309356cb82
https://git.kernel.org/stable/c/ca420ac4f9451f22347bae44b18ab47ba2c267ec
https://git.kernel.org/stable/c/f882f51905517575c9f793a3dff567af90ef9a10
rh#2282648
CVE-2023-52800kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52800
SMASH Issue 407100
https://git.kernel.org/stable/c/03ed26935bebf6b6fd8a656490bf3dcc71b72679
https://git.kernel.org/stable/c/3a51e6b4da71fdfa43ec006d6abc020f3e22d14e
https://git.kernel.org/stable/c/3f77c7d605b29df277d77e9ee75d96e7ad145d2d
https://git.kernel.org/stable/c/423762f021825b5e57c3d6f01ff96a9ff19cdcd8
https://git.kernel.org/stable/c/69cede2a5a5f60e3f5602b901b52cb64edd2ea6c
https://git.kernel.org/stable/c/e3199b3fac65c9f103055390b6fd07c5cffa5961
rh#2282764
CVE-2023-52801kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52801
SMASH Issue 407135
bnc#1225006
https://git.kernel.org/stable/c/836db2e7e4565d8218923b3552304a1637e2f28d
https://git.kernel.org/stable/c/e7250ab7ca4998fe026f2149805b03e09dc32498
https://git.kernel.org/stable/c/fcb32111f01ddf3cbd04644cde1773428e31de6a
rh#2282709
CVE-2023-52802kernel-source-rt:Not affectedlow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2023-52802
SMASH Issue 407114
bnc#1225474
https://git.kernel.org/stable/c/3a23b384e7e3d64d5587ad10729a34d4f761517e
https://git.kernel.org/stable/c/5b82e4240533bcd4691e50b64ec86d0d7fbd21b9
https://git.kernel.org/stable/c/b028f89c56e964a22d3ddb8eab1a0e7e980841b9
https://git.kernel.org/stable/c/b80aaff5f7817d50798ac61ed75973f004dd5202
rh#2282620
CVE-2023-52803kernel-source-rt:Ignoremoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52803
SMASH Issue 407132
bnc#1225008
https://git.kernel.org/stable/c/194454afa6aa9d6ed74f0c57127bc8beb27c20df
https://git.kernel.org/stable/c/1cdb52ffd6600a37bd355d8dce58ecd03e55e618
https://git.kernel.org/stable/c/7749fd2dbef72a52b5c9ffdbf877691950ed4680
https://git.kernel.org/stable/c/bfca5fb4e97c46503ddfc582335917b0cc228264
https://git.kernel.org/stable/c/cc2e7ebbeb1d0601f7f3c8d93b78fcc03a95e44a
https://git.kernel.org/stable/c/dedf2a0eb9448ae73b270743e6ea9b108189df46
jsc#CAR-3576
rh#2282727
CVE-2023-52806kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52806
SMASH Issue 407125
bnc#1225554
https://git.kernel.org/stable/c/2527775616f3638f4fd54649eba8c7b84d5e4250
https://git.kernel.org/stable/c/25354bae4fc310c3928e8a42fda2d486f67745d7
https://git.kernel.org/stable/c/43b91df291c8802268ab3cfd8fccfdf135800ed4
https://git.kernel.org/stable/c/4a320da7f7cbdab2098b103c47f45d5061f42edd
https://git.kernel.org/stable/c/631a96e9eb4228ff75fce7e72d133ca81194797e
https://git.kernel.org/stable/c/758c7733cb821041f5fd403b7b97c0b95d319323
https://git.kernel.org/stable/c/7de25112de8222fd20564769e6c99dc9f9738a0b
https://git.kernel.org/stable/c/f93dc90c2e8ed664985e366aa6459ac83cdab236
https://git.kernel.org/stable/c/fe7c1a0c2b25c82807cb46fc3aadbf2664a682b0
jsc#CAR-3714
rh#2282753
CVE-2023-52807kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H)CVE-2023-52807
SMASH Issue 407094
bnc#1225097
https://git.kernel.org/stable/c/07f5b8c47152cadbd9102e053dcb60685820aa09
https://git.kernel.org/stable/c/53aba458f23846112c0d44239580ff59bc5c36c3
https://git.kernel.org/stable/c/be1f703f39efa27b7371b9a4cd983317f1366792
https://git.kernel.org/stable/c/f79d985c69060047426be68b7e4c1663d5d731b4
rh#2282711
CVE-2023-52808kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52808
SMASH Issue 407212
bnc#1225555
https://git.kernel.org/stable/c/33331b265aac9441ac0c1a5442e3f05d038240ec
https://git.kernel.org/stable/c/6de426f9276c448e2db7238911c97fb157cb23be
https://git.kernel.org/stable/c/75a2656260fe8c7eeabda6ff4600b29e183f48db
https://git.kernel.org/stable/c/b4465009e7d60c6111946db4c8f1e50d401ed7be
https://git.kernel.org/stable/c/f0bfc8a5561fb0b2c48183dcbfe00bdd6d973bd3
rh#2282665
CVE-2023-52812kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2023-52812
SMASH Issue 407177
bnc#1225564
https://git.kernel.org/stable/c/09f617219fe9ccd8d7b65dc3e879b5889f663b5a
https://git.kernel.org/stable/c/406e8845356d18bdf3d3a23b347faf67706472ec
https://git.kernel.org/stable/c/5b4574b663d0a1a0a62d5232429b7db9ae6d0670
rh#2282782
CVE-2023-52814kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52814
SMASH Issue 407136
bnc#1225565
https://git.kernel.org/stable/c/80285ae1ec8717b597b20de38866c29d84d321a1
https://git.kernel.org/stable/c/9b70fc7d70e8ef7c4a65034c9487f58609e708a1
https://git.kernel.org/stable/c/b0702ee4d811708251cdf54d4a1d3e888d365111
https://git.kernel.org/stable/c/b93a25de28af153312f0fc979b0663fc4bd3442b
https://git.kernel.org/stable/c/c11cf5e117f50f5a767054600885acd981449afe
https://git.kernel.org/stable/c/da46e63482fdc5e35c008865c22ac64027f6f0c2
rh#2282655
CVE-2023-52815kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52815
SMASH Issue 407222
bnc#1225568
https://git.kernel.org/stable/c/33fb1a555354bd593f785935ddcb5d9dd4d3847f
https://git.kernel.org/stable/c/70f831f21155c692bb336c434936fd6f24f3f81a
https://git.kernel.org/stable/c/8c6c85a073768df68c1a3fea143d013a38c66d34
https://git.kernel.org/stable/c/cd90511557fdfb394bb4ac4c3b539b007383914c
https://git.kernel.org/stable/c/eaa03ea366c85ae3cb69c8d4bbc67c8bc2167a27
rh#2282781
CVE-2023-52816kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52816
SMASH Issue 407144
bnc#1225529
https://git.kernel.org/stable/c/2806f880379232e789957c2078d612669eb7a69c
https://git.kernel.org/stable/c/282c1d793076c2edac6c3db51b7e8ed2b41d60a5
https://git.kernel.org/stable/c/3f7a400d5e80f99581e3e8a9843e1f6118bf454f
https://git.kernel.org/stable/c/56649c43d40ce0147465a2d5756d300e87f9ee1c
https://git.kernel.org/stable/c/d33a35b13cbfec3238043f196fa87a6384f9d087
rh#2282734
CVE-2023-52820kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2023-52820
SMASH Issue 407225
bnc#1225269
https://git.kernel.org/stable/c/0f5f56745188b06f13509e5054231cb7a4cb047d
https://git.kernel.org/stable/c/301e597e7b81efa307dd0969ff8f2af9d7b9064e
https://git.kernel.org/stable/c/ea42bc330723644a0bd01d7124a601ab60b27747
https://git.kernel.org/stable/c/f37d63e219c39199a59b8b8a211412ff27192830
rh#2282688
CVE-2023-52822kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2023-52822
SMASH Issue 407128
bnc#1225035
https://git.kernel.org/stable/c/06ab64a0d836ac430c5f94669710a78aa43942cb
https://git.kernel.org/stable/c/1eacb4c96e73225a2f6f276bade006abbe4d8341
https://git.kernel.org/stable/c/21e29f1437b7c36c76efa908589578eaf0f50900
https://git.kernel.org/stable/c/412ce89669341dfd8ed98a4746ad3dbe9653a7b8
https://git.kernel.org/stable/c/689b33b94f096e717cd8f140a8b5502e7e4fe759
jsc#CAR-3580
rh#2282626
CVE-2023-52823kernel-source-rt:Not affectedlow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2023-52823
SMASH Issue 407102
bnc#1225039
https://git.kernel.org/stable/c/4fc857cc5cb9b7ce6940898857d773564973a584
https://git.kernel.org/stable/c/569c8d82f95eb5993c84fb61a649a9c4ddd208b3
https://git.kernel.org/stable/c/8332523b13dbfcce60f631dfb34ac90df021b4bd
https://git.kernel.org/stable/c/b0ed017a2b9735753eb95798d9f60176480424ca
https://git.kernel.org/stable/c/d4f2c09d4672f0e997ba4b1b589cc376be7ec938
rh#2282635
CVE-2023-52824kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2023-52824
SMASH Issue 406928
bnc#1225042
https://git.kernel.org/stable/c/0f403ebad98e6151aaa9c96c9aae5549aa4d87cd
https://git.kernel.org/stable/c/22260dabcfe30ab70440d91aa1e4a703d13925c4
https://git.kernel.org/stable/c/6995df256e4f5841fb45cf40d04f94b62b8067e1
https://git.kernel.org/stable/c/c7acf02df1673a4ea7d6401ac4bc773ffe6a88f6
https://git.kernel.org/stable/c/ca0776571d3163bd03b3e8c9e3da936abfaecbf6
rh#2282694
CVE-2023-52825kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52825
SMASH Issue 407165
bnc#1225076
https://git.kernel.org/stable/c/50f35a907c4f9ed431fd3dbb8b871ef1cbb0718e
https://git.kernel.org/stable/c/709c348261618da7ed89d6c303e2ceb9e453ba74
https://git.kernel.org/stable/c/7d43cdd22cd81a2b079e864c4321b9aba4c6af34
https://git.kernel.org/stable/c/c772eacbd6d0845fc922af8716bb9d29ae27b8cf
https://git.kernel.org/stable/c/fc0210720127cc6302e6d6f3de48f49c3fcf5659
rh#2282658
CVE-2023-52827kernel-source-rt:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2023-52827
SMASH Issue 407201
bnc#1225078
https://git.kernel.org/stable/c/1bc44a505a229bb1dd4957e11aa594edeea3690e
https://git.kernel.org/stable/c/79527c21a3ce04cffc35ea54f74ee087e532be57
https://git.kernel.org/stable/c/c9e44111da221246efb2e623ae1be40a5cf6542c
rh#2282777
CVE-2023-52828kernel-source-rt:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52828
SMASH Issue 406978
bnc#1225079
https://git.kernel.org/stable/c/327b92e8cb527ae097961ffd1610c720481947f5
https://git.kernel.org/stable/c/6058e4829696412457729a00734969acc6fd1d18
https://git.kernel.org/stable/c/66d9111f3517f85ef2af0337ece02683ce0faf21
https://git.kernel.org/stable/c/821a7e4143af115b840ec199eb179537e18af922
https://git.kernel.org/stable/c/aa42a7cb92647786719fe9608685da345883878f
https://git.kernel.org/stable/c/cf353904a82873e952633fcac4385c2fcd3a46e1
rh#2282668
CVE-2023-52829kernel-source-rt:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)CVE-2023-52829
SMASH Issue 407180
bnc#1225081
https://git.kernel.org/stable/c/4dd0547e8b45faf6f95373be5436b66cde326c0e
https://git.kernel.org/stable/c/b302dce3d9edea5b93d1902a541684a967f3c63c
https://git.kernel.org/stable/c/dfe13eaab043130f90dd3d57c7d88577c04adc97
rh#2282692
CVE-2023-52831kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52831
SMASH Issue 407210
bnc#1225533
https://git.kernel.org/stable/c/3073f6df783d9d75f7f69f73e16c7ef85d6cfb63
https://git.kernel.org/stable/c/335a47ed71e332c82339d1aec0c7f6caccfcda13
https://git.kernel.org/stable/c/3410b702354702b500bde10e3cc1f9db8731d908
https://git.kernel.org/stable/c/38685e2a0476127db766f81b1c06019ddc4c9ffa
rh#2282740
CVE-2023-52836kernel-source-rt:Not affectedlow0 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:N)CVE-2023-52836
SMASH Issue 407179
bnc#1225609
https://git.kernel.org/stable/c/304a2c4aad0fff887ce493e4197bf9cbaf394479
https://git.kernel.org/stable/c/9ed2d68b3925145f5f51c46559484881d6082f75
https://git.kernel.org/stable/c/bccdd808902f8c677317cec47c306e42b93b849e
https://git.kernel.org/stable/c/c56df79d68677cf062da1b6e3b33e74299a92dfc
https://git.kernel.org/stable/c/d4d37c9e6a4dbcca958dabd99216550525c7e389
https://git.kernel.org/stable/c/d8267cabbe1bed15ccf8b0e684c528bf8eeef715
https://git.kernel.org/stable/c/dcd85e3c929368076a7592b27f541e0da8b427f5
https://git.kernel.org/stable/c/e36407713163363e65566e7af0abe207d5f59a0c
https://git.kernel.org/stable/c/e89d0ed45a419c485bae999426ecf92697cbdda3
jsc#CAR-3732
rh#2282695
CVE-2023-52837kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52837
SMASH Issue 407176
bnc#1224935
https://git.kernel.org/stable/c/327462725b0f759f093788dfbcb2f1fd132f956b
https://git.kernel.org/stable/c/4e9b3ec84dc97909876641dad14e0a2300d6c2a3
https://git.kernel.org/stable/c/56bd7901b5e9dbc9112036ea615ebcba1565fafe
https://git.kernel.org/stable/c/879947f4180bc6e83af64eb0515e0cf57fce15db
rh#2282637
CVE-2023-52838kernel-source-rt:Not affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2023-52838
SMASH Issue 407119
bnc#1225031
https://git.kernel.org/stable/c/18d26f9baca7d0d309303e3074a2252b8310884a
https://git.kernel.org/stable/c/382e1931e0c9cd58a5a8519cdc6cd9dc4d82b485
https://git.kernel.org/stable/c/6c66d737b2726ac7784269ddf32a31634f8f269d
https://git.kernel.org/stable/c/7bc7b82fb2191b0d50a80ee4e27030918767dd1d
https://git.kernel.org/stable/c/8e4b510fe91782522b7ca0ca881b663b5d35e513
https://git.kernel.org/stable/c/a4dfebec32ec6d420a5506dd56a7834c91be28e4
https://git.kernel.org/stable/c/aba6ab57a910ad4b940c2024d15f2cdbf5b7f76b
https://git.kernel.org/stable/c/b346a531159d08c564a312a9eaeea691704f3c00
rh#2282761
CVE-2023-52839kernel-source-rt:Not affectedlow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2023-52839
SMASH Issue 407091
bnc#1225100
https://git.kernel.org/stable/c/61e3d993c8bd3e80f8f1363ed5e04f88ab531b72
https://git.kernel.org/stable/c/85be1a73fd298ed3fd060dfce97caef5f9928c57
rh#2282751
CVE-2023-52841kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52841
SMASH Issue 407209
bnc#1225592
https://git.kernel.org/stable/c/1fd6eb12642e0c32692924ff359c07de4b781d78
https://git.kernel.org/stable/c/64863ba8e6b7651d994c6e6d506cc8aa2ac45edb
https://git.kernel.org/stable/c/980be4c3b0d51c0f873fd750117774561c66cf68
https://git.kernel.org/stable/c/a254ee1ddc592ae1efcce96b8c014e1bd2d5a2b4
https://git.kernel.org/stable/c/aae7598aff291d4d140be1355aa20930af948785
https://git.kernel.org/stable/c/cb13001411999adb158b39e76d94705eb2da100d
rh#2282708
CVE-2023-52842kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52842
SMASH Issue 407124
bnc#1225025
https://git.kernel.org/stable/c/0b8906fb48b99e993d6e8a12539f618f4854dd26
https://git.kernel.org/stable/c/34c4effacfc329aeca5635a69fd9e0f6c90b4101
https://git.kernel.org/stable/c/cd12535b97dd7d18cf655ec78ce1cf1f29a576be
rh#2282696
CVE-2023-52844kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52844
SMASH Issue 406956
bnc#1225590
https://git.kernel.org/stable/c/3387490c89b10aeb4e71d78b65dbc9ba4b2385b9
https://git.kernel.org/stable/c/5c26aae3723965c291c65dd2ecad6a3240d422b0
https://git.kernel.org/stable/c/5cfcc8de7d733a1137b86954cc28ce99972311ad
https://git.kernel.org/stable/c/76a2c5df6ca8bd8ada45e953b8c72b746f42918d
https://git.kernel.org/stable/c/a51335704a3f90eaf23a6864faefca34b382490a
https://git.kernel.org/stable/c/d17269fb9161995303985ab2fe6f16cfb72152f9
rh#2282725
CVE-2023-52845kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52845
SMASH Issue 407118
bnc#1225585
https://git.kernel.org/stable/c/19b3f72a41a8751e26bffc093bb7e1cef29ad579
https://git.kernel.org/stable/c/2199260c42e6fbc5af8adae3bf78e623407c91b0
https://git.kernel.org/stable/c/2426425d686b43adbc4f2f4a367b494f06f159d6
https://git.kernel.org/stable/c/3907b89cd17fcc23e9a80789c36856f00ece0ba8
https://git.kernel.org/stable/c/4c731e98fe4d678e87ba3e4d45d3cf0a5a193dc4
https://git.kernel.org/stable/c/560992f41c0cea44b7603bc9e6c73bffbf6b5709
https://git.kernel.org/stable/c/6744008c354bca2e4686a5b6056ee6b535d9f67d
https://git.kernel.org/stable/c/abc1582119e8c4af14cedb0db6541fd603f45a04
https://git.kernel.org/stable/c/b33d130f07f1decd756b849ab03c23d11d4dd294
rh#2282759
CVE-2023-52846kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52846
SMASH Issue 407093
bnc#1225098
bnc#1225099
https://git.kernel.org/stable/c/1787b9f0729d318d67cf7c5a95f0c3dba9a7cc18
https://git.kernel.org/stable/c/6086258bd5ea7b5c706ff62da42b8e271b2401db
https://git.kernel.org/stable/c/876f8ab52363f649bcc74072157dfd7adfbabc0d
https://git.kernel.org/stable/c/a1a485e45d24b1cd8fe834fd6f1b06e2903827da
https://git.kernel.org/stable/c/d103fb6726904e353b4773188ee3d3acb4078363
https://git.kernel.org/stable/c/ddf4e04e946aaa6c458b8b6829617cc44af2bffd
rh#2282765
CVE-2023-52847kernel-source-rt:Unsupportedmoderate5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2023-52847
SMASH Issue 407052
bnc#1225588
https://git.kernel.org/stable/c/1871014d6ef4812ad11ef7d838d73ce09d632267
https://git.kernel.org/stable/c/20568d06f6069cb835e05eed432edf962645d226
https://git.kernel.org/stable/c/2f3d9198cdae1cb079ec8652f4defacd481eab2b
https://git.kernel.org/stable/c/51c94256a83fe4e17406c66ff3e1ad7d242d8574
https://git.kernel.org/stable/c/847599fffa528b2cdec4e21b6bf7586dad982132
https://git.kernel.org/stable/c/b35fdade92c5058a5e727e233fe263b828de2c9a
https://git.kernel.org/stable/c/bbc3b8dd2cb7817e703f112d988e4f4728f0f2a9
https://git.kernel.org/stable/c/bd5b50b329e850d467e7bcc07b2b6bde3752fbda
rh#2282717
CVE-2023-52848kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52848
SMASH Issue 407198
bnc#1225385
https://git.kernel.org/stable/c/10b2a6c0dade67b5a2b2d17fb75c457ea1985fad
https://git.kernel.org/stable/c/a4639380bbe66172df329f8b54aa7d2e943f0f64
https://git.kernel.org/stable/c/eb42e1862aa7934c2c21890097ce4993c5e0d192
rh#2282721
CVE-2023-52849kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52849
SMASH Issue 407157
bnc#1224949
https://git.kernel.org/stable/c/0ca074f7d788627a4e0b047ca5fbdb5fc567220c
https://git.kernel.org/stable/c/20bd0198bebdd706bd4614b3933ef70d7c19618f
https://git.kernel.org/stable/c/7c7371b41a14e86f53e7dbe5baa7b1d3e0ab324b
https://git.kernel.org/stable/c/88d3917f82ed4215a2154432c26de1480a61b209
https://git.kernel.org/stable/c/cad22a757029c3a1985c221a2d4a6491ad4035ae
rh#2282619
CVE-2023-52850kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52850
SMASH Issue 407130
bnc#1225014
https://git.kernel.org/stable/c/24c06295f28335ced3aad53dd4b0a0bae7b9b100
https://git.kernel.org/stable/c/64f55cebb4339ae771e9e7f3f42bee2489e2fa00
https://git.kernel.org/stable/c/66b4c5f980d741f3a47e4b65eeaf2797f2d59294
https://git.kernel.org/stable/c/88d4b23a629ebd34f682f770cb6c2116c851f7b8
rh#2282677
CVE-2023-52851kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52851
SMASH Issue 407208
bnc#1225587
https://git.kernel.org/stable/c/2ef422f063b74adcc4a4a9004b0a87bb55e0a836
https://git.kernel.org/stable/c/437f033e30c897bb3723eac9e9003cd9f88d00a3
https://git.kernel.org/stable/c/4f4a7a7d1404297f2a92df0046f7e64dc5c52dd9
https://git.kernel.org/stable/c/6387f269d84e6e149499408c4d1fc805017729b2
rh#2282667
CVE-2023-52852kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-52852
SMASH Issue 407081
bnc#1225116
bnc#1225117
https://git.kernel.org/stable/c/8c4504cc0c64862740a6acb301e0cfa59580dbc5
https://git.kernel.org/stable/c/932ddb5c29e884cc6fac20417ece72ba4a35c401
https://git.kernel.org/stable/c/9375ea7f269093d7c884857ae1f47633a91f429c
https://git.kernel.org/stable/c/9d065aa52b6ee1b06f9c4eca881c9b4425a12ba2
https://git.kernel.org/stable/c/b0327c84e91a0f4f0abced8cb83ec86a7083f086
rh#2282747
CVE-2023-52854kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52854
SMASH Issue 407134
bnc#1225584
https://git.kernel.org/stable/c/0dd34a7ad395dbcf6ae60e48e9786050e25b9bc5
https://git.kernel.org/stable/c/1734a79e951914f1db2c65e635012a35db1c674b
https://git.kernel.org/stable/c/1e901bcb8af19416b65f5063a4af7996e5a51d7f
https://git.kernel.org/stable/c/41aad9d6953984d134fc50f631f24ef476875d4d
https://git.kernel.org/stable/c/7ddc21e317b360c3444de3023bcc83b85fabae2f
https://git.kernel.org/stable/c/c7c26d0ef5d20f00dbb2ae3befcabbe0efa77275
rh#2282644
CVE-2023-52855kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52855
SMASH Issue 407193
bnc#1225583
https://git.kernel.org/stable/c/14c9ec34e8118fbffd7f5431814d767726323e72
https://git.kernel.org/stable/c/3e851a77a13ce944d703721793f49ee82622986d
https://git.kernel.org/stable/c/64c47749fc7507ed732e155c958253968c1d275e
https://git.kernel.org/stable/c/6b21a22728852d020a6658d39cd7bb7e14b07790
https://git.kernel.org/stable/c/a7bee9598afb38004841a41dd8fe68c1faff4e90
https://git.kernel.org/stable/c/bdb3dd4096302d6b87441fdc528439f171b04be6
https://git.kernel.org/stable/c/ef307bc6ef04e8c1ea843231db58e3afaafa9fa6
https://git.kernel.org/stable/c/fcaafb574fc88a52dce817f039f7ff2f9da38001
https://git.kernel.org/stable/c/fed492aa6493a91a77ebd51da6fb939c98d94a0d
rh#2282758
CVE-2023-52856kernel-source-rt:Not affectedmoderate4.6 (CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52856
SMASH Issue 407181
bnc#1224932
https://git.kernel.org/stable/c/42071feab712ba2a139b8928f7e0f8d3a6fc719e
https://git.kernel.org/stable/c/44283993144a03af9df31934d6c32bbd42d1a347
https://git.kernel.org/stable/c/7bf0cb8f40280a85034990dfe42be8ca8f80f37a
https://git.kernel.org/stable/c/b65e3249f3ca96e3c736af889461d80d675feab6
https://git.kernel.org/stable/c/fcd9895e365474709844eeb31cfe53d912c3596e
rh#2282672
CVE-2023-52857kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52857
SMASH Issue 407205
bnc#1225581
https://git.kernel.org/stable/c/0d8a1df39d3fc34560e2cc663b5c340d06a25396
https://git.kernel.org/stable/c/96312a251d4dcee5d36e32edba3002bfde0ddd9c
https://git.kernel.org/stable/c/b0b0d811eac6b4c52cb9ad632fa6384cf48869e7
rh#2282625
CVE-2023-52858kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52858
SMASH Issue 407214
bnc#1225566
https://git.kernel.org/stable/c/1d89430fc3158f872d492f1b88d07262f48290c0
https://git.kernel.org/stable/c/2befa515c1bb6cdd33c262b909d93d1973a219aa
https://git.kernel.org/stable/c/4f861b63945e076f9f003a5fad958174096df1ee
https://git.kernel.org/stable/c/5fbea47eebff5daeca7d918c99289bcd3ae4dc8d
https://git.kernel.org/stable/c/a836efc21ef04608333d6d05753e558ebd1f85d0
https://git.kernel.org/stable/c/e8ae4b49dd9cfde69d8de8c0c0cd7cf1b004482e
https://git.kernel.org/stable/c/e964d21dc034b650d719c4ea39564bec72b42f94
rh#2282693
CVE-2023-52859kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52859
SMASH Issue 407145
bnc#1225582
https://git.kernel.org/stable/c/0e1e88bba286621b886218363de07b319d6208b2
https://git.kernel.org/stable/c/3405f364f82d4f5407a8b4c519dc15d24b847fda
https://git.kernel.org/stable/c/75bab28ffd05ec8879c197890b1bd1dfec8d3f63
https://git.kernel.org/stable/c/b660420f449d094b1fabfa504889810b3a63cdd5
https://git.kernel.org/stable/c/b805cafc604bfdb671fae7347a57f51154afa735
rh#2282745
CVE-2023-52860kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52860
SMASH Issue 407175
bnc#1224936
https://git.kernel.org/stable/c/3f5827371763f2d9c70719c270055a81d030f3d0
https://git.kernel.org/stable/c/4589403a343bb0c72a6faf5898386ff964d4e01a
https://git.kernel.org/stable/c/50b560783f7f71790bcf70e9e9855155fb0af8c1
https://git.kernel.org/stable/c/d04ff5437a45f275db5530efb49b68d0ec851f6f
rh#2282697
CVE-2023-52861kernel-source-rt:Not affectedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52861
SMASH Issue 407170
bnc#1224941
https://git.kernel.org/stable/c/1374561a7cbc9a000b77bb0473bb2c19daf18d86
https://git.kernel.org/stable/c/1669d7b21a664aa531856ce85b01359a376baebc
https://git.kernel.org/stable/c/2c80c4f0d2845645f41cbb7c9304c8efbdbd4331
https://git.kernel.org/stable/c/d0375f6858c4ff7244b62b02eb5e93428e1916cd
rh#2282685
CVE-2023-52862kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52862
SMASH Issue 407127
bnc#1225015
https://git.kernel.org/stable/c/0c3601a2fbfb265ce283651480e30c8e60459112
https://git.kernel.org/stable/c/8b72c5d4a5d25e76b16283397c40b8b3c0d70019
https://git.kernel.org/stable/c/97ef07182ac46b069bb5e7d46cb903a764d67898
rh#2282752
CVE-2023-52863kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52863
SMASH Issue 407204
bnc#1225586
https://git.kernel.org/stable/c/2a5b3370a1d9750eca325292e291c8c7cb8cf2e0
https://git.kernel.org/stable/c/33de53a2706066d526173dc743faf43d92c62105
https://git.kernel.org/stable/c/7d870088db4863c514a7f8751cd593751983029a
https://git.kernel.org/stable/c/b3e7eb23a6e97642ff3190431c06475d9ca1e062
https://git.kernel.org/stable/c/c49f14cc1bb12c625a1c572e8a95b6adefd4d8eb
https://git.kernel.org/stable/c/f62b8969847850ba7596cb145cc47c65ea57dae0
rh#2282629
CVE-2023-52865kernel-source-rt:Ignoremoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52865
SMASH Issue 407101
bnc#1225086
https://git.kernel.org/stable/c/122ac6496e4975ddd7ec1edba4f6fc1e15e39478
https://git.kernel.org/stable/c/2705c5b97f504e831ae1935c05f0e44f80dfa6b3
https://git.kernel.org/stable/c/357df1c2f6ace96defd557fad709ed1f9f70e16c
https://git.kernel.org/stable/c/3aefc6fcfbada57fac27f470602d5565e5b76cb4
https://git.kernel.org/stable/c/4c79cbfb8e9e2311be77182893fda5ea4068c836
https://git.kernel.org/stable/c/606f6366a35a3329545e38129804d65ef26ed7d2
https://git.kernel.org/stable/c/81b16286110728674dcf81137be0687c5055e7bf
https://git.kernel.org/stable/c/be3f12f16038a558f08fa93cc32fa715746a5235
https://git.kernel.org/stable/c/c26feedbc561f2a3cee1a4f717e61bdbdfb4fa92
jsc#CAR-3591
rh#2282786
CVE-2023-52866kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52866
SMASH Issue 407079
bnc#1225120
https://git.kernel.org/stable/c/64da1f6147dac7f8499d4937a0d7ea990bf569e8
https://git.kernel.org/stable/c/6c8f953728d75104d994893f58801c457274335a
https://git.kernel.org/stable/c/91cfe0bbaa1c434d4271eb6e1d7aaa1fe8d121f6
rh#2282783
CVE-2023-52867kernel-source-rt:Ignoremoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H)CVE-2023-52867
SMASH Issue 407131
bnc#1225009
https://git.kernel.org/stable/c/112d4b02d94bf9fa4f1d3376587878400dd74783
https://git.kernel.org/stable/c/19534a7a225f1bf2da70a9a90d41d0215f8f6b45
https://git.kernel.org/stable/c/341e79f8aec6af6b0061b8171d77b085835c6a58
https://git.kernel.org/stable/c/347f025a02b3a5d715a0b471fc3b1439c338ad94
https://git.kernel.org/stable/c/7b063c93bece827fde237fae1c101bceeee4e896
https://git.kernel.org/stable/c/caaa74541459c4c9e2c10046cf66ad2890483d0f
https://git.kernel.org/stable/c/d9b4fa249deaae1145d6fc2b64dae718e5c7a855
https://git.kernel.org/stable/c/dd05484f99d16715a88eedfca363828ef9a4c2d4
https://git.kernel.org/stable/c/ddc42881f170f1f518496f5a70447501335fc783
jsc#CAR-3577
rh#2282670
CVE-2023-52869kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52869
SMASH Issue 407104
bnc#1225050
https://git.kernel.org/stable/c/1c426da79f9fc7b761021b5eb44185ba119cd44a
https://git.kernel.org/stable/c/379b120e4f27fd1cf636a5f85570c4d240a3f688
https://git.kernel.org/stable/c/63f637309baadf81a095f2653e3b807d4b5814b9
https://git.kernel.org/stable/c/a19d48f7c5d57c0f0405a7d4334d1d38fe9d3c1c
https://git.kernel.org/stable/c/ad5cb6deb41417ef41b9d6ff54f789212108606f
https://git.kernel.org/stable/c/bb166bdae1a7d7db30e9be7e6ccaba606debc05f
rh#2282622
CVE-2023-52870kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52870
SMASH Issue 407173
bnc#1224937
https://git.kernel.org/stable/c/10cc81124407d862f0f747db4baa9c006510b480
https://git.kernel.org/stable/c/2617aa8ceaf30e41d3eb7f5fef3445542bef193a
https://git.kernel.org/stable/c/533ca5153ad6c7b7d47ae0114b14d0333964b946
https://git.kernel.org/stable/c/b5ff3e89b4e7f46ad2aa0de7e08d18e6f87d71bc
https://git.kernel.org/stable/c/b82681042724924ae3ba0f2f2eeec217fa31e830
https://git.kernel.org/stable/c/dd1f30d68fa98eb672c0a259297b761656a9025f
rh#2282729
CVE-2023-52872kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52872
SMASH Issue 407211
bnc#1225591
https://git.kernel.org/stable/c/19d34b73234af542cc8a218cf398dee73cdb1890
https://git.kernel.org/stable/c/3a75b205de43365f80a33b98ec9289785da56243
https://git.kernel.org/stable/c/81a4dd5e6c78f5d8952fa8c9d36565db1fe01444
https://git.kernel.org/stable/c/ce4df90333c4fe65acb8b5089fdfe9b955ce976a
https://git.kernel.org/stable/c/df6cfab66ff2a44bd23ad5dd5309cb3421bb6593
rh#2282733
CVE-2023-52873kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52873
SMASH Issue 407033
bnc#1225589
https://git.kernel.org/stable/c/1f57f78fbacf630430bf954e5a84caafdfea30c0
https://git.kernel.org/stable/c/3994387ba3564976731179c4d4a6d7850ddda71a
https://git.kernel.org/stable/c/a90239551abc181687f8c0ba60b276f7d75c141e
https://git.kernel.org/stable/c/ca6d565a2319d69d9766e6ecbb5af827fc4afb2b
https://git.kernel.org/stable/c/df1c4a9efa3f5b6fb5e0ae63890230dbe2190b7e
https://git.kernel.org/stable/c/f6a7c51cf07a399ec067d39f0a22f1817c5c7d2b
https://git.kernel.org/stable/c/fbe466f06d4ea18745da0d57540539b7b36936ae
rh#2282768
CVE-2023-52874kernel-source-rt:Not affectedlow3.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N)CVE-2023-52874
SMASH Issue 407106
bnc#1225049
https://git.kernel.org/stable/c/2191950d35d8f81620ea8d4e04d983f664fe3a8a
https://git.kernel.org/stable/c/5d092b66119d774853cc9308522620299048a662
https://git.kernel.org/stable/c/de4c5bacca4f50233f1f791bec9eeb4dee1b14cd
rh#2282630
CVE-2023-52875kernel-source-rt:Ignoremoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52875
SMASH Issue 407097
bnc#1225096
https://git.kernel.org/stable/c/001e5def774fa1a8f2b29567c0b0cd3e3a859a96
https://git.kernel.org/stable/c/0d6e24b422a2166a9297a8286ff2e6ab9a5e8cd3
https://git.kernel.org/stable/c/1953e62366da5460dc712e045f94fb0d8918999d
https://git.kernel.org/stable/c/1bf9c204aef4cc55ce46a7ff2d4dc7e5f86551a7
https://git.kernel.org/stable/c/2a18dd653284550900b02107c3c7b3ac5e0eb802
https://git.kernel.org/stable/c/6fccee2af400edaed9cf349d506c5971d4762739
https://git.kernel.org/stable/c/d1175cf4bd2b4c5f7c43f677ea1ce9ad2c18d055
https://git.kernel.org/stable/c/d1461f0c9ca0827c03730fe9652ebbf6316a2a95
https://git.kernel.org/stable/c/e61934720af4a58ffd43a63ffdd6f3a0bd7d7b47
jsc#CAR-3593
rh#2282723
CVE-2023-52877kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52877
SMASH Issue 407164
bnc#1224944
https://git.kernel.org/stable/c/4987daf86c152ff882d51572d154ad12e4ff3a4b
https://git.kernel.org/stable/c/9ee038590d808a95d16adf92818dcd4752273c08
https://git.kernel.org/stable/c/b37a168c0137156042a0ca9626651b5a789e822b
https://git.kernel.org/stable/c/e5f53a68a596e04df3fde3099273435a30b6fdac
https://git.kernel.org/stable/c/e7a802447c491903aa7cb45967aa2a934a4e63fc
rh#2282712
CVE-2023-52879kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52879
SMASH Issue 407090
bnc#1225101
https://git.kernel.org/stable/c/2c9de867ca285c397cd71af703763fe416265706
https://git.kernel.org/stable/c/2fa74d29fc1899c237d51bf9a6e132ea5c488976
https://git.kernel.org/stable/c/9034c87d61be8cff989017740a91701ac8195a1d
https://git.kernel.org/stable/c/961c4511c7578d6b8f39118be919016ec3db1c1e
https://git.kernel.org/stable/c/a98172e36e5f1b3d29ad71fade2d611cfcc2fe6f
https://git.kernel.org/stable/c/bb32500fb9b78215e4ef6ee8b4345c5f5d7eafb4
https://git.kernel.org/stable/c/cbc7c29dff0fa18162f2a3889d82eeefd67305e0
rh#2282730
CVE-2023-52883kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52883
SMASH Issue 411595
bnc#1226630
https://git.kernel.org/stable/c/51b79f33817544e3b4df838d86e8e8e4388ff684
https://git.kernel.org/stable/c/fefac8c4686fd81fde6830c6dae32f9001d2ac28
rh#2293300
CVE-2023-52884kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-52884
SMASH Issue 411740
bnc#1226764
https://git.kernel.org/stable/c/7b4e0b39182cf5e677c1fc092a3ec40e621c25b6
https://git.kernel.org/stable/c/9400caf566f65c703e99d95f87b00c4b445627a7
https://git.kernel.org/stable/c/a4c638ab25786bd5aab5978fe51b2b9be16a4ebd
https://git.kernel.org/stable/c/a5fc298fa8f67cf1f0e1fc126eab70578cd40adc
https://git.kernel.org/stable/c/f99809fdeb50d65bcbc1661ef391af94eebb8a75
rh#2293685
CVE-2023-5345kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-5345
SMASH Issue 380594
bnc#1215899
bnc#1215971
http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6e43b8aa7cd3c3af686caf0c2e11819a886d705
https://kernel.dance/e6e43b8aa7cd3c3af686caf0c2e11819a886d705
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/
rh#2242172
CVE-2023-5363openssl:Not affected, openssl-1_1:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2023-5363
DSA-5532
OSS:2023/10/24/1
OSS:2023/Q4/179
SMASH Issue 381640
SMASH Issue 381641
bnc#1216163
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0df40630850fb2740e6be6890bb905d3fc623b2d
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=5f69f5c65e483928c4b28ed16af6e5742929f1ee
https://security.netapp.com/advisory/ntap-20231027-0010/
https://security.netapp.com/advisory/ntap-20240201-0003/
https://security.netapp.com/advisory/ntap-20240201-0004/
https://www.debian.org/security/2023/dsa-5532
https://www.openssl.org/news/secadv/20231024.txt
openssl.git:commit:1e6e682ac27abd9d028f5a7876f7da1a176c175a
openssl.git:commit:a2fe10ca39f9a8e251b98bc03c3b1bbb6ad1496f
openssl.git:commit:f3a7e6c057b5054aa05710f3d528b92e3e885268
rh#2243839
CVE-2023-5633kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-5633
SMASH Issue 382746
bnc#1216527
bnc#1216645
https://access.redhat.com/errata/RHSA-2024:0113
https://access.redhat.com/errata/RHSA-2024:0134
https://access.redhat.com/errata/RHSA-2024:0461
https://access.redhat.com/security/cve/CVE-2023-5633
rh#2218195
rh#2218212
rh#2245663
CVE-2023-5678openssl:Not affected, openssl-1_1:Releasedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2023-5678
L3:67118
L3:67208
L3:67230
L3:67500
L3:67501
L3:67560
L3:67561
L3:67577
L3:67614
L3:67652
OSS:2023/11/06/2
OSS:2024/02/08/2
OSS:2024/03/11/1
OSS:2024/05/16/1
OSS:2024/Q1/205
OSS:2024/Q2/243
SMASH Issue 384240
bnc#1216922
bnc#1217150
bnc#1217151
bnc#1217561
bnc#1217663
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6
https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3
https://security.netapp.com/advisory/ntap-20231130-0010/
https://www.openssl.org/news/secadv/20231106.txt
jsc#CAR-2983
openssl.git:commit:1c16253f3c3a8d1e25918c3f404aae6a5b0893de
openssl.git:commit:4b29762802c05fa871f0e1efcf804e86db0ddaa2
openssl.git:commit:4d4657cb6ba364dfa60681948b0a30c40bee31ca
openssl.git:commit:4ec53ad6e1791daafbe26bdbd539f2ba9172959a
openssl.git:commit:9e0094e2aa1b3428a12d5095132f133c078d3c3d
openssl.git:commit:afb19f07aecc84998eeea56c4d65f5e0499abb5a
openssl.git:commit:ede782b4c8868d1f09c9cd237f82b6f35b7dba8b
rh#2224962
rh#2227852
rh#2248616
CVE-2023-5717kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-5717
L3:67093
L3:67204
L3:67569
L3:67601
L3:67681
SMASH Issue 383061
bnc#1216584
bnc#1216644
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/events?id=32671e3799ca2e4590773fd0e63aaa4229e50c06
https://kernel.dance/32671e3799ca2e4590773fd0e63aaa4229e50c06
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
jsc#CAR-2958
rh#2246945
CVE-2023-5972kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-5972
SMASH Issue 386005
bnc#1217473
https://access.redhat.com/security/cve/CVE-2023-5972
https://github.com/torvalds/linux/commit/505ce0630ad5d31185695f8a29dde8d29f28faa7
https://github.com/torvalds/linux/commit/52177bbf19e6e9398375a148d2e13ed492b40b80
rh#2248189
CVE-2023-6039kernel-source-rt:Not affectedmoderate6.3 (CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-6039
SMASH Issue 384474
bnc#1217068
https://access.redhat.com/security/cve/CVE-2023-6039
https://github.com/torvalds/linux/commit/1e7417c188d0a83fb385ba2dbe35fd2563f2b6f3
rh#2248755
CVE-2023-6040kernel-source-rt:Analysismoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)CVE-2023-6040
MISC:git.kernel.org:OSS:2024/Q1/18
OSS:2024/01/12/1
OSS:2024/Q1/18
SMASH Issue 390957
bnc#1218752
http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
rh#2258013
CVE-2023-6111kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-6111
SMASH Issue 384856
bnc#1217164
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93995bf4af2c5a99e2a87f0cd5ce547d31eb7630
https://kernel.dance/93995bf4af2c5a99e2a87f0cd5ce547d31eb7630
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3OXWBKK7RTQOGGDLQGCZFS753VLGS2GD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3S55P23EYAWDHXZPJEVTGIRZZRICYI3Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IG6IF3FUY7LVZJMFRPANAU4L4PSJ3ESQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YQ7JVDEDZV5SNHG5EW7RHKK2ZN56HSGB/
rh#2250105
CVE-2023-6121kernel-source-rt:Releasedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2023-6121
SMASH Issue 385444
bnc#1217250
https://access.redhat.com/errata/RHSA-2024:2394
https://access.redhat.com/errata/RHSA-2024:2950
https://access.redhat.com/errata/RHSA-2024:3138
https://access.redhat.com/security/cve/CVE-2023-6121
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
jsc#CAR-3004
rh#2250043
CVE-2023-6129openssl:Not affected, openssl-1_1:Not affectedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)CVE-2023-6129
OSS:2024/01/09/1
OSS:2024/02/08/2
OSS:2024/03/11/1
OSS:2024/Q1/15
OSS:2024/Q1/205
SMASH Issue 390487
bnc#1218690
https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3
https://github.com/openssl/openssl/commit/050d26383d4e264966fb83428e72d5d48f402d35
https://github.com/openssl/openssl/commit/5b139f95c9a47a55a0c54100f3837b1eee942b04
https://github.com/openssl/openssl/commit/f3fc5808fe9ff74042d639839610d03b8fdcc015
https://security.netapp.com/advisory/ntap-20240216-0009/
https://security.netapp.com/advisory/ntap-20240426-0008/
https://security.netapp.com/advisory/ntap-20240426-0013/
https://security.netapp.com/advisory/ntap-20240503-0011/
https://www.openssl.org/news/secadv/20240109.txt
openssl.git:commit:858c7bc210a406cc7f891ac2aed78692d2e02937
openssl.git:commit:8d847a3ffd4f0b17ee33962cf69c36224925b34f
rh#2257571
CVE-2023-6176kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-6176
SMASH Issue 385442
bnc#1217332
bnc#1217522
http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
https://access.redhat.com/errata/RHSA-2024:2394
https://access.redhat.com/errata/RHSA-2024:2950
https://access.redhat.com/errata/RHSA-2024:3138
https://access.redhat.com/security/cve/CVE-2023-6176
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cfaa80c91f6f99b9342b6557f0f0e1143e434066
jsc#CAR-3005
rh#2219359
CVE-2023-6200kernel-source-rt:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-6200
SMASH Issue 392383
ZDI-24-842
bnc#1219297
bnc#1219298
https://access.redhat.com/security/cve/CVE-2023-6200
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dade3f6a1e4e
rh#2250377
CVE-2023-6237openssl:Not affected, openssl-1_1:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-6237
OSS:2024/02/08/2
OSS:2024/03/11/1
OSS:2024/Q1/205
OSS:2024/Q1/22
SMASH Issue 391206
bnc#1218810
https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3
https://github.com/openssl/openssl/commit/0b0f7abfb37350794a4b8960fafc292cd5d1b84d
https://github.com/openssl/openssl/commit/18c02492138d1eb8b6548cb26e7b625fb2414a2a
https://github.com/openssl/openssl/commit/a830f551557d3d66a84bbb18a5b889c640c36294
https://security.netapp.com/advisory/ntap-20240531-0007/
https://www.openssl.org/news/secadv/20240115.txt
openssl.git:commit:38b2508f638787842750aec9a75745e1d8786743
openssl.git:commit:e09fc1d746a4fd15bb5c3d7bbbab950aadd005db
rh#2258502
CVE-2023-6238kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-6238
L3:67275
L3:67844
SMASH Issue 385737
bnc#1217384
bnc#1217388
bnc#1217879
https://access.redhat.com/security/cve/CVE-2023-6238
jsc#CAR-2991
rh#2250834
CVE-2023-6240kernel-source-rt:Analysismoderate6.5 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N)CVE-2023-6240
SMASH Issue 392981
bnc#1219556
https://access.redhat.com/errata/RHSA-2024:1881
https://access.redhat.com/errata/RHSA-2024:1882
https://access.redhat.com/errata/RHSA-2024:2758
https://access.redhat.com/errata/RHSA-2024:3414
https://access.redhat.com/errata/RHSA-2024:3421
https://access.redhat.com/errata/RHSA-2024:3618
https://access.redhat.com/errata/RHSA-2024:3627
https://access.redhat.com/security/cve/CVE-2023-6240
https://people.redhat.com/~hkario/marvin/
https://securitypitfalls.wordpress.com/2023/10/16/experiment-with-side-channel-attacks-yourself/
rh#2250843
CVE-2023-6246glibc:Not affectedimportant8.4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2023-6246
CVE-2023-6779
CVE-2023-6780
MISC:sourceware.org:OSS:2024/01/30/6
MISC:sourceware.org:OSS:2024/01/30/7
OSS:2024/01/30/6
OSS:2024/01/30/7
OSS:2024/01/30/8
OSS:2024/Q1/68
SMASH Issue 391322
SMASH Issue 391325
bnc#1218863
bnc#1218867
bnc#1218868
http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html
http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2024/Feb/3
http://seclists.org/fulldisclosure/2024/Feb/5
https://access.redhat.com/security/cve/CVE-2023-6246
https://access.redhat.com/security/cve/CVE-2023-6779
https://access.redhat.com/security/cve/CVE-2023-6780
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/
https://security.gentoo.org/glsa/202402-01
https://security.netapp.com/advisory/ntap-20240216-0007/
https://security.netapp.com/advisory/ntap-20240223-0006/
https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
rh#2249053
rh#2254395
rh#2254396
CVE-2023-6270kernel-source-rt:Already fixedimportant7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-6270
CVE-2024-26898
L3:67569
L3:67606
L3:67695
L3:67706
L3:67756
L3:67844
L3:67846
L3:67866
L3:68017
L3:68142
SMASH Issue 390054
bnc#1218562
bnc#1218813
bnc#1219702
bnc#1220853
bnc#1223016
bnc#1223017
bnc#1223335
bnc#1225020
https://access.redhat.com/security/cve/CVE-2023-6270
https://git.kernel.org/stable/c/079cba4f4e307c69878226fdf5228c20aa1c969c
https://git.kernel.org/stable/c/1a54aa506b3b2f31496731039e49778f54eee881
https://git.kernel.org/stable/c/74ca3ef68d2f449bc848c0a814cefc487bf755fa
https://git.kernel.org/stable/c/7dd09fa80b0765ce68bfae92f4e2f395ccf0fba4
https://git.kernel.org/stable/c/a16fbb80064634b254520a46395e36b87ca4731e
https://git.kernel.org/stable/c/ad80c34944d7175fa1f5c7a55066020002921a99
https://git.kernel.org/stable/c/eb48680b0255a9e8a9bdc93d6a55b11c31262e62
https://git.kernel.org/stable/c/f98364e926626c678fb4b9004b75cacf92ff0662
https://git.kernel.org/stable/c/faf0b4c5e00bb680e8e43ac936df24d3f48c8e65
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3065
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2256786
rh#2275652
rh#2277171
rh#2277811
rh#2278445
CVE-2023-6356kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-6356
SMASH Issue 387556
bnc#1217987
https://access.redhat.com/errata/RHSA-2024:0723
https://access.redhat.com/errata/RHSA-2024:0724
https://access.redhat.com/errata/RHSA-2024:0725
https://access.redhat.com/errata/RHSA-2024:0881
https://access.redhat.com/errata/RHSA-2024:0897
https://access.redhat.com/errata/RHSA-2024:1248
https://access.redhat.com/errata/RHSA-2024:3810
https://access.redhat.com/security/cve/CVE-2023-6356
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
https://security.netapp.com/advisory/ntap-20240415-0002/
rh#2254054
CVE-2023-6531kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-6531
SMASH Issue 389413
bnc#1218447
bnc#1218487
https://access.redhat.com/errata/RHSA-2024:2394
https://access.redhat.com/security/cve/CVE-2023-6531
https://lore.kernel.org/all/c716c88321939156909cfa1bd8b0faaf1c804103.1701868795.git.asml.silence@gmail.com/
jsc#CAR-3045
rh#2253034
CVE-2023-6535kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2023-6535
SMASH Issue 387555
bnc#1217988
https://access.redhat.com/errata/RHSA-2024:0723
https://access.redhat.com/errata/RHSA-2024:0724
https://access.redhat.com/errata/RHSA-2024:0725
https://access.redhat.com/errata/RHSA-2024:0881
https://access.redhat.com/errata/RHSA-2024:0897
https://access.redhat.com/errata/RHSA-2024:1248
https://access.redhat.com/errata/RHSA-2024:3810
https://access.redhat.com/security/cve/CVE-2023-6535
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
https://security.netapp.com/advisory/ntap-20240415-0003/
rh#2254053
CVE-2023-6546kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-6546
MISC:bugzilla.kernel.org:OSS:2024/04/16/2
MISC:git.kernel.org:OSS:2024/04/16/2
MISC:lists.openwall.net:OSS:2024/Q2/96
OSS:2024/04/10/18
OSS:2024/04/10/21
OSS:2024/04/11/7
OSS:2024/04/11/9
OSS:2024/04/12/1
OSS:2024/04/12/2
OSS:2024/04/14/1
OSS:2024/04/16/2
OSS:2024/04/17/1
OSS:2024/Q2/103
OSS:2024/Q2/82
OSS:2024/Q2/96
SMASH Issue 389007
ZDI-24-020
bnc#1218335
bnc#1222685
https://access.redhat.com/errata/RHSA-2024:0930
https://access.redhat.com/errata/RHSA-2024:0937
https://access.redhat.com/errata/RHSA-2024:1018
https://access.redhat.com/errata/RHSA-2024:1019
https://access.redhat.com/errata/RHSA-2024:1055
https://access.redhat.com/errata/RHSA-2024:1250
https://access.redhat.com/errata/RHSA-2024:1253
https://access.redhat.com/errata/RHSA-2024:1306
https://access.redhat.com/errata/RHSA-2024:1607
https://access.redhat.com/errata/RHSA-2024:1612
https://access.redhat.com/errata/RHSA-2024:1614
https://access.redhat.com/errata/RHSA-2024:2394
https://access.redhat.com/errata/RHSA-2024:2621
https://access.redhat.com/errata/RHSA-2024:2697
https://access.redhat.com/security/cve/CVE-2023-6546
https://github.com/torvalds/linux/commit/3c4f8333b582487a2d1e02171f1465531cde53e3
https://www.zerodayinitiative.com/advisories/ZDI-CAN-20527
rh#2255498
CVE-2023-6560kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2023-6560
SMASH Issue 387226
bnc#1217867
http://packetstormsecurity.com/files/176405/io_uring-__io_uaddr_map-Dangerous-Multi-Page-Handling.html
https://access.redhat.com/security/cve/CVE-2023-6560
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AU4NHBDEDLRW33O76Y6LFECEYNQET5GZ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UCQIPFUQXKXRCH5Y4RP3C5NK4IHNBNVK/
https://patchwork.kernel.org/project/io-uring/patch/20231130194633.649319-2-axboe@kernel.dk/
rh#2253249
CVE-2023-6606kernel-source-rt:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2023-6606
L3:67651
SMASH Issue 387411
bnc#1217947
https://access.redhat.com/errata/RHSA-2024:0723
https://access.redhat.com/errata/RHSA-2024:0725
https://access.redhat.com/errata/RHSA-2024:0881
https://access.redhat.com/errata/RHSA-2024:0897
https://access.redhat.com/errata/RHSA-2024:1188
https://access.redhat.com/errata/RHSA-2024:1248
https://access.redhat.com/security/cve/CVE-2023-6606
https://bugzilla.kernel.org/show_bug.cgi?id=218218
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
jsc#CAR-3029
linux.git:commit:b35858b3786ddbb56e1c35138ba25d6adf8d0bef
rh#2253611
CVE-2023-6610kernel-source-rt:Releasedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2023-6610
SMASH Issue 387412
bnc#1217946
https://access.redhat.com/errata/RHSA-2024:0723
https://access.redhat.com/errata/RHSA-2024:0724
https://access.redhat.com/errata/RHSA-2024:0725
https://access.redhat.com/errata/RHSA-2024:0881
https://access.redhat.com/errata/RHSA-2024:0897
https://access.redhat.com/errata/RHSA-2024:1248
https://access.redhat.com/security/cve/CVE-2023-6610
https://bugzilla.kernel.org/show_bug.cgi?id=218219
jsc#CAR-3030
linux.git:commit:567320c46a60a3c39b69aa1df802d753817a3f86
rh#2253614
CVE-2023-6622kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-6622
SMASH Issue 387419
bnc#1217938
https://access.redhat.com/errata/RHSA-2024:2394
https://access.redhat.com/errata/RHSA-2024:2950
https://access.redhat.com/errata/RHSA-2024:3138
https://access.redhat.com/security/cve/CVE-2023-6622
https://github.com/torvalds/linux/commit/3701cd390fd731ee7ae8b8006246c8db82c72bea
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AAOVK2F3ALGKYIQ5IOMAYEC2DGI7BWAW/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3AGDVE3KBLOOYBPISFDS74R4YAZEDAY/
rh#2253632
CVE-2023-6679kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2023-6679
SMASH Issue 387545
bnc#1217944
https://access.redhat.com/errata/RHSA-2024:0439
https://access.redhat.com/errata/RHSA-2024:0448
https://access.redhat.com/errata/RHSA-2024:0461
https://access.redhat.com/security/cve/CVE-2023-6679
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LBVHM4LGMFIHBN4UBESYRFMYX3WUICV5/
https://lore.kernel.org/netdev/20231211083758.1082853-1-jiri@resnulli.us/
rh#2253986
CVE-2023-6779glibc:Not affectedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2023-6246
CVE-2023-6779
CVE-2023-6780
MISC:sourceware.org:OSS:2024/01/30/6
MISC:sourceware.org:OSS:2024/01/30/7
OSS:2024/01/30/6
OSS:2024/01/30/7
OSS:2024/01/30/8
OSS:2024/Q1/68
SMASH Issue 391323
SMASH Issue 391325
bnc#1218863
bnc#1218867
bnc#1218868
http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html
http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2024/Feb/3
http://seclists.org/fulldisclosure/2024/Feb/5
https://access.redhat.com/security/cve/CVE-2023-6246
https://access.redhat.com/security/cve/CVE-2023-6779
https://access.redhat.com/security/cve/CVE-2023-6780
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/
https://security.gentoo.org/glsa/202402-01
https://security.netapp.com/advisory/ntap-20240216-0007/
https://security.netapp.com/advisory/ntap-20240223-0006/
https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
rh#2249053
rh#2254395
rh#2254396
CVE-2023-6780glibc:Not affectedimportant7.4 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)CVE-2023-6246
CVE-2023-6779
CVE-2023-6780
MISC:sourceware.org:OSS:2024/01/30/6
MISC:sourceware.org:OSS:2024/01/30/7
OSS:2024/01/30/6
OSS:2024/01/30/7
OSS:2024/01/30/8
OSS:2024/Q1/68
SMASH Issue 391324
SMASH Issue 391325
bnc#1218863
bnc#1218867
bnc#1218868
http://packetstormsecurity.com/files/176931/glibc-qsort-Out-Of-Bounds-Read-Write.html
http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html
http://seclists.org/fulldisclosure/2024/Feb/3
http://seclists.org/fulldisclosure/2024/Feb/5
https://access.redhat.com/security/cve/CVE-2023-6246
https://access.redhat.com/security/cve/CVE-2023-6779
https://access.redhat.com/security/cve/CVE-2023-6780
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/
https://security.gentoo.org/glsa/202402-01
https://security.netapp.com/advisory/ntap-20240216-0007/
https://security.netapp.com/advisory/ntap-20240223-0006/
https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
rh#2249053
rh#2254395
rh#2254396
CVE-2023-6817kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2023-6817
OSS:2023/12/22/13
OSS:2023/12/22/6
OSS:2023/Q4/316
SMASH Issue 388542
bnc#1218195
http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a
https://kernel.dance/317eb9685095678f2c9f5a8189de698c5354316a
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
rh#2255139
CVE-2023-6931kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-6931
L3:67364
L3:67569
L3:67600
L3:67681
SMASH Issue 388672
bnc#1218258
bnc#1218259
bnc#1218405
bnc#1219696
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b
https://kernel.dance/382c27f4ed28f803b1f1473ac2d8db0afc795a1b
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
jsc#CAR-3035
rh#2252731
rh#2255283
rh#2255286
CVE-2023-6932kernel-source-rt:Releasedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-6932
L3:67364
L3:67569
L3:67599
L3:67651
L3:67681
L3:67846
L3:67866
SMASH Issue 388673
bnc#1218253
bnc#1218255
bnc#1219695
http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1
https://kernel.dance/e2b706c691905fe78468c361aaabc719d0a496f1
https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
jsc#CAR-3034
rh#2255283
CVE-2023-7008systemd:Not affectedmoderate5.9 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N)CVE-2023-7008
SMASH Issue 388806
bnc#1218297
https://access.redhat.com/errata/RHSA-2024:2463
https://access.redhat.com/errata/RHSA-2024:3203
https://access.redhat.com/security/cve/CVE-2023-7008
https://github.com/systemd/systemd/issues/25676
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4GMDEG5PKONWNHOEYSUDRT6JEOISRMN2/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QHNBXGKJWISJETTTDTZKTBFIBJUOSLKL/
rh#2222261
rh#2222672
CVE-2023-7104sqlite3:Ignoremoderate5.5 (CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2023-7104
SMASH Issue 389619
bnc#1218453
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
https://security.netapp.com/advisory/ntap-20240112-0008/
https://sqlite.org/forum/forumpost/5bcbf4571c
https://sqlite.org/src/info/0e4e7a05c4204b47
https://vuldb.com/?ctiid.248999
https://vuldb.com/?id.248999
jsc#CAR-3044
rh#2256194
CVE-2024-0193kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-0193
SMASH Issue 389846
bnc#1218495
bnc#1218496
https://access.redhat.com/errata/RHSA-2024:1018
https://access.redhat.com/errata/RHSA-2024:1019
https://access.redhat.com/errata/RHSA-2024:1248
https://access.redhat.com/security/cve/CVE-2024-0193
rh#2255653
CVE-2024-0232sqlite3:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)CVE-2024-0232
SMASH Issue 390871
bnc#1218735
https://access.redhat.com/security/cve/CVE-2024-0232
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/
https://security.netapp.com/advisory/ntap-20240315-0007/
rh#2243754
CVE-2024-0443kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-0443
SMASH Issue 390914
bnc#1218767
https://access.redhat.com/errata/RHSA-2023:6583
https://access.redhat.com/errata/RHSA-2023:7077
https://access.redhat.com/errata/RHSA-2023:7370
https://access.redhat.com/security/cve/CVE-2024-0443
https://lore.kernel.org/linux-block/20221215033132.230023-3-longman@redhat.com/
rh#2257968
CVE-2024-0564kernel-source-rt:Analysismoderate6.5 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)CVE-2024-0564
L3:68163
SMASH Issue 391868
bnc#1219054
https://access.redhat.com/security/cve/CVE-2024-0564
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1680513
https://link.springer.com/conference/wisa
https://wisa.or.kr/accepted
rh#2258514
CVE-2024-0582kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-0582
MISC:anatomic.rip:OSS:2024/Q2/172
MISC:blog.exodusintel.com:OSS:2024/Q2/172
MISC:git.kernel.org:OSS:2024/Q2/172
MISC:ruia-ruia.github.io:OSS:2022/Q3/101
OSS:2024/04/24/3
OSS:2024/Q2/172
SMASH Issue 391282
bnc#1218840
https://access.redhat.com/security/cve/CVE-2024-0582
https://bugs.chromium.org/p/project-zero/issues/detail?id=2504
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c392cbecd8eca4c53f2bf508731257d9d0a21c2d
rh#2254050
CVE-2024-0584kernel-source-rt:Already fixedmoderate6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H)CVE-2024-0584
SMASH Issue 391300
bnc#1218857
https://access.redhat.com/security/cve/CVE-2024-0584
https://lore.kernel.org/netdev/170083982540.9628.4546899811301303734.git-patchwork-notify@kernel.org/T/
rh#2258584
CVE-2024-0641kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-0641
SMASH Issue 391544
bnc#1218916
https://access.redhat.com/security/cve/CVE-2024-0641
https://github.com/torvalds/linux/commit/08e50cf071847323414df0835109b6f3560d44f5
rh#2258757
CVE-2024-0646kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-0646
SMASH Issue 391567
bnc#1218941
bnc#1218942
https://access.redhat.com/errata/RHSA-2024:0723
https://access.redhat.com/errata/RHSA-2024:0724
https://access.redhat.com/errata/RHSA-2024:0725
https://access.redhat.com/errata/RHSA-2024:0850
https://access.redhat.com/errata/RHSA-2024:0851
https://access.redhat.com/errata/RHSA-2024:0876
https://access.redhat.com/errata/RHSA-2024:0881
https://access.redhat.com/errata/RHSA-2024:0897
https://access.redhat.com/errata/RHSA-2024:1248
https://access.redhat.com/errata/RHSA-2024:1250
https://access.redhat.com/errata/RHSA-2024:1251
https://access.redhat.com/errata/RHSA-2024:1253
https://access.redhat.com/errata/RHSA-2024:1268
https://access.redhat.com/errata/RHSA-2024:1269
https://access.redhat.com/errata/RHSA-2024:1278
https://access.redhat.com/errata/RHSA-2024:1306
https://access.redhat.com/errata/RHSA-2024:1367
https://access.redhat.com/errata/RHSA-2024:1368
https://access.redhat.com/errata/RHSA-2024:1377
https://access.redhat.com/errata/RHSA-2024:1382
https://access.redhat.com/errata/RHSA-2024:1404
https://access.redhat.com/security/cve/CVE-2024-0646
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c5a595000e267
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
rh#2253908
CVE-2024-0671kernel-source-rt:Not affectedlow ()CONFIRM:developer.arm.com:CVE-2022-28350
CVE-2024-0671
SMASH Issue 402720
bnc#1223184
CVE-2024-0727openssl:Not affected, openssl-1_1:Releasedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)CVE-2024-0727
OSS:2024/02/08/2
OSS:2024/03/11/1
OSS:2024/Q1/205
OSS:2024/Q1/56
SMASH Issue 392059
bnc#1219243
https://github.com/nodejs/undici/security/advisories/GHSA-3787-6prv-h9w3
https://github.com/openssl/openssl/commit/09df4395b5071217b76dc7d3d2e630eb8c5a79c2
https://github.com/openssl/openssl/commit/775acfdbd0c6af9ac855f34969cdab0c0c90844a
https://github.com/openssl/openssl/commit/d135eeab8a5dbf72b3da5240bab9ddb7678dbd2c
https://github.openssl.org/openssl/extended-releases/commit/03b3941d60c4bce58fab69a0c22377ab439bc0e8
https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539
https://security.netapp.com/advisory/ntap-20240208-0006/
https://www.openssl.org/news/secadv/20240125.txt
jsc#CAR-3084
openssl.git:commit:041962b429ebe748c8b6b7922980dfb6decfef26
openssl.git:commit:8a85df7c60ba1372ee98acc5982e902d75f52130
rh#2259944
CVE-2024-0775kernel-source-rt:Releasedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2024-0775
L3:67695
L3:68095
L3:68137
SMASH Issue 391869
bnc#1219053
bnc#1219079
bnc#1219082
https://access.redhat.com/security/cve/CVE-2024-0775
https://scm.linefinity.com/common/linux-stable/commit/4c0b4818b1f636bc96359f7817a2d8bab6370162
jsc#CAR-3074
rh#2259414
CVE-2024-0841kernel-source-rt:Analysismoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-0841
SMASH Issue 392382
bnc#1219264
https://access.redhat.com/errata/RHSA-2024:2394
https://access.redhat.com/errata/RHSA-2024:2950
https://access.redhat.com/errata/RHSA-2024:3138
https://access.redhat.com/security/cve/CVE-2024-0841
rh#2256490
CVE-2024-0853curl:Not affectedlow3.8 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N)CVE-2024-0853
OSS:2024/Q1/73
SMASH Issue 392119
bnc#1219149
https://curl.se/docs/CVE-2024-0853.json
https://hackerone.com/reports/2298922
https://security.netapp.com/advisory/ntap-20240307-0004/
https://security.netapp.com/advisory/ntap-20240426-0009/
https://security.netapp.com/advisory/ntap-20240503-0012/
rh#2262097
CVE-2024-1065kernel-source-rt:Not affectedlow ()CONFIRM:developer.arm.com:CVE-2022-28350
CVE-2024-1065
SMASH Issue 402721
bnc#1223185
CVE-2024-1085kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-1085
SMASH Issue 392616
bnc#1219429
bnc#1219432
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7
https://kernel.dance/b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7
rh#2262127
CVE-2024-1086kernel-source-rt:Releasedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-1086
L3:67695
L3:68095
L3:68137
L3:68242
MISC:git.kernel.org:OSS:2024/Q2/86
MISC:jonathanspw.com:OSS:2024/Q2/86
OSS:2024/04/10/22
OSS:2024/04/10/23
OSS:2024/04/14/1
OSS:2024/04/15/2
OSS:2024/04/17/5
OSS:2024/Q2/116
OSS:2024/Q2/86
SMASH Issue 392617
bnc#1219434
bnc#1219435
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660
https://github.com/Notselwyn/CVE-2024-1086
https://kernel.dance/f342de4e2f33e0e39165d8639387aa6c19dff660
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/
https://news.ycombinator.com/item?id=39828424
https://pwning.tech/nftables/
https://security.netapp.com/advisory/ntap-20240614-0009/
jsc#CAR-3088
rh#2262126
rh#2269217
CVE-2024-1312kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-1312
SMASH Issue 393351
bnc#1219731
https://access.redhat.com/security/cve/CVE-2024-1312
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/mm/memory.c?h=v6.8-rc3&id=657b5146955eba331e01b9a6ae89ce2e716ba306
rh#2225569
CVE-2024-2004curl:Not affectedlow3.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N)CVE-2024-2004
MISC:github.com:OSS:2024/Q1/253
OSS:2024/03/27/1
OSS:2024/Q1/253
SMASH Issue 398212
SMASH Issue 398213
bnc#1221665
https://curl.se/docs/CVE-2024-2004.json
https://hackerone.com/reports/2384833
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
https://security.netapp.com/advisory/ntap-20240524-0006/
rh#2270500
CVE-2024-21485dash:Analysismoderate ()CVE-2024-21485
SMASH Issue 392840
bnc#1219469
https://github.com/plotly/dash/commit/9920073c9a8619ae8f90fcec1924f2f3a4332a8c
https://github.com/plotly/dash/issues/2729
https://github.com/plotly/dash/pull/2732
https://github.com/plotly/dash/releases/tag/v2.15.0
https://security.snyk.io/vuln/SNYK-JS-DASHCORECOMPONENTS-6183084
https://security.snyk.io/vuln/SNYK-JS-DASHHTMLCOMPONENTS-6226337
https://security.snyk.io/vuln/SNYK-PYTHON-DASH-6226335
https://security.snyk.io/vuln/SNYK-PYTHON-DASHCORECOMPONENTS-6226334
https://security.snyk.io/vuln/SNYK-PYTHON-DASHHTMLCOMPONENTS-6226336
CVE-2024-21803kernel-source-rt:Analysisimportant ()CVE-2024-21803
SMASH Issue 392519
bnc#1219351
https://bugzilla.openanolis.cn/show_bug.cgi?id=8081
rh#2256822
rh#2261903
CVE-2024-21823kernel-source-rt:Not affectedmoderate6.8 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H)CVE-2024-21823
MISC:www.intel.com:OSS:2024/Q2/242
OSS:2024/05/15/1
OSS:2024/Q2/242
SMASH Issue 403963
bnc#1223625
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/
linux.git:commit:796aec4a5b5850967af0c42d4e84df2d748d570b
rh#2278989
CVE-2024-2193kernel-source-rt:Won't fixmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2024-2193
OSS:2024/03/12/14
OSS:2024/Q1/220
SMASH Issue 387230
SMASH Issue 397295
bnc#1217857
bnc#1221334
https://download.vusec.net/papers/ghostrace_sec24.pdf
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/patch/?id=944d5fe50f3f03daacfea16300e656a1691c4a23
https://ibm.github.io/system-security-research-updates/2024/03/12/ghostrace
https://kb.cert.org/vuls/id/488902
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EIUICU6CVJUIB6BPJ7P5QTPQR5VOBHFK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H63LGAQXPEVJOES73U4XK65I6DASOAAG/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZON4TLXG7TG4A2XZG563JMVTGQW4SF3A/
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7016.html
https://www.kb.cert.org/vuls/id/488902
https://www.vusec.net/projects/ghostrace/
https://xenbits.xen.org/xsa/advisory-453.html
rh#2262051
CVE-2024-22365pam:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-22365
OSS:2024/01/18/3
OSS:2024/Q1/31
SMASH Issue 389839
SMASH Issue 390436
bnc#1218475
https://github.com/linux-pam/linux-pam
https://github.com/linux-pam/linux-pam/commit/031bb5a5d0d950253b68138b498dc93be69a64cb
https://github.com/linux-pam/linux-pam/releases/tag/v1.6.0
jsc#CAR-3075
rh#2257722
CVE-2024-22386kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-22386
SMASH Issue 393019
bnc#1219615
https://bugzilla.openanolis.cn/show_bug.cgi?id=8147
jsc#CAR-3102
CVE-2024-22705kernel-source-rt:Not affectedmoderate4.3 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)CVE-2024-22705
SMASH Issue 391994
bnc#1219102
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.10
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=d10c77873ba1e9e6b91905018e29e196fd5f863d
rh#2259864
CVE-2024-2379curl:Not affectedmoderate4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2024-2379
MISC:github.com:OSS:2024/Q1/254
OSS:2024/03/27/2
OSS:2024/Q1/254
SMASH Issue 398214
SMASH Issue 398215
bnc#1221666
https://curl.se/docs/CVE-2024-2379.json
https://hackerone.com/reports/2410774
https://security.netapp.com/advisory/ntap-20240531-0001/
rh#2270499
CVE-2024-23850kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-23850
SMASH Issue 391981
bnc#1219126
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/
https://lore.kernel.org/all/6a80cb4b32af89787dadee728310e5e2ca85343f.1705741883.git.wqu%40suse.com/
https://lore.kernel.org/lkml/CALGdzuo6awWdau3X=8XK547x2vX_-VoFmH1aPsqosRTQ5WzJVA%40mail.gmail.com/
rh#2260044
CVE-2024-2398curl:Not affectedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-2398
MISC:github.com:OSS:2024/Q1/255
OSS:2024/03/27/3
OSS:2024/Q1/255
SMASH Issue 398216
SMASH Issue 398217
bnc#1221667
https://curl.se/docs/CVE-2024-2398.json
https://hackerone.com/reports/2402845
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
https://security.netapp.com/advisory/ntap-20240503-0009/
rh#2270498
CVE-2024-2466kernel-source-rt:Releasedmoderate5.4 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)APPLE:APPLE-SA-2010-03-29-1
APPLE:APPLE-SA-2016-05-16-4
BID:101274
BID:102118
BID:102371
BID:102376
BID:102378
BID:103954
BID:104768
BID:104773
BID:104774
BID:104780
BID:105117
BID:105118
BID:105126
BID:105587
BID:105590
BID:105591
BID:105601
BID:105602
BID:105608
BID:105615
BID:105617
BID:105622
BID:106128
BID:85801
BID:90726
BID:91319
BID:93841
BID:95131
BID:98888
BUGTRAQ:20170801 [security bulletin] HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS)
BUGTRAQ:20190624 [SECURITY] [DSA 4469-1] libvirt security update
BUGTRAQ:20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu
CERT-VN:VU#180049
CERT-VN:VU#228519
CERT-VN:VU#584653
CISCO:20160927 Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: September 2016
CISCO:20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II
CISCO:20180104 CPU Side-Channel Information Disclosure Vulnerabilities
CONFIRM:01.org:CVE-2017-5753
CONFIRM:01.org:CVE-2017-5754
CONFIRM:access.redhat.com:CVE-2017-13088
CONFIRM:access.redhat.com:CVE-2017-5754
CONFIRM:aws.amazon.com:CVE-2017-5754
CONFIRM:blog.mozilla.org:CVE-2017-5754
CONFIRM:bto.bluecoat.com:CVE-2016-7052
CONFIRM:bugs.eclipse.org:CVE-2018-12539
CONFIRM:bugs.launchpad.net:CVE-2015-8866
CONFIRM:bugs.launchpad.net:CVE-2015-8867
CONFIRM:bugs.php.net:CVE-2015-8866
CONFIRM:bugs.php.net:CVE-2015-8867
CONFIRM:bugs.php.net:CVE-2016-4070
CONFIRM:bugzilla.redhat.com:CVE-2015-7559
CONFIRM:bugzilla.redhat.com:CVE-2016-8610
CONFIRM:cdrdv2.intel.com:CVE-2017-5754
CONFIRM:cdrdv2.intel.com:CVE-2018-3693
CONFIRM:cert-portal.siemens.com:/productcert/pdf/ssa-412672.pdf
CONFIRM:cert-portal.siemens.com:CVE-2017-13088
CONFIRM:cert-portal.siemens.com:CVE-2017-5715
CONFIRM:cert-portal.siemens.com:CVE-2017-5753
CONFIRM:cert.vde.com:CVE-2017-13080
CONFIRM:cert.vde.com:CVE-2017-13088
CONFIRM:cert.vde.com:CVE-2017-5754
CONFIRM:curl.haxx.se:CVE-2016-3739
CONFIRM:developer.arm.com:CVE-2017-5754
CONFIRM:git.openssl.org:CVE-2016-2177
CONFIRM:git.openssl.org:CVE-2016-8610
CONFIRM:git.php.net:CVE-2015-8866
CONFIRM:git.php.net:CVE-2015-8867
CONFIRM:github.com:CVE-2016-9840
CONFIRM:github.com:CVE-2016-9841
CONFIRM:github.com:CVE-2016-9842
CONFIRM:github.com:CVE-2016-9843
CONFIRM:github.com:CVE-2017-1000071
CONFIRM:h20566.www2.hpe.com:CVE-2016-2177
CONFIRM:h20566.www2.hpe.com:CVE-2016-5388
CONFIRM:h20566.www2.hpe.com:CVE-2016-5773
CONFIRM:h20566.www2.hpe.com:CVE-2016-6306
CONFIRM:h20566.www2.hpe.com:CVE-2017-5787
CONFIRM:help.ecostruxureit.com:CVE-2017-5754
CONFIRM:issues.apache.org:CVE-2015-7559
CONFIRM:kb.juniper.net:CVE-2016-7052
CONFIRM:kb.pulsesecure.net:CVE-2016-6306
CONFIRM:kc.mcafee.com:CVE-2016-2177
CONFIRM:kc.mcafee.com:CVE-2016-6306
CONFIRM:nodejs.org:CVE-2017-3738
CONFIRM:nvidia.custhelp.com:CVE-2017-5754
CONFIRM:portal.msrc.microsoft.com:CVE-2017-13080
CONFIRM:portal.msrc.microsoft.com:CVE-2017-5754
CONFIRM:rockwellautomation.custhelp.com:CVE-2017-13082
CONFIRM:security-center.intel.com:CVE-2017-5715
CONFIRM:security.netapp.com:CVE-2016-8610
CONFIRM:security.netapp.com:CVE-2016-9843
CONFIRM:security.netapp.com:CVE-2017-10388
CONFIRM:security.netapp.com:CVE-2017-3738
CONFIRM:security.netapp.com:CVE-2017-5645
CONFIRM:security.netapp.com:CVE-2017-5664
CONFIRM:security.netapp.com:CVE-2017-5754
CONFIRM:security.netapp.com:CVE-2018-2973
CONFIRM:security.netapp.com:CVE-2018-3214
CONFIRM:security.paloaltonetworks.com:CVE-2016-8610
CONFIRM:security.paloaltonetworks.com:CVE-2017-5715
CONFIRM:securityadvisories.paloaltonetworks.com:CVE-2016-8610
CONFIRM:securityadvisories.paloaltonetworks.com:CVE-2017-5715
CONFIRM:source.android.com:CVE-2017-5754
CONFIRM:source.android.com:CVE-2017-6264
CONFIRM:source.android.com:CVE-2017-6294
CONFIRM:support.apple.com:CVE-2009-0689
CONFIRM:support.apple.com:CVE-2016-4073
CONFIRM:support.apple.com:CVE-2017-13852
CONFIRM:support.apple.com:CVE-2017-13873
CONFIRM:support.apple.com:CVE-2017-13877
CONFIRM:support.apple.com:CVE-2017-13904
CONFIRM:support.apple.com:CVE-2017-3169
CONFIRM:support.apple.com:CVE-2017-6464
CONFIRM:support.citrix.com:CVE-2017-5754
CONFIRM:support.f5.com:CVE-2016-2177
CONFIRM:support.f5.com:CVE-2017-5754
CONFIRM:support.hpe.com:CVE-2016-6306
CONFIRM:support.hpe.com:CVE-2016-7052
CONFIRM:support.hpe.com:CVE-2016-8610
CONFIRM:support.hpe.com:CVE-2017-13081
CONFIRM:support.hpe.com:CVE-2017-3738
CONFIRM:support.hpe.com:CVE-2017-5664
CONFIRM:support.hpe.com:CVE-2017-5754
CONFIRM:support.hpe.com:CVE-2018-2940
CONFIRM:support.hpe.com:CVE-2018-2973
CONFIRM:support.hpe.com:CVE-2018-3136
CONFIRM:support.lenovo.com:CVE-2017-13088
CONFIRM:support.lenovo.com:CVE-2017-5754
CONFIRM:www-01.ibm.com:CVE-2016-7052
CONFIRM:www.arubanetworks.com:CVE-2017-13088
CONFIRM:www.arubanetworks.com:CVE-2017-5715
CONFIRM:www.arubanetworks.com:CVE-2017-5754
CONFIRM:www.citect.schneider-electric.com:CVE-2017-5571
CONFIRM:www.codeaurora.org:CVE-2017-5754
CONFIRM:www.huawei.com:CVE-2016-6306
CONFIRM:www.ibm.com:CVE-2018-1656
CONFIRM:www.intel.com:CVE-2017-13080
CONFIRM:www.mitel.com:CVE-2017-5754
CONFIRM:www.openssl.org
CONFIRM:www.openssl.org:CVE-2017-3738
CONFIRM:www.oracle.com:CVE-2014-0114
CONFIRM:www.oracle.com:CVE-2015-4879
CONFIRM:www.oracle.com:CVE-2016-4957
CONFIRM:www.oracle.com:CVE-2016-6304
CONFIRM:www.oracle.com:CVE-2016-7039
CONFIRM:www.oracle.com:CVE-2016-8296
CONFIRM:www.oracle.com:CVE-2017-10365
CONFIRM:www.oracle.com:CVE-2017-3636
CONFIRM:www.oracle.com:CVE-2017-5689
CONFIRM:www.oracle.com:CVE-2017-5709
CONFIRM:www.oracle.com:CVE-2017-5715
CONFIRM:www.oracle.com:CVE-2017-5753
CONFIRM:www.oracle.com:CVE-2017-6074
CONFIRM:www.oracle.com:CVE-2018-18223
CONFIRM:www.oracle.com:CVE-2018-2639
CONFIRM:www.oracle.com:CVE-2018-2819
CONFIRM:www.oracle.com:CVE-2018-3081
CONFIRM:www.pcre.org:CVE-2015-2325
CONFIRM:www.php.net:CVE-2009-3558
CONFIRM:www.php.net:CVE-2016-9935
CONFIRM:www.php.net:CVE-2016-9936
CONFIRM:www.schneider-electric.com:CVE-2017-5571
CONFIRM:www.splunk.com:CVE-2016-6304
CONFIRM:www.suse.com:CVE-2017-5754
CONFIRM:www.synology.com:CVE-2017-5754
CONFIRM:www.tenable.com:CVE-2016-7052
CONFIRM:www.tenable.com:CVE-2016-8625
CONFIRM:www.tenable.com:CVE-2016-9260
CONFIRM:www.tenable.com:CVE-2017-3738
CONFIRM:www.vmware.com:CVE-2017-5715
CONFIRM:www.vmware.com:CVE-2017-5753
CONFIRM:x-stream.github.io:CVE-2013-7285
CONFIRM:xenbits.xen.org:CVE-2017-5754
CVE-2009-3559
CVE-2014-3490
CVE-2015-2325
CVE-2015-2326
CVE-2015-5328
CVE-2015-7559
CVE-2016-2177
CVE-2016-3739
CVE-2016-4070
CVE-2016-8610
CVE-2016-9840
CVE-2016-9841
CVE-2016-9842
CVE-2017-13077
CVE-2017-13078
CVE-2017-13079
CVE-2017-13080
CVE-2017-13081
CVE-2017-13082
CVE-2017-13084
CVE-2017-13086
CVE-2017-13087
CVE-2017-13088
CVE-2017-3738
CVE-2017-5664
CVE-2017-5715
CVE-2017-5753
CVE-2017-5754
CVE-2018-1000872
CVE-2018-12539
CVE-2018-1517
CVE-2018-1656
CVE-2018-2767
CVE-2018-2797
CVE-2018-2815
CVE-2018-2825
CVE-2018-2938
CVE-2018-2940
CVE-2018-2952
CVE-2018-2964
CVE-2018-2973
CVE-2018-3136
CVE-2018-3139
CVE-2018-3149
CVE-2018-3169
CVE-2018-3180
CVE-2018-3183
CVE-2018-3209
CVE-2018-3211
CVE-2018-3214
CVE-2024-2466
D:CVE-2016-2141
D:CVE-2016-2177
D:CVE-2016-3739
D:CVE-2017-3738
D:CVE-2018-1517
D:CVE-2018-1656
D:CVE-2022-2590
DEBIAN:DSA-3773
DEBIAN:DSA-4065
DEBIAN:DSA-4078
DEBIAN:DSA-4082
DEBIAN:DSA-4120
DEBIAN:DSA-4157
DEBIAN:DSA-4187
DEBIAN:DSA-4188
DEBIAN:DSA-4213
DEBIAN:DSA-4326
DEBIAN:DSA-4341
DSA-3673
DSA-3891
DSA-3892
DSA-3999
DSA-4065
DSA-4078
DSA-4082
DSA-4120
DSA-4157
DSA-4187
DSA-4188
DSA-5378
EXPLOIT-DB:43427
FREEBSD:FreeBSD-SA-16:26
FREEBSD:FreeBSD-SA-16:35
FREEBSD:FreeBSD-SA-17:07
FREEBSD:FreeBSD-SA-17:12
FREEBSD:FreeBSD-SA-18:03
FREEBSD:FreeBSD-SA-19:26
FULLDISC:20170717 Orion Elite Hidden IP Browser Pro - All Versions - Multiple Known Vulnerabilities
GENTOO:GLSA-201612-16
GENTOO:GLSA-201701-47
GENTOO:GLSA-201701-56
GENTOO:GLSA-201711-03
GENTOO:GLSA-201712-03
GENTOO:GLSA-201810-06
GLSA-201908-10
GLSA-202007-54
L3:52429
L3:53225
L3:63823
L3:64100
MANDRIVA:MDVSA-2009:302
MISC:access.redhat.com:CVE-2014-0245
MISC:blog.diniscruz.com:CVE-2013-7285
MISC:bugs.exim.org:CVE-2015-2325
MISC:bugs.exim.org:CVE-2015-2326
MISC:bugs.php.net:CVE-2009-3559
MISC:bugzilla.redhat.com:CVE-2014-0245
MISC:cve.mitre.org:MISC:www.openwall.com:CVE-2015-1877
MISC:exchange.xforce.ibmcloud.com:CVE-2014-4172
MISC:fortiguard.com:CVE-2015-2325
MISC:fortiguard.com:CVE-2015-2326
MISC:github.com:CVE-2014-4172
MISC:github.com:CVE-2017-13082
MISC:github.com:CVE-2017-3738
MISC:github.com:CVE-2018-1000872
MISC:github.com:MLIST:[oss-security] 20160608 CVE-2016-2177: OpenSSL undefined pointer arithmetic
MISC:github.com:MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
MISC:github.com:OSS:2024/Q1/256
MISC:googleprojectzero.blogspot.com:CVE-2017-5754
MISC:ics-cert.us-cert.gov:CVE-2017-13082
MISC:ics-cert.us-cert.gov:CVE-2017-5571
MISC:issues.apache.org:CVE-2014-4651
MISC:issues.jasig.org:CVE-2014-4172
MISC:lists.fedoraproject.org:CVE-2014-4172
MISC:meltdownattack.com:CVE-2017-5754
MISC:packetstormsecurity.com:CVE-2017-5715
MISC:packetstormsecurity.com:CVE-2017-5753
MISC:seclists.org:CVE-2014-4651
MISC:security.360.cn:CVE-2016-8610
MISC:security.googleblog.com:CVE-2017-5754
MISC:spectreattack.com:CVE-2017-5753
MISC:w1.fi
MISC:w1.fi:CVE-2017-13088
MISC:web.archive.org:CVE-2013-7285
MISC:wiki.mozilla.org:CVE-2016-9843
MISC:www.arista.com:CVE-2016-6306
MISC:www.debian.org:CVE-2014-4172
MISC:www.krackattacks.com:CVE-2017-13088
MISC:www.mail-archive.com:CVE-2014-4172
MISC:www.openssl.org:CVE-2016-6302
MISC:www.oracle.com:CVE-2013-7285
MISC:www.oracle.com:CVE-2014-0107
MISC:www.oracle.com:CVE-2014-3596
MISC:www.oracle.com:CVE-2015-0226
MISC:www.oracle.com:CVE-2015-7501
MISC:www.oracle.com:CVE-2016-1000031
MISC:www.oracle.com:CVE-2019-0217
MISC:www.oracle.com:CVE-2019-2880
MLIST:[activemq-issues] 20190718 [jira] [Updated] (AMQ-7236) SEV-1 Security vulnerability in spring-expression-4.3.11.RELEASE.jar (spring framework) and xstream-1.4.10.jar
MLIST:[activemq-issues] 20190826 [jira] [Created] (AMQ-7288) Security Vulnerabilities in ActiveMQ dependent libraries.
MLIST:[debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
MLIST:[debian-lts-announce] 20180107 [SECURITY] [DLA 1232-1] linux security update
MLIST:[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
MLIST:[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
MLIST:[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
MLIST:[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
MLIST:[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update
MLIST:[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update
MLIST:[debian-lts-announce] 20181105 [SECURITY] [DLA 1566-1] mysql-5.5 security update
MLIST:[debian-lts-announce] 20181113 [SECURITY] [DLA 1573-1] firmware-nonfree security update
MLIST:[debian-lts-announce] 20181122 [SECURITY] [DLA 1590-1] openjdk-7 security update
MLIST:[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update
MLIST:[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
MLIST:[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
MLIST:[debian-lts-announce] 20200129 [SECURITY] [DLA 2085-1] zlib security update
MLIST:[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update
MLIST:[oss-security] 20091120 CVE request: php 5.3.1 update
MLIST:[oss-security] 20091120 Re: CVE request: php 5.3.1 update
MLIST:[oss-security] 20140109 Re: CVE request: remote code execution via deserialization in XStream
MLIST:[oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases
MLIST:[oss-security] 20160608 CVE-2016-2177: OpenSSL undefined pointer arithmetic
MLIST:[oss-security] 20161205 Re: CVE Request: zlib security issues found during audit
MLIST:[php-announce] 20091119 5.3.1 Release announcement
MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [24/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190319 svn commit: r1855831 [25/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [22/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [23/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190325 svn commit: r1856174 [24/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [16/20] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190413 svn commit: r1857494 [17/20] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190413 svn commit: r1857496 [3/4] - in /tomcat/site/trunk: ./ docs/ xdocs/
MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [17/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [18/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
MLIST:[tomcat-dev] 20190415 svn commit: r1857582 [19/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/
MLIST:[tomcat-users] 20170606 [SECURITY] CVE-2017-5664 Apache Tomcat Security Constraint Bypass
MLIST:[xstream-user] 20130717 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper
MLIST:[xstream-user] 20130718 Re: Is it possible to unregister the DynamicProxyConverter using the SpringOXM wrapper
OSS:2016/Q2/362
OSS:2016/Q2/500
OSS:2016/Q4/224
OSS:2016/Q4/602
OSS:2017/Q4/83
OSS:2018/Q1/10
OSS:2018/Q1/180
OSS:2018/Q1/181
OSS:2018/Q1/258
OSS:2018/Q1/3
OSS:2018/Q1/32
OSS:2018/Q1/35
OSS:2018/Q1/40
OSS:2018/Q1/44
OSS:2018/Q1/45
OSS:2018/Q1/55
OSS:2018/Q1/60
OSS:2018/Q1/65
OSS:2018/Q1/9
OSS:2018/Q2/21
OSS:2018/Q4/155
OSS:2022/08/08/8
OSS:2022/08/09/4
OSS:2022/08/15/1
OSS:2022/11/10/2
OSS:2022/Q3/99
OSS:2022/Q4/132
OSS:2022/Q4/135
OSS:2024/03/27/4
OSS:2024/Q1/256
Oracle:CVE-2011-4461
Oracle:CVE-2013-1768
Oracle:CVE-2013-2566
Oracle:CVE-2014-0107
Oracle:CVE-2014-0114
Oracle:CVE-2014-3490
Oracle:CVE-2014-3577
Oracle:CVE-2015-0204
Oracle:CVE-2015-0226
Oracle:CVE-2015-0235
Oracle:CVE-2015-1832
Oracle:CVE-2015-3253
Oracle:CVE-2015-5600
Oracle:CVE-2015-6937
Oracle:CVE-2015-7501
Oracle:CVE-2015-7940
Oracle:CVE-2015-8965
Oracle:CVE-2015-9251
Oracle:CVE-2016-0635
Oracle:CVE-2016-0714
Oracle:CVE-2016-0729
Oracle:CVE-2016-1000031
Oracle:CVE-2016-1181
Oracle:CVE-2016-1182
Oracle:CVE-2016-2099
Oracle:CVE-2016-2107
Oracle:CVE-2016-2141
Oracle:CVE-2016-2176
Oracle:CVE-2016-2179
Oracle:CVE-2016-2183
Oracle:CVE-2016-2510
Oracle:CVE-2016-3092
Oracle:CVE-2016-3506
Oracle:CVE-2016-3739
Oracle:CVE-2016-4000
Oracle:CVE-2016-4055
Oracle:CVE-2016-5007
Oracle:CVE-2016-5019
Oracle:CVE-2016-5080
Oracle:CVE-2016-5195
Oracle:CVE-2016-5244
Oracle:CVE-2016-5385
Oracle:CVE-2016-5616
Oracle:CVE-2016-5617
Oracle:CVE-2016-5684
Oracle:CVE-2016-6304
Oracle:CVE-2016-6814
Oracle:CVE-2016-7103
Oracle:CVE-2016-7167
Oracle:CVE-2016-9389
Oracle:CVE-2016-9392
Oracle:CVE-2016-9583
Oracle:CVE-2016-9841
Oracle:CVE-2016-9843
Oracle:CVE-2016-9878
Oracle:CVE-2017-0379
Oracle:CVE-2017-10068
Oracle:CVE-2017-12617
Oracle:CVE-2017-13077
Oracle:CVE-2017-13082
Oracle:CVE-2017-13745
Oracle:CVE-2017-14229
Oracle:CVE-2017-14735
Oracle:CVE-2017-15095
Oracle:CVE-2017-17562
Oracle:CVE-2017-3633
Oracle:CVE-2017-3732
Oracle:CVE-2017-3736
Oracle:CVE-2017-3737
Oracle:CVE-2017-5533
Oracle:CVE-2017-5645
Oracle:CVE-2017-5662
Oracle:CVE-2017-5664
Oracle:CVE-2017-5715
Oracle:CVE-2017-5753
Oracle:CVE-2017-5754
Oracle:CVE-2017-6074
Oracle:CVE-2017-7525
Oracle:CVE-2017-7658
Oracle:CVE-2017-7805
Oracle:CVE-2017-9798
Oracle:CVE-2018-0732
Oracle:CVE-2018-0734
Oracle:CVE-2018-0739
Oracle:CVE-2018-1000120
Oracle:CVE-2018-1000180
Oracle:CVE-2018-1000300
Oracle:CVE-2018-1000632
Oracle:CVE-2018-10933
Oracle:CVE-2018-11039
Oracle:CVE-2018-11212
Oracle:CVE-2018-1171
Oracle:CVE-2018-11763
Oracle:CVE-2018-11775
Oracle:CVE-2018-11776
Oracle:CVE-2018-11784
Oracle:CVE-2018-1258
Oracle:CVE-2018-1275
Oracle:CVE-2018-1305
Oracle:CVE-2018-13785
Oracle:CVE-2018-14718
Oracle:CVE-2018-14721
Oracle:CVE-2018-1656
Oracle:CVE-2018-2562
Oracle:CVE-2018-2563
Oracle:CVE-2018-2572
Oracle:CVE-2018-2587
Oracle:CVE-2018-2598
Oracle:CVE-2018-2612
Oracle:CVE-2018-2622
Oracle:CVE-2018-2628
Oracle:CVE-2018-2640
Oracle:CVE-2018-2665
Oracle:CVE-2018-2668
Oracle:CVE-2018-2718
Oracle:CVE-2018-2737
Oracle:CVE-2018-2738
Oracle:CVE-2018-2739
Oracle:CVE-2018-2742
Oracle:CVE-2018-2746
Oracle:CVE-2018-2747
Oracle:CVE-2018-2748
Oracle:CVE-2018-2749
Oracle:CVE-2018-2750
Oracle:CVE-2018-2752
Oracle:CVE-2018-2753
Oracle:CVE-2018-2754
Oracle:CVE-2018-2755
Oracle:CVE-2018-2756
Oracle:CVE-2018-2758
Oracle:CVE-2018-2759
Oracle:CVE-2018-2760
Oracle:CVE-2018-2761
Oracle:CVE-2018-2762
Oracle:CVE-2018-2763
Oracle:CVE-2018-2764
Oracle:CVE-2018-2765
Oracle:CVE-2018-2766
Oracle:CVE-2018-2767
Oracle:CVE-2018-2768
Oracle:CVE-2018-2769
Oracle:CVE-2018-2770
Oracle:CVE-2018-2771
Oracle:CVE-2018-2772
Oracle:CVE-2018-2773
Oracle:CVE-2018-2774
Oracle:CVE-2018-2775
Oracle:CVE-2018-2776
Oracle:CVE-2018-2777
Oracle:CVE-2018-2778
Oracle:CVE-2018-2779
Oracle:CVE-2018-2780
Oracle:CVE-2018-2781
Oracle:CVE-2018-2782
Oracle:CVE-2018-2783
Oracle:CVE-2018-2784
Oracle:CVE-2018-2785
Oracle:CVE-2018-2786
Oracle:CVE-2018-2787
Oracle:CVE-2018-2788
Oracle:CVE-2018-2789
Oracle:CVE-2018-2790
Oracle:CVE-2018-2791
Oracle:CVE-2018-2792
Oracle:CVE-2018-2793
Oracle:CVE-2018-2794
Oracle:CVE-2018-2795
Oracle:CVE-2018-2796
Oracle:CVE-2018-2797
Oracle:CVE-2018-2798
Oracle:CVE-2018-2799
Oracle:CVE-2018-2800
Oracle:CVE-2018-2801
Oracle:CVE-2018-2804
Oracle:CVE-2018-2805
Oracle:CVE-2018-2806
Oracle:CVE-2018-2807
Oracle:CVE-2018-2808
Oracle:CVE-2018-2809
Oracle:CVE-2018-2810
Oracle:CVE-2018-2811
Oracle:CVE-2018-2812
Oracle:CVE-2018-2813
Oracle:CVE-2018-2814
Oracle:CVE-2018-2815
Oracle:CVE-2018-2816
Oracle:CVE-2018-2817
Oracle:CVE-2018-2818
Oracle:CVE-2018-2819
Oracle:CVE-2018-2820
Oracle:CVE-2018-2821
Oracle:CVE-2018-2822
Oracle:CVE-2018-2823
Oracle:CVE-2018-2825
Oracle:CVE-2018-2826
Oracle:CVE-2018-2827
Oracle:CVE-2018-2828
Oracle:CVE-2018-2830
Oracle:CVE-2018-2831
Oracle:CVE-2018-2832
Oracle:CVE-2018-2834
Oracle:CVE-2018-2835
Oracle:CVE-2018-2836
Oracle:CVE-2018-2837
Oracle:CVE-2018-2838
Oracle:CVE-2018-2839
Oracle:CVE-2018-2840
Oracle:CVE-2018-2841
Oracle:CVE-2018-2842
Oracle:CVE-2018-2843
Oracle:CVE-2018-2844
Oracle:CVE-2018-2845
Oracle:CVE-2018-2846
Oracle:CVE-2018-2849
Oracle:CVE-2018-2850
Oracle:CVE-2018-2852
Oracle:CVE-2018-2854
Oracle:CVE-2018-2855
Oracle:CVE-2018-2856
Oracle:CVE-2018-2857
Oracle:CVE-2018-2858
Oracle:CVE-2018-2859
Oracle:CVE-2018-2860
Oracle:CVE-2018-2861
Oracle:CVE-2018-2862
Oracle:CVE-2018-2863
Oracle:CVE-2018-2864
Oracle:CVE-2018-2865
Oracle:CVE-2018-2866
Oracle:CVE-2018-2867
Oracle:CVE-2018-2868
Oracle:CVE-2018-2869
Oracle:CVE-2018-2870
Oracle:CVE-2018-2871
Oracle:CVE-2018-2872
Oracle:CVE-2018-2873
Oracle:CVE-2018-2874
Oracle:CVE-2018-2876
Oracle:CVE-2018-2877
Oracle:CVE-2018-2878
Oracle:CVE-2018-2879
Oracle:CVE-2018-2881
Oracle:CVE-2018-2882
Oracle:CVE-2018-2887
Oracle:CVE-2018-2888
Oracle:CVE-2018-2889
Oracle:CVE-2018-2891
Oracle:CVE-2018-2892
Oracle:CVE-2018-2893
Oracle:CVE-2018-2894
Oracle:CVE-2018-2895
Oracle:CVE-2018-2896
Oracle:CVE-2018-2897
Oracle:CVE-2018-2898
Oracle:CVE-2018-2899
Oracle:CVE-2018-2900
Oracle:CVE-2018-2901
Oracle:CVE-2018-2902
Oracle:CVE-2018-2903
Oracle:CVE-2018-2904
Oracle:CVE-2018-2905
Oracle:CVE-2018-2906
Oracle:CVE-2018-2907
Oracle:CVE-2018-2908
Oracle:CVE-2018-2909
Oracle:CVE-2018-2911
Oracle:CVE-2018-2912
Oracle:CVE-2018-2913
Oracle:CVE-2018-2914
Oracle:CVE-2018-2915
Oracle:CVE-2018-2916
Oracle:CVE-2018-2917
Oracle:CVE-2018-2918
Oracle:CVE-2018-2919
Oracle:CVE-2018-2920
Oracle:CVE-2018-2921
Oracle:CVE-2018-2922
Oracle:CVE-2018-2923
Oracle:CVE-2018-2924
Oracle:CVE-2018-2925
Oracle:CVE-2018-2926
Oracle:CVE-2018-2927
Oracle:CVE-2018-2928
Oracle:CVE-2018-2929
Oracle:CVE-2018-2930
Oracle:CVE-2018-2932
Oracle:CVE-2018-2933
Oracle:CVE-2018-2934
Oracle:CVE-2018-2935
Oracle:CVE-2018-2936
Oracle:CVE-2018-2937
Oracle:CVE-2018-2938
Oracle:CVE-2018-2939
Oracle:CVE-2018-2940
Oracle:CVE-2018-2941
Oracle:CVE-2018-2942
Oracle:CVE-2018-2943
Oracle:CVE-2018-2944
Oracle:CVE-2018-2945
Oracle:CVE-2018-2946
Oracle:CVE-2018-2947
Oracle:CVE-2018-2948
Oracle:CVE-2018-2949
Oracle:CVE-2018-2950
Oracle:CVE-2018-2951
Oracle:CVE-2018-2952
Oracle:CVE-2018-2953
Oracle:CVE-2018-2954
Oracle:CVE-2018-2955
Oracle:CVE-2018-2956
Oracle:CVE-2018-2957
Oracle:CVE-2018-2958
Oracle:CVE-2018-2959
Oracle:CVE-2018-2960
Oracle:CVE-2018-2961
Oracle:CVE-2018-2962
Oracle:CVE-2018-2963
Oracle:CVE-2018-2964
Oracle:CVE-2018-2965
Oracle:CVE-2018-2966
Oracle:CVE-2018-2967
Oracle:CVE-2018-2968
Oracle:CVE-2018-2969
Oracle:CVE-2018-2970
Oracle:CVE-2018-2971
Oracle:CVE-2018-2972
Oracle:CVE-2018-2973
Oracle:CVE-2018-2974
Oracle:CVE-2018-2975
Oracle:CVE-2018-2976
Oracle:CVE-2018-2977
Oracle:CVE-2018-2979
Oracle:CVE-2018-2980
Oracle:CVE-2018-2981
Oracle:CVE-2018-2982
Oracle:CVE-2018-2984
Oracle:CVE-2018-2985
Oracle:CVE-2018-2986
Oracle:CVE-2018-2987
Oracle:CVE-2018-2988
Oracle:CVE-2018-2989
Oracle:CVE-2018-2990
Oracle:CVE-2018-2991
Oracle:CVE-2018-2992
Oracle:CVE-2018-2993
Oracle:CVE-2018-2994
Oracle:CVE-2018-2995
Oracle:CVE-2018-2996
Oracle:CVE-2018-2997
Oracle:CVE-2018-2998
Oracle:CVE-2018-2999
Oracle:CVE-2018-3000
Oracle:CVE-2018-3001
Oracle:CVE-2018-3002
Oracle:CVE-2018-3003
Oracle:CVE-2018-3004
Oracle:CVE-2018-3005
Oracle:CVE-2018-3006
Oracle:CVE-2018-3007
Oracle:CVE-2018-3008
Oracle:CVE-2018-3009
Oracle:CVE-2018-3010
Oracle:CVE-2018-3011
Oracle:CVE-2018-3012
Oracle:CVE-2018-3013
Oracle:CVE-2018-3014
Oracle:CVE-2018-3015
Oracle:CVE-2018-3016
Oracle:CVE-2018-3017
Oracle:CVE-2018-3018
Oracle:CVE-2018-3019
Oracle:CVE-2018-3020
Oracle:CVE-2018-3021
Oracle:CVE-2018-3022
Oracle:CVE-2018-3023
Oracle:CVE-2018-3024
Oracle:CVE-2018-3025
Oracle:CVE-2018-3026
Oracle:CVE-2018-3027
Oracle:CVE-2018-3028
Oracle:CVE-2018-3029
Oracle:CVE-2018-3030
Oracle:CVE-2018-3031
Oracle:CVE-2018-3032
Oracle:CVE-2018-3033
Oracle:CVE-2018-3034
Oracle:CVE-2018-3035
Oracle:CVE-2018-3036
Oracle:CVE-2018-3037
Oracle:CVE-2018-3038
Oracle:CVE-2018-3039
Oracle:CVE-2018-3040
Oracle:CVE-2018-3041
Oracle:CVE-2018-3042
Oracle:CVE-2018-3043
Oracle:CVE-2018-3044
Oracle:CVE-2018-3045
Oracle:CVE-2018-3046
Oracle:CVE-2018-3047
Oracle:CVE-2018-3048
Oracle:CVE-2018-3049
Oracle:CVE-2018-3050
Oracle:CVE-2018-3051
Oracle:CVE-2018-3052
Oracle:CVE-2018-3053
Oracle:CVE-2018-3054
Oracle:CVE-2018-3055
Oracle:CVE-2018-3056
Oracle:CVE-2018-3057
Oracle:CVE-2018-3058
Oracle:CVE-2018-3059
Oracle:CVE-2018-3060
Oracle:CVE-2018-3061
Oracle:CVE-2018-3062
Oracle:CVE-2018-3063
Oracle:CVE-2018-3064
Oracle:CVE-2018-3065
Oracle:CVE-2018-3066
Oracle:CVE-2018-3067
Oracle:CVE-2018-3068
Oracle:CVE-2018-3069
Oracle:CVE-2018-3070
Oracle:CVE-2018-3071
Oracle:CVE-2018-3072
Oracle:CVE-2018-3073
Oracle:CVE-2018-3074
Oracle:CVE-2018-3075
Oracle:CVE-2018-3076
Oracle:CVE-2018-3077
Oracle:CVE-2018-3078
Oracle:CVE-2018-3079
Oracle:CVE-2018-3080
Oracle:CVE-2018-3081
Oracle:CVE-2018-3082
Oracle:CVE-2018-3084
Oracle:CVE-2018-3085
Oracle:CVE-2018-3086
Oracle:CVE-2018-3087
Oracle:CVE-2018-3088
Oracle:CVE-2018-3089
Oracle:CVE-2018-3090
Oracle:CVE-2018-3091
Oracle:CVE-2018-3092
Oracle:CVE-2018-3093
Oracle:CVE-2018-3094
Oracle:CVE-2018-3095
Oracle:CVE-2018-3096
Oracle:CVE-2018-3097
Oracle:CVE-2018-3098
Oracle:CVE-2018-3099
Oracle:CVE-2018-3100
Oracle:CVE-2018-3101
Oracle:CVE-2018-3102
Oracle:CVE-2018-3103
Oracle:CVE-2018-3104
Oracle:CVE-2018-3105
Oracle:CVE-2018-3108
Oracle:CVE-2018-3109
Oracle:CVE-2018-3115
Oracle:CVE-2018-3122
Oracle:CVE-2018-3125
Oracle:CVE-2018-3126
Oracle:CVE-2018-3127
Oracle:CVE-2018-3128
Oracle:CVE-2018-3129
Oracle:CVE-2018-3130
Oracle:CVE-2018-3131
Oracle:CVE-2018-3132
Oracle:CVE-2018-3133
Oracle:CVE-2018-3134
Oracle:CVE-2018-3135
Oracle:CVE-2018-3136
Oracle:CVE-2018-3137
Oracle:CVE-2018-3138
Oracle:CVE-2018-3139
Oracle:CVE-2018-3140
Oracle:CVE-2018-3141
Oracle:CVE-2018-3142
Oracle:CVE-2018-3143
Oracle:CVE-2018-3144
Oracle:CVE-2018-3145
Oracle:CVE-2018-3146
Oracle:CVE-2018-3147
Oracle:CVE-2018-3148
Oracle:CVE-2018-3149
Oracle:CVE-2018-3150
Oracle:CVE-2018-3151
Oracle:CVE-2018-3152
Oracle:CVE-2018-3153
Oracle:CVE-2018-3154
Oracle:CVE-2018-3155
Oracle:CVE-2018-3156
Oracle:CVE-2018-3157
Oracle:CVE-2018-3158
Oracle:CVE-2018-3159
Oracle:CVE-2018-3160
Oracle:CVE-2018-3161
Oracle:CVE-2018-3162
Oracle:CVE-2018-3163
Oracle:CVE-2018-3164
Oracle:CVE-2018-3165
Oracle:CVE-2018-3166
Oracle:CVE-2018-3167
Oracle:CVE-2018-3168
Oracle:CVE-2018-3169
Oracle:CVE-2018-3170
Oracle:CVE-2018-3171
Oracle:CVE-2018-3172
Oracle:CVE-2018-3173
Oracle:CVE-2018-3174
Oracle:CVE-2018-3175
Oracle:CVE-2018-3176
Oracle:CVE-2018-3177
Oracle:CVE-2018-3178
Oracle:CVE-2018-3179
Oracle:CVE-2018-3180
Oracle:CVE-2018-3181
Oracle:CVE-2018-3182
Oracle:CVE-2018-3183
Oracle:CVE-2018-3184
Oracle:CVE-2018-3185
Oracle:CVE-2018-3186
Oracle:CVE-2018-3187
Oracle:CVE-2018-3188
Oracle:CVE-2018-3189
Oracle:CVE-2018-3190
Oracle:CVE-2018-3191
Oracle:CVE-2018-3192
Oracle:CVE-2018-3193
Oracle:CVE-2018-3194
Oracle:CVE-2018-3195
Oracle:CVE-2018-3196
Oracle:CVE-2018-3197
Oracle:CVE-2018-3198
Oracle:CVE-2018-3200
Oracle:CVE-2018-3201
Oracle:CVE-2018-3202
Oracle:CVE-2018-3203
Oracle:CVE-2018-3204
Oracle:CVE-2018-3205
Oracle:CVE-2018-3206
Oracle:CVE-2018-3207
Oracle:CVE-2018-3208
Oracle:CVE-2018-3209
Oracle:CVE-2018-3210
Oracle:CVE-2018-3211
Oracle:CVE-2018-3212
Oracle:CVE-2018-3213
Oracle:CVE-2018-3214
Oracle:CVE-2018-3215
Oracle:CVE-2018-3217
Oracle:CVE-2018-3218
Oracle:CVE-2018-3219
Oracle:CVE-2018-3220
Oracle:CVE-2018-3221
Oracle:CVE-2018-3222
Oracle:CVE-2018-3223
Oracle:CVE-2018-3224
Oracle:CVE-2018-3225
Oracle:CVE-2018-3226
Oracle:CVE-2018-3227
Oracle:CVE-2018-3228
Oracle:CVE-2018-3229
Oracle:CVE-2018-3230
Oracle:CVE-2018-3231
Oracle:CVE-2018-3232
Oracle:CVE-2018-3233
Oracle:CVE-2018-3234
Oracle:CVE-2018-3235
Oracle:CVE-2018-3236
Oracle:CVE-2018-3237
Oracle:CVE-2018-3238
Oracle:CVE-2018-3239
Oracle:CVE-2018-3241
Oracle:CVE-2018-3242
Oracle:CVE-2018-3243
Oracle:CVE-2018-3244
Oracle:CVE-2018-3245
Oracle:CVE-2018-3246
Oracle:CVE-2018-3247
Oracle:CVE-2018-3248
Oracle:CVE-2018-3249
Oracle:CVE-2018-3250
Oracle:CVE-2018-3251
Oracle:CVE-2018-3252
Oracle:CVE-2018-3253
Oracle:CVE-2018-3254
Oracle:CVE-2018-3255
Oracle:CVE-2018-3256
Oracle:CVE-2018-3257
Oracle:CVE-2018-3258
Oracle:CVE-2018-3259
Oracle:CVE-2018-3261
Oracle:CVE-2018-3262
Oracle:CVE-2018-3263
Oracle:CVE-2018-3264
Oracle:CVE-2018-3265
Oracle:CVE-2018-3266
Oracle:CVE-2018-3267
Oracle:CVE-2018-3268
Oracle:CVE-2018-3269
Oracle:CVE-2018-3270
Oracle:CVE-2018-3271
Oracle:CVE-2018-3272
Oracle:CVE-2018-3273
Oracle:CVE-2018-3274
Oracle:CVE-2018-3275
Oracle:CVE-2018-3276
Oracle:CVE-2018-3277
Oracle:CVE-2018-3278
Oracle:CVE-2018-3279
Oracle:CVE-2018-3280
Oracle:CVE-2018-3281
Oracle:CVE-2018-3282
Oracle:CVE-2018-3283
Oracle:CVE-2018-3284
Oracle:CVE-2018-3285
Oracle:CVE-2018-3286
Oracle:CVE-2018-3287
Oracle:CVE-2018-3288
Oracle:CVE-2018-3289
Oracle:CVE-2018-3290
Oracle:CVE-2018-3291
Oracle:CVE-2018-3292
Oracle:CVE-2018-3293
Oracle:CVE-2018-3294
Oracle:CVE-2018-3295
Oracle:CVE-2018-3296
Oracle:CVE-2018-3297
Oracle:CVE-2018-3298
Oracle:CVE-2018-3299
Oracle:CVE-2018-3301
Oracle:CVE-2018-3302
Oracle:CVE-2018-3303
Oracle:CVE-2018-3304
Oracle:CVE-2018-3305
Oracle:CVE-2018-3309
Oracle:CVE-2018-3311
Oracle:CVE-2018-3639
Oracle:CVE-2018-3646
Oracle:CVE-2018-5390
Oracle:CVE-2018-7489
Oracle:CVE-2018-8013
Oracle:CVE-2018-8014
Oracle:CVE-2018-8037
Oracle:CVE-2018-8088
Oracle:CVE-2018-9206
Oracle:CVE-2019-10173
Oracle:CVE-2019-1559
Oracle:CVE-2019-2395
Oracle:CVE-2019-2396
Oracle:CVE-2019-2397
Oracle:CVE-2019-2398
Oracle:CVE-2019-2399
Oracle:CVE-2019-2400
Oracle:CVE-2019-2401
Oracle:CVE-2019-2402
Oracle:CVE-2019-2403
Oracle:CVE-2019-2404
Oracle:CVE-2019-2405
Oracle:CVE-2019-2406
Oracle:CVE-2019-2407
Oracle:CVE-2019-2408
Oracle:CVE-2019-2409
Oracle:CVE-2019-2410
Oracle:CVE-2019-2411
Oracle:CVE-2019-2412
Oracle:CVE-2019-2413
Oracle:CVE-2019-2414
Oracle:CVE-2019-2415
Oracle:CVE-2019-2416
Oracle:CVE-2019-2417
Oracle:CVE-2019-2418
Oracle:CVE-2019-2419
Oracle:CVE-2019-2420
Oracle:CVE-2019-2421
Oracle:CVE-2019-2422
Oracle:CVE-2019-2423
Oracle:CVE-2019-2425
Oracle:CVE-2019-2426
Oracle:CVE-2019-2427
Oracle:CVE-2019-2429
Oracle:CVE-2019-2430
Oracle:CVE-2019-2431
Oracle:CVE-2019-2432
Oracle:CVE-2019-2433
Oracle:CVE-2019-2434
Oracle:CVE-2019-2435
Oracle:CVE-2019-2436
Oracle:CVE-2019-2437
Oracle:CVE-2019-2438
Oracle:CVE-2019-2439
Oracle:CVE-2019-2440
Oracle:CVE-2019-2441
Oracle:CVE-2019-2442
Oracle:CVE-2019-2443
Oracle:CVE-2019-2444
Oracle:CVE-2019-2445
Oracle:CVE-2019-2446
Oracle:CVE-2019-2447
Oracle:CVE-2019-2448
Oracle:CVE-2019-2449
Oracle:CVE-2019-2450
Oracle:CVE-2019-2451
Oracle:CVE-2019-2452
Oracle:CVE-2019-2453
Oracle:CVE-2019-2455
Oracle:CVE-2019-2456
Oracle:CVE-2019-2457
Oracle:CVE-2019-2458
Oracle:CVE-2019-2459
Oracle:CVE-2019-2460
Oracle:CVE-2019-2461
Oracle:CVE-2019-2462
Oracle:CVE-2019-2463
Oracle:CVE-2019-2464
Oracle:CVE-2019-2465
Oracle:CVE-2019-2466
Oracle:CVE-2019-2467
Oracle:CVE-2019-2468
Oracle:CVE-2019-2469
Oracle:CVE-2019-2470
Oracle:CVE-2019-2471
Oracle:CVE-2019-2472
Oracle:CVE-2019-2473
Oracle:CVE-2019-2474
Oracle:CVE-2019-2475
Oracle:CVE-2019-2476
Oracle:CVE-2019-2477
Oracle:CVE-2019-2478
Oracle:CVE-2019-2479
Oracle:CVE-2019-2480
Oracle:CVE-2019-2481
Oracle:CVE-2019-2482
Oracle:CVE-2019-2485
Oracle:CVE-2019-2486
Oracle:CVE-2019-2487
Oracle:CVE-2019-2488
Oracle:CVE-2019-2489
Oracle:CVE-2019-2490
Oracle:CVE-2019-2491
Oracle:CVE-2019-2492
Oracle:CVE-2019-2493
Oracle:CVE-2019-2494
Oracle:CVE-2019-2495
Oracle:CVE-2019-2496
Oracle:CVE-2019-2497
Oracle:CVE-2019-2498
Oracle:CVE-2019-2499
Oracle:CVE-2019-2500
Oracle:CVE-2019-2501
Oracle:CVE-2019-2502
Oracle:CVE-2019-2503
Oracle:CVE-2019-2504
Oracle:CVE-2019-2505
Oracle:CVE-2019-2506
Oracle:CVE-2019-2507
Oracle:CVE-2019-2508
Oracle:CVE-2019-2509
Oracle:CVE-2019-2510
Oracle:CVE-2019-2511
Oracle:CVE-2019-2512
Oracle:CVE-2019-2513
Oracle:CVE-2019-2519
Oracle:CVE-2019-2520
Oracle:CVE-2019-2521
Oracle:CVE-2019-2522
Oracle:CVE-2019-2523
Oracle:CVE-2019-2524
Oracle:CVE-2019-2525
Oracle:CVE-2019-2526
Oracle:CVE-2019-2527
Oracle:CVE-2019-2528
Oracle:CVE-2019-2529
Oracle:CVE-2019-2530
Oracle:CVE-2019-2531
Oracle:CVE-2019-2532
Oracle:CVE-2019-2533
Oracle:CVE-2019-2534
Oracle:CVE-2019-2535
Oracle:CVE-2019-2536
Oracle:CVE-2019-2537
Oracle:CVE-2019-2538
Oracle:CVE-2019-2539
Oracle:CVE-2019-2540
Oracle:CVE-2019-2541
Oracle:CVE-2019-2543
Oracle:CVE-2019-2544
Oracle:CVE-2019-2545
Oracle:CVE-2019-2546
Oracle:CVE-2019-2547
Oracle:CVE-2019-2548
Oracle:CVE-2019-2549
Oracle:CVE-2019-2550
Oracle:CVE-2019-2552
Oracle:CVE-2019-2553
Oracle:CVE-2019-2554
Oracle:CVE-2019-2555
Oracle:CVE-2019-2556
Oracle:CVE-2019-2762
Oracle:CVE-2019-2766
Oracle:CVE-2019-2769
Oracle:CVE-2019-2786
Oracle:CVE-2019-2816
Oracle:CVE-2019-7317
Oracle:CVE-2021-4160
RH:CVE-2016-2177
RH:CVE-2016-3739
RH:CVE-2016-8610
RH:CVE-2016-9840
RH:CVE-2016-9841
RH:CVE-2016-9842
RH:CVE-2016-9843
RH:CVE-2017-13077
RH:CVE-2017-13078
RH:CVE-2017-13079
RH:CVE-2017-13080
RH:CVE-2017-13081
RH:CVE-2017-13082
RH:CVE-2017-13084
RH:CVE-2017-13086
RH:CVE-2017-13087
RH:CVE-2017-13088
RH:CVE-2017-3738
RH:CVE-2017-5664
RH:CVE-2017-5715
RH:CVE-2017-5753
RH:CVE-2017-5754
RH:CVE-2018-1000872
RH:CVE-2018-12539
RH:CVE-2018-1517
RH:CVE-2018-1656
RH:CVE-2018-2767
RH:CVE-2018-2938
RH:CVE-2018-2940
RH:CVE-2018-2973
RH:CVE-2018-3136
RH:CVE-2018-3139
RH:CVE-2018-3149
RH:CVE-2018-3169
RH:CVE-2018-3180
RH:CVE-2018-3183
RH:CVE-2018-3209
RH:CVE-2018-3211
RH:CVE-2018-3214
RHBA-2018:0042
RHSA-2014:0216
RHSA-2014:0294
RHSA-2014:0323
RHSA-2014:0371
RHSA-2014:0372
RHSA-2014:0374
RHSA-2014:0389
RHSA-2014:0452
RHSA-2014:0474
RHSA-2014:0497
RHSA-2014:0498
RHSA-2014:0500
RHSA-2014:0511
RHSA-2014:1007
RHSA-2014:1011
RHSA-2014:1039
RHSA-2014:1040
RHSA-2014:1059
RHSA-2014:1298
RHSA-2014:1904
RHSA-2015:0125
RHSA-2015:0234
RHSA-2015:0235
RHSA-2015:0675
RHSA-2015:0720
RHSA-2015:0765
RHSA-2015:1009
RHSA-2015:1176
RHSA-2015:1485
RHSA-2015:1486
RHSA-2015:1488
RHSA-2015:1544
RHSA-2015:1604
RHSA-2015:1888
RHSA-2016:1940
RHSA-2016:2035
RHSA-2016:2036
RHSA-2016:2130
RHSA-2016:2131
RHSA-2016:2595
RHSA-2016:2749
RHSA-2016:2750
RHSA-2016:2927
RHSA-2016:2928
RHSA-2016:2957
RHSA-2017:0184
RHSA-2017:0193
RHSA-2017:0194
RHSA-2017:0272
RHSA-2017:0286
RHSA-2017:0574
RHSA-2017:0868
RHSA-2017:1208
RHSA-2017:1220
RHSA-2017:1221
RHSA-2017:1222
RHSA-2017:1413
RHSA-2017:1414
RHSA-2017:1415
RHSA-2017:1658
RHSA-2017:1659
RHSA-2017:1801
RHSA-2017:1802
RHSA-2017:1809
RHSA-2017:2192
RHSA-2017:2486
RHSA-2017:2493
RHSA-2017:2494
RHSA-2017:2596
RHSA-2017:2633
RHSA-2017:2635
RHSA-2017:2636
RHSA-2017:2637
RHSA-2017:2638
RHSA-2017:2787
RHSA-2017:2886
RHSA-2017:2907
RHSA-2017:2911
RHSA-2017:2999
RHSA-2017:3046
RHSA-2017:3047
RHSA-2017:3080
RHSA-2017:3189
RHSA-2017:3190
RHSA-2017:3453
RHSA-2018:0010
RHSA-2018:0016
RHSA-2018:0017
RHSA-2018:0018
RHSA-2018:0020
RHSA-2018:0021
RHSA-2018:0022
RHSA-2018:0108
RHSA-2018:0109
RHSA-2018:0110
RHSA-2018:0111
RHSA-2018:0112
RHSA-2018:0151
RHSA-2018:0182
RHSA-2018:0279
RHSA-2018:0292
RHSA-2018:0342
RHSA-2018:0464
RHSA-2018:0478
RHSA-2018:0479
RHSA-2018:0480
RHSA-2018:0481
RHSA-2018:0496
RHSA-2018:0501
RHSA-2018:0512
RHSA-2018:0574
RHSA-2018:0576
RHSA-2018:0577
RHSA-2018:0654
RHSA-2018:0998
RHSA-2018:1062
RHSA-2018:1129
RHSA-2018:1130
RHSA-2018:1196
RHSA-2018:1216
RHSA-2018:1252
RHSA-2018:1319
RHSA-2018:1346
RHSA-2018:1374
RHSA-2018:1447
RHSA-2018:1448
RHSA-2018:1449
RHSA-2018:1450
RHSA-2018:1451
RHSA-2018:1967
RHSA-2018:2185
RHSA-2018:2186
RHSA-2018:2187
RHSA-2018:2241
RHSA-2018:2242
RHSA-2018:2253
RHSA-2018:2254
RHSA-2018:2255
RHSA-2018:2256
RHSA-2018:2283
RHSA-2018:2286
RHSA-2018:2439
RHSA-2018:2568
RHSA-2018:2569
RHSA-2018:2575
RHSA-2018:2576
RHSA-2018:2669
RHSA-2018:2712
RHSA-2018:2713
RHSA-2018:2729
RHSA-2018:2927
RHSA-2018:2942
RHSA-2018:2943
RHSA-2018:2948
RHSA-2018:3000
RHSA-2018:3001
RHSA-2018:3002
RHSA-2018:3003
RHSA-2018:3007
RHSA-2018:3008
RHSA-2018:3350
RHSA-2018:3409
RHSA-2018:3521
RHSA-2018:3533
RHSA-2018:3534
RHSA-2018:3671
RHSA-2018:3672
RHSA-2018:3779
RHSA-2018:3852
RHSA-2019:1822
RHSA-2019:1823
RHSA-2019:2995
RHSA-2019:3892
RHSA-2019:4352
RHSA-2020:0445
RHSA-2020:0727
RHSA-2020:0983
RHSA-2021:2299
RHSA-2021:2300
RHSA-2021:2301
RHSA-2021:2302
RHSA-2021:2303
RHSA-2021:2304
RHSA-2021:2305
RHSA-2021:2306
RHSA-2021:2307
RHSA-2021:2308
SECTRACK:1035907
SECTRACK:1036088
SECTRACK:1037084
SECTRACK:1038641
SECTRACK:1039427
SECTRACK:1039570
SECTRACK:1039571
SECTRACK:1039572
SECTRACK:1039573
SECTRACK:1039576
SECTRACK:1039577
SECTRACK:1039578
SECTRACK:1039581
SECTRACK:1039585
SECTRACK:1039596
SECTRACK:1039703
SECTRACK:1039978
SECTRACK:1040071
SECTRACK:1041294
SECTRACK:1041302
SECTRACK:1041432
SECTRACK:1041765
SECTRACK:1041888
SECTRACK:1041889
SLACKWARE:SSA:2016-141-01
SMASH Issue 169178
SMASH Issue 169658
SMASH Issue 173284
SMASH Issue 173285
SMASH Issue 186305
SMASH Issue 191142
SMASH Issue 196332
SMASH Issue 196703
SMASH Issue 196704
SMASH Issue 196705
SMASH Issue 203304
SMASH Issue 211038
SMASH Issue 211039
SMASH Issue 211040
SMASH Issue 212718
SMASH Issue 212926
SMASH Issue 216695
SMASH Issue 216696
SMASH Issue 216697
SMASH Issue 216698
SMASH Issue 216699
SMASH Issue 216700
SMASH Issue 216701
SMASH Issue 216795
SMASH Issue 216797
SMASH Issue 229602
SMASH Issue 232575
SMASH Issue 239691
SMASH Issue 241888
SMASH Issue 332048
SMASH Issue 398218
SMASH Issue 398219
SUSE:SUSE-SU-2016:1277
SUSE:SUSE-SU-2016:2387
SUSE:SUSE-SU-2016:2394
SUSE:SUSE-SU-2016:2458
SUSE:SUSE-SU-2016:2468
SUSE:SUSE-SU-2016:2469
SUSE:SUSE-SU-2017:2699
SUSE:SUSE-SU-2017:2700
SUSE:SUSE-SU-2017:2745
SUSE:SUSE-SU-2017:2752
SUSE:SUSE-SU-2018:0006
SUSE:SUSE-SU-2018:0007
SUSE:SUSE-SU-2018:0008
SUSE:SUSE-SU-2018:0009
SUSE:SUSE-SU-2018:0010
SUSE:SUSE-SU-2018:0011
SUSE:SUSE-SU-2018:0012
SUSE:SUSE-SU-2018:0019
SUSE:SUSE-SU-2018:0020
SUSE:openSUSE-SU-2015:0858
SUSE:openSUSE-SU-2016:1274
SUSE:openSUSE-SU-2016:1373
SUSE:openSUSE-SU-2016:2391
SUSE:openSUSE-SU-2016:2407
SUSE:openSUSE-SU-2016:2537
SUSE:openSUSE-SU-2016:3202
SUSE:openSUSE-SU-2017:0077
SUSE:openSUSE-SU-2017:0080
SUSE:openSUSE-SU-2017:2755
SUSE:openSUSE-SU-2018:0013
SUSE:openSUSE-SU-2018:0022
SUSE:openSUSE-SU-2018:0023
SUSE:openSUSE-SU-2018:0458
UBUNTU:CVE-2015-7559
UBUNTU:CVE-2016-2177
UBUNTU:CVE-2016-3739
UBUNTU:CVE-2016-8610
UBUNTU:CVE-2016-9840
UBUNTU:CVE-2016-9841
UBUNTU:CVE-2016-9842
UBUNTU:CVE-2016-9843
UBUNTU:CVE-2017-13077
UBUNTU:CVE-2017-13078
UBUNTU:CVE-2017-13079
UBUNTU:CVE-2017-13080
UBUNTU:CVE-2017-13081
UBUNTU:CVE-2017-13082
UBUNTU:CVE-2017-13084
UBUNTU:CVE-2017-13086
UBUNTU:CVE-2017-13087
UBUNTU:CVE-2017-13088
UBUNTU:CVE-2017-3738
UBUNTU:CVE-2017-5664
UBUNTU:CVE-2017-5715
UBUNTU:CVE-2017-5753
UBUNTU:CVE-2017-5754
UBUNTU:CVE-2018-1000872
UBUNTU:CVE-2018-1517
UBUNTU:CVE-2018-1656
UBUNTU:CVE-2018-2767
UBUNTU:CVE-2018-2938
UBUNTU:CVE-2018-2940
UBUNTU:CVE-2018-2952
UBUNTU:CVE-2018-2973
UBUNTU:CVE-2018-3136
UBUNTU:CVE-2018-3139
UBUNTU:CVE-2018-3149
UBUNTU:CVE-2018-3169
UBUNTU:CVE-2018-3180
UBUNTU:CVE-2018-3183
UBUNTU:CVE-2018-3209
UBUNTU:CVE-2018-3211
UBUNTU:CVE-2018-3214
UBUNTU:USN-2952-1
UBUNTU:USN-2952-2
UBUNTU:USN-3455-1
UBUNTU:USN-3516-1
UBUNTU:USN-3522-2
UBUNTU:USN-3522-3
UBUNTU:USN-3522-4
UBUNTU:USN-3523-1
UBUNTU:USN-3523-2
UBUNTU:USN-3524-2
UBUNTU:USN-3525-1
UBUNTU:USN-3531-1
UBUNTU:USN-3531-3
UBUNTU:USN-3540-1
UBUNTU:USN-3540-2
UBUNTU:USN-3541-1
UBUNTU:USN-3541-2
UBUNTU:USN-3542-1
UBUNTU:USN-3542-2
UBUNTU:USN-3549-1
UBUNTU:USN-3560-1
UBUNTU:USN-3561-1
UBUNTU:USN-3580-1
UBUNTU:USN-3581-1
UBUNTU:USN-3581-2
UBUNTU:USN-3582-1
UBUNTU:USN-3582-2
UBUNTU:USN-3583-1
UBUNTU:USN-3594-1
UBUNTU:USN-3597-1
UBUNTU:USN-3597-2
UBUNTU:USN-3620-2
UBUNTU:USN-3690-1
UBUNTU:USN-3725-1
UBUNTU:USN-3725-2
UBUNTU:USN-3777-3
UBUNTU:USN-3804-1
UBUNTU:USN-3824-1
USN-3087-1
USN-3087-2
USN-3181-1
USN-4246-1
USN-4292-1
bdo#1033297
bdo#759718
bdo#802312
bdo#802671
bdo#864447
bdo#877890
bdo#880832
bdo#880836
bdo#882136
bdo#883399
bdo#883625
bdo#884806
bdo#885345
bdo#886532
bdo#898444
bdo#898445
bdo#912848
bnc#1003579
bnc#1003580
bnc#1042910
bnc#1056061
bnc#1071906
bnc#1074578
bnc#1088681
bnc#1101644
bnc#1101645
bnc#1101651
bnc#1101653
bnc#1101656
bnc#1101675
bnc#1104668
bnc#1110018
bnc#1112142
bnc#1112143
bnc#1112144
bnc#1112146
bnc#1112147
bnc#1112148
bnc#1112150
bnc#1112151
bnc#1112152
bnc#1120767
bnc#1122292
bnc#1221668
bnc#977614
bnc#982575
bnc#982778
http://www.debian.org/security/2016/dsa-3560
http://www.debian.org/security/2017/dsa-3891
http://www.debian.org/security/2017/dsa-3892
https://curl.se/docs/CVE-2024-2466.json
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commit%3Bh=af58be768ebb690f78530f796e92b8ae5c9a4401
https://git.php.net/?p=php-src.git%3Ba=commit%3Bh=95433e8e339dbb6b5d5541473c1661db6ba2c451
https://hackerone.com/reports/2416725
https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/a42c48e37398d76334e17089e43ccab945238b8b7896538478d76066%40%3Cannounce.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E
https://security.netapp.com/advisory/ntap-20240503-0010/
linux.git:commit:05992edc279237d5803d64578e0c72b604970a49
linux.git:commit:0ba2e29c7fc1d58a90fab614d41bf487e28e3840
linux.git:commit:1b72bf5a0777d7cec6c2d857ac15599022b3c123
linux.git:commit:290af86629b25ffd1ed6232c4e9107da031705cb
linux.git:commit:2aad9b3e0711f8c67c472920cd5b70199fba8520
linux.git:commit:3214d01f139b7544e870fc0b7fcce8da13c1cb51
linux.git:commit:4bc352ffb39e4eec253e70f8c076f2f48a6c1926
linux.git:commit:5535be3099717646781ce1540cf725965d680e7b
linux.git:commit:6167ec5c9145cdf493722dfd80a5d48bafc4a18a
linux.git:commit:75f139aaf896d6fdeec2e468ddfa4b2fe469bf40
linux.git:commit:b2157399cc9898260d6031c5bfe45fe137c1fbe7
linux.git:commit:d9ea761fdd197351890418acd462c51f241014a7
linux.git:commit:f9f5dc19509bbef6f5e675346f1a7d7b846bdb12
linux.git:commit:fdf7cb4185b60c68e1a75e61691c4afdc15dea0e
openssl.git:commit:5630661aecbea5fe3c4740f5fea744a1f07a6253
rh#1051277
rh#1101303
rh#1103586
rh#1103593
rh#1103598
rh#1103600
rh#1104858
rh#1107544
rh#1107901
rh#1112877
rh#1113899
rh#1116665
rh#1131350
rh#1167537
rh#1183461
rh#1183744
rh#1202366
rh#1202380
rh#1202384
rh#1202395
rh#1202418
rh#1207198
rh#1207202
rh#1287629
rh#1293972
rh#1323114
rh#1335430
rh#1341705
rh#1369383
rh#1378936
rh#1384344
rh#1384743
rh#1386562
rh#1386564
rh#1393454
rh#1397485
rh#1399546
rh#1402345
rh#1402346
rh#1402348
rh#1402351
rh#1414133
rh#1433010
rh#1459158
rh#1491692
rh#1491693
rh#1491694
rh#1491696
rh#1491697
rh#1491698
rh#1500301
rh#1500302
rh#1500303
rh#1500304
rh#1519778
rh#1519780
rh#1519781
rh#1523510
rh#1527393
rh#1553413
rh#1564965
rh#1573699
rh#1575472
rh#1588306
rh#1588313
rh#1588314
rh#1588323
rh#1588327
rh#1588330
rh#1588688
rh#1588695
rh#1588708
rh#1588715
rh#1588721
rh#1591854
rh#1595621
rh#1599161
rh#1600925
rh#1601704
rh#1602141
rh#1602142
rh#1602145
rh#1602146
rh#1607582
rh#1608073
rh#1614973
rh#1618767
rh#1618869
rh#1618871
rh#1619846
rh#1639268
rh#1639293
rh#1639301
rh#1639442
rh#1639484
rh#1639755
rh#1639834
rh#1639904
rh#1639906
rh#1645695
rh#1660375
rh#1660385
rh#1665592
rh#1683804
rh#1686136
rh#1714979
rh#1716448
rh#1716453
rh#1716454
rh#1722971
rh#1731271
rh#1962702
rh#2027239
rh#2044599
rh#2044602
rh#2044863
rh#2048651
rh#2061700
rh#2116175
rh#2119127
rh#2161287
rh#2270497
rh#539529
rh#873317
rh#927622
xf#141681
xf#144882
CVE-2024-24857kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H)CVE-2024-24857
SMASH Issue 393023
bnc#1219616
https://bugzilla.openanolis.cn/show_bug.cgi?id=8155
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
rh#2266247
CVE-2024-24858kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2024-24858
L3:67844
SMASH Issue 393024
bnc#1219609
https://bugzilla.openanolis.cn/show_bug.cgi?id=8154
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3103
linux.git:commit:7835fcfd132eb88b87e8eb901f88436f63ab60f7
rh#2266249
CVE-2024-24859kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-24859
L3:67844
SMASH Issue 393025
bnc#1219612
https://bugzilla.openanolis.cn/show_bug.cgi?id=8153
jsc#CAR-3099
CVE-2024-24860kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-24860
SMASH Issue 393026
bnc#1219608
https://bugzilla.openanolis.cn/show_bug.cgi?id=8151
CVE-2024-24864kernel-source-rt:Won't fixmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-24864
SMASH Issue 393028
bnc#1219624
https://bugzilla.openanolis.cn/show_bug.cgi?id=8178
jsc#CAR-3112
CVE-2024-25062libxml2:Releasedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2024-25062
L3:67637
MISC:gitlab.gnome.org:CVE-2022-40304
SMASH Issue 392982
bnc#1219575
bnc#1219576
bnc#1219578
bnc#1219579
bnc#1219900
https://gitlab.gnome.org/GNOME/libxml2/-/issues/604
jsc#CAR-3098
rh#2262726
CVE-2024-25260elfutils:Not affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2024-25260
SMASH Issue 394639
bnc#1220199
https://github.com/schsiung/fuzzer_issues/issues/1
https://sourceware.org/bugzilla/show_bug.cgi?id=31058
https://sourceware.org/elfutils/
rh#2265194
CVE-2024-25739kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-25739
SMASH Issue 393675
bnc#1219834
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=68a24aba7c593eafa8fd00f2f76407b9b32b47a9
https://groups.google.com/g/syzkaller/c/Xl97YcQA4hg
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://www.spinics.net/lists/kernel/msg5074816.html
jsc#CAR-3105
rh#2263879
CVE-2024-25740kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-25740
SMASH Issue 393676
bnc#1219830
https://lore.kernel.org/lkml/0171b6cc-95ee-3538-913b-65a391a446b3%40huawei.com/T/
rh#2263881
CVE-2024-25741kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-25741
SMASH Issue 393677
bnc#1219832
https://www.spinics.net/lists/linux-usb/msg252167.html
rh#2263884
CVE-2024-25742kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2024-25742
SMASH Issue 398286
SMASH Issue 398288
bnc#1221725
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f
https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208f
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html
rh#2270836
CVE-2024-25743kernel-source-rt:Not affectedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)CVE-2024-25743
SMASH Issue 398287
bnc#1223307
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f35e46631b28a63ca3887d7afef1a65a5544da52
https://github.com/torvalds/linux/commit/f35e46631b28a63ca3887d7afef1a65a5544da52
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html
rh#2270836
CVE-2024-25744kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-25744
SMASH Issue 387546
SMASH Issue 393678
bnc#1217927
bnc#1220314
https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.6.7
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b82a8dbd3d2f4563156f7150c6f2ecab6e960b30
rh#2263875
CVE-2024-26256libarchive:Not affectedimportant7.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)CVE-2024-26256
MISC:www.zerodayinitiative.com:OSS:2024/Q2/269
OSS:2024/06/04/2
OSS:2024/06/05/1
OSS:2024/Q2/269
SMASH Issue 400972
bnc#1222911
https://github.com/LeSuisse/nixpkgs/commit/81b82a2934521dffef76f7ca305d8d4e22fe7262
https://github.com/libarchive/libarchive/commit/eb7939b24a681a04648a59cdebd386b1e9dc9237.patch
https://github.com/libarchive/libarchive/releases/tag/v3.7.4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EWANFZ6NEMXFCALXWI2AFKYBOLONAVFC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TWAMR5TY47UKVYMWQXB34CWSBNTRYMBV/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26256
rh#2282521
rh#2290445
CVE-2024-26581kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26581
SMASH Issue 394583
bnc#1220144
https://git.kernel.org/stable/c/10e9cb39313627f2eae4cd70c4b742074e998fd8
https://git.kernel.org/stable/c/1296c110c5a0
https://git.kernel.org/stable/c/1296c110c5a0b45a8fcf58e7d18bc5da61a565cb
https://git.kernel.org/stable/c/2bab493a5624444ec6e648ad0d55a362bcb4c003
https://git.kernel.org/stable/c/4cee42fcf54fec46b344681e7cc4f234bb22f85a
https://git.kernel.org/stable/c/60c0c230c6f0
https://git.kernel.org/stable/c/60c0c230c6f046da536d3df8b39a20b9a9fd6af0
https://git.kernel.org/stable/c/6eb14441f106
https://git.kernel.org/stable/c/6eb14441f10602fa1cf691da9d685718b68b78a9
https://git.kernel.org/stable/c/b734f7a47aeb
https://git.kernel.org/stable/c/b734f7a47aeb32a5ba298e4ccc16bb0c52b6dbf7
https://git.kernel.org/stable/c/c60d252949caf9aba537525195edae6bbabc35eb
rh#2265185
CVE-2024-26582kernel-source-rt:Not affectedimportant7.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)CVE-2024-26582
SMASH Issue 394736
bnc#1220214
bnc#1226329
https://git.kernel.org/stable/c/20b4ed034872b4d024b26e2bc1092c3f80e5db96
https://git.kernel.org/stable/c/32b55c5ff9103b8508c1e04bfa5a08c64e7a925f
https://git.kernel.org/stable/c/754c9bab77a1b895b97bd99d754403c505bc79df
https://git.kernel.org/stable/c/d684763534b969cca1022e2a28645c7cc91f7fa5
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/
jsc#CAR-3120
rh#2265518
CVE-2024-26583kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26583
SMASH Issue 394737
bnc#1220185
https://git.kernel.org/stable/c/6209319b2efdd8524691187ee99c40637558fa33
https://git.kernel.org/stable/c/7a3ca06d04d589deec81f56229a9a9d62352ce01
https://git.kernel.org/stable/c/86dc27ee36f558fe223dbdfbfcb6856247356f4a
https://git.kernel.org/stable/c/aec7961916f3f9e88766e2688992da6980f11b8d
https://git.kernel.org/stable/c/f17d21ea73918ace8afb9c2d8e734dbf71c2c9d7
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/
rh#2265520
CVE-2024-26587kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26587
SMASH Issue 394909
bnc#1220246
https://git.kernel.org/stable/c/08aca65997fb6f233066883b1f1e653bcb1f26ca
https://git.kernel.org/stable/c/c5068e442eed063d2f1658e6b6d3c1c6fcf1e588
https://git.kernel.org/stable/c/ea937f77208323d35ffe2f8d8fc81b00118bfcda
rh#2265656
CVE-2024-26588kernel-source-rt:Not affectedimportant ()CVE-2024-26588
SMASH Issue 394910
bnc#1220236
https://git.kernel.org/stable/c/36a87385e31c9343af9a4756598e704741250a67
https://git.kernel.org/stable/c/4631c2dd69d928bca396f9f58baeddf85e14ced5
https://git.kernel.org/stable/c/7924ade13a49c0067da6ea13e398102979c0654a
https://git.kernel.org/stable/c/9aeb09f4d85a87bac46c010d75a2ea299d462f28
CVE-2024-26590kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26590
SMASH Issue 394912
bnc#1220252
https://git.kernel.org/stable/c/118a8cf504d7dfa519562d000f423ee3ca75d2c4
https://git.kernel.org/stable/c/47467e04816cb297905c0f09bc2d11ef865942d9
https://git.kernel.org/stable/c/823ba1d2106019ddf195287ba53057aee33cf724
https://git.kernel.org/stable/c/eed24b816e50c6cd18cbee0ff0d7218c8fced199
CVE-2024-26591kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26591
SMASH Issue 394913
bnc#1220254
https://git.kernel.org/stable/c/50ae82f080cf87e84828f066c31723b781d68f5b
https://git.kernel.org/stable/c/6cc9c0af0aa06f781fa515a1734b1a4239dfd2c0
https://git.kernel.org/stable/c/715d82ba636cb3629a6e18a33bb9dbe53f9936ee
https://git.kernel.org/stable/c/8c8bcd45e9b10eef12321f08d2e5be33d615509c
https://git.kernel.org/stable/c/a7b98aa10f895e2569403896f2d19b73b6c95653
rh#2265648
CVE-2024-26592kernel-source-rt:Not affectedimportant5.6 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)CVE-2023-52440
CVE-2023-52441
CVE-2023-52442
CVE-2024-26592
CVE-2024-26594
MISC:lore.kernel.org:OSS:2024/Q1/233
MISC:www.openwall.com:OSS:2024/Q1/233
MISC:www.zerodayinitiative.com:OSS:2024/Q1/233
OSS:2022/12/22/8
OSS:2023/01/04/1
OSS:2024/03/18/2
OSS:2024/Q1/233
SMASH Issue 394723
SMASH Issue 394724
SMASH Issue 394725
SMASH Issue 394914
SMASH Issue 394965
ZDI-24-194
ZDI-24-195
ZDI-24-227
ZDI-24-228
ZDI-24-229
bnc#1220182
bnc#1220183
bnc#1220184
bnc#1220256
bnc#1220327
https://git.kernel.org/stable/c/017d85c94f02090a87f4a473dbe0d6ee0da72693
https://git.kernel.org/stable/c/24290ba94cd0136e417283b0dbf8fcdabcf62111
https://git.kernel.org/stable/c/30fd6521b2fbd9b767e438e31945e5ea3e3a2fba
https://git.kernel.org/stable/c/330d900620dfc9893011d725b3620cd2ee0bc2bc
https://git.kernel.org/stable/c/380965e48e9c32ee4263c023e1d830ea7e462ed1
https://git.kernel.org/stable/c/38d20c62903d669693a1869aa68c4dd5674e2544
https://git.kernel.org/stable/c/3df0411e132ee74a87aa13142dfd2b190275332e
https://git.kernel.org/stable/c/4b081ce0d830b684fdf967abc3696d1261387254
https://git.kernel.org/stable/c/4c2b350b2e269e3fd17bbfa42de1b42775b777ac
https://git.kernel.org/stable/c/536bb492d39bb6c080c92f31e8a55fe9934f452b
https://git.kernel.org/stable/c/5c0df9d30c289d6b9d7d44e2a450de2f8e3cf40b
https://git.kernel.org/stable/c/5e6dfec95833edc54c48605a98365a7325e5541e
https://git.kernel.org/stable/c/69d54650b751532d1e1613a4fb433e591aeef126
https://git.kernel.org/stable/c/6eb8015492bcc84e40646390e50a862b2c0529c9
https://git.kernel.org/stable/c/7f1d6cb0eb6af3a8088dc24b7ddee9a9711538c4
https://git.kernel.org/stable/c/92e470163d96df8db6c4fa0f484e4a229edb903d
https://git.kernel.org/stable/c/999daf367b924fdf14e9d83e034ee0f86bc17ec6
https://git.kernel.org/stable/c/a2b21ef1ea4cf632d19b3a7cc4d4245b8e63202a
https://git.kernel.org/stable/c/aa669ef229ae8dd779da9caa24e254964545895f
https://git.kernel.org/stable/c/bd554ed4fdc3d38404a1c43d428432577573e809
https://git.kernel.org/stable/c/becb5191d1d5fdfca0198a2e37457bbbf4fe266f
https://git.kernel.org/stable/c/dd1de9268745f0eac83a430db7afc32cbd62e84b
https://git.kernel.org/stable/c/ecd7e1c562cb08e41957fcd4b0e404de5ab38e20
rh#2292407
rh#2292410
CVE-2024-26594kernel-source-rt:Not affectedimportant9.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L)CVE-2023-52440
CVE-2023-52441
CVE-2023-52442
CVE-2024-26592
CVE-2024-26594
MISC:lore.kernel.org:OSS:2024/Q1/233
MISC:www.openwall.com:OSS:2024/Q1/233
MISC:www.zerodayinitiative.com:OSS:2024/Q1/233
OSS:2022/12/22/8
OSS:2023/01/04/1
OSS:2024/03/18/2
OSS:2024/Q1/233
SMASH Issue 394723
SMASH Issue 394724
SMASH Issue 394725
SMASH Issue 394914
SMASH Issue 394965
ZDI-24-194
ZDI-24-195
ZDI-24-227
ZDI-24-228
ZDI-24-229
bnc#1220182
bnc#1220183
bnc#1220184
bnc#1220256
bnc#1220327
https://git.kernel.org/stable/c/017d85c94f02090a87f4a473dbe0d6ee0da72693
https://git.kernel.org/stable/c/24290ba94cd0136e417283b0dbf8fcdabcf62111
https://git.kernel.org/stable/c/30fd6521b2fbd9b767e438e31945e5ea3e3a2fba
https://git.kernel.org/stable/c/330d900620dfc9893011d725b3620cd2ee0bc2bc
https://git.kernel.org/stable/c/380965e48e9c32ee4263c023e1d830ea7e462ed1
https://git.kernel.org/stable/c/38d20c62903d669693a1869aa68c4dd5674e2544
https://git.kernel.org/stable/c/3df0411e132ee74a87aa13142dfd2b190275332e
https://git.kernel.org/stable/c/4b081ce0d830b684fdf967abc3696d1261387254
https://git.kernel.org/stable/c/4c2b350b2e269e3fd17bbfa42de1b42775b777ac
https://git.kernel.org/stable/c/536bb492d39bb6c080c92f31e8a55fe9934f452b
https://git.kernel.org/stable/c/5c0df9d30c289d6b9d7d44e2a450de2f8e3cf40b
https://git.kernel.org/stable/c/5e6dfec95833edc54c48605a98365a7325e5541e
https://git.kernel.org/stable/c/69d54650b751532d1e1613a4fb433e591aeef126
https://git.kernel.org/stable/c/6eb8015492bcc84e40646390e50a862b2c0529c9
https://git.kernel.org/stable/c/7f1d6cb0eb6af3a8088dc24b7ddee9a9711538c4
https://git.kernel.org/stable/c/92e470163d96df8db6c4fa0f484e4a229edb903d
https://git.kernel.org/stable/c/999daf367b924fdf14e9d83e034ee0f86bc17ec6
https://git.kernel.org/stable/c/a2b21ef1ea4cf632d19b3a7cc4d4245b8e63202a
https://git.kernel.org/stable/c/aa669ef229ae8dd779da9caa24e254964545895f
https://git.kernel.org/stable/c/bd554ed4fdc3d38404a1c43d428432577573e809
https://git.kernel.org/stable/c/becb5191d1d5fdfca0198a2e37457bbbf4fe266f
https://git.kernel.org/stable/c/dd1de9268745f0eac83a430db7afc32cbd62e84b
https://git.kernel.org/stable/c/ecd7e1c562cb08e41957fcd4b0e404de5ab38e20
rh#2292407
rh#2292410
CVE-2024-26596kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H)CVE-2024-26596
SMASH Issue 394982
bnc#1220355
https://git.kernel.org/stable/c/844f104790bd69c2e4dbb9ee3eba46fde1fcea7b
https://git.kernel.org/stable/c/dbd909c20c11f0d29c0054d41e0d1f668a60e8c8
CVE-2024-26598kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26598
SMASH Issue 394984
bnc#1220326
bnc#1221129
https://git.kernel.org/stable/c/12c2759ab1343c124ed46ba48f27bd1ef5d2dff4
https://git.kernel.org/stable/c/65b201bf3e9af1b0254243a5881390eda56f72d1
https://git.kernel.org/stable/c/ad362fe07fecf0aba839ff2cc59a3617bd42c33f
https://git.kernel.org/stable/c/ba7be666740847d967822bed15500656b26bc703
https://git.kernel.org/stable/c/d04acadb6490aa3314f9c9e087691e55de153b88
https://git.kernel.org/stable/c/dba788e25f05209adf2b0175eb1691dc89fb1ba6
https://git.kernel.org/stable/c/dd3956a1b3dd11f46488c928cb890d6937d1ca80
https://lists.debian.org/debian-lts-announce/2024/06/msg00016.html
rh#2265801
CVE-2024-26599kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L)CVE-2024-26599
SMASH Issue 394985
bnc#1220365
https://git.kernel.org/stable/c/7b85554c7c2aee91171e038e4d5442ffa130b282
https://git.kernel.org/stable/c/a297d07b9a1e4fb8cda25a4a2363a507d294b7c9
https://git.kernel.org/stable/c/bae45b7ebb31984b63b13c3519fd724b3ce92123
https://git.kernel.org/stable/c/e5f2b4b62977fb6c2efcbc5779e0c9dce18215f7
rh#2265802
CVE-2024-26601kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26601
SMASH Issue 395095
bnc#1220342
https://git.kernel.org/stable/c/6b0d48647935e4b8c7b75d1eccb9043fcd4ee581
https://git.kernel.org/stable/c/78327acd4cdc4a1601af718b781eece577b6b7d4
https://git.kernel.org/stable/c/94ebf71bddbcd4ab1ce43ae32c6cb66396d2d51a
https://git.kernel.org/stable/c/c1317822e2de80e78f137d3a2d99febab1b80326
https://git.kernel.org/stable/c/c9b528c35795b711331ed36dc3dbee90d5812d4e
https://git.kernel.org/stable/c/ea42d6cffb0dd27a417f410b9d0011e9859328cb
rh#2265836
CVE-2024-26603kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26603
SMASH Issue 395094
bnc#1220335
https://git.kernel.org/stable/c/627339cccdc9166792ecf96bc3c9f711a60ce996
https://git.kernel.org/stable/c/627e28cbb65564e55008315d9e02fbb90478beda
https://git.kernel.org/stable/c/8bd3eee7720c14b59a206bd05b98d7586bccf99a
https://git.kernel.org/stable/c/b2479ab426cef7ab79a13005650eff956223ced2
https://git.kernel.org/stable/c/d877550eaf2dc9090d782864c96939397a3c6835
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OX4EWCYDZRTOEMC2C6OF7ZACAP23SUB5/
rh#2265833
CVE-2024-26604kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26604
SMASH Issue 395189
bnc#1220449
https://git.kernel.org/stable/c/3ca8fbabcceb8bfe44f7f50640092fd8f1de375c
https://git.kernel.org/stable/c/7f414d306320f837cc3df96cf52161cb8290fb1b
https://git.kernel.org/stable/c/b746d52ce7bcac325a2fa264216ead85b7fbbfaa
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/
rh#2266257
CVE-2024-26605kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26605
SMASH Issue 395093
bnc#1220336
https://git.kernel.org/stable/c/0f7908a016c092cfdaa16d785fa5099d867bc1a3
https://git.kernel.org/stable/c/1e560864159d002b453da42bd2c13a1805515a20
https://git.kernel.org/stable/c/b0f4478838be1f1d330061201898fef65bf8fd7c
https://git.kernel.org/stable/c/ef90508574d7af48420bdc5f7b9a4f1cdd26bc70
rh#2265831
CVE-2024-26606kernel-source-rt:Not affectedlow4 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26606
SMASH Issue 395190
bnc#1220450
https://git.kernel.org/stable/c/42beab162dcee1e691ee4934292d51581c29df61
https://git.kernel.org/stable/c/82722b453dc2f967b172603e389ee7dc1b3137cc
https://git.kernel.org/stable/c/90e09c016d72b91e76de25f71c7b93d94cc3c769
https://git.kernel.org/stable/c/93b372c39c40cbf179e56621e6bc48240943af69
https://git.kernel.org/stable/c/97830f3c3088638ff90b20dfba2eb4d487bf14d7
https://git.kernel.org/stable/c/a423042052ec2bdbf1e552e621e6a768922363cc
https://git.kernel.org/stable/c/a7ae586f6f6024f490b8546c8c84670f96bb9b68
https://git.kernel.org/stable/c/dd64bb8329ce0ea27bc557e4160c2688835402ac
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EZOU3745CWCDZ7EMKMXB2OEEIB5Q3IWM/
rh#2266286
CVE-2024-26608kernel-source-rt:Not affectedmoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26608
SMASH Issue 397147
bnc#1221285
https://git.kernel.org/stable/c/2c939c74ef0b74e99b92e32edc2a59f9b9ca3d5a
https://git.kernel.org/stable/c/6993328a4cd62a24df254b587c0796a4a1eecc95
https://git.kernel.org/stable/c/9863a53100f47652755545c2bd43e14a1855104d
https://git.kernel.org/stable/c/aaa1f1a2ee80888c12ae2783f3a0be10e14067c5
https://git.kernel.org/stable/c/ebeae8adf89d9a82359f6659b1663d09beec2faa
rh#2269206
CVE-2024-26609kernel-source-rt:Not affectedlow ()CVE-2024-26609
MISC:git.kernel.org:OSS:2024/Q2/86
MISC:jonathanspw.com:OSS:2024/Q2/86
OSS:2024/04/10/22
OSS:2024/04/10/23
OSS:2024/04/14/1
OSS:2024/04/15/2
OSS:2024/04/17/5
OSS:2024/Q2/116
OSS:2024/Q2/86
SMASH Issue 397148
bnc#1221290
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660
https://git.kernel.org/stable/c/4e66422f1b56149761dc76030e6345d1cca6f869
https://git.kernel.org/stable/c/55a60251fa50d4e68175e36666b536a602ce4f6c
https://git.kernel.org/stable/c/6653118b176a00915125521c6572ae8e507621db
https://git.kernel.org/stable/c/8365e9d92b85fda975a5ece7a3a139cb964018c8
https://git.kernel.org/stable/c/8e34430e33b8a80bc014f3efe29cac76bc30a4b4
https://git.kernel.org/stable/c/960cf4f812530f01f6acc6878ceaa5404c06af7b
https://git.kernel.org/stable/c/f05a497e7bc8851eeeb3a58da180ba469efebb05
https://git.kernel.org/stable/c/f342de4e2f33e0e39165d8639387aa6c19dff660
https://github.com/Notselwyn/CVE-2024-1086
rh#2262126
rh#2269217
CVE-2024-26610kernel-source-rt:Not affectedimportant7.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2024-26610
SMASH Issue 397149
bnc#1221299
bnc#1221302
https://git.kernel.org/stable/c/05dd9facfb9a1e056752c0901c6e86416037d15a
https://git.kernel.org/stable/c/870171899d75d43e3d14360f3a4850e90a9c289b
https://git.kernel.org/stable/c/99a23462fe1a6f709f0fda3ebbe8b6b193ac75bd
https://git.kernel.org/stable/c/aa2cc9363926991ba74411e3aa0a0ea82c1ffe32
https://git.kernel.org/stable/c/cf4a0d840ecc72fcf16198d5e9c505ab7d5a5e4d
https://git.kernel.org/stable/c/f32a81999d0b8e5ce60afb5f6a3dd7241c17dd67
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2269213
CVE-2024-26611kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26611
SMASH Issue 397150
bnc#1221303
https://git.kernel.org/stable/c/5cd781f7216f980207af09c5e0e1bb1eda284540
https://git.kernel.org/stable/c/82ee4781b8200e44669a354140d5c6bd966b8768
https://git.kernel.org/stable/c/c5114710c8ce86b8317e9b448f4fd15c711c2a82
rh#2269203
CVE-2024-26612kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26612
SMASH Issue 397151
bnc#1221291
https://git.kernel.org/stable/c/1c45256e599061021e2c848952e50f406457e448
https://git.kernel.org/stable/c/3be0b3ed1d76c6703b9ee482b55f7e01c369cc68
https://git.kernel.org/stable/c/4200ad3e46ce50f410fdda302745489441bc70f0
https://git.kernel.org/stable/c/82a9bc343ba019665d3ddc1d9a180bf0e0390cf3
rh#2269201
CVE-2024-26613kernel-source-rt:Not affectedlow ()CVE-2024-26613
SMASH Issue 397152
bnc#1221292
https://git.kernel.org/stable/c/00d1ee8e1d02194f7b7b433e904e04bbcd2cc0dc
https://git.kernel.org/stable/c/0b787c2dea15e7a2828fa3a74a5447df4ed57711
https://git.kernel.org/stable/c/13e788deb7348cc88df34bed736c3b3b9927ea52
https://git.kernel.org/stable/c/344350bfa3b4b37d7c3d5a00536e6fbf0e953fbf
https://git.kernel.org/stable/c/5ae8d50044633306ff160fcf7faa24994175efe1
https://git.kernel.org/stable/c/71024928b3f71ce4529426f8692943205c58d30b
https://git.kernel.org/stable/c/7a73190ea557e7f26914b0fe04c1f57a96cb771f
https://git.kernel.org/stable/c/a37ae111db5e0f7e3d6b692056c30e3e0f6f79cd
rh#2269199
CVE-2024-26616kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26616
SMASH Issue 396003
bnc#1220943
https://git.kernel.org/stable/c/34de0f04684ec00c093a0455648be055f0e8e24f
https://git.kernel.org/stable/c/642b9c520ef2f104277ad1f902f8526edbe087fb
https://git.kernel.org/stable/c/f546c4282673497a06ecb6190b50ae7f6c85b02f
rh#2267352
CVE-2024-26617kernel-source-rt:Not affectedmoderate ()CVE-2024-26617
SMASH Issue 397154
bnc#1221294
https://git.kernel.org/stable/c/05509adf297924f51e1493aa86f9fcde1433ed80
https://git.kernel.org/stable/c/4cccb6221cae6d020270606b9e52b1678fc8b71a
rh#2269194
CVE-2024-26618kernel-source-rt:Not affectedmoderate ()CVE-2024-26618
SMASH Issue 397155
bnc#1221295
https://git.kernel.org/stable/c/569156e4fa347237f8fa2a7e935d860109c55ac4
https://git.kernel.org/stable/c/814af6b4e6000e574e74d92197190edf07cc3680
https://git.kernel.org/stable/c/dc7eb8755797ed41a0d1b5c0c39df3c8f401b3d9
rh#2269192
CVE-2024-26619kernel-source-rt:Not affectedmoderate ()CVE-2024-26619
SMASH Issue 397156
bnc#1221296
https://git.kernel.org/stable/c/2fa79badf4bfeffda6b5032cf62b828486ec9a99
https://git.kernel.org/stable/c/78996eee79ebdfe8b6f0e54cb6dcc792d5129291
rh#2269197
CVE-2024-26620kernel-source-rt:Not affectedimportant7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)CVE-2024-26620
SMASH Issue 397157
bnc#1221298
bnc#1224176
https://git.kernel.org/stable/c/850fb7fa8c684a4c6bf0e4b6978f4ddcc5d43d11
https://git.kernel.org/stable/c/c69d821197611678533fb3eb784fc823b921349a
https://git.kernel.org/stable/c/cdd134d56138302976685e6c7bc4755450b3880e
https://git.kernel.org/stable/c/d6b8d034b576f406af920a7bee81606c027b24c6
rh#2269235
CVE-2024-26621kernel-source-rt:Not affectedlow5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26621
SMASH Issue 391202
SMASH Issue 396109
bnc#1218800
bnc#1220944
https://git.kernel.org/stable/c/4ef9ad19e17676b9ef071309bc62020e2373705d
https://git.kernel.org/stable/c/7432376c913381c5f24d373a87ff629bbde94b47
https://git.kernel.org/stable/c/87632bc9ecff5ded93433bc0fca428019bdd1cfe
rh#2267505
CVE-2024-26622kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26622
L3:68095
L3:68137
SMASH Issue 396176
bnc#1220825
bnc#1220828
https://git.kernel.org/stable/c/2caa605079488da9601099fbda460cfc1702839f
https://git.kernel.org/stable/c/2f03fc340cac9ea1dc63cbf8c93dd2eb0f227815
https://git.kernel.org/stable/c/3bfe04c1273d30b866f4c7c238331ed3b08e5824
https://git.kernel.org/stable/c/6edefe1b6c29a9932f558a898968a9fcbeec5711
https://git.kernel.org/stable/c/7d930a4da17958f869ef679ee0e4a8729337affc
https://git.kernel.org/stable/c/a23ac1788e2c828c097119e9a3178f0b7e503fee
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IVVYSTEVMPYGF6GDSOD44MUXZXAZHOHB/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KSXNF4RLEFLH35BFUQGYXRRVHHUIVBAE/
rh#2267721
CVE-2024-26623kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26623
SMASH Issue 396465
bnc#1221057
https://git.kernel.org/stable/c/22cd6046eb2148b18990257505834dd45c672a1b
https://git.kernel.org/stable/c/5939feb63ea1f011027576c64b68b681cbad31ca
https://git.kernel.org/stable/c/7e82a8745b951b1e794cc780d46f3fbee5e93447
rh#2268223
CVE-2024-26624kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26624
SMASH Issue 396466
bnc#1221059
https://git.kernel.org/stable/c/4d322dce82a1d44f8c83f0f54f95dd1b8dcf46c9
https://git.kernel.org/stable/c/5e7f3e0381c002cb2abde42f09ad511991a8ebaf
https://git.kernel.org/stable/c/875f31aaa67e306098befa5e798a049075910fa7
https://git.kernel.org/stable/c/a2104f43876408b164be5fd58f9b6a3a73b77746
https://git.kernel.org/stable/c/b169ffde733c5adf01788ae091c377f0eca44806
https://git.kernel.org/stable/c/c2d272a9a1e8f22ba584589219f6fe1886a3595f
https://git.kernel.org/stable/c/c8f6b3b864cb876e9ee21666a391c9ee290682ac
https://git.kernel.org/stable/c/f199018dc762dfa501f6d96a424468a0f3c10d9e
jsc#CAR-3212
rh#2268221
CVE-2024-26626kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26626
SMASH Issue 396468
bnc#1221089
https://git.kernel.org/stable/c/2e8c9ae40adda2be1ba41c05fd3cd1e61cce3207
https://git.kernel.org/stable/c/d2f1b7fe74afd66298dbb3c7b39e7b62e4df1724
https://git.kernel.org/stable/c/dcaafdba6c6162bb49f1192850bc3bbc3707738c
https://git.kernel.org/stable/c/e622502c310f1069fd9f41cd38210553115f610a
rh#2268216
CVE-2024-26628kernel-source-rt:Ignorelow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26628
SMASH Issue 396470
bnc#1221128
https://git.kernel.org/stable/c/28d2d623d2fbddcca5c24600474e92f16ebb3a05
https://git.kernel.org/stable/c/47bf0f83fc86df1bf42b385a91aadb910137c5c9
https://git.kernel.org/stable/c/7a70663ba02bd4e19aea8d70c979eb3bd03d839d
https://git.kernel.org/stable/c/8b25d397162b0316ceda40afaa63ee0c4a97d28b
https://git.kernel.org/stable/c/cb96e492d72d143d57db2d2bc143a1cee8741807
rh#2268212
CVE-2024-26629kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26629
OSS:2024/05/29/2
OSS:2024/05/30/1
OSS:2024/05/30/2
OSS:2024/Q2/262
SMASH Issue 397445
bnc#1221379
https://git.kernel.org/stable/c/8f5b860de87039b007e84a28a5eefc888154e098
https://git.kernel.org/stable/c/99fb654d01dc3f08b5905c663ad6c89a9d83302f
https://git.kernel.org/stable/c/b7d2eee1f53899b53f069bba3a59a419fc3d331b
https://git.kernel.org/stable/c/c6f8b3fcc62725e4129f2c0fd550d022d4a7685a
https://git.kernel.org/stable/c/e4cf8941664cae2f89f0189c29fe2ce8c6be0d03
https://git.kernel.org/stable/c/edcf9725150e42beeca42d085149f4c88fa97afd
rh#2269434
CVE-2024-26630kernel-source-rt:Not affectedimportant ()CVE-2024-26630
SMASH Issue 397558
bnc#1221380
https://git.kernel.org/stable/c/3a75cb05d53f4a6823a32deb078de1366954a804
https://git.kernel.org/stable/c/ba60fdf75e89ea762bb617be578dc47f27655117
https://git.kernel.org/stable/c/fe7e008e0ce728252e4ec652cceebcc62211657c
rh#2269436
CVE-2024-26631kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26631
SMASH Issue 398037
bnc#1221630
https://git.kernel.org/stable/c/2e7ef287f07c74985f1bf2858bedc62bd9ebf155
https://git.kernel.org/stable/c/380540bb06bb1d1b12bdc947d1b8f56cda6b5663
https://git.kernel.org/stable/c/3bb5849675ae1d592929798a2b37ea450879c855
https://git.kernel.org/stable/c/3cc283fd16fba72e2cefe3a6f48d7a36b0438900
https://git.kernel.org/stable/c/62b3387beef11738eb6ce667601a28fa089fa02c
rh#2270133
CVE-2024-26632kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26632
SMASH Issue 398038
bnc#1221635
https://git.kernel.org/stable/c/7bed6f3d08b7af27b7015da8dc3acf2b9c1f21d7
https://git.kernel.org/stable/c/a6bd8182137a12d22d3f2cee463271bdcb491659
https://git.kernel.org/stable/c/c6350b5cb78e9024c49eaee6fdb914ad2903a5fe
https://git.kernel.org/stable/c/ca3ede3f5893e2d26d4dbdef1eec28a8487fafde
rh#2270131
CVE-2024-26634kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26634
SMASH Issue 398040
bnc#1221651
https://git.kernel.org/stable/c/8072699aa9e67d1727692cfb3c347263bb627fb9
https://git.kernel.org/stable/c/a2232f29bf52c24f827865b3c90829c44b6c695b
https://git.kernel.org/stable/c/d09486a04f5da0a812c26217213b89a3b1acf836
https://git.kernel.org/stable/c/e855dded4b70d1975ee7b9fed0c700391e3c8ea6
rh#2270116
CVE-2024-26637kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26637
SMASH Issue 398043
bnc#1221652
https://git.kernel.org/stable/c/556857aa1d0855aba02b1c63bc52b91ec63fc2cc
https://git.kernel.org/stable/c/aa74ce30a8a40d19a4256de4ae5322e71344a274
rh#2270106
CVE-2024-26638kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2024-26638
SMASH Issue 398044
bnc#1221649
https://git.kernel.org/stable/c/1960f2b534da1e6c65fb96f9e98bda773495f406
https://git.kernel.org/stable/c/78fbb92af27d0982634116c7a31065f24d092826
https://git.kernel.org/stable/c/b0028f333420a65a53a63978522db680b37379dd
https://git.kernel.org/stable/c/d9c54763e5cdbbd3f81868597fe8aca3c96e6387
rh#2270103
CVE-2024-26639kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26639
SMASH Issue 398045
bnc#1221624
https://git.kernel.org/stable/c/5a33420599fa0288792537e6872fd19cc8607ea6
https://git.kernel.org/stable/c/6335c0cdb2ea0ea02c999e04d34fd84f69fb27ff
https://git.kernel.org/stable/c/dc904345e3771aa01d0b8358b550802fdc6fe00b
https://git.kernel.org/stable/c/f6564fce256a3944aa1bc76cb3c40e792d97c1eb
rh#2270102
CVE-2024-26643kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26643
SMASH Issue 398536
bnc#1221829
https://git.kernel.org/stable/c/291cca35818bd52a407bc37ab45a15816039e363
https://git.kernel.org/stable/c/406b0241d0eb598a0b330ab20ae325537d8d8163
https://git.kernel.org/stable/c/5224afbc30c3ca9ba23e752f0f138729b2c48dd8
https://git.kernel.org/stable/c/552705a3650bbf46a22b1adedc1b04181490fc36
https://git.kernel.org/stable/c/b2d6f9a5b1cf968f1eaa71085ceeb09c2cb276b1
https://git.kernel.org/stable/c/d75a589bb92af1abf3b779cfcd1977ca11b27033
https://git.kernel.org/stable/c/e2d45f467096e931044f0ab7634499879d851a5c
https://git.kernel.org/stable/c/edcf1a3f182ecf8b6b805f0ce90570ea98c5f6bf
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2270879
CVE-2024-26644kernel-source-rt:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26644
SMASH Issue 398968
bnc#1222072
https://git.kernel.org/stable/c/0877497dc97834728e1b528ddf1e1c484292c29c
https://git.kernel.org/stable/c/2bdf872bcfe629a6202ffd6641615a8ed00e8464
https://git.kernel.org/stable/c/6e6bca99e8d88d989a7cde4c064abea552d5219b
https://git.kernel.org/stable/c/7081929ab2572920e94d70be3d332e5c9f97095a
https://git.kernel.org/stable/c/d8680b722f0ff6d7a01ddacc1844e0d52354d6ff
https://git.kernel.org/stable/c/ec794a7528199e1be6d47bec03f4755aa75df256
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2271644
CVE-2024-26646kernel-source-rt:Not affectedmoderate4.9 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2024-26646
SMASH Issue 399012
bnc#1222070
https://git.kernel.org/stable/c/019ccc66d56a696a4dfee3bfa2f04d0a7c3d89ee
https://git.kernel.org/stable/c/28f010dc50df0f7987c04112114fcfa7e0803566
https://git.kernel.org/stable/c/97566d09fd02d2ab329774bb89a2cdf2267e86d9
https://git.kernel.org/stable/c/c9d6d63b6c03afaa6f185df249af693a7939577c
rh#2271788
CVE-2024-26647kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26647
SMASH Issue 399013
bnc#1222066
https://git.kernel.org/stable/c/3bb9b1f958c3d986ed90a3ff009f1e77e9553207
https://git.kernel.org/stable/c/6aa5ede6665122f4c8abce3c6eba06b49e54d25c
https://git.kernel.org/stable/c/cf656fc7276e5b3709a81bc9d9639459be2b2647
rh#2271790
CVE-2024-26648kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26648
SMASH Issue 399014
bnc#1222067
https://git.kernel.org/stable/c/22ae604aea14756954e1c00ae653e34d2afd2935
https://git.kernel.org/stable/c/7073934f5d73f8b53308963cee36f0d389ea857c
https://git.kernel.org/stable/c/c02d257c654191ecda1dc1af6875d527e85310e7
rh#2271797
CVE-2024-26649kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26649
SMASH Issue 399015
bnc#1222055
https://git.kernel.org/stable/c/8b5bacce2d13dbe648f0bfd3f738ecce8db4978c
https://git.kernel.org/stable/c/bc03c02cc1991a066b23e69bbcc0f66e8f1f7453
https://git.kernel.org/stable/c/d3887448486caeef9687fb5dfebd4ff91e0f25aa
rh#2271796
CVE-2024-26650kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N)CVE-2024-26650
SMASH Issue 399016
bnc#1222048
https://git.kernel.org/stable/c/2841631a03652f32b595c563695d0461072e0de4
https://git.kernel.org/stable/c/5913320eb0b3ec88158cfcb0fa5e996bf4ef681b
https://git.kernel.org/stable/c/847e1eb30e269a094da046c08273abe3f3361cf2
https://git.kernel.org/stable/c/d281ac9a987c553d93211b90fd4fe97d8eca32cd
rh#2271795
CVE-2024-26652kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26652
SMASH Issue 399254
bnc#1222115
bnc#1222116
https://git.kernel.org/stable/c/995f802abff209514ac2ee03b96224237646cec3
https://git.kernel.org/stable/c/ba18deddd6d502da71fd6b6143c53042271b82bd
https://git.kernel.org/stable/c/ffda0e962f270b3ec937660afd15b685263232d3
rh#2271875
CVE-2024-26653kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26653
SMASH Issue 399862
bnc#1222297
https://git.kernel.org/stable/c/420babea4f1881a7c4ea22a8e218b8c6895d3f21
https://git.kernel.org/stable/c/7c9631969287a5366bc8e39cd5abff154b35fb80
https://git.kernel.org/stable/c/8a9f653cc852677003c23ee8075e3ed8fb4743c9
rh#2272444
CVE-2024-26655kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26655
SMASH Issue 399890
bnc#1222306
https://git.kernel.org/stable/c/0200dd7ed2335469955d7e69cc1a6fa7df1f3847
https://git.kernel.org/stable/c/5b4cdd9c5676559b8a7c944ac5269b914b8c0bb8
https://git.kernel.org/stable/c/a88649b49523e8cbe95254440d803e38c19d2341
rh#2272530
CVE-2024-26657kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26657
SMASH Issue 399967
bnc#1222273
https://git.kernel.org/stable/c/54b5b7275dfdec35812ccce70930cd7c4ee612b2
https://git.kernel.org/stable/c/74cd204c7afe498aa9dcc3ebf0ecac53d477a429
https://git.kernel.org/stable/c/f34e8bb7d6c6626933fe993e03ed59ae85e16abb
rh#2272687
CVE-2024-26658kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26658
SMASH Issue 399968
bnc#1222315
https://git.kernel.org/stable/c/2acc59dd88d27ad69b66ded80df16c042b04eeec
https://git.kernel.org/stable/c/5b41d3fd04c6757b9c2a60a0c5b2609cae9999df
rh#2272777
CVE-2024-26660kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26660
SMASH Issue 399948
bnc#1222266
https://git.kernel.org/stable/c/42442f74314d41ddc68227047036fa3e78940054
https://git.kernel.org/stable/c/58fca355ad37dcb5f785d9095db5f748b79c5dc2
https://git.kernel.org/stable/c/a938eab9586eea31cfd129a507f552efae14d738
https://git.kernel.org/stable/c/cd9bd10c59e3c1446680514fd3097c5b00d3712d
https://git.kernel.org/stable/c/efdd665ce1a1634b8c1dad5e7f6baaef3e131d0a
rh#2272782
CVE-2024-26661kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26661
SMASH Issue 399970
bnc#1222323
https://git.kernel.org/stable/c/39f24c08363af1cd945abad84e3c87fd3e3c845a
https://git.kernel.org/stable/c/3f3c237a706580326d3b7a1b97697e5031ca4667
https://git.kernel.org/stable/c/66951d98d9bf45ba25acf37fe0747253fafdf298
rh#2272784
CVE-2024-26662kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26662
SMASH Issue 399946
bnc#1222324
https://git.kernel.org/stable/c/0c863cab0e9173f8b6c7bc328bee3b8625f131b5
https://git.kernel.org/stable/c/2e150ccea13129eb048679114808eb9770443e4d
https://git.kernel.org/stable/c/e96fddb32931d007db12b1fce9b5e8e4c080401b
rh#2272786
CVE-2024-26664kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26664
SMASH Issue 399972
bnc#1222355
https://git.kernel.org/stable/c/1eb74c00c9c3b13cb65e508c5d5a2f11afb96b8b
https://git.kernel.org/stable/c/3a7753bda55985dc26fae17795cb10d825453ad1
https://git.kernel.org/stable/c/4e440abc894585a34c2904a32cd54af1742311b3
https://git.kernel.org/stable/c/853a6503c586a71abf27e60a7f8c4fb28092976d
https://git.kernel.org/stable/c/93f0f4e846fcb682c3ec436e3b2e30e5a3a8ee6a
https://git.kernel.org/stable/c/9bce69419271eb8b2b3ab467387cb59c99d80deb
https://git.kernel.org/stable/c/a16afec8e83c56b14a4a73d2e3fb8eec3a8a057e
https://git.kernel.org/stable/c/f0da068c75c20ffc5ba28243ff577531dc2af1fd
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2272791
CVE-2024-26665kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26665
SMASH Issue 399973
bnc#1222328
https://git.kernel.org/stable/c/510c869ffa4068c5f19ff4df51d1e2f3a30aaac1
https://git.kernel.org/stable/c/7dc9feb8b1705cf00de20563b6bc4831f4c99dab
https://git.kernel.org/stable/c/d75abeec401f8c86b470e7028a13fcdc87e5dd06
https://git.kernel.org/stable/c/d964dd1bc1452594b4207d9229c157d9386e5d8a
https://git.kernel.org/stable/c/e37cde7a5716466ff2a76f7f27f0a29b05b9a732
https://git.kernel.org/stable/c/e77bf828f1ca1c47fcff58bdc26b60a9d3dfbe1d
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2272793
CVE-2024-26666kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26666
SMASH Issue 399974
bnc#1222293
https://git.kernel.org/stable/c/9480adfe4e0f0319b9da04b44e4eebd5ad07e0cd
https://git.kernel.org/stable/c/c255c3b653c6e8b52ac658c305e2fece2825f7ad
https://git.kernel.org/stable/c/fc3432ae8232ff4025e7c55012dd88db0e3d18eb
rh#2272773
CVE-2024-26667kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26667
SMASH Issue 399975
bnc#1222331
https://git.kernel.org/stable/c/79592a6e7bdc1d05460c95f891f5e5263a107af8
https://git.kernel.org/stable/c/7f3d03c48b1eb6bc45ab20ca98b8b11be25f9f52
https://git.kernel.org/stable/c/eb4f56f3ff5799ca754ae6d811803a63fe25a4a2
https://git.kernel.org/stable/c/fb8bfc6ea3cd8c5ac3d35711d064e2f6646aec17
rh#2272775
CVE-2024-26670kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26670
SMASH Issue 399978
bnc#1222356
https://git.kernel.org/stable/c/58eb5c07f41704464b9acc09ab0707b6769db6c0
https://git.kernel.org/stable/c/832dd634bd1b4e3bbe9f10b9c9ba5db6f6f2b97f
https://git.kernel.org/stable/c/baa0aaac16432019651e0d60c41cd34a0c3c3477
rh#2272800
CVE-2024-26672kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26672
SMASH Issue 399980
bnc#1222358
https://git.kernel.org/stable/c/4f32504a2f85a7b40fe149436881381f48e9c0c0
https://git.kernel.org/stable/c/7b5d58c07024516c0e81b95e98f37710cf402c53
rh#2272814
CVE-2024-26674kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26674
SMASH Issue 399981
bnc#1222378
https://git.kernel.org/stable/c/2aed1b6c33afd8599d01c6532bbecb829480a674
https://git.kernel.org/stable/c/2da241c5ed78d0978228a1150735539fe1a60eca
https://git.kernel.org/stable/c/8eed4e00a370b37b4e5985ed983dccedd555ea9d
rh#2272818
CVE-2024-26676kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26676
SMASH Issue 399983
bnc#1222380
https://git.kernel.org/stable/c/1279f9d9dec2d7462823a18c29ad61359e0a007d
https://git.kernel.org/stable/c/4fe505c63aa3273135a57597fda761e9aecc7668
https://git.kernel.org/stable/c/82ae47c5c3a6b27fdc0f9e83c1499cb439c56140
https://git.kernel.org/stable/c/b74aa9ce13d02b7fd37c5325b99854f91b9b4276
https://git.kernel.org/stable/c/e0e09186d8821ad59806115d347ea32efa43ca4b
rh#2272832
CVE-2024-26678kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26678
SMASH Issue 399985
bnc#1222292
https://git.kernel.org/stable/c/0a962f2fbaa976af9eed21d0306370cded485787
https://git.kernel.org/stable/c/1ad55cecf22f05f1c884adf63cc09d3c3e609ebf
https://git.kernel.org/stable/c/4adeeff8c12321cd453412a659c3c0eeb9bb2397
https://git.kernel.org/stable/c/d327e961573fc335af0ae8a160302205327e1f4e
rh#2272836
CVE-2024-26680kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26680
SMASH Issue 399987
bnc#1222427
https://git.kernel.org/stable/c/004fe5b7f59286a926a45e0cafc7870e9cdddd56
https://git.kernel.org/stable/c/2e7d3b67630dfd8f178c41fa2217aa00e79a5887
https://git.kernel.org/stable/c/466ceebe48cbba3f4506f165fca7111f9eb8bb12
https://git.kernel.org/stable/c/e42e334c645575be5432adee224975d4f536fdb1
rh#2272842
CVE-2024-26681kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26681
SMASH Issue 399988
bnc#1222431
https://git.kernel.org/stable/c/0193e0660cc6689c794794b471492923cfd7bfbc
https://git.kernel.org/stable/c/6eecddd9c3c8d6e3a097531cdc6d500335b35e46
https://git.kernel.org/stable/c/ba5e1272142d051dcc57ca1d3225ad8a089f9858
https://git.kernel.org/stable/c/d91964cdada76740811b7c621239f9c407820dbc
rh#2272844
CVE-2024-26682kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26682
SMASH Issue 399989
bnc#1222433
https://git.kernel.org/stable/c/35e2385dbe787936c793d70755a5177d267a40aa
https://git.kernel.org/stable/c/ea88bde8e3fefbe4268f6991375dd629895a090a
rh#2272846
CVE-2024-26683kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26683
SMASH Issue 399945
bnc#1222434
https://git.kernel.org/stable/c/177fbbcb4ed6b306c1626a277fac3fb1c495a4c7
https://git.kernel.org/stable/c/ce112c941c2b172afba3e913a90c380647d53975
rh#2272822
CVE-2024-26684kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26684
SMASH Issue 399990
bnc#1222445
https://git.kernel.org/stable/c/2fc45a4631ac7837a5c497cb4f7e2115d950fc37
https://git.kernel.org/stable/c/3b48c9e258c8691c2f093ee07b1ea3764caaa1b2
https://git.kernel.org/stable/c/46eba193d04f8bd717e525eb4110f3c46c12aec3
https://git.kernel.org/stable/c/6609e98ed82966a1b3168c142aca30f8284a7b89
https://git.kernel.org/stable/c/7e0ff50131e9d1aa507be8e670d38e9300a5f5bf
https://git.kernel.org/stable/c/e42ff0844fe418c7d03a14f9f90e1b91ba119591
https://git.kernel.org/stable/c/e9837c83befb5b852fa76425dde98a87b737df00
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2272824
CVE-2024-26685kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26685
SMASH Issue 400157
bnc#1222437
https://git.kernel.org/stable/c/2c3bdba00283a6c7a5b19481a59a730f46063803
https://git.kernel.org/stable/c/5bc09b397cbf1221f8a8aacb1152650c9195b02b
https://git.kernel.org/stable/c/626daab3811b772086aef1bf8eed3ffe6f523eff
https://git.kernel.org/stable/c/6589f0f72f8edd1fa11adce4eedbd3615f2e78ab
https://git.kernel.org/stable/c/8fa90634ec3e9cc50f42dd605eec60f2d146ced8
https://git.kernel.org/stable/c/c4a09fdac625e64abe478dcf88bfa20406616928
https://git.kernel.org/stable/c/d31c8721e816eff5ca6573cc487754f357c093cd
https://git.kernel.org/stable/c/f3e4963566f58726d3265a727116a42b591f6596
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273111
CVE-2024-26686kernel-source-rt:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26686
SMASH Issue 400158
bnc#1222436
https://git.kernel.org/stable/c/27978243f165b44e342f28f449b91327944ea071
https://git.kernel.org/stable/c/7601df8031fd67310af891897ef6cc0df4209305
https://git.kernel.org/stable/c/cf4b8c39b9a0bd81c47afc7ef62914a62dd5ec4d
rh#2273109
CVE-2024-26690kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26690
SMASH Issue 400163
bnc#1222462
https://git.kernel.org/stable/c/38cc3c6dcc09dc3a1800b5ec22aef643ca11eab8
https://git.kernel.org/stable/c/9680b2ab54ba8d72581100e8c45471306101836e
https://git.kernel.org/stable/c/e6af0f082a4b87b99ad033003be2a904a1791b3f
rh#2273100
CVE-2024-26691kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26691
SMASH Issue 400164
bnc#1222463
https://git.kernel.org/stable/c/10c02aad111df02088d1a81792a709f6a7eca6cc
https://git.kernel.org/stable/c/3ab1c40a1e915e350d9181a4603af393141970cc
https://git.kernel.org/stable/c/3d16cebf01127f459dcfeb79ed77bd68b124c228
rh#2273098
CVE-2024-26692kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26692
SMASH Issue 400165
bnc#1222464
https://git.kernel.org/stable/c/4145ccff546ea868428b3e0fe6818c6261b574a9
https://git.kernel.org/stable/c/4860abb91f3d7fbaf8147d54782149bb1fc45892
https://git.kernel.org/stable/c/63c35afd50e28b49c5b75542045a8c42b696dab9
rh#2273096
CVE-2024-26693kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26693
SMASH Issue 400166
bnc#1222451
https://git.kernel.org/stable/c/00f4eb31b8193f6070ce24df636883f9c104ca95
https://git.kernel.org/stable/c/b7198383ef2debe748118996f627452281cf27d7
https://git.kernel.org/stable/c/c12f0f4d4caf23b1bfdc2602b6b70d56bdcd6aa7
rh#2273094
CVE-2024-26694kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26694
SMASH Issue 400168
bnc#1222466
https://git.kernel.org/stable/c/353d321f63f7dbfc9ef58498cc732c9fe886a596
https://git.kernel.org/stable/c/ab9d4bb9a1892439b3123fc52b19e32b9cdf80ad
https://git.kernel.org/stable/c/d24eb9a27bea8fe5237fa71be274391d9d51eff2
rh#2273092
CVE-2024-26695kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26695
SMASH Issue 400169
bnc#1222373
https://git.kernel.org/stable/c/58054faf3bd29cd0b949b77efcb6157f66f401ed
https://git.kernel.org/stable/c/7535ec350a5f09b5756a7607f5582913f21200f4
https://git.kernel.org/stable/c/8731fe001a60581794ed9cf65da8cd304846a6fb
https://git.kernel.org/stable/c/88aa493f393d2ee38ac140e1f6ac1881346e85d4
https://git.kernel.org/stable/c/b5909f197f3b26aebedca7d8ac7b688fd993a266
https://git.kernel.org/stable/c/ccb88e9549e7cfd8bcd511c538f437e20026e983
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273123
CVE-2024-26696kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26696
SMASH Issue 400170
bnc#1222549
https://git.kernel.org/stable/c/228742b2ddfb99dfd71e5a307e6088ab6836272e
https://git.kernel.org/stable/c/38296afe3c6ee07319e01bb249aa4bb47c07b534
https://git.kernel.org/stable/c/7e9b622bd0748cc104d66535b76d9b3535f9dc0f
https://git.kernel.org/stable/c/8494ba2c9ea00a54d5b50e69b22c55a8958bce32
https://git.kernel.org/stable/c/862ee4422c38be5c249844a684b00d0dbe9d1e46
https://git.kernel.org/stable/c/98a4026b22ff440c7f47056481bcbbe442f607d6
https://git.kernel.org/stable/c/e38585401d464578d30f5868ff4ca54475c34f7d
https://git.kernel.org/stable/c/ea5ddbc11613b55e5128c85f57b08f907abd9b28
rh#2273121
CVE-2024-26697kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26697
SMASH Issue 400171
bnc#1222550
https://git.kernel.org/stable/c/120f7fa2008e3bd8b7680b4ab5df942decf60fd5
https://git.kernel.org/stable/c/2000016bab499074e6248ea85aeea7dd762355d9
https://git.kernel.org/stable/c/2e1480538ef60bfee5473dfe02b1ecbaf1a4aa0d
https://git.kernel.org/stable/c/364a66be2abdcd4fd426ffa44d9b8f40aafb3caa
https://git.kernel.org/stable/c/5278c3eb6bf5896417572b52adb6be9d26e92f65
https://git.kernel.org/stable/c/67b8bcbaed4777871bb0dcc888fb02a614a98ab1
https://git.kernel.org/stable/c/9c9c68d64fd3284f7097ed6ae057c8441f39fcd3
https://git.kernel.org/stable/c/a6efe6dbaaf504f5b3f8a5c3f711fe54e7dda0ba
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273119
CVE-2024-26698kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26698
SMASH Issue 400172
bnc#1222374
https://git.kernel.org/stable/c/0e8875de9dad12805ff66e92cd5edea6a421f1cd
https://git.kernel.org/stable/c/22a77c0f5b8233237731df3288d067af51a2fd7b
https://git.kernel.org/stable/c/48a8ccccffbae10c91d31fc872db5c31aba07518
https://git.kernel.org/stable/c/7656372ae190e54e8c8cf1039725a5ea59fdf84a
https://git.kernel.org/stable/c/9ec807e7b6f5fcf9499f3baa69f254bb239a847f
https://git.kernel.org/stable/c/e0526ec5360a48ad3ab2e26e802b0532302a7e11
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273117
CVE-2024-26699kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2024-26699
SMASH Issue 400173
bnc#1222602
https://git.kernel.org/stable/c/46806e59a87790760870d216f54951a5b4d545bc
https://git.kernel.org/stable/c/ca400d8e0c1c9d79c08dfb6b7f966e26c8cae7fb
rh#2273115
CVE-2024-26700kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26700
SMASH Issue 400154
bnc#1222870
https://git.kernel.org/stable/c/01d992088dce3945f70f49f34b0b911c5213c238
https://git.kernel.org/stable/c/5cd7185d2db76c42a9b7e69adad9591d9fca093f
https://git.kernel.org/stable/c/7407c61f43b66e90ad127d0cdd13cbc9d87141a5
https://git.kernel.org/stable/c/e6a7df96facdcf5b1f71eb3ec26f2f9f6ad61e57
rh#2273113
CVE-2024-26703kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26703
SMASH Issue 400175
bnc#1222423
https://git.kernel.org/stable/c/1389358bb008e7625942846e9f03554319b7fecc
https://git.kernel.org/stable/c/2354d29986ebd138f89c2b73fecf8237e0a4ad6b
https://git.kernel.org/stable/c/5f703935fdb559642d85b2088442ee55a557ae6d
rh#2273176
CVE-2024-26705kernel-source-rt:Not affectedmoderate ()CVE-2024-26705
SMASH Issue 400176
bnc#1222485
https://git.kernel.org/stable/c/54944f45470af5965fb9c28cf962ec30f38a8f5b
https://git.kernel.org/stable/c/913b9d443a0180cf0de3548f1ab3149378998486
https://git.kernel.org/stable/c/aa52be55276614d33f22fbe7da36c40d6432d10b
rh#2273172
CVE-2024-26706kernel-source-rt:Not affectedmoderate ()CVE-2024-26706
SMASH Issue 400177
bnc#1222486
https://git.kernel.org/stable/c/23027309b099ffc4efca5477009a11dccbdae592
https://git.kernel.org/stable/c/8b1d72395635af45410b66cc4c4ab37a12c4a831
https://git.kernel.org/stable/c/ce31d79aa1f13a2345791f84935281a2c194e003
https://git.kernel.org/stable/c/fa69a8063f8b27f3c7434a0d4f464a76a62f24d2
rh#2273170
CVE-2024-26707kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26707
SMASH Issue 400178
bnc#1222421
https://git.kernel.org/stable/c/0d8011a878fdf96123bc0d6a12e2fe7ced5fddfb
https://git.kernel.org/stable/c/37e8c97e539015637cb920d3e6f1e404f707a06e
https://git.kernel.org/stable/c/547545e50c913861219947ce490c68a1776b9b51
https://git.kernel.org/stable/c/56440799fc4621c279df16176f83a995d056023a
https://git.kernel.org/stable/c/923dea2a7ea9e1ef5ac4031fba461c1cc92e32b8
https://git.kernel.org/stable/c/de769423b2f053182a41317c4db5a927e90622a0
rh#2273168
CVE-2024-26708kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26708
SMASH Issue 400179
bnc#1222672
https://git.kernel.org/stable/c/337cebbd850f94147cee05252778f8f78b8c337f
https://git.kernel.org/stable/c/4bfe217e075d04e63c092df9d40c608e598c2ef2
https://git.kernel.org/stable/c/e158fb9679d15a2317ec13b4f6301bd26265df2f
rh#2273166
CVE-2024-26709kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26709
SMASH Issue 400180
bnc#1222418
https://git.kernel.org/stable/c/0846dd77c8349ec92ca0079c9c71d130f34cb192
https://git.kernel.org/stable/c/c90fdea9cac9eb419fc266e75d625cb60c8f7f6c
rh#2273164
CVE-2024-26710kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26710
SMASH Issue 400181
bnc#1222419
https://git.kernel.org/stable/c/4297217bcf1f0948a19c2bacc6b68d92e7778ad9
https://git.kernel.org/stable/c/4cc31fa07445879a13750cb061bb8c2654975fcb
https://git.kernel.org/stable/c/b29b16bd836a838b7690f80e37f8376414c74cbe
https://git.kernel.org/stable/c/f1acb109505d983779bbb7e20a1ee6244d2b5736
rh#2273162
CVE-2024-26711kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26711
SMASH Issue 400182
bnc#1222420
https://git.kernel.org/stable/c/02876e2df02f8b17a593d77a0a7879a8109b27e1
https://git.kernel.org/stable/c/0e0dab37750926d4fb0144edb1c1ea0612fea273
https://git.kernel.org/stable/c/a22b0a2be69a36511cb5b37d948b651ddf7debf3
rh#2273160
CVE-2024-26712kernel-source-rt:Not affectedmoderate ()CVE-2024-26712
SMASH Issue 400183
bnc#1222439
https://git.kernel.org/stable/c/0516c06b19dc64807c10e01bb99b552bdf2d7dbe
https://git.kernel.org/stable/c/0c09912dd8387e228afcc5e34ac5d79b1e3a1058
https://git.kernel.org/stable/c/230e89b5ad0a33f530a2a976b3e5e4385cb27882
https://git.kernel.org/stable/c/2738e0aa2fb24a7ab9c878d912dc2b239738c6c6
https://git.kernel.org/stable/c/4a7aee96200ad281a5cc4cf5c7a2e2a49d2b97b0
https://git.kernel.org/stable/c/70ef2ba1f4286b2b73675aeb424b590c92d57b25
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273158
CVE-2024-26713kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26713
SMASH Issue 400140
bnc#1222872
https://git.kernel.org/stable/c/9978d5b744e0227afe19e3bcb4c5f75442dde753
https://git.kernel.org/stable/c/d4f762d6403f7419de90d7749fa83dd92ffb0e1d
https://git.kernel.org/stable/c/ed8b94f6e0acd652ce69bd69d678a0c769172df8
rh#2273156
CVE-2024-26714kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26714
SMASH Issue 400184
bnc#1222489
https://git.kernel.org/stable/c/6616d3c4f8284a7b3ef978c916566bd240cea1c7
https://git.kernel.org/stable/c/7a3a70dd08e4b7dffc2f86f2c68fc3812804b9d0
https://git.kernel.org/stable/c/85e985a4f46e462a37f1875cb74ed380e7c0c2e0
https://git.kernel.org/stable/c/d8e36ff40cf9dadb135f3a97341c02c9a7afcc43
rh#2273154
CVE-2024-26716kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26716
SMASH Issue 400186
bnc#1222359
https://git.kernel.org/stable/c/12783c0b9e2c7915a50d5ec829630ff2da50472c
https://git.kernel.org/stable/c/465b545d1d7ef282192ddd4439b08279bdb13f6f
https://git.kernel.org/stable/c/ed85777c640cf9e6920bb1b60ed8cd48e1f4d873
rh#2273150
CVE-2024-26717kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26717
SMASH Issue 400187
bnc#1222360
https://git.kernel.org/stable/c/00aab7dcb2267f2aef59447602f34501efe1a07f
https://git.kernel.org/stable/c/4cad91344a62536a2949873bad6365fbb6232776
https://git.kernel.org/stable/c/62f5d219edbd174829aa18d4b3d97cd5fefbb783
https://git.kernel.org/stable/c/d7d7a0e3b6f5adc45f23667cbb919e99093a5b5c
https://git.kernel.org/stable/c/e28d6b63aeecbda450935fb58db0e682ea8212d3
rh#2273148
CVE-2024-26718kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26718
SMASH Issue 400188
bnc#1222416
https://git.kernel.org/stable/c/0a9bab391e336489169b95cb0d4553d921302189
https://git.kernel.org/stable/c/0c45a20cbe68bc4d681734f5c03891124a274257
https://git.kernel.org/stable/c/30884a44e0cedc3dfda8c22432f3ba4078ec2d94
https://git.kernel.org/stable/c/5735a2671ffb70ea29ca83969fe01316ee2ed6fc
rh#2273146
CVE-2024-26719kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26719
SMASH Issue 400189
bnc#1222566
https://git.kernel.org/stable/c/39126abc5e20611579602f03b66627d7cd1422f0
https://git.kernel.org/stable/c/985d053f7633d8b539ab1531738d538efac678a9
https://git.kernel.org/stable/c/cc0037fa592d56e4abb9c7d1c52c4d2dc25cd906
rh#2273143
CVE-2024-26721kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26721
SMASH Issue 400191
bnc#1222365
https://git.kernel.org/stable/c/962ac2dce56bb3aad1f82a4bbe3ada57a020287c
https://git.kernel.org/stable/c/ff5999fb03f467e1e7159f0ddb199c787f7512b9
rh#2273139
CVE-2024-26723kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26723
SMASH Issue 400193
bnc#1222367
https://git.kernel.org/stable/c/15faa1f67ab405d47789d4702f587ec7df7ef03e
https://git.kernel.org/stable/c/2a492f01228b7d091dfe38974ef40dccf8f9f2f1
https://git.kernel.org/stable/c/48fae67d837488c87379f0c9f27df7391718477c
https://git.kernel.org/stable/c/b9357489c46c7a43999964628db8b47d3a1f8672
rh#2273135
CVE-2024-26724kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26724
SMASH Issue 400141
bnc#1222523
https://git.kernel.org/stable/c/1596126ea50228f0ed96697bae4e9368fda02c56
https://git.kernel.org/stable/c/aa1eec2f546f2afa8c98ec41e5d8ee488165d685
rh#2273133
CVE-2024-26725kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26725
SMASH Issue 400194
bnc#1222369
https://git.kernel.org/stable/c/087739cbd0d0b87b6cec2c0799436ac66e24acc8
https://git.kernel.org/stable/c/53c0441dd2c44ee93fddb5473885fd41e4bc2361
rh#2273130
CVE-2024-26726kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26726
SMASH Issue 400142
bnc#1222532
https://git.kernel.org/stable/c/02f2b95b00bf57d20320ee168b30fb7f3db8e555
https://git.kernel.org/stable/c/5571e41ec6e56e35f34ae9f5b3a335ef510e0ade
https://git.kernel.org/stable/c/7bddf18f474f166c19f91b2baf67bf7c5eda03f7
https://git.kernel.org/stable/c/a4b7741c8302e28073bfc6dd1c2e73598e5e535e
rh#2273128
CVE-2024-26727kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26727
SMASH Issue 400146
bnc#1222536
https://git.kernel.org/stable/c/3f5d47eb163bceb1b9e613c9003bae5fefc0046f
https://git.kernel.org/stable/c/5a172344bfdabb46458e03708735d7b1a918c468
https://git.kernel.org/stable/c/66b317a2fc45b2ef66527ee3f8fa08fb5beab88d
https://git.kernel.org/stable/c/833775656d447c545133a744a0ed1e189ce61430
https://git.kernel.org/stable/c/e03ee2fe873eb68c1f9ba5112fee70303ebf9dfb
https://git.kernel.org/stable/c/e31546b0f34af21738c4ceac47d662c00ee6382f
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273126
CVE-2024-26728kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26728
SMASH Issue 400221
bnc#1222370
https://git.kernel.org/stable/c/2d392f7268a1a9bfbd98c831f0f4c964e59aa145
https://git.kernel.org/stable/c/9671761792156f2339627918bafcd713a8a6f777
rh#2273258
CVE-2024-26729kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26729
SMASH Issue 400222
bnc#1222552
https://git.kernel.org/stable/c/351080ba3414c96afff0f1338b4aeb2983195b80
https://git.kernel.org/stable/c/d2b48f340d9e4a8fbeb1cdc84cd8da6ad143a907
rh#2273256
CVE-2024-26730kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26730
SMASH Issue 400223
bnc#1222538
https://git.kernel.org/stable/c/c196387820c9214c5ceaff56d77303c82514b8b1
https://git.kernel.org/stable/c/d56e460e19ea8382f813eb489730248ec8d7eb73
https://git.kernel.org/stable/c/f006c45a3ea424f8f6c8e4b9283bc245ce2a4d0f
rh#2273254
CVE-2024-26731kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26731
SMASH Issue 400224
bnc#1222371
https://git.kernel.org/stable/c/4588b13abcbd561ec67f5b3c1cb2eff690990a54
https://git.kernel.org/stable/c/4cd12c6065dfcdeba10f49949bffcf383b3952d8
https://git.kernel.org/stable/c/9b099ed46dcaf1403c531ff02c3d7400fa37fa26
https://git.kernel.org/stable/c/d61608a4e394f23e0dca099df9eb8e555453d949
rh#2273252
CVE-2024-26732kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26732
SMASH Issue 400225
bnc#1222551
https://git.kernel.org/stable/c/56667da7399eb19af857e30f41bea89aa6fa812c
https://git.kernel.org/stable/c/897f75e2cde8a5f9f7529b55249af1fa4248c83b
rh#2273250
CVE-2024-26734kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26734
SMASH Issue 400227
bnc#1222438
https://git.kernel.org/stable/c/919092bd5482b7070ae66d1daef73b600738f3a2
https://git.kernel.org/stable/c/def689fc26b9a9622d2e2cb0c4933dd3b1c8071c
https://git.kernel.org/stable/c/e91d3561e28d7665f4f837880501dc8755f635a9
rh#2273244
CVE-2024-26736kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26736
SMASH Issue 400229
bnc#1222586
https://git.kernel.org/stable/c/5c27d85a69fa16a08813ba37ddfb4bbc9a1ed6b5
https://git.kernel.org/stable/c/6e6065dd25b661420fac19c34282b6c626fcd35e
https://git.kernel.org/stable/c/6ea38e2aeb72349cad50e38899b0ba6fbcb2af3d
https://git.kernel.org/stable/c/d34a5e57632bb5ff825196ddd9a48ca403626dfa
https://git.kernel.org/stable/c/d9b5e2b7a8196850383c70d099bfd39e81ab6637
https://git.kernel.org/stable/c/e56662160fc24d28cb75ac095cc6415ae1bda43e
https://git.kernel.org/stable/c/e8530b170e464017203e3b8c6c49af6e916aece1
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3292
rh#2273276
CVE-2024-26737kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26737
SMASH Issue 400230
bnc#1222557
https://git.kernel.org/stable/c/0281b919e175bb9c3128bd3872ac2903e9436e3f
https://git.kernel.org/stable/c/5268bb02107b9eedfdcd51db75b407d10043368c
https://git.kernel.org/stable/c/7d80a9e745fa5b47da3bca001f186c02485c7c33
https://git.kernel.org/stable/c/8327ed12e8ebc5436bfaa1786c49988894f9c8a6
https://git.kernel.org/stable/c/addf5e297e6cbf5341f9c07720693ca9ba0057b5
rh#2273274
CVE-2024-26738kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26738
SMASH Issue 400231
bnc#1222607
https://git.kernel.org/stable/c/46e36ebd5e00a148b67ed77c1d31675996f77c25
https://git.kernel.org/stable/c/a5c57fd2e9bd1c8ea8613a8f94fd0be5eccbf321
https://git.kernel.org/stable/c/b8315b2e25b4e68e42fcb74630f824b9a5067765
rh#2273272
CVE-2024-26741kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26741
SMASH Issue 400234
bnc#1222587
https://git.kernel.org/stable/c/334a8348b2df26526f3298848ad6864285592caf
https://git.kernel.org/stable/c/66b60b0c8c4a163b022a9f0ad6769b0fd3dc662f
https://git.kernel.org/stable/c/729bc77af438a6e67914c97f6f3d3af8f72c0131
https://git.kernel.org/stable/c/f8c4a6b850882bc47aaa864b720c7a2ee3102f39
rh#2273266
CVE-2024-26742kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26742
SMASH Issue 400235
bnc#1222608
https://git.kernel.org/stable/c/3c31b18a8dd8b7bf36af1cd723d455853b8f94fe
https://git.kernel.org/stable/c/4f5b15c15e6016efb3e14582d02cc4ddf57227df
https://git.kernel.org/stable/c/5761eb9761d2d5fe8248a9b719efc4d8baf1f24a
https://git.kernel.org/stable/c/b9433b25cb06c415c9cb24782599649a406c8d6d
rh#2273264
CVE-2024-26745kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26745
SMASH Issue 400329
bnc#1222678
https://git.kernel.org/stable/c/09a3c1e46142199adcee372a420b024b4fc61051
https://git.kernel.org/stable/c/5da6d306f315344af1ca2eff4bd9b10b130f0c28
https://git.kernel.org/stable/c/7eb95e0af5c9c2e6fad50356eaf32d216d0e7bc3
https://git.kernel.org/stable/c/d4d1e4b1513d975961de7bb4f75e450a92d65ebf
rh#2273410
CVE-2024-26746kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26746
SMASH Issue 400330
bnc#1222444
https://git.kernel.org/stable/c/5e3022ea42e490a36ec6f2cfa6fc603deb0bace4
https://git.kernel.org/stable/c/bb71e040323175e18c233a9afef32ba14fa64eb7
https://git.kernel.org/stable/c/d3ea125df37dc37972d581b74a5d3785c3f283ab
rh#2273408
CVE-2024-26748kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26748
SMASH Issue 400239
bnc#1222513
https://git.kernel.org/stable/c/1e204a8e9eb514e22a6567fb340ebb47df3f3a48
https://git.kernel.org/stable/c/3a2a909942b5335b7ea66366d84261b3ed5f89c8
https://git.kernel.org/stable/c/5fd9e45f1ebcd57181358af28506e8a661a260b3
https://git.kernel.org/stable/c/70e8038813f9d3e72df966748ebbc40efe466019
https://git.kernel.org/stable/c/92d20406a3d4ff3e8be667c79209dc9ed31df5b3
https://git.kernel.org/stable/c/9a52b694b066f299d8b9800854a8503457a8b64c
https://git.kernel.org/stable/c/aad6132ae6e4809e375431f8defd1521985e44e7
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273076
CVE-2024-26749kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2024-26749
SMASH Issue 400240
bnc#1222680
https://git.kernel.org/stable/c/2134e9906e17b1e5284300fab547869ebacfd7d9
https://git.kernel.org/stable/c/29e42e1578a10c611b3f1a38f3229b2d664b5d16
https://git.kernel.org/stable/c/4e5c73b15d95452c1ba9c771dd013a3fbe052ff3
https://git.kernel.org/stable/c/9a07244f614bc417de527b799da779dcae780b5d
https://git.kernel.org/stable/c/b40328eea93c75a5645891408010141a0159f643
https://git.kernel.org/stable/c/cd45f99034b0c8c9cb346dd0d6407a95ca3d36f6
https://git.kernel.org/stable/c/cfa9abb5570c489dabf6f7fb3a066cc576fc8824
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273074
CVE-2024-26750kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26750
SMASH Issue 400331
bnc#1222617
https://git.kernel.org/stable/c/43ba9e331559a30000c862eea313248707afa787
https://git.kernel.org/stable/c/6c480d0f131862645d172ca9e25dc152b1a5c3a6
https://git.kernel.org/stable/c/aa82ac51d63328714645c827775d64dbfd9941f3
https://git.kernel.org/stable/c/c4c795b21dd23d9514ae1c6646c3fb2c78b5be60
https://git.kernel.org/stable/c/e9eac260369d0cf57ea53df95427125725507a0d
rh#2273368
CVE-2024-26752kernel-source-rt:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)CVE-2024-26752
SMASH Issue 400242
bnc#1222667
bnc#1223292
https://git.kernel.org/stable/c/0da15a70395182ee8cb75716baf00dddc0bea38d
https://git.kernel.org/stable/c/13cd1daeea848614e585b2c6ecc11ca9c8ab2500
https://git.kernel.org/stable/c/359e54a93ab43d32ee1bff3c2f9f10cb9f6b6e79
https://git.kernel.org/stable/c/4c3ce64bc9d36ca9164dd6c77ff144c121011aae
https://git.kernel.org/stable/c/804bd8650a3a2bf3432375f8c97d5049d845ce56
https://git.kernel.org/stable/c/83340c66b498e49353530e41542500fc8a4782d6
https://git.kernel.org/stable/c/c1d3a84a67db910ce28a871273c992c3d7f9efb5
https://git.kernel.org/stable/c/dcb4d14268595065c85dc5528056713928e17243
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273219
CVE-2024-26753kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2024-26753
SMASH Issue 400243
bnc#1222601
https://git.kernel.org/stable/c/37077ed16c7793e21b005979d33f8a61565b7e86
https://git.kernel.org/stable/c/62f361bfea60c6afc3df09c1ad4152e6507f6f47
https://git.kernel.org/stable/c/b0365460e945e1117b47cf7329d86de752daff63
https://git.kernel.org/stable/c/c0ec2a712daf133d9996a8a1b7ee2d4996080363
https://git.kernel.org/stable/c/ef1e47d50324e232d2da484fe55a54274eeb9bc1
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273217
CVE-2024-26755kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26755
SMASH Issue 400245
bnc#1222529
https://git.kernel.org/stable/c/60d6130d0ac1d883ed93c2a1e10aadb60967fd48
https://git.kernel.org/stable/c/9e46c70e829bddc24e04f963471e9983a11598b7
rh#2273213
CVE-2024-26758kernel-source-rt:Ignoremoderate ()CVE-2024-26758
SMASH Issue 400248
https://git.kernel.org/stable/c/1baae052cccd08daf9a9d64c3f959d8cdb689757
https://git.kernel.org/stable/c/a55f0d6179a19c6b982e2dc344d58c98647a3be0
rh#2273206
CVE-2024-26760kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26760
SMASH Issue 400250
bnc#1222596
https://git.kernel.org/stable/c/1cfe9489fb563e9a0c9cdc5ca68257a44428c2ec
https://git.kernel.org/stable/c/4ebc079f0c7dcda1270843ab0f38ab4edb8f7921
https://git.kernel.org/stable/c/de959094eb2197636f7c803af0943cb9d3b35804
https://git.kernel.org/stable/c/f49b20fd0134da84a6bd8108f9e73c077b7d6231
rh#2273202
CVE-2024-26761kernel-source-rt:Ignoremoderate ()CVE-2024-26761
SMASH Issue 400251
https://git.kernel.org/stable/c/031217128990d7f0ab8c46db1afb3cf1e075fd29
https://git.kernel.org/stable/c/0cab687205986491302cd2e440ef1d253031c221
https://git.kernel.org/stable/c/2cc1a530ab31c65b52daf3cb5d0883c8b614ea69
https://git.kernel.org/stable/c/3a3181a71935774bda2398451256d7441426420b
rh#2273200
CVE-2024-26764kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26764
SMASH Issue 400254
bnc#1222721
https://git.kernel.org/stable/c/18f614369def2a11a52f569fe0f910b199d13487
https://git.kernel.org/stable/c/1dc7d74fe456944a9b1c57bd776280249f441ac6
https://git.kernel.org/stable/c/337b543e274fe7a8f47df3c8293cc6686ffa620f
https://git.kernel.org/stable/c/b4eea7a05ee0ab5ab0514421e6ba8c5d249cf942
https://git.kernel.org/stable/c/b820de741ae48ccf50dd95e297889c286ff4f760
https://git.kernel.org/stable/c/d7b6fa97ec894edd02f64b83e5e72e1aa352f353
https://git.kernel.org/stable/c/e7e23fc5d5fe422827c9a43ecb579448f73876c7
https://git.kernel.org/stable/c/ea1cd64d59f22d6d13f367d62ec6e27b9344695f
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273193
CVE-2024-26766kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26766
SMASH Issue 400256
bnc#1222726
bnc#1222882
https://git.kernel.org/stable/c/115b7f3bc1dce590a6851a2dcf23dc1100c49790
https://git.kernel.org/stable/c/3f38d22e645e2e994979426ea5a35186102ff3c2
https://git.kernel.org/stable/c/47ae64df23ed1318e27bd9844e135a5e1c0e6e39
https://git.kernel.org/stable/c/52dc9a7a573dbf778625a0efca0fca55489f084b
https://git.kernel.org/stable/c/5833024a9856f454a964a198c63a57e59e07baf5
https://git.kernel.org/stable/c/9034a1bec35e9f725315a3bb6002ef39666114d9
https://git.kernel.org/stable/c/a2fef1d81becf4ff60e1a249477464eae3c3bc2a
https://git.kernel.org/stable/c/e6f57c6881916df39db7d95981a8ad2b9c3458d6
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273187
CVE-2024-26768kernel-source-rt:Not affectedmoderate ()CVE-2024-26768
SMASH Issue 400258
bnc#1222600
https://git.kernel.org/stable/c/0f6810e39898af2d2cabd9313e4dbc945fb5dfdd
https://git.kernel.org/stable/c/4551b30525cf3d2f026b92401ffe241eb04dfebe
https://git.kernel.org/stable/c/88e189bd16e5889e44a41b3309558ebab78b9280
rh#2273183
CVE-2024-26769kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26769
SMASH Issue 400259
bnc#1222727
https://git.kernel.org/stable/c/1d86f79287206deec36d63b89c741cf542b6cadd
https://git.kernel.org/stable/c/5e0bc09a52b6169ce90f7ac6e195791adb16cec4
https://git.kernel.org/stable/c/710c69dbaccdac312e32931abcb8499c1525d397
https://git.kernel.org/stable/c/9e6987f8937a7bd7516aa52f25cb7e12c0c92ee8
https://git.kernel.org/stable/c/eaf0971fdabf2a93c1429dc6bedf3bbe85dffa30
rh#2273180
CVE-2024-26772kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26772
SMASH Issue 400262
bnc#1222613
https://git.kernel.org/stable/c/21dbe20589c7f48e9c5d336ce6402bcebfa6d76a
https://git.kernel.org/stable/c/5a6dcc4ad0f7f7fa8e8d127b5526e7c5f2d38a43
https://git.kernel.org/stable/c/6b92b1bc16d691c95b152c6dbf027ad64315668d
https://git.kernel.org/stable/c/832698373a25950942c04a512daa652c18a9b513
https://git.kernel.org/stable/c/8de8305a25bfda607fc13475ebe84b978c96d7ff
https://git.kernel.org/stable/c/d3bbe77a76bc52e9d4d0a120f1509be36e25c916
https://git.kernel.org/stable/c/d639102f4cbd4cb65d1225dba3b9265596aab586
https://git.kernel.org/stable/c/ffeb72a80a82aba59a6774b0611f792e0ed3b0b7
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3305
rh#2273242
CVE-2024-26774kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26774
SMASH Issue 400264
bnc#1222622
https://git.kernel.org/stable/c/687061cfaa2ac3095170e136dd9c29a4974f41d4
https://git.kernel.org/stable/c/8b40eb2e716b503f7a4e1090815a17b1341b2150
https://git.kernel.org/stable/c/8cf9cc602cfb40085967c0d140e32691c8b71cf3
https://git.kernel.org/stable/c/993bf0f4c393b3667830918f9247438a8f6fdb5b
https://git.kernel.org/stable/c/f32d2a745b02123258026e105a008f474f896d6a
rh#2273234
CVE-2024-26776kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26776
SMASH Issue 400266
bnc#1222764
https://git.kernel.org/stable/c/0399d7eba41d9b28f5bdd7757ec21a5b7046858d
https://git.kernel.org/stable/c/d637b5118274701e8448f35953877daf04df18b4
https://git.kernel.org/stable/c/de8b6e1c231a95abf95ad097b993d34b31458ec9
https://git.kernel.org/stable/c/e4168ac25b4bd378bd7dda322d589482a136c1fd
https://git.kernel.org/stable/c/e94da8aca2e78ef9ecca02eb211869eacd5504e5
https://git.kernel.org/stable/c/f19361d570c67e7e014896fa2dacd7d721bf0aa8
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273230
CVE-2024-26780kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26780
SMASH Issue 400332
bnc#1222588
https://git.kernel.org/stable/c/25236c91b5ab4a26a56ba2e79b8060cf4e047839
https://git.kernel.org/stable/c/2a3d40b4025fcfe51b04924979f1653993b17669
https://git.kernel.org/stable/c/36f7371de977f805750748e80279be7e370df85c
https://git.kernel.org/stable/c/69e0f04460f4037e01e29f0d9675544f62aafca3
https://git.kernel.org/stable/c/cb8890318dde26fc89c6ea67d6e9070ab50b6e91
rh#2273474
CVE-2024-26781kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26781
SMASH Issue 400333
bnc#1222589
https://git.kernel.org/stable/c/70e5b013538d5e4cb421afed431a5fcd2a5d49ee
https://git.kernel.org/stable/c/cc32ba2fdf3f8b136619fff551f166ba51ec856d
https://git.kernel.org/stable/c/d487e7ba1bc7444d5f062c4930ef8436c47c7e63
https://git.kernel.org/stable/c/d6a9608af9a75d13243d217f6ce1e30e57d56ffe
https://git.kernel.org/stable/c/f27d319df055629480b84b9288a502337b6f2a2e
https://git.kernel.org/stable/c/fa8c776f4c323a9fbc8ddf25edcb962083391430
rh#2273470
CVE-2024-26782kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26782
SMASH Issue 400334
bnc#1222590
https://git.kernel.org/stable/c/10048689def7e40a4405acda16fdc6477d4ecc5c
https://git.kernel.org/stable/c/4a4eeb6912538c2d0b158e8d11b62d96c1dada4e
https://git.kernel.org/stable/c/85933e80d077c9ae2227226beb86c22f464059cc
https://git.kernel.org/stable/c/ce0809ada38dca8d6d41bb57ab40494855c30582
https://git.kernel.org/stable/c/d93fd40c62397326046902a2c5cb75af50882a85
https://git.kernel.org/stable/c/f74362a004225df935863dea6eb7d82daaa5b16e
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273468
CVE-2024-26783kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26783
SMASH Issue 400335
bnc#1222615
https://git.kernel.org/stable/c/2774f256e7c0219e2b0a0894af1c76bdabc4f974
https://git.kernel.org/stable/c/bdd21eed8b72f9e28d6c279f6db258e090c79080
https://git.kernel.org/stable/c/d6159bd4c00594249e305bfe02304c67c506264e
rh#2273466
CVE-2024-26784kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26784
SMASH Issue 400336
bnc#1222778
https://git.kernel.org/stable/c/eb5555d422d0fc325e1574a7353d3c616f82d8b5
https://git.kernel.org/stable/c/f6aaf131e4d4a9a26040ecc018eb70ab8b3d355d
rh#2273464
CVE-2024-26785kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26785
SMASH Issue 400337
bnc#1222779
https://git.kernel.org/stable/c/cf7c2789822db8b5efa34f5ebcf1621bc0008d48
https://git.kernel.org/stable/c/fc719ecbca45c9c046640d72baddba3d83e0bc0b
rh#2273461
CVE-2024-26786kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26786
SMASH Issue 400338
bnc#1222780
https://git.kernel.org/stable/c/9526a46cc0c378d381560279bea9aa34c84298a0
https://git.kernel.org/stable/c/aeb004c0cd6958e910123a1607634401009c9539
https://git.kernel.org/stable/c/f1fb745ee0a6fe43f1d84ec369c7e6af2310fda9
rh#2273459
CVE-2024-26789kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26789
SMASH Issue 400341
bnc#1222626
https://git.kernel.org/stable/c/034e2d70b5c7f578200ad09955aeb2aa65d1164a
https://git.kernel.org/stable/c/1291d278b5574819a7266568ce4c28bce9438705
https://git.kernel.org/stable/c/1c0cf6d19690141002889d72622b90fc01562ce4
https://git.kernel.org/stable/c/9e8ecd4908b53941ab6f0f51584ab80c6c6606c4
rh#2273453
CVE-2024-26792kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26792
SMASH Issue 400344
bnc#1222430
https://git.kernel.org/stable/c/c34adc20b91a8e55e048b18d63f4f4ae003ecf8f
https://git.kernel.org/stable/c/c8ab7521665bd0f8bc4a900244d1d5a7095cc3b9
https://git.kernel.org/stable/c/e2b54eaf28df0c978626c9736b94f003b523b451
https://git.kernel.org/stable/c/eb3441093aad251418921246fc3b224fd1575701
rh#2273446
CVE-2024-26794kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26794
SMASH Issue 400346
bnc#1222426
https://git.kernel.org/stable/c/31d07a757c6d3430e03cc22799921569999b9a12
https://git.kernel.org/stable/c/a1a4a9ca77f143c00fce69c1239887ff8b813bec
https://git.kernel.org/stable/c/d43f8e58f10a44df8c08e7f7076f3288352cd168
rh#2273442
CVE-2024-26795kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26795
SMASH Issue 400347
bnc#1222794
https://git.kernel.org/stable/c/2a1728c15ec4f45ed9248ae22f626541c179bfbe
https://git.kernel.org/stable/c/5941a90c55d3bfba732b32208d58d997600b44ef
https://git.kernel.org/stable/c/8310080799b40fd9f2a8b808c657269678c149af
https://git.kernel.org/stable/c/8af1c121b0102041809bc137ec600d1865eaeedd
https://git.kernel.org/stable/c/a11dd49dcb9376776193e15641f84fcc1e5980c9
https://git.kernel.org/stable/c/a278d5c60f21aa15d540abb2f2da6e6d795c3e6e
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273440
CVE-2024-26796kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26796
SMASH Issue 400348
bnc#1222795
https://git.kernel.org/stable/c/682dc133f83e0194796e6ea72eb642df1c03dfbe
https://git.kernel.org/stable/c/e0d17ee872cf8d0f51cc561329b8e1a0aa792bbb
https://git.kernel.org/stable/c/e4f50e85de5a6b21dfdc0d7ca435eba4f62935c3
rh#2273438
CVE-2024-26797kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26797
SMASH Issue 400349
bnc#1222425
https://git.kernel.org/stable/c/0f8ca019544a252d1afb468ce840c6dcbac73af4
https://git.kernel.org/stable/c/50a6302cf881f67f1410461a68fe9eabd00ff31d
rh#2273436
CVE-2024-26798kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26798
SMASH Issue 400350
bnc#1222798
https://git.kernel.org/stable/c/00d6a284fcf3fad1b7e1b5bc3cd87cbfb60ce03f
https://git.kernel.org/stable/c/20a4b5214f7bee13c897477168c77bbf79683c3d
https://git.kernel.org/stable/c/2f91a96b892fab2f2543b4a55740c5bee36b1a6b
https://git.kernel.org/stable/c/73a6bd68a1342f3a44cac9dffad81ad6a003e520
https://git.kernel.org/stable/c/a2c881413dcc5d801bdc9535e51270cc88cb9cd8
rh#2273434
CVE-2024-26799kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26799
SMASH Issue 400351
bnc#1222415
https://git.kernel.org/stable/c/1382d8b55129875b2e07c4d2a7ebc790183769ee
https://git.kernel.org/stable/c/99adc8b4d2f38bf0d06483ec845bc48f60c3f8cf
https://git.kernel.org/stable/c/d5a7726e6ea62d447b79ab5baeb537ea6bdb225b
rh#2273432
CVE-2024-26800kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26800
SMASH Issue 400352
bnc#1222728
https://git.kernel.org/stable/c/13114dc5543069f7b97991e3b79937b6da05f5b0
https://git.kernel.org/stable/c/1ac9fb84bc7ecd4bc6428118301d9d864d2a58d1
https://git.kernel.org/stable/c/81be85353b0f5a7b660635634b655329b429eefe
https://git.kernel.org/stable/c/f2b85a4cc763841843de693bbd7308fe9a2c4c89
rh#2273472
CVE-2024-26802kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26802
SMASH Issue 400354
bnc#1222799
https://git.kernel.org/stable/c/17ccd9798fe0beda3db212cfa3ebe373f605cbd6
https://git.kernel.org/stable/c/699b103e48ce32d03fc86c35b37ee8ae4288c7e3
https://git.kernel.org/stable/c/8af411bbba1f457c33734795f024d0ef26d0963f
https://git.kernel.org/stable/c/8e99556301172465c8fe33c7f78c39a3d4ce8462
https://git.kernel.org/stable/c/f72cf22dccc94038cbbaa1029cb575bf52e5cbc8
rh#2273427
CVE-2024-26803kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26803
SMASH Issue 400355
bnc#1222788
https://git.kernel.org/stable/c/16edf51f33f52dff70ed455bc40a6cc443c04664
https://git.kernel.org/stable/c/7985d73961bbb4e726c1be7b9cd26becc7be8325
https://git.kernel.org/stable/c/8f7a3894e58e6f5d5815533cfde60e3838947941
https://git.kernel.org/stable/c/f011c103e654d83dc85f057a7d1bd0960d02831c
https://git.kernel.org/stable/c/fe9f801355f0b47668419f30f1fac1cf4539e736
rh#2273425
CVE-2024-26806kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26806
SMASH Issue 400358
bnc#1222800
https://git.kernel.org/stable/c/041562ebc4759c9932b59a06527f8753b86da365
https://git.kernel.org/stable/c/959043afe53ae80633e810416cee6076da6e91c6
rh#2273419
CVE-2024-26807kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26807
SMASH Issue 400359
bnc#1222801
https://git.kernel.org/stable/c/03f1573c9587029730ca68503f5062105b122f61
https://git.kernel.org/stable/c/32ce3bb57b6b402de2aec1012511e7ac4e7449dc
https://git.kernel.org/stable/c/34e1d5c4407c78de0e3473e1fbf8fb74dbe66d03
rh#2273416
CVE-2024-26808kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26808
SMASH Issue 400363
bnc#1222634
https://git.kernel.org/stable/c/01acb2e8666a6529697141a6017edbf206921913
https://git.kernel.org/stable/c/36a0a80f32209238469deb481967d777a3d539ee
https://git.kernel.org/stable/c/70f17b48c86622217a58d5099d29242fc9adac58
https://git.kernel.org/stable/c/9489e214ea8f2a90345516016aa51f2db3a8cc2f
https://git.kernel.org/stable/c/af149a46890e8285d1618bd68b8d159bdb87fdb3
https://git.kernel.org/stable/c/e5888acbf1a3d8d021990ce6c6061fd5b2bb21b4
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273405
CVE-2024-26809kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26809
SMASH Issue 400364
bnc#1222633
https://git.kernel.org/stable/c/362508506bf545e9ce18c72a2c48dcbfb891ab9c
https://git.kernel.org/stable/c/5ad233dc731ab64cdc47b84a5c1f78fff6c024af
https://git.kernel.org/stable/c/821e28d5b506e6a73ccc367ff792bd894050d48b
https://git.kernel.org/stable/c/9384b4d85c46ce839f51af01374062ce6318b2f2
https://git.kernel.org/stable/c/b0e256f3dd2ba6532f37c5c22e07cb07a36031ee
https://git.kernel.org/stable/c/b36b83297ff4910dfc8705402c8abffd4bbf8144
https://git.kernel.org/stable/c/ff90050771412b91e928093ccd8736ae680063c2
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273402
CVE-2024-26811kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26811
SMASH Issue 400708
bnc#1222805
https://git.kernel.org/stable/c/51a6c2af9d20203ddeeaf73314ba8854b38d01bd
https://git.kernel.org/stable/c/76af689a45aa44714b46d1a7de4ffdf851ded896
https://git.kernel.org/stable/c/88b7f1143b15b29cccb8392b4f38e75b7bb3e300
https://git.kernel.org/stable/c/a637fabac554270a851033f5ab402ecb90bc479c
https://git.kernel.org/stable/c/a677ebd8ca2f2632ccdecbad7b87641274e15aac
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6XCNJZBDMGJXRIKLGKM4RRJU4XCHPX62/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LG6L4FXO4WNWUM6W7USOH2YTRVWREM3V/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RO3RO34MLQ6WT3A7O6STQUVXW43N6W3K/
rh#2273967
CVE-2024-26813kernel-source-rt:Ignoremoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26813
SMASH Issue 400467
bnc#1222809
https://git.kernel.org/stable/c/07afdfd8a68f9eea8db0ddc4626c874f29d2ac5e
https://git.kernel.org/stable/c/09452c8fcbd7817c06e8e3212d99b45917e603a5
https://git.kernel.org/stable/c/0f8d8f9c2173a541812dd750529f4a415117eb29
https://git.kernel.org/stable/c/62d4e43a569b67929eb3319780be5359694c8086
https://git.kernel.org/stable/c/675daf435e9f8e5a5eab140a9864dfad6668b375
https://git.kernel.org/stable/c/7932db06c82c5b2f42a4d1a849d97dba9ce4a362
https://git.kernel.org/stable/c/cc5838f19d39a5fef04c468199699d2a4578be3a
https://git.kernel.org/stable/c/d6bedd6acc0bcb1e7e010bc046032e47f08d379f
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273648
CVE-2024-26814kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26814
SMASH Issue 400468
bnc#1222810
https://git.kernel.org/stable/c/083e750c9f5f4c3bf61161330fb84d7c8e8bb417
https://git.kernel.org/stable/c/250219c6a556f8c69c5910fca05a59037e24147d
https://git.kernel.org/stable/c/6ec0d88166dac43f29e96801c0927d514f17add9
https://git.kernel.org/stable/c/7447d911af699a15f8d050dfcb7c680a86f87012
https://git.kernel.org/stable/c/a563fc18583ca4f42e2fdd0c70c7c618288e7ede
https://git.kernel.org/stable/c/de87511fb0404d23b6da5f4660383b6ed095e28d
https://git.kernel.org/stable/c/ee0bd4ad780dfbb60355b99f25063357ab488267
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2273646
CVE-2024-26815kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26815
SMASH Issue 401230
bnc#1222635
https://git.kernel.org/stable/c/343041b59b7810f9cdca371f445dd43b35c740b1
https://git.kernel.org/stable/c/6915b1b28fe57e92c78e664366dc61c4f15ff03b
https://git.kernel.org/stable/c/860e838fb089d652a446ced52cbdf051285b68e7
https://git.kernel.org/stable/c/9b720bb1a69a9f12a4a5c86b6f89386fe05ed0f2
https://git.kernel.org/stable/c/bd2474a45df7c11412c2587de3d4e43760531418
rh#2274478
CVE-2024-26818kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26818
SMASH Issue 402305
bnc#1222962
https://git.kernel.org/stable/c/30369084ac6e27479a347899e74f523e6ca29b89
https://git.kernel.org/stable/c/6bdd43f62ab3bb5a306af7f0ab857af45777f5a8
https://git.kernel.org/stable/c/8a585914c266dc044f53b5c83c170f79b45fcf9a
rh#2275622
CVE-2024-26819kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26819
SMASH Issue 402307
bnc#1223079
https://git.kernel.org/stable/c/438d19492b7f002334573bae43276297eb234c80
https://git.kernel.org/stable/c/888a0a46b80fa37eacfe81faf47ba0b83876251d
https://git.kernel.org/stable/c/a891a0621e725e85529985139cada8cb5a74a116
https://git.kernel.org/stable/c/bd504bcfec41a503b32054da5472904b404341a4
https://git.kernel.org/stable/c/c5d83ac2bf6ca668a39ffb1a576899a66153ba19
https://git.kernel.org/stable/c/cd70175481f63af31901dd463e44386f033c3f4c
rh#2260046
rh#2263856
rh#2275620
CVE-2024-26820kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26820
SMASH Issue 402308
bnc#1223078
https://git.kernel.org/stable/c/309ef7de5d840e17607e7d65cbf297c0564433ef
https://git.kernel.org/stable/c/4d29a58d96a78728cb01ee29ed70dc4bd642f135
https://git.kernel.org/stable/c/5b10a88f64c0315cfdef45de0aaaa4eef57de0b7
https://git.kernel.org/stable/c/9cae43da9867412f8bd09aee5c8a8dc5e8dc3dc2
https://git.kernel.org/stable/c/a71302c8638939c45e4ba5a99ea438185fd3f418
https://git.kernel.org/stable/c/b6d46f306b3964d05055ddaa96b58cd8bd3a472c
https://git.kernel.org/stable/c/bcb7164258d0a9a8aa2e73ddccc2d78f67d2519d
https://git.kernel.org/stable/c/c7441c77c91e47f653104be8353b44a3366a5366
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2275618
CVE-2024-26821kernel-source-rt:Not affectedmoderate ()CVE-2024-26821
SMASH Issue 402309
bnc#1223080
https://git.kernel.org/stable/c/2a7a31e1fb9717845d9d5e2a8c6e48848147801e
https://git.kernel.org/stable/c/31f71f2d7a081fc6c6bdf06865beedf6db5b0ca4
https://git.kernel.org/stable/c/46f5ab762d048dad224436978315cbc2fa79c630
https://git.kernel.org/stable/c/95de4ad173ca0e61034f3145d66917970961c210
rh#2275616
CVE-2024-26822kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26822
SMASH Issue 402310
bnc#1223011
https://git.kernel.org/stable/c/4508ec17357094e2075f334948393ddedbb75157
https://git.kernel.org/stable/c/7590ba9057c6d74c66f3b909a383ec47cd2f27fb
https://git.kernel.org/stable/c/c2aa2718cda2d56b4a551cb40043e9abc9684626
rh#2275613
CVE-2024-26823kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26823
SMASH Issue 402311
bnc#1223009
https://git.kernel.org/stable/c/4c60c611441f1f1e5de8e00e98ee5a4970778a00
https://git.kernel.org/stable/c/8b02da04ad978827e5ccd675acf170198f747a7a
https://git.kernel.org/stable/c/91a80fff3eeed928b6fba21271f6a9719b22a5d8
rh#2275611
CVE-2024-26824kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26824
SMASH Issue 402312
bnc#1223081
https://git.kernel.org/stable/c/24c890dd712f6345e382256cae8c97abb0406b70
https://git.kernel.org/stable/c/775f3c1882a493168e08fdb8cde0865c8f3a8a29
https://git.kernel.org/stable/c/9c82920359b7c1eddaf72069bcfe0ffddf088cd0
rh#2275609
CVE-2024-26826kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26826
SMASH Issue 402313
bnc#1223010
https://git.kernel.org/stable/c/624902eab7abcb8731b333ec73f206d38d839cd8
https://git.kernel.org/stable/c/6673d9f1c2cd984390550dbdf7d5ae07b20abbf8
https://git.kernel.org/stable/c/6f95120f898b40d13fd441225ef511307853c9c2
https://git.kernel.org/stable/c/b609c783c535493aa3fca22c7e40a120370b1ca5
https://git.kernel.org/stable/c/b6c620dc43ccb4e802894e54b651cf81495e9598
rh#2275604
CVE-2024-26827kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26827
SMASH Issue 402314
bnc#1223005
https://git.kernel.org/stable/c/0589dff4fbf4a7b88a909a34ecfa7b5d3daf51f5
https://git.kernel.org/stable/c/083870b029c06da6a9a49340dd78637eec35a1d4
https://git.kernel.org/stable/c/83ef106fa732aea8558253641cd98e8a895604d7
https://git.kernel.org/stable/c/9318483e99f242ec4059e2fa20887e1d28efd5ae
rh#2275602
CVE-2024-26829kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26829
SMASH Issue 402316
bnc#1223027
https://git.kernel.org/stable/c/207557e393a135c1b6fe1df7cc0741d2c1789fff
https://git.kernel.org/stable/c/486a4176bc783df798bce2903824801af8d2c3ae
https://git.kernel.org/stable/c/7219a692ffc00089015ada33b85b334d1a4b6e8e
https://git.kernel.org/stable/c/b37259448bbc70af1d0e52a9dd5559a9c29c9621
https://git.kernel.org/stable/c/be76ad74a43f90f340f9f479e6b04f02125f6aef
https://git.kernel.org/stable/c/dc9ceb90c4b42c6e5c6757df1d6257110433788e
rh#2275598
CVE-2024-26831kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26831
SMASH Issue 402319
bnc#1223008
https://git.kernel.org/stable/c/4e1d71cabb19ec2586827adfc60d68689c68c194
https://git.kernel.org/stable/c/7f97805b8df6e33850e225e6bd3ebd9e246920af
https://git.kernel.org/stable/c/d74226e03df1bf19848f18344401f254345af912
rh#2275593
CVE-2024-26832kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26832
SMASH Issue 402320
bnc#1223007
https://git.kernel.org/stable/c/14f1992430ef9e647b02aa8ca12c5bcb9a1dffea
https://git.kernel.org/stable/c/6156277d1b26cb3fdb6fcbf0686ab78268571644
https://git.kernel.org/stable/c/e2891c763aa2cff74dd6b5e978411ccf0cf94abe
https://git.kernel.org/stable/c/e3b63e966cac0bf78aaa1efede1827a252815a1d
rh#2275590
CVE-2024-26833kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26833
SMASH Issue 402321
bnc#1223036
https://git.kernel.org/stable/c/10c6b90e975358c17856a578419dc449887899c2
https://git.kernel.org/stable/c/33f649f1b1cea39ed360e6c12bba4fac83118e6e
https://git.kernel.org/stable/c/541e79265ea7e339a7c4a462feafe9f8f996e04b
https://git.kernel.org/stable/c/58168005337eabef345a872be3f87d0215ff3b30
https://git.kernel.org/stable/c/b49b022f7dfce85eb77d0d987008fde5c01d7857
https://git.kernel.org/stable/c/bae67893578d608e35691dcdfa90c4957debf1d3
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2275588
CVE-2024-26834kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26834
SMASH Issue 402322
bnc#1222964
https://git.kernel.org/stable/c/13b57b5cd591d5b22f9bbf047b2922967de411f3
https://git.kernel.org/stable/c/2d17cf10179a7de6d8f0128168b84ad0b4a1863f
https://git.kernel.org/stable/c/8762785f459be1cfe6fcf7285c123aad6a3703f0
https://git.kernel.org/stable/c/9256ab9232e35a16af9c30fa4e522e6d1bd3605a
https://git.kernel.org/stable/c/a6cafdb49a7bbf4a88367db209703eee6941e023
rh#2275586
CVE-2024-26835kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2024-26835
SMASH Issue 402323
bnc#1222967
https://git.kernel.org/stable/c/0c9302a6da262e6ab6a6c1d30f04a6130ed97376
https://git.kernel.org/stable/c/31ea574aeca1aa488e18716459bde057217637af
https://git.kernel.org/stable/c/664264a5c55bf97a9c571c557d477b75416199be
https://git.kernel.org/stable/c/6f2496366426cec18ba53f1c7f6c3ac307ca6a95
https://git.kernel.org/stable/c/a6411f3c48f991c19aaf9a24fce36865fbba28d7
https://git.kernel.org/stable/c/ae4360cbd385f0d7a8a86d5723e50448cc6318f3
https://git.kernel.org/stable/c/bccebf64701735533c8db37773eeacc6566cc8ec
https://git.kernel.org/stable/c/f2135bbf14949687e96cabb13d8a91ae3deb9069
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2275584
CVE-2024-26836kernel-source-rt:Not affectedmoderate4.3 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2024-26836
SMASH Issue 402324
bnc#1222968
https://git.kernel.org/stable/c/2bfbe1e0aed00ba51d58573c79452fada3f62ed4
https://git.kernel.org/stable/c/6f7d0f5fd8e440c3446560100ac4ff9a55eec340
rh#2275582
CVE-2024-26837kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)CVE-2024-26837
SMASH Issue 402325
bnc#1222973
https://git.kernel.org/stable/c/2d5b4b3376fa146a23917b8577064906d643925f
https://git.kernel.org/stable/c/603be95437e7fd85ba694e75918067fb9e7754db
https://git.kernel.org/stable/c/dc489f86257cab5056e747344f17a164f63bff4b
https://git.kernel.org/stable/c/e0b4c5b1d760008f1dd18c07c35af0442e54f9c8
rh#2275580
CVE-2024-26838kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26838
SMASH Issue 402327
bnc#1222974
https://git.kernel.org/stable/c/0ae8ad0013978f7471f22bcf45b027393e87f5dc
https://git.kernel.org/stable/c/635d79aa477f9912e602feb5498bdd51fb9cb824
https://git.kernel.org/stable/c/b2e4a5266e3d133b4c7f0e43bf40d13ce14fd1aa
https://git.kernel.org/stable/c/bd97cea7b18a0a553773af806dfbfac27a7c4acb
https://git.kernel.org/stable/c/c6f1ca235f68b22b3e691b2ea87ac285e5946848
rh#2275578
CVE-2024-26841kernel-source-rt:Not affectedmoderate ()CVE-2024-26841
SMASH Issue 402329
bnc#1222977
https://git.kernel.org/stable/c/0d862db64d26c2905ba1a6a8561466b215b664c2
https://git.kernel.org/stable/c/752cd08da320a667a833803a8fd6bb266114cce5
https://git.kernel.org/stable/c/b1ec3d6b86fdd057559a5908e6668279bf770e0e
rh#2275571
CVE-2024-26842kernel-source-rt:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26842
SMASH Issue 402330
bnc#1223013
https://git.kernel.org/stable/c/7ac9e18f5d66087cd22751c5c5bf0090eb0038fe
https://git.kernel.org/stable/c/a992425d18e5f7c48931121993c6c69426f2a8fb
https://git.kernel.org/stable/c/b513d30d59bb383a6a5d6b533afcab2cee99a8f8
rh#2275567
CVE-2024-26843kernel-source-rt:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26843
SMASH Issue 402331
bnc#1223014
https://git.kernel.org/stable/c/156cb12ffdcf33883304f0db645e1eadae712fe0
https://git.kernel.org/stable/c/4aa36b62c3eaa869860bf78b1146e9f2b5f782a9
https://git.kernel.org/stable/c/4fff3d735baea104017f2e3c245e27cdc79f2426
https://git.kernel.org/stable/c/700c3f642c32721f246e09d3a9511acf40ae42be
https://git.kernel.org/stable/c/cf3d6813601fe496de7f023435e31bfffa74ae70
https://git.kernel.org/stable/c/de1034b38a346ef6be25fe8792f5d1e0684d5ff4
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2275565
CVE-2024-26844kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26844
SMASH Issue 402332
bnc#1223015
https://git.kernel.org/stable/c/0f1bae071de9967602807472921829a54b2e5956
https://git.kernel.org/stable/c/13f3956eb5681a4045a8dfdef48df5dc4d9f58a6
https://git.kernel.org/stable/c/8fc80874103a5c20aebdc2401361aa01c817f75b
https://git.kernel.org/stable/c/cbaf9be337f7da25742acfce325119e3395b1f1b
rh#2275563
CVE-2024-26845kernel-source-rt:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26845
SMASH Issue 402333
bnc#1223018
https://git.kernel.org/stable/c/11f3fe5001ed05721e641f0ecaa7a73b7deb245d
https://git.kernel.org/stable/c/168ed59170de1fd7274080fe102216162d6826cf
https://git.kernel.org/stable/c/36bc5040c863b44af06094b22f1e50059227b9cb
https://git.kernel.org/stable/c/425a571a7e6fc389954cf2564e1edbba3740e171
https://git.kernel.org/stable/c/83ab68168a3d990d5ff39ab030ad5754cbbccb25
https://git.kernel.org/stable/c/a9849b67b4402a12eb35eadc9306c1ef9847d53d
https://git.kernel.org/stable/c/bd508f96b5fef96d8a0ce9cbb211d82bcfc2341f
https://git.kernel.org/stable/c/e717bd412001495f17400bfc09f606f1b594ef5a
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2275561
CVE-2024-26847kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26847
SMASH Issue 402300
bnc#1223026
https://git.kernel.org/stable/c/6b6282d56b14879124416a23837af9bd52ae2dfb
https://git.kernel.org/stable/c/dd63817baf334888289877ab1db1d866af2a6479
https://git.kernel.org/stable/c/fad87dbd48156ab940538f052f1820f4b6ed2819
rh#2275758
CVE-2024-26848kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26848
SMASH Issue 402353
bnc#1223030
https://git.kernel.org/stable/c/058ed71e0f7aa3b6694ca357e23d084e5d3f2470
https://git.kernel.org/stable/c/106e14ca55a0acb3236ee98813a1d243f8aa2d05
https://git.kernel.org/stable/c/2afdd0cb02329464d77f3ec59468395c791a51a4
https://git.kernel.org/stable/c/5c78be006ed9cb735ac2abf4fd64f3f4ea26da31
https://git.kernel.org/stable/c/5f7a07646655fb4108da527565dcdc80124b14c4
https://git.kernel.org/stable/c/76426abf9b980b46983f97de8e5b25047b4c9863
https://git.kernel.org/stable/c/80b15346492bdba677bbb0adefc611910e505f7b
https://git.kernel.org/stable/c/854ebf45a4ddd4cadeffb6644e88d19020634e1a
https://git.kernel.org/stable/c/96370ba395c572ef496fd2c7afc4a1ab3dedd3f0
https://git.kernel.org/stable/c/9c41f4935625218a2053a2dce1423c3054169809
https://git.kernel.org/stable/c/a6ffae61ad9ebf2fdcb943135b2f30c85f49cd27
https://git.kernel.org/stable/c/b94f434fe977689da4291dc21717790b9bd1c064
https://git.kernel.org/stable/c/f67898867b6b0f4542cddc7fe57997978b948a7a
https://git.kernel.org/stable/c/fe02316e4933befc621fa125efb8f8b4d04cceec
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2275756
CVE-2024-26849kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2024-26849
SMASH Issue 402354
bnc#1223053
https://git.kernel.org/stable/c/0ac219c4c3ab253f3981f346903458d20bacab32
https://git.kernel.org/stable/c/7a9d14c63b35f89563c5ecbadf918ad64979712d
https://git.kernel.org/stable/c/9a0d18853c280f6a0ee99f91619f2442a17a323a
https://git.kernel.org/stable/c/a2ab028151841cd833cb53eb99427e0cc990112d
rh#2275754
CVE-2024-26850kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26850
SMASH Issue 402355
bnc#1223054
https://git.kernel.org/stable/c/720da1e593b85a550593b415bf1d79a053133451
https://git.kernel.org/stable/c/d2a9510c0e39d06f5544075c13040407bdbf2803
https://git.kernel.org/stable/c/eeeddf85fc58d48c58ad916e4ca12363ebd8ab21
rh#2275752
CVE-2024-26853kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26853
SMASH Issue 402358
bnc#1223061
https://git.kernel.org/stable/c/1b3b8231386a572bac8cd5b6fd7e944b84f9bb1f
https://git.kernel.org/stable/c/63a3c1f3c9ecc654d851e7906d05334cd0c236e2
https://git.kernel.org/stable/c/8df393af9e7e8dfd62e9c41dbaa4d2ff53bf794a
https://git.kernel.org/stable/c/ef27f655b438bed4c83680e4f01e1cde2739854b
rh#2275748
CVE-2024-26854kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26854
SMASH Issue 402359
bnc#1223039
https://git.kernel.org/stable/c/9224fc86f1776193650a33a275cac628952f80a9
https://git.kernel.org/stable/c/db29ceff3e25c48907016da456a7cbee6310fd83
rh#2275746
CVE-2024-26856kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26856
SMASH Issue 402361
bnc#1223052
https://git.kernel.org/stable/c/0de693d68b0a18d5e256556c7c62d92cca35ad52
https://git.kernel.org/stable/c/71809805b95052ff551922f11660008fb3666025
https://git.kernel.org/stable/c/89d72d4125e94aa3c2140fedd97ce07ba9e37674
https://git.kernel.org/stable/c/e46274df1100fb0c06704195bfff5bfbd418bf64
https://git.kernel.org/stable/c/e83bebb718fd1f42549358730e1206164e0861d6
rh#2275740
CVE-2024-26858kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26858
SMASH Issue 402363
bnc#1223020
https://git.kernel.org/stable/c/936ef086161ab89a7f38f7a0761d6a3063c3277e
https://git.kernel.org/stable/c/b7cf07586c40f926063d4d09f7de28ff82f62b2a
https://git.kernel.org/stable/c/d1f71615dbb305f14f3b756cce015d70d8667549
rh#2275735
CVE-2024-26860kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26860
SMASH Issue 402365
bnc#1223077
https://git.kernel.org/stable/c/20e21c3c0195d915f33bc7321ee6b362177bf5bf
https://git.kernel.org/stable/c/338580a7fb9b0930bb38098007e89cc0fc496bf7
https://git.kernel.org/stable/c/55e565c42dce81a4e49c13262d5bc4eb4c2e588a
https://git.kernel.org/stable/c/6d35654f03c35c273240d85ec67e3f2c3596c4e0
https://git.kernel.org/stable/c/74abc2fe09691f3d836d8a54d599ca71f1e4287b
rh#2275731
CVE-2024-26864kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26864
SMASH Issue 402294
bnc#1223112
https://git.kernel.org/stable/c/04d9d1fc428ac9f581d55118d67e0cb546701feb
https://git.kernel.org/stable/c/1b20e61d36f490319d3fbdedd410155232ab5190
https://git.kernel.org/stable/c/856baaa100cd288d3685eedae9a129c996e7e755
https://git.kernel.org/stable/c/86d9b040421bbd26425f5a3edc226f57ecdecbfe
https://git.kernel.org/stable/c/ad105cde6b261b8b05ec872fe7d1987417d7fe5a
rh#2275723
CVE-2024-26865kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26865
L3:68040
SMASH Issue 402370
ZDI-24-297
ZDI-24-298
ZDI-24-299
bnc#1223062
bnc#1223063
bnc#1223557
https://git.kernel.org/stable/c/1e9fd5cf8d7f487332560f7bb312fc7d416817f3
https://git.kernel.org/stable/c/2a750d6a5b365265dbda33330a6188547ddb5c24
https://git.kernel.org/stable/c/9905a157048f441f1412e7bd13372f4a971d75c6
https://git.kernel.org/stable/c/9ceac040506a05a30b104b2aa2e9146810704500
https://git.kernel.org/stable/c/f901ee07853ce97e9f1104c7c898fbbe447f0279
jsc#CAR-3341
rh#2267190
rh#2272041
rh#2275600
rh#2275721
rh#2275928
CVE-2024-26867kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26867
SMASH Issue 402371
bnc#1223114
https://git.kernel.org/stable/c/4a825457a45d8debc46ab8cba57d47462411710d
https://git.kernel.org/stable/c/cfa9ba1ae0bef0681833a22d326174fe633caab5
rh#2275717
CVE-2024-26868kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26868
SMASH Issue 402372
bnc#1223038
https://git.kernel.org/stable/c/31db25e3141b20e2a76a9f219eeca52e3cab126c
https://git.kernel.org/stable/c/5ada9016b1217498fad876a3d5b07645cc955608
https://git.kernel.org/stable/c/719fcafe07c12646691bd62d7f8d94d657fa0766
https://git.kernel.org/stable/c/7ca651b4ec4a049f5a46a0e5ff921b86b91c47c5
https://git.kernel.org/stable/c/dac068f164ad05b35e7c0be13f138c3f6adca58f
rh#2275715
CVE-2024-26869kernel-source-rt:Not affectedmoderate5.9 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2024-26869
SMASH Issue 402373
bnc#1223116
https://git.kernel.org/stable/c/04226d8e3c4028dc451e9d8777356ec0f7919253
https://git.kernel.org/stable/c/77bfdb89cc222fc7bfe198eda77bdc427d5ac189
https://git.kernel.org/stable/c/9f0c4a46be1fe9b97dbe66d49204c1371e3ece65
https://git.kernel.org/stable/c/c92f2927df860a60ba815d3ee610a944b92a8694
jsc#CAR-3347
rh#2275713
CVE-2024-26870kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26870
SMASH Issue 402374
bnc#1223113
https://git.kernel.org/stable/c/06e828b3f1b206de08ef520fc46a40b22e1869cb
https://git.kernel.org/stable/c/23bfecb4d852751d5e403557dd500bb563313baf
https://git.kernel.org/stable/c/251a658bbfceafb4d58c76b77682c8bf7bcfad65
https://git.kernel.org/stable/c/4403438eaca6e91f02d272211c4d6b045092396b
https://git.kernel.org/stable/c/79cdcc765969d23f4e3d6ea115660c3333498768
https://git.kernel.org/stable/c/80365c9f96015bbf048fdd6c8705d3f8770132bf
https://git.kernel.org/stable/c/9d52865ff28245fc2134da9f99baff603a24407a
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2275711
CVE-2024-26871kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26871
SMASH Issue 402375
bnc#1223040
https://git.kernel.org/stable/c/4c122a32582b67bdd44ca8d25f894ee2dc54f566
https://git.kernel.org/stable/c/6d102382a11d5e6035f6c98f6e508a38541f7af3
https://git.kernel.org/stable/c/8e2ea8b04cb8d976110c4568509e67d6a39b2889
https://git.kernel.org/stable/c/c2034ef6192a65a986a45c2aa2ed05824fdc0e9f
rh#2275709
CVE-2024-26873kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26873
SMASH Issue 402297
bnc#1223047
https://git.kernel.org/stable/c/3c4f53b2c341ec6428b98cb51a89a09b025d0953
https://git.kernel.org/stable/c/85c98073ffcfe9e46abfb9c66f3364467119d563
https://git.kernel.org/stable/c/e022dd3b875315a2d2001a512e98d1dc8c991f4a
rh#2275705
CVE-2024-26877kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26877
SMASH Issue 402380
bnc#1223140
https://git.kernel.org/stable/c/03e6d4e948432a61b35783323b6ab2be071d2619
https://git.kernel.org/stable/c/23bc89fdce71124cd2126fc919c7076e7cb489cf
https://git.kernel.org/stable/c/8a01335aedc50a66d04dd39203c89f4bc8042596
https://git.kernel.org/stable/c/9db89b1fb85557892e6681724b367287de5f9f20
https://git.kernel.org/stable/c/a71f66bd5f7b9b35a8aaa49e29565eca66299399
https://git.kernel.org/stable/c/a853450bf4c752e664abab0b2fad395b7ad7701c
https://git.kernel.org/stable/c/dbf291d8ffffb70f48286176a15c6c54f0bb0743
rh#2275697
CVE-2024-26878kernel-source-rt:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26878
SMASH Issue 402381
bnc#1223060
https://git.kernel.org/stable/c/1ca72a3de915f87232c9a4cb9bebbd3af8ed3e25
https://git.kernel.org/stable/c/40a673b4b07efd6f74ff3ab60f38b26aa91ee5d5
https://git.kernel.org/stable/c/49669f8e7eb053f91d239df7b1bfb4500255a9d0
https://git.kernel.org/stable/c/61380537aa6dd32d8a723d98b8f1bd1b11d8fee0
https://git.kernel.org/stable/c/6afc9f4434fa8063aa768c2bf5bf98583aee0877
https://git.kernel.org/stable/c/7f9e833fc0f9b47be503af012eb5903086939754
https://git.kernel.org/stable/c/8514899c1a4edf802f03c408db901063aa3f05a1
https://git.kernel.org/stable/c/d0aa72604fbd80c8aabb46eda00535ed35570f1f
https://git.kernel.org/stable/c/f2649d98aa9ca8623149b3cb8df00c944f5655c7
rh#2275694
CVE-2024-26879kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26879
SMASH Issue 402292
bnc#1223066
https://git.kernel.org/stable/c/0cbefc7b5bdad86b18a263d837450cdc9a56f8d7
https://git.kernel.org/stable/c/7ae1b0dc12ec407f12f80b49d22c6ad2308e2202
https://git.kernel.org/stable/c/9f3e5df38b4528213449e55b80f0316864f2a1c8
https://git.kernel.org/stable/c/a03ed00787b0ce7a83eebabd0fa95ecc4a5cac84
https://git.kernel.org/stable/c/a860aaebacbc908fa06e2642402058f40bfffe10
https://git.kernel.org/stable/c/ba535bce57e71463a86f8b33a0ea88c26e3a6418
rh#2275692
CVE-2024-26881kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26881
SMASH Issue 402383
bnc#1223041
https://git.kernel.org/stable/c/0fbcf2366ba9888cf02eda23e35fde7f7fcc07c3
https://git.kernel.org/stable/c/11b998360d96f6c76f04a95f54b49f24d3c858e4
https://git.kernel.org/stable/c/23ec1cec24293f9799c725941677d4e167997265
https://git.kernel.org/stable/c/b2bb19114c079dcfec1ea46e761f510e30505e70
https://git.kernel.org/stable/c/b3cf70472a600bcb2efe24906bc9bc6014d4c6f6
https://git.kernel.org/stable/c/f0b5225a7dfc1bf53c98215db8c2f0b4efd3f108
rh#2275688
CVE-2024-26883kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26883
SMASH Issue 402384
bnc#1223035
https://git.kernel.org/stable/c/0971126c8164abe2004b8536b49690a0d6005b0a
https://git.kernel.org/stable/c/15641007df0f0d35fa28742b25c2a7db9dcd6895
https://git.kernel.org/stable/c/21e5fa4688e1a4d3db6b72216231b24232f75c1d
https://git.kernel.org/stable/c/43f798b9036491fb014b55dd61c4c5c3193267d0
https://git.kernel.org/stable/c/7070b274c7866a4c5036f8d54fcaf315c64ac33a
https://git.kernel.org/stable/c/7a4b21250bf79eef26543d35bd390448646c536b
https://git.kernel.org/stable/c/ca1f06e72dec41ae4f76e7b1a8a97265447b46ae
https://git.kernel.org/stable/c/d0e214acc59145ce25113f617311aa79dda39cb3
https://git.kernel.org/stable/c/f06899582ccee09bd85d0696290e3eaca9aa042d
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2275684
CVE-2024-26887kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26887
SMASH Issue 402296
bnc#1223123
https://git.kernel.org/stable/c/620b9e60e4b55fa55540ce852a0f3c9e6091dbbc
https://git.kernel.org/stable/c/79f4127a502c5905f04da1f20a7bbe07103fb77c
https://git.kernel.org/stable/c/b08bd8f02a24e2b82fece5ac51dc1c3d9aa6c404
https://git.kernel.org/stable/c/b10e6f6b160a60b98fb7476028f5a95405bbd725
rh#2275676
CVE-2024-26888kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26888
SMASH Issue 402295
bnc#1223124
https://git.kernel.org/stable/c/5987b9f7d9314c7411136005b3a52f61a8cc0911
https://git.kernel.org/stable/c/5cb93417c93716a5404f762f331f5de3653fd952
https://git.kernel.org/stable/c/98e9920c75e0790bff947a00d192d24bf1c724e0
https://git.kernel.org/stable/c/a6e06258f4c31eba0fcd503e19828b5f8fe7b08b
rh#2275674
CVE-2024-26889kernel-source-rt:Analysismoderate ()CVE-2024-26889
SMASH Issue 402387
https://git.kernel.org/stable/c/2e845867b4e279eff0a19ade253390470e07e8a1
https://git.kernel.org/stable/c/2edce8e9a99dd5e4404259d52e754fdc97fb42c2
https://git.kernel.org/stable/c/54a03e4ac1a41edf8a5087bd59f8241b0de96d3d
https://git.kernel.org/stable/c/68644bf5ec6baaff40fc39b3529c874bfda709bd
https://git.kernel.org/stable/c/6d5a9d4a7bcbb7534ce45a18a52e7bd23e69d8ac
https://git.kernel.org/stable/c/81137162bfaa7278785b24c1fd2e9e74f082e8e4
https://git.kernel.org/stable/c/8c28598a2c29201d2ba7fc37539a7d41c264fb10
https://git.kernel.org/stable/c/a41c8efe659caed0e21422876bbb6b73c15b5244
https://git.kernel.org/stable/c/d47e6c1932cee02954ea588c9f09fd5ecefeadfc
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2275672
CVE-2024-26890kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26890
SMASH Issue 402388
bnc#1223192
bnc#1223362
https://git.kernel.org/stable/c/0c657e641df1e77d6087688190f632cad9c0439b
https://git.kernel.org/stable/c/2f232bc389a4f5943c40733582f9edf77b89e499
https://git.kernel.org/stable/c/dd163fa34c483f1674aa2510accce11a224f649e
https://git.kernel.org/stable/c/de4e88ec58c4202efd1f02eebb4939bbf6945358
rh#2275670
CVE-2024-26892kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26892
SMASH Issue 402390
bnc#1223195
https://git.kernel.org/stable/c/bfe1adf1606f76c180324e53b130f0e76d5cc6c3
https://git.kernel.org/stable/c/bfeaef901194c5923ce3330272786eff2fac513a
https://git.kernel.org/stable/c/c7dd42fbebcfb02bef070fd48f774d6412d0b49d
https://git.kernel.org/stable/c/c957280ef6ab6bdf559a91ae693a6b34310697e3
rh#2275666
CVE-2024-26893kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26893
SMASH Issue 402367
bnc#1223196
https://git.kernel.org/stable/c/0d276d9f335f41d6524258d58c0c0241ef9a83a4
https://git.kernel.org/stable/c/857f56db8c3a71f9871922b6984ff74ad588cb2c
https://git.kernel.org/stable/c/8ffaa17ccb1eb1b65cf85db63225a3581c303773
https://git.kernel.org/stable/c/ead445dd3d681020af333649a27306160eee761d
https://git.kernel.org/stable/c/f1d71576d2c9ec8fdb822173fa7f3de79475e9bd
rh#2275664
CVE-2024-26895kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26895
SMASH Issue 402392
bnc#1223197
https://git.kernel.org/stable/c/24228dcf1d30c2231caa332be7d3090ac59fbfe9
https://git.kernel.org/stable/c/3da9d32b7f4a1a9f7e4bb15bb82f2b2dd6719447
https://git.kernel.org/stable/c/5956f4203b6cdd0755bbdd21b45f3933c7026208
https://git.kernel.org/stable/c/73a2aa0aef86c2c07be5a2f42c9e6047e1a2f7bb
https://git.kernel.org/stable/c/a9545af2a533739ffb64d6c9a6fec6f13e2b505f
https://git.kernel.org/stable/c/cb5942b77c05d54310a0420cac12935e9b6aa21c
https://git.kernel.org/stable/c/fe20e3d56bc911408fc3c27a17c59e9d7885f7d1
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2275659
CVE-2024-26896kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26896
SMASH Issue 402393
bnc#1223042
https://git.kernel.org/stable/c/12f00a367b2b62756e0396f14b54c2c15524e1c3
https://git.kernel.org/stable/c/3a71ec74e5e3478d202a1874f085ca3ef40be49b
https://git.kernel.org/stable/c/a1f57a0127b89a6b6620514564aa7eaec16d9af3
https://git.kernel.org/stable/c/b8cfb7c819dd39965136a66fe3a7fde688d976fc
https://git.kernel.org/stable/c/dadbb5d29d6c5f571a50272fce8c1505a9559487
rh#2275657
CVE-2024-26897kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26897
SMASH Issue 402394
bnc#1223323
https://git.kernel.org/stable/c/1bc5461a21c56a36e2a7d81e152b90ce019a3905
https://git.kernel.org/stable/c/24355fcb0d4cbcb6ddda262596558e8cfba70f11
https://git.kernel.org/stable/c/4afa0246656d5680c8a4c3fb37ba6570c4ab819b
https://git.kernel.org/stable/c/74d0639261dd795dce958d1b14815bdcbb48a715
https://git.kernel.org/stable/c/a015fbf698c8957aa5fbeefc5c59dd2cf3107298
https://git.kernel.org/stable/c/ac90e22e735bac44f74b5161fb096fbeb0ff8bc2
https://git.kernel.org/stable/c/f8ff4b4df71e87f609be0cc37d92e918107f9b90
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2275655
CVE-2024-26898kernel-source-rt:Already fixedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2023-6270
CVE-2024-26898
L3:67569
L3:67606
L3:67695
L3:67706
L3:67756
L3:67844
L3:67846
L3:67866
L3:68017
L3:68142
SMASH Issue 390054
SMASH Issue 402395
bnc#1218562
bnc#1218813
bnc#1219702
bnc#1220853
bnc#1223016
bnc#1223017
bnc#1223335
bnc#1225020
https://access.redhat.com/security/cve/CVE-2023-6270
https://git.kernel.org/stable/c/079cba4f4e307c69878226fdf5228c20aa1c969c
https://git.kernel.org/stable/c/1a54aa506b3b2f31496731039e49778f54eee881
https://git.kernel.org/stable/c/74ca3ef68d2f449bc848c0a814cefc487bf755fa
https://git.kernel.org/stable/c/7dd09fa80b0765ce68bfae92f4e2f395ccf0fba4
https://git.kernel.org/stable/c/a16fbb80064634b254520a46395e36b87ca4731e
https://git.kernel.org/stable/c/ad80c34944d7175fa1f5c7a55066020002921a99
https://git.kernel.org/stable/c/eb48680b0255a9e8a9bdc93d6a55b11c31262e62
https://git.kernel.org/stable/c/f98364e926626c678fb4b9004b75cacf92ff0662
https://git.kernel.org/stable/c/faf0b4c5e00bb680e8e43ac936df24d3f48c8e65
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3065
linux.git:commit:f98364e926626c678fb4b9004b75cacf92ff0662
rh#2256786
rh#2275652
rh#2277171
rh#2277811
rh#2278445
CVE-2024-26899kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26899
SMASH Issue 402317
bnc#1223045
https://git.kernel.org/stable/c/03f12122b20b6e6028e9ed69030a49f9cffcbb75
https://git.kernel.org/stable/c/1e5c5b0abaee7b62a10b9707a62083b71ad21f62
https://git.kernel.org/stable/c/5a87c1f7993bc8ac358a3766bac5dc7126e01e98
rh#2275650
CVE-2024-26902kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26902
SMASH Issue 402397
bnc#1223199
https://git.kernel.org/stable/c/34b567868777e9fd39ec5333969728a7f0cf179c
https://git.kernel.org/stable/c/3ede8e94de6b834b48b0643385e66363e7a04be9
https://git.kernel.org/stable/c/9f599ba3b9cc4bdb8ec1e3f0feddd41bf9d296d6
rh#2275643
CVE-2024-26903kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26903
SMASH Issue 402398
bnc#1223187
https://git.kernel.org/stable/c/2535b848fa0f42ddff3e5255cf5e742c9b77bb26
https://git.kernel.org/stable/c/369f419c097e82407dd429a202cde9a73d3ae29b
https://git.kernel.org/stable/c/3ead59bafad05f2967ae2438c0528d53244cfde5
https://git.kernel.org/stable/c/567c0411dc3b424fc7bd1e6109726d7ba32d4f73
https://git.kernel.org/stable/c/5f369efd9d963c1f711a06c9b8baf9f5ce616d85
https://git.kernel.org/stable/c/5f9fe302dd3a9bbc50f4888464c1773f45166bfd
https://git.kernel.org/stable/c/81d7d920a22fd58ef9aedb1bd0a68ee32bd23e96
https://git.kernel.org/stable/c/8d1753973f598531baaa2c1033cf7f7b5bb004b0
rh#2275641
CVE-2024-26906kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26906
SMASH Issue 402401
bnc#1223202
https://git.kernel.org/stable/c/29bd6f86904682adafe9affbc7f79b14defcaff8
https://git.kernel.org/stable/c/32019c659ecfe1d92e3bf9fcdfbb11a7c70acd58
https://git.kernel.org/stable/c/57f78c46f08198e1be08ffe99c4c1ccc12855bf5
https://git.kernel.org/stable/c/6e4694e65b6db4c3de125115dd4f55848cc48381
https://git.kernel.org/stable/c/e8a67fe34b76a49320b33032228a794f40b0316b
https://git.kernel.org/stable/c/f175de546a3eb77614d94d4c02550181c0a8493e
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2275635
CVE-2024-26908kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26908
SMASH Issue 402403
bnc#1223201
https://git.kernel.org/stable/c/025a8a96c7ef3ff24a9b4753a7e851ba16f11bfc
https://git.kernel.org/stable/c/3693bb4465e6e32a204a5b86d3ec7e6b9f7e67c2
https://git.kernel.org/stable/c/70a33a629090130d731fc1e1ad498bb672eea165
https://git.kernel.org/stable/c/8082bccb7ac480ceab89b09c53d20c78ae54f9fa
https://git.kernel.org/stable/c/a9bbb05c0c04b49a1f7f05fd03826321dca2b8d4
https://git.kernel.org/stable/c/d211e8128c0e2122512fa5e859316540349b54af
https://git.kernel.org/stable/c/eb279074badac0bbe28749906562d648ca4bc750
https://git.kernel.org/stable/c/f49c513f46dc19bf01ffad2aaaf234d7f37f6799
jsc#CAR-3360
rh#2275744
CVE-2024-26909kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26909
SMASH Issue 402404
bnc#1223143
https://git.kernel.org/stable/c/2bbd65c6ca567ed8dbbfc4fb945f57ce64bef342
https://git.kernel.org/stable/c/b979f2d50a099f3402418d7ff5f26c3952fb08bb
https://git.kernel.org/stable/c/ef45aa2841e15b649e5417fe3d4de395fe462781
rh#2275630
CVE-2024-26910kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26910
SMASH Issue 402448
bnc#1223151
https://git.kernel.org/stable/c/653bc5e6d9995d7d5f497c665b321875a626161c
https://git.kernel.org/stable/c/970709a67696b100a57b33af1a3d75fc34b747eb
https://git.kernel.org/stable/c/97f7cf1cd80eeed3b7c808b7c12463295c751001
https://git.kernel.org/stable/c/a24d5f2ac8ef702a58e55ec276aad29b4bd97e05
https://git.kernel.org/stable/c/b93a6756a01f4fd2f329a39216f9824c56a66397
https://git.kernel.org/stable/c/c2dc077d8f722a1c73a24e674f925602ee5ece49
https://git.kernel.org/stable/c/c7f2733e5011bfd136f1ca93497394d43aa76225
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2275773
CVE-2024-26911kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26911
SMASH Issue 402449
bnc#1223055
https://git.kernel.org/stable/c/4b59c3fada06e5e8010ef7700689c71986e667a2
https://git.kernel.org/stable/c/8746c6c9dfa31d269c65dd52ab42fde0720b7d91
rh#2275798
CVE-2024-26912kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26912
SMASH Issue 402450
bnc#1223064
https://git.kernel.org/stable/c/042b5f83841fbf7ce39474412db3b5e4765a7ea7
https://git.kernel.org/stable/c/6190d4c08897d748dd25f0b78267a90aa1694e15
rh#2275796
CVE-2024-26913kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26913
SMASH Issue 402451
bnc#1223204
https://git.kernel.org/stable/c/cdbe0be8874c63bca85b8c38e5b1eecbdd18df31
https://git.kernel.org/stable/c/faf51b201bc42adf500945732abb6220c707d6f3
rh#2275794
CVE-2024-26914kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26914
SMASH Issue 402452
bnc#1223205
https://git.kernel.org/stable/c/0bd8ef618a42d7e6ea3f701065264e15678025e3
https://git.kernel.org/stable/c/39079fe8e660851abbafa90cd55cbf029210661f
rh#2275792
CVE-2024-26916kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26916
SMASH Issue 402454
bnc#1223137
https://git.kernel.org/stable/c/65158edb0a3a8df23197d52cd24287e39eaf95d6
https://git.kernel.org/stable/c/916361685319098f696b798ef1560f69ed96e934
https://git.kernel.org/stable/c/caa2565a2e13899be31f7b1e069e6465d3e2adb0
https://git.kernel.org/stable/c/d855ceb6a5fde668c5431156bc60fae0cc52b764
https://git.kernel.org/stable/c/ff70e6ff6fc2413caf33410af7462d1f584d927e
rh#2275788
CVE-2024-26917kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26917
SMASH Issue 402455
bnc#1223056
https://git.kernel.org/stable/c/2209fc6e3d7727d787dc6ef9baa1e9eae6b1295b
https://git.kernel.org/stable/c/25675159040bffc7992d5163f3f33ba7d0142f21
https://git.kernel.org/stable/c/2996c7e97ea7cf4c1838a1b1dbc0885934113783
https://git.kernel.org/stable/c/5b8f473c4de95c056c1c767b1ad48c191544f6a5
https://git.kernel.org/stable/c/6bb22ac1d11d7d20f91e7fd2e657a9e5f6db65e0
https://git.kernel.org/stable/c/7d4e19f7ff644c5b79e8271df8ac2e549b436a5b
https://git.kernel.org/stable/c/94a600226b6d0ef065ee84024b450b566c5a87d6
https://git.kernel.org/stable/c/977fe773dcc7098d8eaf4ee6382cb51e13e784cb
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2275784
CVE-2024-26918kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26918
SMASH Issue 402456
bnc#1223136
https://git.kernel.org/stable/c/41044d5360685e78a869d40a168491a70cdb7e73
https://git.kernel.org/stable/c/63b1a3d9dd3b3f6d67f524e76270e66767090583
https://git.kernel.org/stable/c/a4f12e5cbac2865c151d1e97e36eb24205afb23b
rh#2275782
CVE-2024-26919kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26919
SMASH Issue 402457
bnc#1223847
https://git.kernel.org/stable/c/330d22aba17a4d30a56f007d0f51291d7e00862b
https://git.kernel.org/stable/c/33713945cc92ea9c4a1a9479d5c1b7acb7fc4df3
https://git.kernel.org/stable/c/3caf2b2ad7334ef35f55b95f3e1b138c6f77b368
https://git.kernel.org/stable/c/d31b886ed6a5095214062ee4fb55037eb930adb6
rh#2275777
CVE-2024-26920kernel-source-rt:Analysismoderate ()CVE-2024-26920
SMASH Issue 402458
https://git.kernel.org/stable/c/0958b33ef5a04ed91f61cef4760ac412080c4e08
https://git.kernel.org/stable/c/2450a69d2ee75d1f0112d509ac82ef98f5ad6b5f
https://git.kernel.org/stable/c/26ebeffff238488466fa578be3b35b8a46e69906
https://git.kernel.org/stable/c/2a3073d58382157ab396734ed4e421ba9e969db1
https://git.kernel.org/stable/c/34925d01baf3ee62ab21c21efd9e2c44c24c004a
https://git.kernel.org/stable/c/36be97e9eb535fe3008a5cb040b1e56f29f2e398
https://git.kernel.org/stable/c/4b001ef14baab16b553a002cb9979e31b8fc0c6b
https://git.kernel.org/stable/c/56cfbe60710772916a5ba092c99542332b48e870
https://git.kernel.org/stable/c/6022c065c9ec465d84cebff8f480db083e4ee06b
https://git.kernel.org/stable/c/8ffd5590f4d6ef5460acbeac7fbdff7025f9b419
https://git.kernel.org/stable/c/b5085b5ac1d96ea2a8a6240f869655176ce44197
https://git.kernel.org/stable/c/bcf4a115a5068f3331fafb8c176c1af0da3d8b19
rh#2275775
CVE-2024-26924kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26924
SMASH Issue 403112
bnc#1223387
https://git.kernel.org/stable/c/14b001ba221136c15f894577253e8db535b99487
https://git.kernel.org/stable/c/3cfc9ec039af60dbd8965ae085b2c2ccdcfbe1cc
https://git.kernel.org/stable/c/41d8fdf3afaff312e17466e4ab732937738d5644
https://git.kernel.org/stable/c/7a1679e2d9bfa3b5f8755c2c7113e54b7d42bd46
https://git.kernel.org/stable/c/e3b887a9c11caf8357a821260e095f2a694a34f2
https://git.kernel.org/stable/c/ebf7c9746f073035ee26209e38c3a1170f7b349a
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2277168
CVE-2024-26925kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26925
MISC:git.kernel.org:OSS:2024/Q2/220
OSS:2024/05/07/6
OSS:2024/05/08/2
OSS:2024/Q2/220
SMASH Issue 403115
bnc#1223390
bnc#1224175
https://git.kernel.org/stable/c/0d459e2ffb541841714839e8228b845458ed3b27
https://git.kernel.org/stable/c/2cee2ff7f8cce12a63a0a23ffe27f08d99541494
https://git.kernel.org/stable/c/61ac7284346c32f9a8c8ceac56102f7914060428
https://git.kernel.org/stable/c/8038ee3c3e5b59bcd78467686db5270c68544e30
https://git.kernel.org/stable/c/8d3a58af50e46167b6f1db47adadad03c0045dae
https://git.kernel.org/stable/c/a34ba4bdeec0c3b629160497594908dc820110f1
https://git.kernel.org/stable/c/eb769ff4e281f751adcaf4f4445cbf30817be139
rh#2277166
CVE-2024-26926kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2024-26926
SMASH Issue 403114
bnc#1223388
https://git.kernel.org/stable/c/1d7f1049035b2060342f11eff957cf567d810bdc
https://git.kernel.org/stable/c/48a1f83ca9c68518b1a783c62e6a8223144fa9fc
https://git.kernel.org/stable/c/68a28f551e4690db2b27b3db716c7395f6fada12
https://git.kernel.org/stable/c/a2fd6dbc98be1105a1d8e9e31575da8873ef115c
https://git.kernel.org/stable/c/a6d2a8b211c874971ee4cf3ddd167408177f6e76
https://git.kernel.org/stable/c/aaef73821a3b0194a01bd23ca77774f704a04d40
https://git.kernel.org/stable/c/f01d6619045704d78613b14e2e0420bfdb7f1c15
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2277173
CVE-2024-26927kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26927
SMASH Issue 403386
bnc#1223525
https://git.kernel.org/stable/c/044e220667157fb9d59320341badec59cf45ba48
https://git.kernel.org/stable/c/98f681b0f84cfc3a1d83287b77697679e0398306
https://git.kernel.org/stable/c/9eeb8e1231f6450c574c1db979122e171a1813ab
https://git.kernel.org/stable/c/ced7df8b3c5c4751244cad79011e86cf1f809153
https://git.kernel.org/stable/c/d133d67e7e724102d1e53009c4f88afaaf3e167c
rh#2277844
CVE-2024-26932kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26932
SMASH Issue 403699
bnc#1223649
https://git.kernel.org/stable/c/242e425ed580b2f4dbcb86c8fc03a410a4084a69
https://git.kernel.org/stable/c/b63f90487bdf93a4223ce7853d14717e9d452856
rh#2278243
CVE-2024-26933kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26933
SMASH Issue 403700
bnc#1223670
https://git.kernel.org/stable/c/4facc9421117ba9d8148c73771b213887fec77f7
https://git.kernel.org/stable/c/73d1589b91f2099e5f6534a8497b7c6b527e064e
https://git.kernel.org/stable/c/9dac54f08198147f5ec0ec52fcf1bc8ac899ac05
https://git.kernel.org/stable/c/f4d1960764d8a70318b02f15203a1be2b2554ca1
https://git.kernel.org/stable/c/f51849833705dea5b4f9b0c8de714dd87bd6c95c
rh#2278240
CVE-2024-26935kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26935
SMASH Issue 403703
bnc#1223675
https://git.kernel.org/stable/c/0053f15d50d50c9312d8ab9c11e2e405812dfcac
https://git.kernel.org/stable/c/3678cf67ff7136db1dd3bf63c361650db5d92889
https://git.kernel.org/stable/c/5c2386ba80e779a92ec3bb64ccadbedd88f779b1
https://git.kernel.org/stable/c/cea234bb214b17d004dfdccce4491e6ff57c96ee
https://git.kernel.org/stable/c/d4c34782b6d7b1e68d18d9549451b19433bd4c6c
https://git.kernel.org/stable/c/e293c773c13b830cdc251f155df2254981abc320
https://git.kernel.org/stable/c/f23a4d6e07570826fe95023ca1aa96a011fa9f84
https://git.kernel.org/stable/c/f4ff08fab66eb5c0b97e1a24edac052fb40bf5d7
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2278235
CVE-2024-26936kernel-source-rt:Not affectedmoderate ()CVE-2024-26936
SMASH Issue 403704
bnc#1223676
https://git.kernel.org/stable/c/17cf0c2794bdb6f39671265aa18aea5c22ee8c4a
https://git.kernel.org/stable/c/21ff9d7d223c5c19cb4334009e4c0c83a2f4d674
https://git.kernel.org/stable/c/2c27a64a2bc47d9bfc7c3cf8be14be53b1ee7cb6
https://git.kernel.org/stable/c/5c20b242d4fed73a93591e48bfd9772e2322fb11
https://git.kernel.org/stable/c/8f3d0bf1d0c62b539d54c5b9108a845cff619b99
rh#2278233
CVE-2024-26938kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-26938
SMASH Issue 403706
bnc#1223678
https://git.kernel.org/stable/c/32e39bab59934bfd3f37097d4dd85ac5eb0fd549
https://git.kernel.org/stable/c/72e4d3fb72e9f0f016946158a7d95304832768e6
https://git.kernel.org/stable/c/94cf2fb6feccd625e5b4e23e1b70f39a206f82ac
https://git.kernel.org/stable/c/a891add409e3bc381f4f68c2ce9d953f1865cb1f
https://git.kernel.org/stable/c/f4bbac954d8f9ab214ea1d4f385de4fa6bd92dd0
rh#2278229
CVE-2024-26939kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26939
SMASH Issue 403707
bnc#1223679
bnc#1223680
https://git.kernel.org/stable/c/0e45882ca829b26b915162e8e86dbb1095768e9e
https://git.kernel.org/stable/c/59b2626dd8c8a2e13f18054b3530e0c00073d79f
https://git.kernel.org/stable/c/5e3eb862df9f972ab677fb19e0d4b9b1be8db7b5
https://git.kernel.org/stable/c/704edc9252f4988ae1ad7dafa23d0db8d90d7190
rh#2278220
CVE-2024-26940kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26940
SMASH Issue 403708
bnc#1223718
https://git.kernel.org/stable/c/016119154981d81c9e8f2ea3f56b9e2b4ea14500
https://git.kernel.org/stable/c/042ef0afc40fa1a22b3608f22915b91ce39d128f
https://git.kernel.org/stable/c/25e3ce59c1200f1f0563e39de151f34962ab0fe1
https://git.kernel.org/stable/c/4be9075fec0a639384ed19975634b662bfab938f
https://git.kernel.org/stable/c/eb08db0fc5354fa17b7ed66dab3c503332423451
rh#2278218
CVE-2024-26941kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26941
SMASH Issue 403709
bnc#1223721
https://git.kernel.org/stable/c/828862071a6ca0c52655e6e62ac7abfef3e5c578
https://git.kernel.org/stable/c/9cbd1dae842737bfafa4b10a87909fa209dde250
rh#2278216
CVE-2024-26942kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26942
SMASH Issue 403711
bnc#1223727
https://git.kernel.org/stable/c/6a4aee277740d04ac0fd54cfa17cc28261932ddc
https://git.kernel.org/stable/c/a8a296ad9957b845b89bcf48be1cf8c74875ecc3
rh#2278214
CVE-2024-26943kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26943
SMASH Issue 403712
https://git.kernel.org/stable/c/16e87fe23d4af6df920406494ced5c0f4354567b
https://git.kernel.org/stable/c/2a84744a037b8a511d6a9055f3defddc28ff4a4d
https://git.kernel.org/stable/c/3e82f7383e0b82a835e6b6b06a348b2bc4e2c2ee
https://git.kernel.org/stable/c/5e81773757a95fc298e96cfd6d4700f07b6192a2
https://git.kernel.org/stable/c/9acfd8b083a0ffbd387566800d89f55058a68af2
rh#2278212
CVE-2024-26944kernel-source-rt:Analysisimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26944
SMASH Issue 403713
bnc#1223731
https://git.kernel.org/stable/c/1ec17ef59168a1a6f1105f5dc517f783839a5302
https://git.kernel.org/stable/c/34ca809e055eca5cfe63d9c7efbf80b7c21b4e57
rh#2278210
CVE-2024-26945kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26945
SMASH Issue 403714
bnc#1223732
https://git.kernel.org/stable/c/5a7e89d3315d1be86aff8a8bf849023cda6547f7
https://git.kernel.org/stable/c/a5ca1be7f9817de4e93085778b3ee2219bdc2664
rh#2278208
CVE-2024-26946kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26946
SMASH Issue 403715
bnc#1223669
https://git.kernel.org/stable/c/20fdb21eabaeb8f78f8f701f56d14ea0836ec861
https://git.kernel.org/stable/c/4e51653d5d871f40f1bd5cf95cc7f2d8b33d063b
https://git.kernel.org/stable/c/6417684315087904fffe8966d27ca74398c57dd6
https://git.kernel.org/stable/c/b69f577308f1070004cafac106dd1a44099e5483
https://git.kernel.org/stable/c/f13edd1871d4fb4ab829aff629d47914e251bae3
rh#2278206
CVE-2024-26947kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26947
SMASH Issue 403716
bnc#1223662
https://git.kernel.org/stable/c/0c027c2bad7f5111c51a358b5d392e1a695dabff
https://git.kernel.org/stable/c/0c66c6f4e21cb22220cbd8821c5c73fc157d20dc
https://git.kernel.org/stable/c/9f7ddc222cae8254e93d5c169a8ae11a49d912a7
https://git.kernel.org/stable/c/fb3a122a978626b33de3367ee1762da934c0f512
rh#2278167
CVE-2024-26948kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26948
SMASH Issue 403717
bnc#1223664
https://git.kernel.org/stable/c/334b56cea5d9df5989be6cf1a5898114fa70ad98
https://git.kernel.org/stable/c/d37a08f840485995e3fb91dad95e441b9d28a269
rh#2278204
CVE-2024-26949kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26949
SMASH Issue 403718
bnc#1223665
https://git.kernel.org/stable/c/08ae9ef829b8055c2fdc8cfee37510c1f4721a07
https://git.kernel.org/stable/c/99c2f1563b1400cc8331fc79d19ada1bb95bb388
https://git.kernel.org/stable/c/b8eaa8ef1f1157a9f330e36e66bdd7a693309948
rh#2278202
CVE-2024-26951kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26951
SMASH Issue 403720
bnc#1223660
https://git.kernel.org/stable/c/13d107794304306164481d31ce33f8fdb25a9c04
https://git.kernel.org/stable/c/302b2dfc013baca3dea7ceda383930d9297d231d
https://git.kernel.org/stable/c/55b6c738673871c9b0edae05d0c97995c1ff08c4
https://git.kernel.org/stable/c/710a177f347282eea162aec8712beb1f42d5ad87
https://git.kernel.org/stable/c/7bedfe4cfa38771840a355970e4437cd52d4046b
https://git.kernel.org/stable/c/b7cea3a9af0853fdbb1b16633a458f991dde6aac
https://git.kernel.org/stable/c/f52be46e3e6ecefc2539119784324f0cbc09620a
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2278197
CVE-2024-26952kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26952
SMASH Issue 403721
bnc#1223658
https://git.kernel.org/stable/c/0c5541b4c980626fa3cab16ba1a451757778bbb5
https://git.kernel.org/stable/c/2dcda336b6e80b72d58d30d40f2fad9724e5fe63
https://git.kernel.org/stable/c/39bdc4197acf2ed13269167ccf093ee28cfa2a4e
https://git.kernel.org/stable/c/c6cd2e8d2d9aa7ee35b1fa6a668e32a22a9753da
rh#2278195
CVE-2024-26953kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26953
SMASH Issue 403722
bnc#1223656
https://git.kernel.org/stable/c/1abb20a5f4b02fb3020f88456fc1e6069b3cdc45
https://git.kernel.org/stable/c/8291b4eac429c480386669444c6377573f5d8664
https://git.kernel.org/stable/c/c3198822c6cb9fb588e446540485669cc81c5d34
https://git.kernel.org/stable/c/f278ff9db67264715d0d50e3e75044f8b78990f4
rh#2278193
CVE-2024-26954kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26954
SMASH Issue 403723
bnc#1223659
https://git.kernel.org/stable/c/3b8da67191e938a63d2736dabb4ac5d337e5de57
https://git.kernel.org/stable/c/4f97e6a9d62cb1fce82fbf4baff44b83221bc178
https://git.kernel.org/stable/c/a80a486d72e20bd12c335bcd38b6e6f19356b0aa
rh#2278191
CVE-2024-26958kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26958
SMASH Issue 403727
bnc#1223653
https://git.kernel.org/stable/c/17f46b803d4f23c66cacce81db35fef3adb8f2af
https://git.kernel.org/stable/c/1daf52b5ffb24870fbeda20b4967526d8f9e12ab
https://git.kernel.org/stable/c/3abc2d160ed8213948b147295d77d44a22c88fa3
https://git.kernel.org/stable/c/4595d90b5d2ea5fa4d318d13f59055aa4bf3e7f5
https://git.kernel.org/stable/c/80d24b308b7ee7037fc90d8ac99f6f78df0a256f
https://git.kernel.org/stable/c/cf54f66e1dd78990ec6b32177bca7e6ea2144a95
https://git.kernel.org/stable/c/e25447c35f8745337ea8bc0c9697fcac14df8605
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2278182
CVE-2024-26959kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26959
SMASH Issue 403728
bnc#1223667
https://git.kernel.org/stable/c/586e099c93fe26b7bd40593979532f507ed9f6a4
https://git.kernel.org/stable/c/664130c0b0309b360bc5bdd40a30604a9387bde8
https://git.kernel.org/stable/c/74bcf708775c405f7fb6ed776ccd3e1957f38a52
https://git.kernel.org/stable/c/d4e2365b07f1ae1f811a915b514caef5b2d6581e
rh#2278180
CVE-2024-26962kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26962
SMASH Issue 403732
bnc#1223654
https://git.kernel.org/stable/c/41425f96d7aa59bc865f60f5dda3d7697b555677
https://git.kernel.org/stable/c/5943a34bf6bab5801e08a55f63e1b8d5bc90dae1
https://git.kernel.org/stable/c/a8d249d770cb357d16a2097b548d2e4c1c137304
rh#2278174
CVE-2024-26963kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26963
SMASH Issue 403733
bnc#1223651
https://git.kernel.org/stable/c/3895780fabd120d0fbd54354014e85207b25687c
https://git.kernel.org/stable/c/629b534c42d04f0797980f2d1ed105fdb8906975
https://git.kernel.org/stable/c/6661befe41009c210efa2c1bcd16a5cc4cff8a06
https://git.kernel.org/stable/c/6c6a45645a2e6a272dfde14eddbb6706de63c25d
https://git.kernel.org/stable/c/7dfed9855397d0df4c6f748d1f66547ab3bad766
rh#2278172
CVE-2024-26964kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26964
SMASH Issue 403734
bnc#1223650
https://git.kernel.org/stable/c/4a49d24fdec0a802aa686a567a3989a9fdf4e5dd
https://git.kernel.org/stable/c/620b6cf2f1a270f48d38e6b8ce199c1acb3e90f4
https://git.kernel.org/stable/c/7b6cc33593d7ccfc3011b290849cfa899db46757
https://git.kernel.org/stable/c/962300a360d24c5be5a188cda48da58a37e4304d
https://git.kernel.org/stable/c/b2c898469dfc388f619c6c972a28466cbb1442ea
https://git.kernel.org/stable/c/be95cc6d71dfd0cba66e3621c65413321b398052
rh#2278169
CVE-2024-26967kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26967
SMASH Issue 403738
bnc#1223647
https://git.kernel.org/stable/c/6a3d70f7802a98e6c28a74f997a264118b9f50cd
https://git.kernel.org/stable/c/93ff48729211dae55df5d216023be4528d29babb
rh#2278368
CVE-2024-26968kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26968
SMASH Issue 403739
bnc#1223642
https://git.kernel.org/stable/c/0204247cf3669b6021fb745c3b7f37ae392ab19c
https://git.kernel.org/stable/c/1723629fea8a4e75333196866e10d395463dca72
https://git.kernel.org/stable/c/604f2d7c46727c5e24fc7faddc980bc1cc0b1011
https://git.kernel.org/stable/c/bd2b6395671d823caa38d8e4d752de2448ae61e1
rh#2278366
CVE-2024-26970kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26970
SMASH Issue 403741
bnc#1223644
https://git.kernel.org/stable/c/421b135aceace99789c982f6a77ce9476564fb52
https://git.kernel.org/stable/c/852db52b45ea96dac2720f108e7c7331cd3738bb
https://git.kernel.org/stable/c/ae60e3342296f766f88911d39199f77b05f657a6
https://git.kernel.org/stable/c/b4527ee3de365a742215773d20f07db3e2c06f3b
https://git.kernel.org/stable/c/cdbc6e2d8108bc47895e5a901cfcaf799b00ca8d
https://git.kernel.org/stable/c/db4066e3ab6b3d918ae2b92734a89c04fe82cc1d
https://git.kernel.org/stable/c/dcb13b5c9ae8743f99a96f392186527c3df89198
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2278362
CVE-2024-26971kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26971
SMASH Issue 403742
bnc#1223639
https://git.kernel.org/stable/c/50c3acd460551cdf9d8ac6fe0c04f2de0e8e0872
https://git.kernel.org/stable/c/90ad946fff70f312b8d23226afc38c13ddd88c4b
https://git.kernel.org/stable/c/b0cf3d200e8a72b6d28e6e088c062b4a98cb5eaf
https://git.kernel.org/stable/c/c8f4bef0667947b826848db1c45a645f751357c1
rh#2278360
CVE-2024-26975kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26975
SMASH Issue 403746
bnc#1223632
https://git.kernel.org/stable/c/0641908b906a133f1494c312a71f9fecbe2b6c78
https://git.kernel.org/stable/c/2d1f5006ff95770da502f8cee2a224a1ff83866e
https://git.kernel.org/stable/c/2f73cf2ae5e0f4e629db5be3a4380ff7807148e6
https://git.kernel.org/stable/c/9b254feb249981b66ccdb1dae54e757789a15ba1
rh#2278352
CVE-2024-26977kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26977
SMASH Issue 403710
bnc#1223631
https://git.kernel.org/stable/c/5e4b23e7a7b33a1e56bfa3e5598138a2234d55b6
https://git.kernel.org/stable/c/6d21d0356aa44157a62e39c0d1a13d4c69a8d0c8
https://git.kernel.org/stable/c/7626913652cc786c238e2dd7d8740b17d41b2637
https://git.kernel.org/stable/c/af280e137e273935f2e09f4d73169998298792ed
https://git.kernel.org/stable/c/b5d40f02e7222da032c2042aebcf2a07de9b342f
https://git.kernel.org/stable/c/f3749345a9b7295dd071d0ed589634cb46364f77
rh#2278348
CVE-2024-26978kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26978
SMASH Issue 403748
bnc#1223629
https://git.kernel.org/stable/c/0d27056c24efd3d63a03f3edfbcfc4827086b110
https://git.kernel.org/stable/c/12609c76b755dbeb1645c0aacc0f0f4743b2eff3
https://git.kernel.org/stable/c/2160ad6861c4a21d3fa553d7b2aaec6634a37f8a
https://git.kernel.org/stable/c/5cd8af02b466e1beeae13e2de3dc58fcc7925e5a
https://git.kernel.org/stable/c/7d271b798add90c6196539167c019d0817285cf0
https://git.kernel.org/stable/c/aeca49661fd02fd56fb026768b580ce301b45733
https://git.kernel.org/stable/c/c45e53c27b78afd6c81fc25608003576f27b5735
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2278345
CVE-2024-26979kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-26979
SMASH Issue 403749
bnc#1223628
https://git.kernel.org/stable/c/07c3fe923ff7eccf684fb4f8c953d0a7cc8ded73
https://git.kernel.org/stable/c/517621b7060096e48e42f545fa6646fc00252eac
https://git.kernel.org/stable/c/585fec7361e7850bead21fada49a7fcde2f2e791
https://git.kernel.org/stable/c/899e154f9546fcae18065d74064889d08fff62c2
https://git.kernel.org/stable/c/9cb3755b1e3680b720b74dbedfac889e904605c7
https://git.kernel.org/stable/c/c560327d900bab968c2e1b4cd7fa2d46cd429e3d
https://git.kernel.org/stable/c/ff41e0d4f3fa10d7cdd7d40f8026bea9fcc8b000
jsc#CAR-3394
rh#2278343
CVE-2024-26980kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26980
SMASH Issue 403751
bnc#1223630
https://git.kernel.org/stable/c/0977f89722eceba165700ea384f075143f012085
https://git.kernel.org/stable/c/3160d9734453a40db248487f8204830879c207f1
https://git.kernel.org/stable/c/b80ba648714e6d790d69610cf14656be222d0248
https://git.kernel.org/stable/c/c119f4ede3fa90a9463f50831761c28f989bfb20
https://git.kernel.org/stable/c/da21401372607c49972ea87a6edaafb36a17c325
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278341
CVE-2024-26981kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26981
SMASH Issue 403729
bnc#1223668
https://git.kernel.org/stable/c/054f29e9ca05be3906544c5f2a2c7321c30a4243
https://git.kernel.org/stable/c/2382eae66b196c31893984a538908c3eb7506ff9
https://git.kernel.org/stable/c/7061c7efbb9e8f11ce92d6b4646405ea2b0b4de1
https://git.kernel.org/stable/c/897ac5306bbeb83e90c437326f7044c79a17c611
https://git.kernel.org/stable/c/90823f8d9ecca3d5fa6b102c8e464c62f416975f
https://git.kernel.org/stable/c/90f43980ea6be4ad903e389be9a27a2a0018f1c8
https://git.kernel.org/stable/c/bdbe483da21f852c93b22557b146bc4d989260f0
https://git.kernel.org/stable/c/c4a7dc9523b59b3e73fd522c73e95e072f876b16
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3402
rh#2278339
CVE-2024-26983kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26983
SMASH Issue 403753
bnc#1223637
https://git.kernel.org/stable/c/1e7feb31a18c197d63a5e606025ed63c762f8918
https://git.kernel.org/stable/c/5a7dfb8fcd3f29fc93161100179b27f24f3d5f35
https://git.kernel.org/stable/c/89f9a1e876b5a7ad884918c03a46831af202c8a0
https://git.kernel.org/stable/c/e46d3be714ad9652480c6db129ab8125e2d20ab7
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278335
CVE-2024-26985kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26985
SMASH Issue 403754
bnc#1223636
https://git.kernel.org/stable/c/652ead9b746a63e4e79d7ad66d3edf0a8a5b0c2f
https://git.kernel.org/stable/c/7d8ac0942c312abda43b407eff72d31747a7b472
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278331
CVE-2024-26986kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26986
SMASH Issue 403756
bnc#1223728
https://git.kernel.org/stable/c/0dcd876411644da98a6b4d5a18d32ca94c15bdb5
https://git.kernel.org/stable/c/18921b205012568b45760753ad3146ddb9e2d4e2
https://git.kernel.org/stable/c/aa02d43367a9adf8c85fb382fea4171fb266c8d0
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278329
CVE-2024-26987kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26987
SMASH Issue 403757
bnc#1223672
https://git.kernel.org/stable/c/1983184c22dd84a4d95a71e5c6775c2638557dc7
https://git.kernel.org/stable/c/49955b24002dc16a0ae2e83a57a2a6c863a1845c
https://git.kernel.org/stable/c/5ef7ba2799a3b5ed292b8f6407376e2c25ef002e
https://git.kernel.org/stable/c/882e1180c83f5b75bae03d0ccc31ccedfe5159de
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278327
CVE-2024-26989kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26989
SMASH Issue 403759
bnc#1223748
https://git.kernel.org/stable/c/022b19ebc31cce369c407617041a3db810db23b3
https://git.kernel.org/stable/c/31f815cb436082e72d34ed2e8a182140a73ebdf4
https://git.kernel.org/stable/c/50449ca66cc5a8cbc64749cf4b9f3d3fc5f4b457
https://git.kernel.org/stable/c/813f5213f2c612dc800054859aaa396ec8ad7069
https://git.kernel.org/stable/c/f7e71a7cf399f53ff9fc314ca3836dc913b05bd6
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278322
CVE-2024-26990kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2024-26990
SMASH Issue 403737
bnc#1223749
https://git.kernel.org/stable/c/2673dfb591a359c75080dd5af3da484b89320d22
https://git.kernel.org/stable/c/cdf811a937471af2d1facdf8ae80e5e68096f1ed
https://git.kernel.org/stable/c/e20bff0f1b2de9cfe303dd35ff46470104a87404
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278320
CVE-2024-26991kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26991
SMASH Issue 403760
bnc#1223695
https://git.kernel.org/stable/c/048cc4a028e635d339687ed968985d2d1669494c
https://git.kernel.org/stable/c/992b54bd083c5bee24ff7cc35991388ab08598c4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278318
CVE-2024-26992kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2024-26992
SMASH Issue 403761
bnc#1223692
https://git.kernel.org/stable/c/037e48ceccf163899374b601afb6ae8d0bf1d2ac
https://git.kernel.org/stable/c/0fb74c00d140a66128afc0003785dcc57e69d312
https://git.kernel.org/stable/c/7a7650b3ac23e5fc8c990f00e94f787dc84e3175
https://git.kernel.org/stable/c/9e985cbf2942a1bb8fcef9adc2a17d90fd7ca8ee
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278316
CVE-2024-26994kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26994
SMASH Issue 403763
bnc#1223750
https://git.kernel.org/stable/c/0d130158db29f5e0b3893154908cf618896450a8
https://git.kernel.org/stable/c/0efb15c14c493263cb3a5f65f5ddfd4603d19a76
https://git.kernel.org/stable/c/6401038acfa24cba9c28cce410b7505efadd0222
https://git.kernel.org/stable/c/756c5cb7c09e537b87b5d3acafcb101b2ccf394f
https://git.kernel.org/stable/c/89af25bd4b4bf6a71295f07e07a8ae7dc03c6595
https://git.kernel.org/stable/c/8defb1d22ba0395b81feb963b96e252b097ba76f
https://git.kernel.org/stable/c/8f6b62125befe1675446923e4171eac2c012959c
https://git.kernel.org/stable/c/c8d2f34ea96ea3bce6ba2535f867f0d4ee3b22e1
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278312
CVE-2024-26995kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26995
SMASH Issue 403764
bnc#1223696
https://git.kernel.org/stable/c/c4128304c2169b4664ed6fb6200f228cead2ab70
https://git.kernel.org/stable/c/f3da3192cdd3fefe213390e976eec424a8e270b5
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278310
CVE-2024-26996kernel-source-rt:Analysismoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2024-26996
SMASH Issue 403765
bnc#1223752
https://git.kernel.org/stable/c/0588bbbd718a8130b98c54518f1e0b569ce60a93
https://git.kernel.org/stable/c/6334b8e4553cc69f51e383c9de545082213d785e
https://git.kernel.org/stable/c/7250326cbb1f4f90391ac511a126b936cefb5bb7
https://git.kernel.org/stable/c/7f67c2020cb08499c400abf0fc32c65e4d9a09ca
https://git.kernel.org/stable/c/f356fd0cbd9c9cbd0854657a80d1608d0d732db3
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278308
CVE-2024-26997kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26997
SMASH Issue 403702
bnc#1223741
https://git.kernel.org/stable/c/257d313e37d66c3bcc87197fb5b8549129c45dfe
https://git.kernel.org/stable/c/26fde0ea40dda1b08fad3bc0a43f122f6dd8bddf
https://git.kernel.org/stable/c/55656b2afd5f1efcec4245f3e7e814c2a9ef53f6
https://git.kernel.org/stable/c/75bf5e78b2a27cb1bca6fa826e3ab685015165e1
https://git.kernel.org/stable/c/8a139fa44870e84ac228b7b76423a49610e5ba9a
https://git.kernel.org/stable/c/8aa5c28ac65cb5e7f1b9c0c3238c00b661dd2b8c
https://git.kernel.org/stable/c/9de10b59d16880a0a3ae2876c142fe54ce45d816
https://git.kernel.org/stable/c/eed04fa96c48790c1cce73c8a248e9d460b088f8
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2278305
CVE-2024-26998kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26998
SMASH Issue 403766
bnc#1223736
https://git.kernel.org/stable/c/7ae7104d54342433a3a73975f6569beefdd86350
https://git.kernel.org/stable/c/9cf7ea2eeb745213dc2a04103e426b960e807940
https://git.kernel.org/stable/c/bb1118905e875c111d7ccef9aee86ac5e4e7f985
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278303
CVE-2024-26999kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-26999
SMASH Issue 403767
bnc#1223754
https://git.kernel.org/stable/c/1be3226445362bfbf461c92a5bcdb1723f2e4907
https://git.kernel.org/stable/c/52aaf1ff14622a04148dbb9ccce6d9de5d534ea7
https://git.kernel.org/stable/c/69a02273e288011b521ee7c1f3ab2c23fda633ce
https://git.kernel.org/stable/c/7a3bbe41efa55323b6ea3c35fa15941d4dbecdef
https://git.kernel.org/stable/c/ab86cf6f8d24e63e9aca23da5108af1aa5483928
https://git.kernel.org/stable/c/bbaafbb4651fede8d3c3881601ecaa4f834f9d3f
https://git.kernel.org/stable/c/ca09dfc3cfdf89e6af3ac24e1c6c0be5c575a729
https://git.kernel.org/stable/c/d679c816929d62af51c8e6d7fc0e165c9412d2f3
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3415
rh#2278301
CVE-2024-27001kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27001
SMASH Issue 403769
bnc#1223698
https://git.kernel.org/stable/c/3a63ae0348d990e137cca04eced5b08379969ea9
https://git.kernel.org/stable/c/59f33af9796160f851641d960bd93937f282c696
https://git.kernel.org/stable/c/6ec3514a7d35ad9cfab600187612c29f669069d2
https://git.kernel.org/stable/c/a3b8ae7e9297dd453f2977b011c5bc75eb20e71b
https://git.kernel.org/stable/c/ac882d6b21bffecb57bcc4486701239eef5aa67b
https://git.kernel.org/stable/c/b0b268eeb087e324ef3ea71f8e6cabd07630517f
https://git.kernel.org/stable/c/d1718530e3f640b7d5f0050e725216eab57a85d8
https://git.kernel.org/stable/c/f15370e315976198f338b41611f37ce82af6cf54
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
jsc#CAR-3405
rh#2278297
CVE-2024-27003kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-27003
SMASH Issue 403771
bnc#1223761
https://git.kernel.org/stable/c/2c077fdfd09dffb31a890e5095c8ab205138a42e
https://git.kernel.org/stable/c/83ada89e4a86e2b28ea2b5113c76d6dc7560a4d0
https://git.kernel.org/stable/c/9d1e795f754db1ac3344528b7af0b17b8146f321
https://git.kernel.org/stable/c/b457105309d388e4081c716cf7b81d517ff74db4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278293
CVE-2024-27005kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27005
SMASH Issue 403773
bnc#1223800
https://git.kernel.org/stable/c/4c65507121ea8e0b47fae6d2049c8688390d46b6
https://git.kernel.org/stable/c/d0d04efa2e367921654b5106cc5c05e3757c2b42
https://git.kernel.org/stable/c/de1bf25b6d771abdb52d43546cf57ad775fb68a1
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278289
CVE-2024-27006kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27006
SMASH Issue 403774
bnc#1223801
https://git.kernel.org/stable/c/9c8215d32e730b597c809a9d2090bf8ec1b79fcf
https://git.kernel.org/stable/c/b552f63cd43735048bbe9bfbb7a9dcfce166fbdd
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278287
CVE-2024-27007kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27007
SMASH Issue 403775
bnc#1223710
https://git.kernel.org/stable/c/c0205eaf3af9f5db14d4b5ee4abacf4a583c3c50
https://git.kernel.org/stable/c/df5f6e683e7f21a15d8be6e7a0c7a46436963ebe
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278285
CVE-2024-27009kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27009
SMASH Issue 403777
bnc#1223699
https://git.kernel.org/stable/c/2d8527f2f911fab84aec04df4788c0c23af3df48
https://git.kernel.org/stable/c/2df56f4ea769ff81e51bbb05699989603bde9c49
https://git.kernel.org/stable/c/3076b3c38a704e10df5e143c213653309d532538
https://git.kernel.org/stable/c/559f3a6333397ab6cd4a696edd65a70b6be62c6e
https://git.kernel.org/stable/c/a4234decd0fe429832ca81c4637be7248b88b49e
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278281
CVE-2024-27012kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27012
SMASH Issue 403750
bnc#1223804
https://git.kernel.org/stable/c/86658fc7414d4b9e25c2699d751034537503d637
https://git.kernel.org/stable/c/e79b47a8615d42c68aaeb68971593333667382ed
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278275
CVE-2024-27015kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27015
SMASH Issue 403783
bnc#1223806
https://git.kernel.org/stable/c/4ed82dd368ad883dc4284292937b882f044e625d
https://git.kernel.org/stable/c/6db5dc7b351b9569940cd1cf445e237c42cd6d27
https://git.kernel.org/stable/c/e3f078103421642fcd5f05c5e70777feb10f000d
https://git.kernel.org/stable/c/e719b52d0c56989b0f3475a03a6d64f182c85b56
https://git.kernel.org/stable/c/f1c3c61701a0b12f4906152c1626a5de580ea3d2
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278266
CVE-2024-27016kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27016
SMASH Issue 403784
bnc#1223807
https://git.kernel.org/stable/c/87b3593bed1868b2d9fe096c01bcdf0ea86cbebf
https://git.kernel.org/stable/c/8bf7c76a2a207ca2b4cfda0a279192adf27678d7
https://git.kernel.org/stable/c/a2471d271042ea18e8a6babc132a8716bb2f08b9
https://git.kernel.org/stable/c/cf366ee3bc1b7d1c76a882640ba3b3f8f1039163
https://git.kernel.org/stable/c/d06977b9a4109f8738bb276125eb6a0b772bc433
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278264
CVE-2024-27017kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27017
SMASH Issue 403782
bnc#1223733
https://git.kernel.org/stable/c/29b359cf6d95fd60730533f7f10464e95bd17c73
https://git.kernel.org/stable/c/721715655c72640567e8742567520c99801148ed
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278262
CVE-2024-27018kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27018
SMASH Issue 403785
bnc#1223809
https://git.kernel.org/stable/c/3f59ac29dea0921637053908fe99268d157bbb9d
https://git.kernel.org/stable/c/43193174510ea4f3ce09b796e559a2fd9f148615
https://git.kernel.org/stable/c/751de2012eafa4d46d8081056761fa0e9cc8a178
https://git.kernel.org/stable/c/b13db0d16bc7b2a52abcf5cb71334f63faa5dbd6
https://git.kernel.org/stable/c/dceb683ab87ca3666a9bb5c0158528b646faedc4
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278260
CVE-2024-27021kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27021
SMASH Issue 403787
bnc#1223730
https://git.kernel.org/stable/c/19fa4f2a85d777a8052e869c1b892a2f7556569d
https://git.kernel.org/stable/c/53d986f39acd8ea11c9e460732bfa5add66360d9
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278254
CVE-2024-27022kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27022
SMASH Issue 403788
bnc#1223774
https://git.kernel.org/stable/c/04b0c41912349aff11a1bbaef6a722bd7fbb90ac
https://git.kernel.org/stable/c/0c42f7e039aba3de6d7dbf92da708e2b2ecba557
https://git.kernel.org/stable/c/35e351780fa9d8240dd6f7e4f245f9ea37e96c19
https://git.kernel.org/stable/c/abdb88dd272bbeb93efe01d8e0b7b17e24af3a34
https://git.kernel.org/stable/c/cec11fa2eb512ebe3a459c185f4aca1d44059bbf
https://git.kernel.org/stable/c/dd782da470761077f4d1120e191f1a35787cda6e
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EZ6PJW7VOZ224TD7N4JZNU6KV32ZJ53/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DAMSOZXJEPUOXW33WZYWCVAY7Z5S7OOY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCBZZEC7L7KTWWAS2NLJK6SO3IZIL4WW/
rh#2278252
CVE-2024-27023kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27023
SMASH Issue 403814
bnc#1223776
https://git.kernel.org/stable/c/02dad157ba11064d073f5499dc33552b227d5d3a
https://git.kernel.org/stable/c/11f81438927f84edfaaeb5d5f10856c3a1c1fc82
https://git.kernel.org/stable/c/6b2ff10390b19a2364af622b6666b690443f9f3f
https://git.kernel.org/stable/c/855678ed8534518e2b428bcbcec695de9ba248e8
rh#2278488
CVE-2024-27026kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27026
SMASH Issue 403817
bnc#1223700
https://git.kernel.org/stable/c/7c8505ecc2d15473d679b8e06335434b84fffe86
https://git.kernel.org/stable/c/91d017d19d5a9ad153e2dc23ed3c0e2e79ef5262
https://git.kernel.org/stable/c/aba8659caf88017507419feea06069f529329ea6
https://git.kernel.org/stable/c/e127ce7699c1e05279ee5ee61f00893e7bfa9671
rh#2278482
CVE-2024-27027kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L)CVE-2024-27027
SMASH Issue 403818
bnc#1223787
https://git.kernel.org/stable/c/769324eb35143462542cdb15483cdaf4877bf661
https://git.kernel.org/stable/c/b27e32e9367dac024cd6f61f22655714f483fd67
https://git.kernel.org/stable/c/b446631f355ece73b13c311dd712c47381a23172
rh#2278479
CVE-2024-27028kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27028
SMASH Issue 403819
bnc#1223788
https://git.kernel.org/stable/c/1784053cf10a14c4ebd8a890bad5cfe1bee51713
https://git.kernel.org/stable/c/2342b05ec5342a519e00524a507f7a6ea6791a38
https://git.kernel.org/stable/c/55f8ea6731aa64871ee6aef7dba53ee9f9f3b2f6
https://git.kernel.org/stable/c/62b1f837b15cf3ec2835724bdf8577e47d14c753
https://git.kernel.org/stable/c/766ec94cc57492eab97cbbf1595bd516ab0cb0e4
https://git.kernel.org/stable/c/a20ad45008a7c82f1184dc6dee280096009ece55
https://git.kernel.org/stable/c/bcfcdf19698024565eff427706ebbd8df65abd11
https://git.kernel.org/stable/c/bea82355df9e1c299625405b1947fc9b26b4c6d4
https://git.kernel.org/stable/c/c10fed329c1c104f375a75ed97ea3abef0786d62
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3425
rh#2278477
CVE-2024-27029kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-27029
SMASH Issue 403820
bnc#1223789
bnc#1226184
https://git.kernel.org/stable/c/1f24b3040f2b6ffcb97151fabb3070328254d923
https://git.kernel.org/stable/c/6540ff6482c1a5a6890ae44b23d0852ba1986d9e
https://git.kernel.org/stable/c/e1e076bda4fd6378ae650f2c6ef1a4ff93c5aea5
rh#2278475
CVE-2024-27030kernel-source-rt:Ignoremoderate6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2024-27030
SMASH Issue 403821
bnc#1223790
https://git.kernel.org/stable/c/29d2550d79a8cbd31e0fbaa5c0e2a2efdc444e44
https://git.kernel.org/stable/c/4fedae8f9eafa2ac8cdaca58e315f52a7e2a8701
https://git.kernel.org/stable/c/50e60de381c342008c0956fd762e1c26408f372c
https://git.kernel.org/stable/c/766c2627acb2d9d1722cce2e24837044d52d888a
https://git.kernel.org/stable/c/772f18ded0e240cc1fa2b7020cc640e3e5c32b70
https://git.kernel.org/stable/c/94cb17e5cf3a3c484063abc0ce4b8a2b2e8c1cb2
https://git.kernel.org/stable/c/ad6759e233db6fcc131055f8e23b4eafbe81053c
https://git.kernel.org/stable/c/dc29dd00705a62c77de75b6d752259b869aac49d
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3426
rh#2278473
CVE-2024-27031kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27031
SMASH Issue 403822
bnc#1223805
https://git.kernel.org/stable/c/8a2e5977cecd3cde6a0e3e86b7b914d00240e5dc
https://git.kernel.org/stable/c/8df1678c021ffeb20ef8a203bd9413f3ed9b0e9a
https://git.kernel.org/stable/c/ad27382f8495f8ef6d2c66c413d756bfd13c0598
https://git.kernel.org/stable/c/fd5860ab6341506004219b080aea40213b299d2e
rh#2278471
CVE-2024-27032kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27032
SMASH Issue 403823
bnc#1223701
https://git.kernel.org/stable/c/21ec68234826b1b54ab980a8df6e33c74cfbee58
https://git.kernel.org/stable/c/8844b2f8a3f0c428b74672f9726f9950b1a7764c
https://git.kernel.org/stable/c/d034810d02a5af8eb74debe29877dcaf5f00fdd1
https://git.kernel.org/stable/c/f26091a981318b5b7451d61f99bc073a6af8db67
https://git.kernel.org/stable/c/fe4de493572a4263554903bf9c3afc5c196e15f0
rh#2278469
CVE-2024-27033kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27033
SMASH Issue 403824
bnc#1223702
https://git.kernel.org/stable/c/0386408036bfc8b50296d9e544ff91c4d52af2db
https://git.kernel.org/stable/c/6633cdc8b2ebefcddcfcdacfd063105e60f39a49
https://git.kernel.org/stable/c/abe98a05e7162f64759bf9111108ebcb11322dec
https://git.kernel.org/stable/c/b896e302f79678451a94769ddd9e52e954c64fbb
rh#2278467
CVE-2024-27034kernel-source-rt:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27034
SMASH Issue 403825
bnc#1223703
https://git.kernel.org/stable/c/2b1b14d9fc94b8feae20808684c8af28ec80f45b
https://git.kernel.org/stable/c/52982edfcefd475cc34af663d5c47c0cddaa5739
https://git.kernel.org/stable/c/542c8b3c774a480bfd0804291a12f6f2391b0cd1
https://git.kernel.org/stable/c/75abfd61392b1db391bde6d738a30d685b843286
https://git.kernel.org/stable/c/7d420eaaa18ec8e2bb4eeab8c65c00492ef6f416
https://git.kernel.org/stable/c/fd244524c2cf07b5f4c3fe8abd6a99225c76544b
rh#2278465
CVE-2024-27035kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27035
SMASH Issue 403826
bnc#1223704
https://git.kernel.org/stable/c/57e8b17d0522c8f4daf0c4d9969b4d7358033532
https://git.kernel.org/stable/c/82704e598d7b33c7e45526e34d3c585426319bed
https://git.kernel.org/stable/c/8a430dd49e9cb021372b0ad91e60aeef9c6ced00
https://git.kernel.org/stable/c/c3311694b9bcced233548574d414c91d39214684
https://git.kernel.org/stable/c/e54cce8137258a550b49cae45d09e024821fb28d
rh#2278462
CVE-2024-27036kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2024-27036
SMASH Issue 403827
bnc#1223810
https://git.kernel.org/stable/c/65f2ced695982ccd516196d0a9447d85dbe2eed5
https://git.kernel.org/stable/c/844b4e132f57f1333dc79feaa035075a096762e4
https://git.kernel.org/stable/c/e45deec35bf7f1f4f992a707b2d04a8c162f2240
https://git.kernel.org/stable/c/f3dc1bdb6b0b0693562c7c54a6c28bafa608ba3c
rh#2278460
CVE-2024-27039kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27039
SMASH Issue 403830
bnc#1223821
https://git.kernel.org/stable/c/2cc572e0085ebd4b662b74a0f43222bc00df9a00
https://git.kernel.org/stable/c/3f8445f1c746fda180a7f75372ed06b24e9cefe2
https://git.kernel.org/stable/c/64c6a38136b74a2f18c42199830975edd9fbc379
https://git.kernel.org/stable/c/95d1f1228c1bb54803ae57525b76db60e99b37e4
https://git.kernel.org/stable/c/d575765b1b62e8bdb00af11caa1aabeb01763d9f
https://git.kernel.org/stable/c/e0b0d1c46a2ce1e46b79d004a7270fdef872e097
rh#2278454
CVE-2024-27040kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27040
SMASH Issue 403831
bnc#1223711
https://git.kernel.org/stable/c/d0e94f4807ff0df66cf447d6b4bbb8ac830e99c3
https://git.kernel.org/stable/c/e7cadd5d3a8ffe334d0229ba9eda4290138d56e7
https://git.kernel.org/stable/c/f610c46771ef1047e46d61807aa7c69cd29e63d8
https://git.kernel.org/stable/c/f6aed043ee5d75b3d1bfc452b1a9584b63c8f76b
rh#2278452
CVE-2024-27041kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27041
SMASH Issue 403832
bnc#1223714
https://git.kernel.org/stable/c/1c62697e4086de988b31124fb8c79c244ea05f2b
https://git.kernel.org/stable/c/2a3cfb9a24a28da9cc13d2c525a76548865e182c
https://git.kernel.org/stable/c/ca2eb375db76fd50f31afdd67d6ca4f833254957
https://git.kernel.org/stable/c/e040f1fbe9abae91b12b074cfc3bbb5367b79811
rh#2278450
CVE-2024-27042kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2024-27042
SMASH Issue 403833
bnc#1223823
https://git.kernel.org/stable/c/8db10cee51e3e11a6658742465edc21986cf1e8d
https://git.kernel.org/stable/c/8f3e68c6a3fff53c2240762a47a0045d89371775
https://git.kernel.org/stable/c/b33d4af102b9c1f7a83d3f0ad3cab7d2bab8f058
https://git.kernel.org/stable/c/cdb637d339572398821204a1142d8d615668f1e9
rh#2278447
CVE-2024-27044kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27044
SMASH Issue 403835
bnc#1223723
https://git.kernel.org/stable/c/14613d52bc7fc180df6d2c65ba65fc921fc1dda7
https://git.kernel.org/stable/c/29fde8895b2fcc33f44aea28c644ce2d9b62f9e0
https://git.kernel.org/stable/c/2d9fe7787af01188dc470a649bdbb842d6511fd7
https://git.kernel.org/stable/c/330caa061af53ea6d287d7c43d0703714e510e08
https://git.kernel.org/stable/c/6ac7c7a3a9ab57aba0fe78ecb922d2b20e16efeb
https://git.kernel.org/stable/c/7874ab3105ca4657102fee1cc14b0af70883c484
https://git.kernel.org/stable/c/9ccfe80d022df7c595f1925afb31de2232900656
https://git.kernel.org/stable/c/e019d87e02f1e539ae48b99187f253847744ca7a
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2278442
CVE-2024-27045kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2024-27045
SMASH Issue 403836
bnc#1223826
https://git.kernel.org/stable/c/440f059837418fac1695b65d3ebc6080d33be877
https://git.kernel.org/stable/c/4b09715f1504f1b6e8dff0e9643630610bc05141
https://git.kernel.org/stable/c/ad76fd30557d6a106c481e4606a981221ca525f7
https://git.kernel.org/stable/c/cf114d8d4a8d78df272116a745bb43b48cef65f4
https://git.kernel.org/stable/c/d346b3e5b25c95d504478507eb867cd3818775ab
https://git.kernel.org/stable/c/eb9327af3621d26b1d83f767c97a3fe8191a3a65
https://git.kernel.org/stable/c/ff28893c96c5e0927a4da10cd24a3522ca663515
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2278440
CVE-2024-27047kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27047
SMASH Issue 403838
bnc#1223828
https://git.kernel.org/stable/c/0307cf443308ecc6be9b2ca312bb31bae5e5a7ad
https://git.kernel.org/stable/c/06dd21045a7e8bc8701b0ebedcd9a30a6325878b
https://git.kernel.org/stable/c/0e939a002c8a7d66e60bd0ea6b281fb39d713c1a
https://git.kernel.org/stable/c/2a2ff709511617de9c6c072eeee82bcbbdfecaf8
https://git.kernel.org/stable/c/4469c0c5b14a0919f5965c7ceac96b523eb57b79
https://git.kernel.org/stable/c/589ec16174dd9378953b8232ae76fad0a96e1563
https://git.kernel.org/stable/c/c0691de7df1d51482a52cac93b7fe82fd9dd296b
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2278433
CVE-2024-27048kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27048
SMASH Issue 403839
bnc#1223760
https://git.kernel.org/stable/c/6138a82f3bccfc67ed7ac059493579fc326c02e5
https://git.kernel.org/stable/c/9975908315c13bae2f2ed5ba92870fa935180b0e
https://git.kernel.org/stable/c/b4152222e04cb8afeeca239c90e3fcaf4c553b42
https://git.kernel.org/stable/c/df62e22c2e27420e8990a4f09e30d7bf56c2036f
rh#2278431
CVE-2024-27049kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-27049
SMASH Issue 403840
bnc#1223763
https://git.kernel.org/stable/c/6d9930096e1f13cf6d9aabfbf95d0e05fb04144f
https://git.kernel.org/stable/c/84470b48af03a818039d587478b415cbcb264ff5
https://git.kernel.org/stable/c/a5a5f4413d91f395cb2d89829d376d7393ad48b9
rh#2278429
CVE-2024-27052kernel-source-rt:Not affectedmoderate6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2024-27052
SMASH Issue 403843
bnc#1223829
https://git.kernel.org/stable/c/1213acb478a7181cd73eeaf00db430f1e45b1361
https://git.kernel.org/stable/c/156012667b85ca7305cb363790d3ae8519a6f41e
https://git.kernel.org/stable/c/3518cea837de4d106efa84ddac18a07b6de1384e
https://git.kernel.org/stable/c/58fe3bbddfec10c6b216096d8c0e517cd8463e3a
https://git.kernel.org/stable/c/7059cdb69f8e1a2707dd1e2f363348b507ed7707
https://git.kernel.org/stable/c/ac512507ac89c01ed6cd4ca53032f52cdb23ea59
https://git.kernel.org/stable/c/dddedfa3b29a63c2ca4336663806a6128b8545b4
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2278417
CVE-2024-27055kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27055
SMASH Issue 403846
bnc#1223811
https://git.kernel.org/stable/c/15930da42f8981dc42c19038042947b475b19f47
https://git.kernel.org/stable/c/38c19c44cc05ec1e84d2e31a9a289b83b6c7ec85
https://git.kernel.org/stable/c/7df62b8cca38aa452b508b477b16544cba615084
https://git.kernel.org/stable/c/9fc557d489f8163c1aabcb89114b8eba960f4097
https://git.kernel.org/stable/c/a75ac2693d734d20724f0e10e039ca85f1fcfc4e
https://git.kernel.org/stable/c/adc646d2126988a64234502f579e4bc2b080d7cf
rh#2278411
CVE-2024-27057kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27057
SMASH Issue 403848
bnc#1223831
https://git.kernel.org/stable/c/3cac6eebea9b4bc5f041e157e45c76e212ad6759
https://git.kernel.org/stable/c/c40aad7c81e5fba34b70123ed7ce3397fa62a4d2
https://git.kernel.org/stable/c/d153e8b154f9746ac969c85a4e6474760453647c
rh#2278406
CVE-2024-27058kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27058
SMASH Issue 403849
bnc#1223708
https://git.kernel.org/stable/c/0a69b6b3a026543bc215ccc866d0aea5579e6ce2
https://git.kernel.org/stable/c/617d55b90e73c7b4aa2733ca6cc3f9b72d1124bb
https://git.kernel.org/stable/c/c7077f43f30d817d10a9f8245e51576ac114b2f0
https://git.kernel.org/stable/c/f82f184874d2761ebaa60dccf577921a0dbb3810
rh#2278404
CVE-2024-27060kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27060
SMASH Issue 403851
bnc#1223725
https://git.kernel.org/stable/c/ce64ba1f6ec3439e4b4d880b4db99673f4507228
https://git.kernel.org/stable/c/d3d17e23d1a0d1f959b4fa55b35f1802d9c584fa
rh#2278393
CVE-2024-27061kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2024-27061
SMASH Issue 403852
bnc#1223833
https://git.kernel.org/stable/c/183420038444547c149a0fc5f58e792c2752860c
https://git.kernel.org/stable/c/51a7d338c212e0640b1aca52ba6590d5bea49879
https://git.kernel.org/stable/c/dc60b25540c82fc4baa95d1458ae96ead21859e0
rh#2278391
CVE-2024-27063kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27063
SMASH Issue 403854
bnc#1223835
https://git.kernel.org/stable/c/10f2af1af8ab8a7064f193446abd5579d3def7e3
https://git.kernel.org/stable/c/3f360227cb46edb2cd2494128e1e06ed5768a62e
https://git.kernel.org/stable/c/415798bc07dd1c1ae3a656aa026580816e0b9fe8
https://git.kernel.org/stable/c/acd025c7a7d151261533016a6ca2d38f2de04e87
rh#2278385
CVE-2024-27064kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27064
SMASH Issue 403855
bnc#1223740
https://git.kernel.org/stable/c/4e4623a4f6e133e671f65f9ac493bddaaf63e250
https://git.kernel.org/stable/c/79846fdcc548d617b0b321addc6a3821d3b75b20
https://git.kernel.org/stable/c/7eaf837a4eb5f74561e2486972e7f5184b613f6e
https://git.kernel.org/stable/c/e77a6b53a3a547b6dedfc40c37cee4f310701090
rh#2278382
CVE-2024-27065kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27065
SMASH Issue 403856
bnc#1223836
https://git.kernel.org/stable/c/2531f907d3e40a6173090f10670ae76d117ab27b
https://git.kernel.org/stable/c/3443e57654f90c9a843ab6a6040c10709fd033aa
https://git.kernel.org/stable/c/4a0e7f2decbf9bd72461226f1f5f7dcc4b08f139
https://git.kernel.org/stable/c/4d37f12707ee965d338028732575f0b85f6d9e4f
https://git.kernel.org/stable/c/640dbf688ba955e83e03de84fbdda8e570b7cce4
https://git.kernel.org/stable/c/845083249d6a392f3a88804e1669bdb936ee129f
https://git.kernel.org/stable/c/9683cb6c2c6c0f45537bf0b8868b5d38fcb63fc7
https://git.kernel.org/stable/c/df257c435e51651c43b86326d112ddadda76350e
https://git.kernel.org/stable/c/fcf32a5bfcb8a57ac0ce717fcfa4d688c91f1005
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2278380
CVE-2024-27066kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27066
SMASH Issue 403857
bnc#1223817
https://git.kernel.org/stable/c/51bacd9d29bf98c3ebc65e4a0477bb86306b4140
https://git.kernel.org/stable/c/75450ff8c6fe8755bf5b139b238eaf9739cfd64e
https://git.kernel.org/stable/c/d5c0ed17fea60cca9bc3bf1278b49ba79242bbcd
https://git.kernel.org/stable/c/e142169aca5546ae6619c39a575cda8105362100
rh#2278378
CVE-2024-27067kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27067
SMASH Issue 403858
bnc#1223739
https://git.kernel.org/stable/c/35485dad6e28f9b17884764d4692b1655cb848d0
https://git.kernel.org/stable/c/51c23bd691c0f1fb95b29731c356c6fd69925d17
https://git.kernel.org/stable/c/99e425032c6ec13584d3cd33846e0c7307501b47
https://git.kernel.org/stable/c/9e2d4b58c1da48a32905802aaeadba7084b46895
rh#2278376
CVE-2024-27068kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27068
SMASH Issue 403859
bnc#1223808
https://git.kernel.org/stable/c/2db869da91afd48e5b9ec76814709be49662b07d
https://git.kernel.org/stable/c/9b02197596671800dd934609384b1aca7c6ad218
https://git.kernel.org/stable/c/a37f3652bee468f879d35fe2da9ede3f1dcbb7be
https://git.kernel.org/stable/c/ca93bf607a44c1f009283dac4af7df0d9ae5e357
rh#2278374
CVE-2024-27069kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27069
SMASH Issue 403860
bnc#1223818
https://git.kernel.org/stable/c/77a28aa476873048024ad56daf8f4f17d58ee48e
https://git.kernel.org/stable/c/c3c85aefc0da1e5074a06c682542a54ccc99bdca
rh#2278513
CVE-2024-27070kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27070
SMASH Issue 403861
bnc#1223706
https://git.kernel.org/stable/c/8186e16a766d709a08f188d2f4e84098f364bea1
https://git.kernel.org/stable/c/eb70d5a6c932d9d23f4bb3e7b83782c21ac4b064
rh#2278511
CVE-2024-27071kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27071
SMASH Issue 403862
bnc#1223734
https://git.kernel.org/stable/c/67e578c8ff2d7df03bf8ca9a7f5436b1796f6ad1
https://git.kernel.org/stable/c/b1ba8bcb2d1ffce11b308ce166c9cc28d989e3b9
rh#2278509
CVE-2024-27076kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27076
SMASH Issue 403867
bnc#1223779
https://git.kernel.org/stable/c/42492b00156c03a79fd4851190aa63045d6a15ce
https://git.kernel.org/stable/c/4797a3dd46f220e6d83daf54d70c5b33db6deb01
https://git.kernel.org/stable/c/5d9fe604bf9b5b09d2215225df55f22a4cbbc684
https://git.kernel.org/stable/c/6c92224721a439d6350db5933a1060768dcd565e
https://git.kernel.org/stable/c/8c2e4efe1278cd2b230cdbf90a6cefbf00acc282
https://git.kernel.org/stable/c/8df9a3c7044b847e9c4dc7e683fd64c6b873f328
https://git.kernel.org/stable/c/b1d0eebaf87cc9ccd05f779ec4a0589f95d6c18b
https://git.kernel.org/stable/c/d164ddc21e986dd9ad614b4b01746e5457aeb24f
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2278498
CVE-2024-27079kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27079
SMASH Issue 403870
bnc#1223742
https://git.kernel.org/stable/c/333fe86968482ca701c609af590003bcea450e8f
https://git.kernel.org/stable/c/81e921fd321614c2ad8ac333b041aae1da7a1c6d
rh#2278492
CVE-2024-27080kernel-source-rt:Not affectedmoderate6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2024-27080
SMASH Issue 403871
bnc#1223782
https://git.kernel.org/stable/c/49d640d2946c35a17b051d54171a032dd95b0f50
https://git.kernel.org/stable/c/978b63f7464abcfd364a6c95f734282c50f3decf
https://git.kernel.org/stable/c/ced63fffd63072c0ca55d5a451010d71bf08c0b3
rh#2278490
CVE-2024-27389kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27389
SMASH Issue 403873
bnc#1223705
https://git.kernel.org/stable/c/340682ed1932b8e3bd0bfc6c31a0c6354eb57cc6
https://git.kernel.org/stable/c/4cdf9006fc095af71da80e9b5f48a32e991b9ed3
https://git.kernel.org/stable/c/a43e0fc5e9134a46515de2f2f8d4100b74e50de3
https://git.kernel.org/stable/c/cb9e802e49c24eeb3af35e9e8c04d526f35f112a
https://git.kernel.org/stable/c/db6e5e16f1ee9e3b01d2f71c7f0ba945f4bf0f4e
rh#2278532
CVE-2024-27390kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-27390
SMASH Issue 403874
bnc#1223707
https://git.kernel.org/stable/c/17ef8efc00b34918b966388b2af0993811895a8c
https://git.kernel.org/stable/c/26d4bac55750d535f1f0b8790dc26daf6089e373
https://git.kernel.org/stable/c/5da9a218340a2bc804dc4327e5804392e24a0b88
https://git.kernel.org/stable/c/7eb06ee5921189812e6b4bfe7b0f1e878be16df7
https://git.kernel.org/stable/c/9d159d6637ccce25f879d662a480541ef4ba3a50
https://git.kernel.org/stable/c/a03ede2282ebbd181bd6f5c38cbfcb5765afcd04
rh#2278530
CVE-2024-27391kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27391
SMASH Issue 403875
bnc#1223709
https://git.kernel.org/stable/c/328efda22af81130c2ad981c110518cb29ff2f1d
https://git.kernel.org/stable/c/4041c60a9d543b3ad50225385b072ba68e96166e
https://git.kernel.org/stable/c/515cc676dfbce40d93c92b1ff3c1070e917f4e52
https://git.kernel.org/stable/c/90ae293d1d255f622318fce6eeea2e18f9fde5c1
https://git.kernel.org/stable/c/9ab0c303ccabfd6bdce14432792d41090070008c
rh#2278528
CVE-2024-27392kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-27392
SMASH Issue 403876
bnc#1223713
https://git.kernel.org/stable/c/534f9dc7fe495b3f9cc84363898ac50c5a25fccb
https://git.kernel.org/stable/c/8d0d2447394b13fb22a069f0330f9c49b7fff9d3
rh#2278526
CVE-2024-27393kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27393
OSS:2024/05/08/4
OSS:2024/Q2/226
SMASH Issue 404867
bnc#1224076
http://xenbits.xen.org/xsa/advisory-457.html
https://git.kernel.org/stable/c/037965402a010898d34f4e35327d22c0a95cd51f
https://git.kernel.org/stable/c/27aa3e4b3088426b7e34584274ad45b5afaf7629
https://git.kernel.org/stable/c/4143b9479caa29bb2380f3620dcbe16ea84eb3b1
https://git.kernel.org/stable/c/7c1250796b6c262b505a46192f4716b8c6a6a8c6
https://git.kernel.org/stable/c/c8b7b2f158d9d4fb89cd2f68244af154f7549bb4
rh#2280745
CVE-2024-27394kernel-source-rt:Not affectedmoderate ()CVE-2024-27394
SMASH Issue 404883
bnc#1224097
https://git.kernel.org/stable/c/80e679b352c3ce5158f3f778cfb77eb767e586fb
https://git.kernel.org/stable/c/ca4fb6c6764b3f75b4f5aa81db1536291897ff7f
rh#2280442
CVE-2024-27395kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27395
SMASH Issue 404882
bnc#1224098
https://git.kernel.org/stable/c/2db9a8c0a01fa1c762c1e61a13c212c492752994
https://git.kernel.org/stable/c/35880c3fa6f8fe281a19975d2992644588ca33d3
https://git.kernel.org/stable/c/589523cf0b384164e445dd5db8d5b1bf97982424
https://git.kernel.org/stable/c/5ea7b72d4fac2fdbc0425cd8f2ea33abe95235b2
https://git.kernel.org/stable/c/9048616553c65e750d43846f225843ed745ec0d4
https://git.kernel.org/stable/c/bca6fa2d9a9f560e6b89fd5190b05cc2f5d422c1
https://git.kernel.org/stable/c/eaa5e164a2110d2fb9e16c8a29e4501882235137
https://git.kernel.org/stable/c/edee0758747d7c219e29db9ed1d4eb33e8d32865
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2280440
CVE-2024-27396kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27396
SMASH Issue 404879
bnc#1224096
https://git.kernel.org/stable/c/07b20d0a3dc13fb1adff10b60021a4924498da58
https://git.kernel.org/stable/c/0caff3e6390f840666b8dc1ecebf985c2ef3f1dd
https://git.kernel.org/stable/c/25a1c2d4b1fcf938356a9688a96a6456abd44b29
https://git.kernel.org/stable/c/2aacd4de45477582993f8a8abb9505a06426bfb6
https://git.kernel.org/stable/c/2e74b3fd6bf542349758f283676dff3660327c07
https://git.kernel.org/stable/c/718df1bc226c383dd803397d7f5d95557eb81ac7
https://git.kernel.org/stable/c/cd957d1716ec979d8f5bf38fc659aeb9fdaa2474
https://git.kernel.org/stable/c/f2a904107ee2b647bb7794a1a82b67740d7c8a64
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2280437
CVE-2024-27397kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27397
SMASH Issue 404880
bnc#1224095
https://git.kernel.org/stable/c/383182db8d58c4237772ba0764cded4938a235c3
https://git.kernel.org/stable/c/7395dfacfff65e9938ac0889dafa1ab01e987d15
rh#2280434
CVE-2024-27400kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27400
SMASH Issue 404987
bnc#1224180
https://git.kernel.org/stable/c/0c7ed3ed35eec9138b88d42217b5a6b9a62bda4d
https://git.kernel.org/stable/c/5c25b169f9a0b34ee410891a96bc9d7b9ed6f9be
https://git.kernel.org/stable/c/9a4f6e138720b6e9adf7b82a71d0292f3f276480
https://git.kernel.org/stable/c/d3a9331a6591e9df64791e076f6591f440af51c3
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/
rh#2280460
CVE-2024-27401kernel-source-rt:Ignoremoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2024-27401
SMASH Issue 404985
bnc#1224181
https://git.kernel.org/stable/c/1fe60ee709436550f8cfbab01295936b868d5baa
https://git.kernel.org/stable/c/38762a0763c10c24a4915feee722d7aa6e73eb98
https://git.kernel.org/stable/c/4ee0941da10e8fdcdb34756b877efd3282594c1f
https://git.kernel.org/stable/c/539d51ac48bcfcfa1b3d4a85f8df92fa22c1d41c
https://git.kernel.org/stable/c/67f34f093c0f7bf33f5b4ae64d3d695a3b978285
https://git.kernel.org/stable/c/79f988d3ffc1aa778fc5181bdfab312e57956c6b
https://git.kernel.org/stable/c/7b8c7bd2296e95b38a6ff346242356a2e7190239
https://git.kernel.org/stable/c/cca330c59c54207567a648357835f59df9a286bb
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/
jsc#CAR-3454
rh#2280407
CVE-2024-27404kernel-source-rt:Not affectedmoderate5.8 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2024-27404
SMASH Issue 406298
bnc#1224422
https://git.kernel.org/stable/c/2dba5774e8ed326a78ad4339d921a4291281ea6e
https://git.kernel.org/stable/c/967d3c27127e71a10ff5c083583a038606431b61
https://git.kernel.org/stable/c/987c3ed7297e5661bc7f448f06fc366e497ac9b2
https://git.kernel.org/stable/c/e64148635509bf13eea851986f5a0b150e5bd066
rh#2281125
CVE-2024-27405kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-27405
SMASH Issue 406314
bnc#1224423
https://git.kernel.org/stable/c/059285e04ebb273d32323fbad5431c5b94f77e48
https://git.kernel.org/stable/c/2b7ec68869d50ea998908af43b643bca7e54577e
https://git.kernel.org/stable/c/2cb66b62a5d64ccf09b0591ab86fb085fa491fc5
https://git.kernel.org/stable/c/35b604a37ec70d68b19dafd10bbacf1db505c9ca
https://git.kernel.org/stable/c/57ca0e16f393bb21d69734e536e383a3a4c665fd
https://git.kernel.org/stable/c/76c51146820c5dac629f21deafab0a7039bc3ccd
https://git.kernel.org/stable/c/a31cf46d108dabce3df80b3e5c07661e24912151
https://git.kernel.org/stable/c/c7f43900bc723203d7554d299a2ce844054fab8e
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3462
rh#2281123
CVE-2024-27406kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27406
SMASH Issue 406302
bnc#1224425
https://git.kernel.org/stable/c/1eb1e984379e2da04361763f66eec90dd75cf63e
https://git.kernel.org/stable/c/9e6e541b97762d5b1143070067f7c68f39a408f8
https://git.kernel.org/stable/c/e6316749d603fe9c4c91f6ec3694e06e4de632a3
rh#2281121
CVE-2024-27407kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27407
SMASH Issue 406299
bnc#1224429
https://git.kernel.org/stable/c/1c0a95d99b1b2b5d842e5abc7ef7eed1193b60d7
https://git.kernel.org/stable/c/652cfeb43d6b9aba5c7c4902bed7a7340df131fb
https://git.kernel.org/stable/c/8c77398c72618101d66480b94b34fe9087ee3d08
rh#2281119
CVE-2024-27408kernel-source-rt:Not affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N)CVE-2024-27408
SMASH Issue 406300
bnc#1224430
https://git.kernel.org/stable/c/bbcc1c83f343e580c3aa1f2a8593343bf7b55bba
https://git.kernel.org/stable/c/d24fe6d5a1cfdddb7a9ef56736ec501c4d0a5fd3
https://git.kernel.org/stable/c/f396b4df27cfe01a99f4b41f584c49e56477be3a
jsc#CAR-3463
rh#2281117
CVE-2024-27409kernel-source-rt:Not affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N)CVE-2024-27409
SMASH Issue 406305
bnc#1224431
https://git.kernel.org/stable/c/17be6f5cb223f22e4733ed8fe8b2247cbb677716
https://git.kernel.org/stable/c/227ef58a9b0c372efba422e8886a8015a1509eba
https://git.kernel.org/stable/c/712a92a48158e02155b4b6b21e03a817f78c9b7e
rh#2281115
CVE-2024-27411kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27411
SMASH Issue 406297
bnc#1224433
https://git.kernel.org/stable/c/be00e15b240ed71fc30c0576af7ab670c8271661
https://git.kernel.org/stable/c/f6ecfdad359a01c7fd8a3bcfde3ef0acdf107e6e
rh#2281111
CVE-2024-27412kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27412
SMASH Issue 406330
bnc#1224437
https://git.kernel.org/stable/c/083686474e7c97b0f8b66df37fcb64e432e8b771
https://git.kernel.org/stable/c/2df70149e73e79783bcbc7db4fa51ecef0e2022c
https://git.kernel.org/stable/c/7394abc8926adee6a817bab10797e0adc898af77
https://git.kernel.org/stable/c/cefe18e9ec84f8fe3e198ccebb815cc996eb9797
https://git.kernel.org/stable/c/d4d813c0a14d6bf52d810a55db06a2e7e3d98eaa
https://git.kernel.org/stable/c/d7acc4a569f5f4513120c85ea2b9f04909b7490f
https://git.kernel.org/stable/c/e601ae81910ce6a3797876e190a2d8ef6cf828bc
https://git.kernel.org/stable/c/fbca8bae1ba79d443a58781b45e92a73a24ac8f8
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281109
CVE-2024-27414kernel-source-rt:Not affectedmoderate6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2024-27414
SMASH Issue 406295
bnc#1224439
https://git.kernel.org/stable/c/167d8642daa6a44b51de17f8ff0f584e1e762db7
https://git.kernel.org/stable/c/743ad091fb46e622f1b690385bb15e3cd3daf874
https://git.kernel.org/stable/c/831bc2728fb48a8957a824cba8c264b30dca1425
https://git.kernel.org/stable/c/882a51a10ecf24ce135d573afa0872aef02c5125
https://git.kernel.org/stable/c/a1227b27fcccc99dc44f912b479e01a17e2d7d31
https://git.kernel.org/stable/c/b9fbc44159dfc3e9a7073032752d9e03f5194a6f
https://git.kernel.org/stable/c/f2261eb994aa5757c1da046b78e3229a3ece0ad9
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281103
CVE-2024-27416kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27416
SMASH Issue 406303
bnc#1224723
https://git.kernel.org/stable/c/30a5e812f78e3d1cced90e1ed750bf027599205f
https://git.kernel.org/stable/c/79820a7e1e057120c49be07cbe10643d0706b259
https://git.kernel.org/stable/c/7e74aa53a68bf60f6019bd5d9a9a1406ec4d4865
https://git.kernel.org/stable/c/8e2758cc25891d2b76717aaf89b40ed215de188c
https://git.kernel.org/stable/c/afec8f772296dd8e5a2a6f83bbf99db1b9ca877f
https://git.kernel.org/stable/c/c3df637266df29edee85e94cab5fd7041e5753ba
https://git.kernel.org/stable/c/df193568d61234c81de7ed4d540c01975de60277
https://git.kernel.org/stable/c/fba268ac36ab19f9763ff90d276cde0ce6cd5f31
rh#2281099
CVE-2024-27418kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27418
SMASH Issue 406331
bnc#1224720
https://git.kernel.org/stable/c/3773d65ae5154ed7df404b050fd7387a36ab5ef3
https://git.kernel.org/stable/c/a3c8fa54e904b0ddb52a08cc2d8ac239054f61fd
https://git.kernel.org/stable/c/a639441c880ac479495e5ab37e3c29f21ae5771b
https://git.kernel.org/stable/c/cbebc55ceacef1fc0651e80e0103cc184552fc68
rh#2281095
CVE-2024-27419kernel-source-rt:Won't fixlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N)CVE-2024-27419
SMASH Issue 406340
bnc#1224759
https://git.kernel.org/stable/c/0866afaff19d8460308b022345ed116a12b1d0e1
https://git.kernel.org/stable/c/16d71319e29d5825ab53f263b59fdd8dc2d60ad4
https://git.kernel.org/stable/c/34cab94f7473e7b09f5205d4583fb5096cb63b5b
https://git.kernel.org/stable/c/43464808669ba9d23996f0b6d875450191687caf
https://git.kernel.org/stable/c/bbf950a6e96a91cf8cf0c71117b94ed3fafc9dd3
https://git.kernel.org/stable/c/d380ce70058a4ccddc3e5f5c2063165dc07672c6
https://git.kernel.org/stable/c/d623fd5298d95b65d27ef5a618ebf39541074856
https://git.kernel.org/stable/c/f9055fa2b2931261d5f89948ee5bc315b6a22d4a
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3566
rh#2281093
CVE-2024-27420kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-27420
SMASH Issue 406341
bnc#1224758
https://git.kernel.org/stable/c/07bbccd1adb56b39eef982b8960d59e3c005c6a1
https://git.kernel.org/stable/c/0b8eb369c182814d817b9449bc9e86bfae4310f9
https://git.kernel.org/stable/c/97a4d8b9f67cc7efe9a0c137e12f6d9e40795bf1
https://git.kernel.org/stable/c/bc76645ebdd01be9b9994dac39685a3d0f6f7985
https://git.kernel.org/stable/c/c558e54f7712b086fbcb611723272a0a4b0d451c
https://git.kernel.org/stable/c/cfe0f73fb38a01bce86fe15ef5f750f850f7d3fe
https://git.kernel.org/stable/c/cfedde3058bf976f2f292c0a236edd43afcdab57
https://git.kernel.org/stable/c/db364859ce68fb3a52d42cd87a54da3dc42dc1c8
jsc#CAR-3565
rh#2281091
CVE-2024-27421kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-27421
SMASH Issue 406342
bnc#1224761
https://git.kernel.org/stable/c/4c02b9ccbb11862ee39850b2b285664cd579b039
https://git.kernel.org/stable/c/859175d4bc11af829e2fdd261a7effdaba9b5d8f
https://git.kernel.org/stable/c/b5dffcb8f71bdd02a4e5799985b51b12f4eeaf76
https://git.kernel.org/stable/c/b7d33e083f9d5d39445c0a91e7ad4f3e2c47fcb5
https://git.kernel.org/stable/c/c13fbb5902bce848759385986d4833f5b90782c1
https://git.kernel.org/stable/c/c4309e5f8e80584715c814e1d012dbc3eee5a500
https://git.kernel.org/stable/c/d732b83251322ecd3b503e03442247745d6052ce
https://git.kernel.org/stable/c/f9c4d42464173b826190fae2283ed1a4bbae0c8b
jsc#CAR-3510
rh#2281089
CVE-2024-27422kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-27422
SMASH Issue 406343
bnc#1224760
https://git.kernel.org/stable/c/01d4e3afe257768cd2a45f15a0e57bacf932b140
https://git.kernel.org/stable/c/2309b369fae2d9cdc3c945cd3eaec84eb1958ca3
https://git.kernel.org/stable/c/498f1d6da11ed6d736d655a2db14ee2d9569eecb
https://git.kernel.org/stable/c/4eacb242e22e31385a50a393681d0fe4b55ed1e9
https://git.kernel.org/stable/c/6f254abae02abd4a0aca062c1b3812d7e2d8ea94
https://git.kernel.org/stable/c/73426c32e259c767d40613b956d5b80d0c28a9a9
https://git.kernel.org/stable/c/cbba77abb4a553c1f5afac1ba2a0861aa1f13549
https://git.kernel.org/stable/c/f99b494b40431f0ca416859f2345746199398e2b
jsc#CAR-3569
rh#2281087
CVE-2024-27423kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-27423
SMASH Issue 406344
bnc#1224762
https://git.kernel.org/stable/c/0d43a58900e5a2bfcc9de47e16c6c501c0bef853
https://git.kernel.org/stable/c/46803b776d869b0c36041828a83c4f7da2dfa03b
https://git.kernel.org/stable/c/489e05c614dbeb1a1148959f02bdb788891819e6
https://git.kernel.org/stable/c/4f2efa17c3ec5e4be0567b47439b9713c0dc6550
https://git.kernel.org/stable/c/652b0b35819610a42b8a90d21acb12f69943b397
https://git.kernel.org/stable/c/89aa78a34340e9dbc3248095f44d81d0e1c23193
https://git.kernel.org/stable/c/a2e706841488f474c06e9b33f71afc947fb3bf56
https://git.kernel.org/stable/c/db006d7edbf0b4800390ece3727a82f4ae764043
jsc#CAR-3511
rh#2281085
CVE-2024-27424kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-27424
SMASH Issue 406345
bnc#1224756
https://git.kernel.org/stable/c/0a30016e892bccabea30af218782c4b6ce0970af
https://git.kernel.org/stable/c/1f60795dcafc97c45984240d442cdc151f825977
https://git.kernel.org/stable/c/43547d8699439a67b78d6bb39015113f7aa360fd
https://git.kernel.org/stable/c/4ccad39009e7bd8a03d60a97c87b0327ae812880
https://git.kernel.org/stable/c/5ac337138272d26d6d3d4f71bc5b1a87adf8b24d
https://git.kernel.org/stable/c/7782e5e7047cae6b9255ee727c99fc73d77cf773
https://git.kernel.org/stable/c/85f34d352f4b79afd63dd13634b23dafe6b570f9
https://git.kernel.org/stable/c/f3315a6edaec12b461031eab8c98c78111a41f95
jsc#CAR-3620
rh#2281083
CVE-2024-27425kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-27425
SMASH Issue 406346
bnc#1224755
https://git.kernel.org/stable/c/33081e0f34899d5325e7c45683dd8dc9cb18b583
https://git.kernel.org/stable/c/34c84e0036a60e7e50ae50b42ed194d8daef8cc9
https://git.kernel.org/stable/c/5deaef2bf56456c71b841e0dfde1bee2fd88c4eb
https://git.kernel.org/stable/c/6133a71c75dacea12fcc85838b4455c2055b0f14
https://git.kernel.org/stable/c/7d56ffc51ebd2777ded8dca50d631ee19d97db5c
https://git.kernel.org/stable/c/80578681ea274e0a6512bb7515718c206a7b74cf
https://git.kernel.org/stable/c/806f462ba9029d41aadf8ec93f2f99c5305deada
https://git.kernel.org/stable/c/a22f9194f61ad4f2b6405c7c86bee85eac1befa5
rh#2281081
CVE-2024-27426kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-27426
SMASH Issue 406347
bnc#1224753
https://git.kernel.org/stable/c/34a164d2448264b62af82bc0af3d2c83d12d38ac
https://git.kernel.org/stable/c/42e71408e2c138be9ccce60920bd6cf094ba1e32
https://git.kernel.org/stable/c/84b8486e9cedc93875f251ba31abcf73bd586a3a
https://git.kernel.org/stable/c/d28fa5f0e6c1554e2829f73a6a276c9a49689d04
https://git.kernel.org/stable/c/e799299aafed417cc1f32adccb2a0e5268b3f6d5
https://git.kernel.org/stable/c/f716a68234242f95305dffb5c9426caa64b316b0
https://git.kernel.org/stable/c/f84f7709486d8a578ab4b7d2a556d1b1a59cfc97
https://git.kernel.org/stable/c/fa3f3ab5c399852d32a0c3cbb8c55882f7e2c61f
rh#2281079
CVE-2024-27427kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-27427
SMASH Issue 406348
bnc#1224754
https://git.kernel.org/stable/c/291d36d772f5ea5c68a263ee440f2c9eade371c9
https://git.kernel.org/stable/c/500936692ccca8617a955652d1929f079b17a201
https://git.kernel.org/stable/c/5d5c14efc987900509cec465af26608e39ac607c
https://git.kernel.org/stable/c/60a7a152abd494ed4f69098cf0f322e6bb140612
https://git.kernel.org/stable/c/7d1e00fc2af3b7c30835d643a3655b7e9ff7cb20
https://git.kernel.org/stable/c/b8006cb0a34aaf85cdd8741f4148fd9c76b351d3
https://git.kernel.org/stable/c/eadec8da4451c2c0897199691184602e4ee497d1
https://git.kernel.org/stable/c/fed835d415766a94fc0246dcebc3af4c03fe9941
rh#2281077
CVE-2024-27428kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-27428
SMASH Issue 406349
bnc#1224752
https://git.kernel.org/stable/c/119cae5ea3f9e35cdada8e572cc067f072fa825a
https://git.kernel.org/stable/c/5731369af2de21695fe7c1c91fe134fabe5b33b8
https://git.kernel.org/stable/c/775ed3549819f814a6ecef5726d2b4c23f249b77
https://git.kernel.org/stable/c/a47d68d777b41862757b7e3051f2d46d6e25f87b
https://git.kernel.org/stable/c/acc653e8a3aaab1b7103f98645f2cce7be89e3d3
https://git.kernel.org/stable/c/d1261bde59a3a087ab0c81181821e194278d9264
https://git.kernel.org/stable/c/dca1d93fe42fb9c42b66f61714fbdc55c87eb002
https://git.kernel.org/stable/c/eda02a0bed550f07a8283d3e1f25b90a38e151ed
rh#2281075
CVE-2024-27429kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27429
SMASH Issue 406350
bnc#1224746
https://git.kernel.org/stable/c/18c95d11c347a12e5c31df1325cef6b995d14ecf
https://git.kernel.org/stable/c/1e84b108f2a71daa8d04032e4d2096522376debb
https://git.kernel.org/stable/c/591192c3a9fc728a0af7b9dd50bf121220062293
https://git.kernel.org/stable/c/7e1e25891f090e24a871451c9403abac63cb45dd
https://git.kernel.org/stable/c/b3f0bc3a315cf1af03673a0163c08fe037587acd
https://git.kernel.org/stable/c/cfd9f4a740f772298308b2e6070d2c744fb5cf79
https://git.kernel.org/stable/c/e3a3718b1723253d4f068e88e81d880d71f1a1e9
https://git.kernel.org/stable/c/e439607291c082332e1e35baf8faf8552e6bcb4a
rh#2281073
CVE-2024-27430kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-27430
SMASH Issue 406351
bnc#1224750
https://git.kernel.org/stable/c/392eb88416dcbc5f1d61b9a88d79d78dc8b27652
https://git.kernel.org/stable/c/7510b08c5f5ba15983da004b021fc6154eeb4047
https://git.kernel.org/stable/c/7644df766006d4878a556e427e3ecc78c2d5606b
https://git.kernel.org/stable/c/7f615232556f3c6e3eeecef96ef2b00d0aa905bb
https://git.kernel.org/stable/c/958d6145a6d9ba9e075c921aead8753fb91c9101
https://git.kernel.org/stable/c/bbc21f134b89535d1cf110c5f2b33ac54e5839c4
https://git.kernel.org/stable/c/dec82a8fc45c6ce494c2cb31f001a2aadb132b57
https://git.kernel.org/stable/c/e041df5dc9e68adffcba5499ca28e1252bed6f4b
jsc#CAR-3586
rh#2281071
CVE-2024-27431kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27431
SMASH Issue 406352
bnc#1224718
https://git.kernel.org/stable/c/2487007aa3b9fafbd2cb14068f49791ce1d7ede5
https://git.kernel.org/stable/c/3420b3ff1ff489c177ea1cb7bd9fbbc4e9a0be95
https://git.kernel.org/stable/c/5f4e51abfbe6eb444fa91906a5cd083044278297
https://git.kernel.org/stable/c/eaa7cb836659ced2d9f814ac32aa3ec193803ed6
https://git.kernel.org/stable/c/f0363af9619c77730764f10360e36c6445c12f7b
https://git.kernel.org/stable/c/f562e4c4aab00986dde3093c4be919c3f2b85a4a
rh#2281069
CVE-2024-27432kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27432
SMASH Issue 406358
bnc#1224716
https://git.kernel.org/stable/c/09a1907433865b7c8ee6777e507f5126bdd38c0f
https://git.kernel.org/stable/c/49202a8256fc50517ef06fd5e2084c4febde6369
https://git.kernel.org/stable/c/943c14ece95eb1cf98d477462aebcbfdfd714633
https://git.kernel.org/stable/c/9fcadd125044007351905d40c405fadc2d3bb6d6
https://git.kernel.org/stable/c/ea80e3ed09ab2c2b75724faf5484721753e92c31
https://git.kernel.org/stable/c/f78807362828ad01db2a9ed005bf79501b620f27
rh#2281139
CVE-2024-27433kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27433
SMASH Issue 406359
bnc#1224711
https://git.kernel.org/stable/c/a32e88f2b20259f5fe4f8eed598bbc85dc4879ed
https://git.kernel.org/stable/c/de3340533bd68a7b3d6be1841b8eb3fa6c762fe6
https://git.kernel.org/stable/c/f3633fed984f1db106ff737a0bb52fadb2d89ac7
https://git.kernel.org/stable/c/fa761ce7a1d15cca1a306b3635f81a22b15fee5b
rh#2281137
CVE-2024-27434kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27434
SMASH Issue 406360
bnc#1224710
https://git.kernel.org/stable/c/40405cbb20eb6541c603e7b3d54ade0a7be9d715
https://git.kernel.org/stable/c/60f6d5fc84a9fd26528a24d8a267fc6a6698b628
https://git.kernel.org/stable/c/b4f1b0b3b91762edd19bf9d3b2e4c3a0740501f8
https://git.kernel.org/stable/c/e35f316bce9e5733c9826120c1838f4c447b2c4c
rh#2281133
CVE-2024-27437kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-27437
SMASH Issue 400469
bnc#1222625
https://git.kernel.org/stable/c/139dfcc4d723ab13469881200c7d80f49d776060
https://git.kernel.org/stable/c/26389925d6c2126fb777821a0a983adca7ee6351
https://git.kernel.org/stable/c/2a4a666c45107206605b7b5bc20545f8aabc4fa2
https://git.kernel.org/stable/c/3b3491ad0f80d913e7d255941d4470f4a4d9bfda
https://git.kernel.org/stable/c/561d5e1998d58b54ce2bbbb3e843b669aa0b3db5
https://git.kernel.org/stable/c/b7a2f0955ffceffadfe098b40b50307431f45438
https://git.kernel.org/stable/c/bf0bc84a20e6109ab07d5dc072067bd01eb931ec
https://git.kernel.org/stable/c/fe9a7082684eb059b925c535682e68c34d487d43
rh#2273657
CVE-2024-28757expat:Not affectedimportant7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2024-28757
L3:67843
MISC:github.com:OSS:2024/Q1/231
OSS:2024/03/15/1
OSS:2024/Q1/231
SMASH Issue 396787
bnc#1221289
https://github.com/libexpat/libexpat/issues/839
https://github.com/libexpat/libexpat/pull/842
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FPLC6WDSRDUYS7F7JWAOVOHFNOUQ43DD/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LKJ7V5F6LJCEQJXDBWGT27J7NAP3E3N7/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VK2O34GH43NTHBZBN7G5Y6YKJKPUCTBE/
https://security.netapp.com/advisory/ntap-20240322-0001/
rh#2268766
CVE-2024-3094xz:Not affectedcritical10 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)CVE-2024-3094
MISC:bugs.gentoo.org:OSS:2024/Q1/324
MISC:bugzilla.mindrot.org:OSS:2024/Q2/127
MISC:git.rootprojects.org:OSS:2024/03/30/5
MISC:github.com:OSS:2024/Q1/268
OSS:2024/03/29/10
OSS:2024/03/29/12
OSS:2024/03/29/4
OSS:2024/03/29/5
OSS:2024/03/29/8
OSS:2024/03/30/12
OSS:2024/03/30/27
OSS:2024/03/30/36
OSS:2024/03/30/5
OSS:2024/04/16/5
OSS:2024/Q1/268
OSS:2024/Q1/276
OSS:2024/Q1/309
OSS:2024/Q1/324
OSS:2024/Q2/127
SMASH Issue 399441
SMASH Issue 399690
bdo#1068024
bnc#1222124
https://access.redhat.com/security/cve/CVE-2024-3094
https://ariadne.space/2024/04/02/the-xz-utils-backdoor-is-a-symptom-of-a-larger-problem/
https://arstechnica.com/security/2024/03/backdoor-found-in-widely-used-linux-utility-breaks-encrypted-ssh-connections/
https://aws.amazon.com/security/security-bulletins/AWS-2024-002/
https://blog.netbsd.org/tnf/entry/statement_on_backdoor_in_xz
https://boehs.org/node/everything-i-know-about-the-xz-backdoor
https://discourse.nixos.org/t/cve-2024-3094-malicious-code-in-xz-5-6-0-and-5-6-1-tarballs/42405
https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27
https://github.com/advisories/GHSA-rxwq-x6h5-x525
https://github.com/amlweems/xzbot
https://github.com/karcherm/xz-malware
https://gynvael.coldwind.pl/?lang=en&id=782
https://lists.debian.org/debian-security-announce/2024/msg00057.html
https://lists.freebsd.org/archives/freebsd-security/2024-March/000248.html
https://lwn.net/Articles/967180/
https://news.ycombinator.com/item?id=39865810
https://news.ycombinator.com/item?id=39877267
https://news.ycombinator.com/item?id=39895344
https://openssf.org/blog/2024/03/30/xz-backdoor-cve-2024-3094/
https://research.swtch.com/xz-script
https://research.swtch.com/xz-timeline
https://security-tracker.debian.org/tracker/CVE-2024-3094
https://security.alpinelinux.org/vuln/CVE-2024-3094
https://security.archlinux.org/CVE-2024-3094
https://security.netapp.com/advisory/ntap-20240402-0001/
https://tukaani.org/xz-backdoor/
https://twitter.com/LetsDefendIO/status/1774804387417751958
https://twitter.com/debian/status/1774219194638409898
https://twitter.com/infosecb/status/1774595540233167206
https://twitter.com/infosecb/status/1774597228864139400
https://ubuntu.com/security/CVE-2024-3094
https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094
https://www.darkreading.com/vulnerabilities-threats/are-you-affected-by-the-backdoor-in-xz-utils
https://www.kali.org/blog/about-the-xz-backdoor/
https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users
https://www.tenable.com/blog/frequently-asked-questions-cve-2024-3094-supply-chain-backdoor-in-xz-utils
https://www.theregister.com/2024/03/29/malicious_backdoor_xz/
https://www.vicarius.io/vsociety/vulnerabilities/cve-2024-3094
https://xeiaso.net/notes/2024/xz-vuln/
rh#2272210
CVE-2024-31076kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-31076
SMASH Issue 411741
bnc#1226765
https://git.kernel.org/stable/c/59f86a2908380d09cdc726461c0fbb8d8579c99f
https://git.kernel.org/stable/c/6752dfcfff3ac3e16625ebd3f0ad9630900e7e76
https://git.kernel.org/stable/c/9eeda3e0071a329af1eba15f4e57dc39576bb420
https://git.kernel.org/stable/c/a40209d355afe4ed6d533507838c9e5cd70a76d8
https://git.kernel.org/stable/c/a6c11c0a5235fb144a65e0cb2ffd360ddc1f6c32
https://git.kernel.org/stable/c/e9c96d01d520498b169ce734a8ad1142bef86a30
https://git.kernel.org/stable/c/ebfb16fc057a016abb46a9720a54abf0d4f6abe1
https://git.kernel.org/stable/c/f5f4675960609d8c5ee95f027fbf6ce380f98372
rh#2293684
CVE-2024-32936kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-32936
SMASH Issue 411976
bnc#1226921
https://git.kernel.org/stable/c/80a8b92950f8ee96582dba6187e3c2deca3569ea
https://git.kernel.org/stable/c/ad79c9ecea5baa7b4f19677e4b1c881ed89b0c3b
rh#2294218
CVE-2024-33599glibc:Analysisimportant7.6 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2024-33599
L3:68141
SMASH Issue 403187
bnc#1223423
bnc#1223530
https://security.netapp.com/advisory/ntap-20240524-0011/
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005
rh#2277202
CVE-2024-33619kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-33619
SMASH Issue 411742
bnc#1226768
https://git.kernel.org/stable/c/4b2543f7e1e6b91cfc8dd1696e3cdf01c3ac8974
https://git.kernel.org/stable/c/6ca67a5fe1c606d1fbe24c30a9fc0bdc43a18554
https://git.kernel.org/stable/c/9dce01f386c9ce6990c0a83fa14b1c95330b037e
https://git.kernel.org/stable/c/b8938d6f570f010a1dcdbfed3e5b5d3258c2a908
rh#2293682
CVE-2024-33847kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N)CVE-2024-33847
SMASH Issue 411978
bnc#1226922
https://git.kernel.org/stable/c/29ed2b5dd521ce7c5d8466cd70bf0cc9d07afeee
https://git.kernel.org/stable/c/3ccf5210dc941a7aa0180596ac021568be4d35ec
https://git.kernel.org/stable/c/5268241b41b1c5d0acca75e9b97d4fd719251c8c
https://git.kernel.org/stable/c/8acae047215024d1ac499b3c8337ef1b952f160b
https://git.kernel.org/stable/c/9f9341064a9b5246a32a7fe56b9f80c6f7f3c62d
https://git.kernel.org/stable/c/b8962cf98595d1ec62f40f23667de830567ec8bc
rh#2294217
CVE-2024-34027kernel-source-rt:Not affectedmoderate6.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H)CVE-2024-34027
SMASH Issue 411971
bnc#1226923
https://git.kernel.org/stable/c/0a4ed2d97cb6d044196cc3e726b6699222b41019
https://git.kernel.org/stable/c/329edb7c9e3b6ca27e6ca67ab1cdda1740fb3a2b
https://git.kernel.org/stable/c/5d47d63883735718825ca2efc4fca6915469774f
https://git.kernel.org/stable/c/69136304fd144144a4828c7b7b149d0f80321ba4
https://git.kernel.org/stable/c/a6e1f7744e9b84f86a629a76024bba8468aa153b
https://git.kernel.org/stable/c/b5bac43875aa27ec032dbbb86173baae6dce6182
rh#2294216
CVE-2024-34030kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-34030
SMASH Issue 411977
bnc#1226924
https://git.kernel.org/stable/c/598e4a37a2f8da9144ba1fab04320c32169b6d0d
https://git.kernel.org/stable/c/b5f31d1470c4fdfae368feeb389768ba8d24fb34
https://git.kernel.org/stable/c/e6f7d27df5d208b50cae817a91d128fb434bb12c
rh#2294215
CVE-2024-34777kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2024-34777
SMASH Issue 411779
bnc#1226796
https://git.kernel.org/stable/c/1ff05e723f7ca30644b8ec3fb093f16312e408ad
https://git.kernel.org/stable/c/34a816d8735f3924b74be8e5bf766ade1f3bd10b
https://git.kernel.org/stable/c/35d31c8bd4722b107f5a2f5ddddce839de04b936
https://git.kernel.org/stable/c/63e7e05a48a35308aeddd7ecccb68363a5988e87
https://git.kernel.org/stable/c/c57874265a3c5206d7aece3793bb2fc9abcd7570
rh#2293642
CVE-2024-3508bzip2:Analysismoderate6.5 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-3508
SMASH Issue 400853
bnc#1223418
https://access.redhat.com/security/cve/CVE-2024-3508
rh#2274109
CVE-2024-35784kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35784
SMASH Issue 406363
bnc#1224804
https://git.kernel.org/stable/c/89bca7fe6382d61e88c67a0b0e7bce315986fb8b
https://git.kernel.org/stable/c/b0ad381fa7690244802aed119b478b4bdafc31dd
https://git.kernel.org/stable/c/ded566b4637f1b6b4c9ba74e7d0b8493e93f19cf
rh#2281067
CVE-2024-35785kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35785
SMASH Issue 406364
bnc#1224724
https://git.kernel.org/stable/c/4b12ff5edd141926d49c9ace4791adf3a4902fe7
https://git.kernel.org/stable/c/520f79c110ff712b391b3d87fcacf03c74bc56ee
https://git.kernel.org/stable/c/95915ba4b987cf2b222b0f251280228a1ff977ac
https://git.kernel.org/stable/c/bc40ded92af55760d12bec8222d4108de725dbe4
https://git.kernel.org/stable/c/bfa344afbe472a9be08f78551fa2190c1a07d7d3
https://git.kernel.org/stable/c/e5b5948c769aa1ebf962dddfb972f87d8f166f95
rh#2281065
CVE-2024-35786kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35786
SMASH Issue 406365
bnc#1224714
https://git.kernel.org/stable/c/b466416bdd6ecbde15ce987226ea633a0268fbb1
https://git.kernel.org/stable/c/c288a61a48ddb77ec097e11ab81b81027cd4e197
https://git.kernel.org/stable/c/daf8739c3322a762ce84f240f50e0c39181a41ab
rh#2281063
CVE-2024-35787kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35787
SMASH Issue 406366
bnc#1224715
https://git.kernel.org/stable/c/55e55eb65fd5e09faf5a0e49ffcdd37905aaf4da
https://git.kernel.org/stable/c/5a95815b17428ce2f56ec18da5e0d1b2a1a15240
https://git.kernel.org/stable/c/736ad6c577a367834118f57417038d45bb5e0a31
https://git.kernel.org/stable/c/ecbd8ebb51bf7e4939d83b9e6022a55cac44ef06
rh#2281061
CVE-2024-35788kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35788
SMASH Issue 406367
bnc#1224709
https://git.kernel.org/stable/c/2f10d4a51bbcd938f1f02f16c304ad1d54717b96
https://git.kernel.org/stable/c/c373f233dab44a13752daec13788e2ad3bf86410
https://git.kernel.org/stable/c/f6e163e9c3d50cd167ab9d411ed01b7718177387
rh#2281059
CVE-2024-35791kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35791
SMASH Issue 406370
bnc#1224725
https://git.kernel.org/stable/c/12f8e32a5a389a5d58afc67728c76e61beee1ad4
https://git.kernel.org/stable/c/2d13b79640b147bd77c34a5998533b2021a4122d
https://git.kernel.org/stable/c/4868c0ecdb6cfde7c70cf478c46e06bb9c7e5865
https://git.kernel.org/stable/c/5ef1d8c1ddbf696e47b226e11888eaf8d9e8e807
https://git.kernel.org/stable/c/e126b508ed2e616d679d85fca2fbe77bb48bbdd7
https://git.kernel.org/stable/c/f6d53d8a2617dd58c89171a6b9610c470ebda38a
rh#2281052
CVE-2024-35792kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35792
SMASH Issue 406371
bnc#1224713
https://git.kernel.org/stable/c/48dd260fdb728eda4a246f635d1325e82f0d3555
https://git.kernel.org/stable/c/c0afb6b88fbbc177fa322a835f874be217bffe45
https://git.kernel.org/stable/c/eb2a41a8ae8c8c4f68aef3bd94665c0cf23e04be
rh#2281050
CVE-2024-35793kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35793
SMASH Issue 406372
bnc#1224708
https://git.kernel.org/stable/c/3d08cca5fd0aabb62b7015067ab40913b33da906
https://git.kernel.org/stable/c/952c3fce297f12c7ff59380adb66b564e2bc9b64
https://git.kernel.org/stable/c/e88b5ae01901c4a655a53158397746334778a57b
rh#2281047
CVE-2024-35795kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35795
SMASH Issue 406409
bnc#1224634
https://git.kernel.org/stable/c/197f6d6987c55860f6eea1c93e4f800c59078874
https://git.kernel.org/stable/c/4687e3c6ee877ee25e57b984eca00be53b9a8db5
https://git.kernel.org/stable/c/8678b1060ae2b75feb60b87e5b75e17374e3c1c5
https://git.kernel.org/stable/c/8b03556da6e576c62664b6cd01809e4a09d53b5b
rh#2281155
CVE-2024-35796kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35796
SMASH Issue 406428
bnc#1224615
https://git.kernel.org/stable/c/3a38a829c8bc27d78552c28e582eb1d885d07d11
https://git.kernel.org/stable/c/46efbdbc95a30951c2579caf97b6df2ee2b3bef3
https://git.kernel.org/stable/c/476eed5f1c22034774902a980aa48dc4662cb39a
https://git.kernel.org/stable/c/553d294db94b5f139378022df480a9fb6c3ae39e
https://git.kernel.org/stable/c/6d9395ba7f85bdb7af0b93272e537484ecbeff48
https://git.kernel.org/stable/c/7e9edb569fd9f688d887e36db8170f6e22bafbc8
https://git.kernel.org/stable/c/92c0c29f667870f17c0b764544bdf22ce0e886a1
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281153
CVE-2024-35797kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35797
SMASH Issue 406406
bnc#1224635
https://git.kernel.org/stable/c/24a0e73d544439bb9329fbbafac44299e548a677
https://git.kernel.org/stable/c/b79f9e1ff27c994a4c452235ba09e672ec698e23
https://git.kernel.org/stable/c/d5d39c707a4cf0bcc84680178677b97aa2cb2627
https://git.kernel.org/stable/c/d962f6c583458037dc7e529659b2b02b9dd3d94b
rh#2281151
CVE-2024-35798kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35798
SMASH Issue 406469
bnc#1224503
https://git.kernel.org/stable/c/0427c8ef8bbb7f304de42ef51d69c960e165e052
https://git.kernel.org/stable/c/2885d54af2c2e1d910e20d5c8045bae40e02fbc1
https://git.kernel.org/stable/c/3a25878a3378adce5d846300c9570f15aa7f7a80
https://git.kernel.org/stable/c/ef1e68236b9153c27cb7cf29ead0c532870d4215
rh#2281241
CVE-2024-35799kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35799
SMASH Issue 406418
bnc#1224740
https://git.kernel.org/stable/c/2b17133a0a2e0e111803124dad09e803718d4a48
https://git.kernel.org/stable/c/4356a2c3f296503c8b420ae8adece053960a9f06
https://git.kernel.org/stable/c/59772327d439874095516673b4b30c48bd83ca38
https://git.kernel.org/stable/c/72d72e8fddbcd6c98e1b02d32cf6f2b04e10bd1c
rh#2281239
CVE-2024-35800kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35800
SMASH Issue 406471
bnc#1224507
https://git.kernel.org/stable/c/090d2b4515ade379cd592fbc8931344945978210
https://git.kernel.org/stable/c/62b71cd73d41ddac6b1760402bbe8c4932e23531
https://git.kernel.org/stable/c/7784135f134c13af17d9ffb39a57db8500bc60ff
https://git.kernel.org/stable/c/9114ba9987506bcfbb454f6e68558d68cb1abbde
https://git.kernel.org/stable/c/b9d103aca85f082a343b222493f3cab1219aaaf4
rh#2281237
CVE-2024-35801kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35801
SMASH Issue 406467
bnc#1224732
https://git.kernel.org/stable/c/10e4b5166df9ff7a2d5316138ca668b42d004422
https://git.kernel.org/stable/c/1acbca933313aa866e39996904c9aca4d435c4cd
https://git.kernel.org/stable/c/21c7c00dae55cb0e3810d5f9506b58f68475d41d
https://git.kernel.org/stable/c/92b0f04e937665bde5768f3fcc622dcce44413d8
https://git.kernel.org/stable/c/b61e3b7055ac6edee4be071c52f48c26472d2624
rh#2281235
CVE-2024-35802kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35802
SMASH Issue 406457
bnc#1224737
https://git.kernel.org/stable/c/0982fd6bf0b822876f2e93ec782c4c28a3f85535
https://git.kernel.org/stable/c/1c811d403afd73f04bde82b83b24c754011bd0e8
https://git.kernel.org/stable/c/66fa3fcb474b2b892fe42d455a6f7ec5aaa98fb9
https://git.kernel.org/stable/c/954a4a87814465ad61cc97c1cd3de1525baaaf07
https://git.kernel.org/stable/c/fe272b61506bb1534922ef07aa165fd3c37a6a90
jsc#CAR-3644
rh#2281232
CVE-2024-35803kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-35803
SMASH Issue 406437
bnc#1224742
bnc#1225314
https://git.kernel.org/stable/c/2149f8a56e2ed345c7a4d022a79f6b8fc53ae926
https://git.kernel.org/stable/c/725351c036452b7db5771a7bed783564bc4b99cc
https://git.kernel.org/stable/c/930775060ca348b8665f60eef14b204172d14f31
https://git.kernel.org/stable/c/cefcd4fe2e3aaf792c14c9e56dab89e3d7a65d02
https://git.kernel.org/stable/c/fba7ee7187581b5bc222003e73e2592b398bb06d
rh#2281229
CVE-2024-35804kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35804
SMASH Issue 406405
bnc#1224638
https://git.kernel.org/stable/c/225d587a073584946c05c9b7651d637bd45c0c71
https://git.kernel.org/stable/c/726374dde5d608b15b9756bd52b6fc283fda7a06
https://git.kernel.org/stable/c/910c57dfa4d113aae6571c2a8b9ae8c430975902
https://git.kernel.org/stable/c/9d1b22e573a3789ed1f32033ee709106993ba551
https://git.kernel.org/stable/c/a9bd6bb6f02bf7132c1ab192ba62bbfa52df7d66
rh#2281227
CVE-2024-35807kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35807
SMASH Issue 406464
bnc#1224735
https://git.kernel.org/stable/c/239c669edb2bffa1aa2612519b1d438ab35d6be6
https://git.kernel.org/stable/c/37b6a3ba793bbbae057f5b991970ebcc52cb3db5
https://git.kernel.org/stable/c/722d2c01b8b108f8283d1b7222209d5b2a5aa7bd
https://git.kernel.org/stable/c/75cc31c2e7193b69f5d25650bda5bb42ed92f8a1
https://git.kernel.org/stable/c/a6b3bfe176e8a5b05ec4447404e412c2a3fc92cc
https://git.kernel.org/stable/c/b461910af8ba3bed80f48c2bf852686d05c6fc5c
https://git.kernel.org/stable/c/e8e8b197317228b5089ed9e7802dadf3ccaa027a
https://git.kernel.org/stable/c/ee4e9c1976147a850f6085a13fca95bcaa00d84c
https://git.kernel.org/stable/c/fb1088d51bbaa0faec5a55d4f5818a9ab79e24df
rh#2281221
CVE-2024-35809kernel-source-rt:Ignoremoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35809
SMASH Issue 406442
bnc#1224738
https://git.kernel.org/stable/c/47d8aafcfe313511a98f165a54d0adceb34e54b1
https://git.kernel.org/stable/c/6347348c6aba52dda0b33296684cbb627bdc6970
https://git.kernel.org/stable/c/7cc94dd36e48879e76ae7a8daea4ff322b7d9674
https://git.kernel.org/stable/c/900b81caf00c89417172afe0e7e49ac4eb110f4b
https://git.kernel.org/stable/c/9a87375bb586515c0af63d5dcdcd58ec4acf20a6
https://git.kernel.org/stable/c/9d5286d4e7f68beab450deddbb6a32edd5ecf4bf
https://git.kernel.org/stable/c/bbe068b24409ef740657215605284fc7cdddd491
https://git.kernel.org/stable/c/d534198311c345e4b062c4b88bb609efb8bd91d5
https://git.kernel.org/stable/c/d86ad8c3e152349454b82f37007ff6ba45f26989
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3647
rh#2281217
CVE-2024-35810kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35810
SMASH Issue 406414
bnc#1224626
https://git.kernel.org/stable/c/104a5b2772bc7c0715ae7355ccf9d294a472765c
https://git.kernel.org/stable/c/86cb706a40b7e6b2221ee49a298a65ad9b46c02d
https://git.kernel.org/stable/c/9a9e8a7159ca09af9b1a300a6c8e8b6ff7501c76
https://git.kernel.org/stable/c/ed381800ea6d9a4c7f199235a471c0c48100f0ae
rh#2281215
CVE-2024-35811kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35811
SMASH Issue 406463
bnc#1224592
https://git.kernel.org/stable/c/0a7591e14a8da794d0b93b5d1c6254ccb23adacb
https://git.kernel.org/stable/c/0b812f706fd7090be74812101114a0e165b36744
https://git.kernel.org/stable/c/0f7352557a35ab7888bc7831411ec8a3cbe20d78
https://git.kernel.org/stable/c/190794848e2b9d15de92d502b6ac652806904f5a
https://git.kernel.org/stable/c/202c503935042272e2f9e1bb549d5f69a8681169
https://git.kernel.org/stable/c/6678a1e7d896c00030b31491690e8ddc9a90767a
https://git.kernel.org/stable/c/8c36205123dc57349b59b4f1a2301eb278cbc731
https://git.kernel.org/stable/c/8e3f03f4ef7c36091f46e7349096efb5a2cdb3a1
https://git.kernel.org/stable/c/bacb8c3ab86dcd760c15903fcee58169bc3026aa
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2248430
rh#2281213
CVE-2024-35813kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35813
SMASH Issue 406427
bnc#1224618
https://git.kernel.org/stable/c/064db53f9023a2d5877a2d12de6bc27995f6ca56
https://git.kernel.org/stable/c/2b539c88940e22494da80a93ee1c5a28bbad10f6
https://git.kernel.org/stable/c/4466677dcabe2d70de6aa3d4bd4a4fafa94a71f2
https://git.kernel.org/stable/c/7d0e8a6147550aa058fa6ade8583ad252aa61304
https://git.kernel.org/stable/c/81b8645feca08a54c7c4bf36e7b176f4983b2f28
https://git.kernel.org/stable/c/ad9cc5e9e53ab94aa0c7ac65d43be7eb208dcb55
https://git.kernel.org/stable/c/b9a7339ae403035ffe7fc37cb034b36947910f68
https://git.kernel.org/stable/c/cf55a7acd1ed38afe43bba1c8a0935b51d1dc014
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281209
CVE-2024-35814kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35814
SMASH Issue 406448
bnc#1224602
https://git.kernel.org/stable/c/04867a7a33324c9c562ee7949dbcaab7aaad1fb4
https://git.kernel.org/stable/c/3e7acd6e25ba77dde48c3b721c54c89cd6a10534
https://git.kernel.org/stable/c/777391743771040e12cc40d3d0d178f70c616491
https://git.kernel.org/stable/c/c88668aa6c1da240ea3eb4d128b7906e740d3cb8
rh#2281207
CVE-2024-35815kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35815
SMASH Issue 406393
bnc#1224685
https://git.kernel.org/stable/c/10ca82aff58434e122c7c757cf0497c335f993f3
https://git.kernel.org/stable/c/18d5fc3c16cc317bd0e5f5dabe0660df415cadb7
https://git.kernel.org/stable/c/396dbbc18963648e9d1a4edbb55cfe08fa374d50
https://git.kernel.org/stable/c/5c43d0041e3a05c6c41c318b759fff16d2384596
https://git.kernel.org/stable/c/94eb0293703ced580f05dfbe5a57da5931e9aee2
https://git.kernel.org/stable/c/961ebd120565cb60cebe21cb634fbc456022db4a
https://git.kernel.org/stable/c/a71cba07783abc76b547568b6452cd1dd9981410
https://git.kernel.org/stable/c/c01ed748847fe8b810d86efc229b9e6c7fafa01e
rh#2281206
CVE-2024-35816kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35816
SMASH Issue 406431
bnc#1224616
https://git.kernel.org/stable/c/318f6d53dd425c400e35f1a9b7af682c2c6a66d6
https://git.kernel.org/stable/c/43c70cbc2502cf2557105c662eeed6a15d082b88
https://git.kernel.org/stable/c/575801663c7dc38f826212b39e3b91a4a8661c33
rh#2281204
CVE-2024-35818kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35818
SMASH Issue 406426
bnc#1224744
https://git.kernel.org/stable/c/0b61a7dc6712b78799b3949997e8a5e94db5c4b0
https://git.kernel.org/stable/c/97cd43ba824aec764f5ea2790d0c0a318f885167
https://git.kernel.org/stable/c/9adec248bba33b1503252caf8e59d81febfc5ceb
https://git.kernel.org/stable/c/9c68ece8b2a5c5ff9b2fcaea923dd73efeb174cd
https://git.kernel.org/stable/c/d7d7c6cdea875be3b241d7d39873bb431db7154d
rh#2281200
CVE-2024-35820kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-35820
SMASH Issue 406387
bnc#1224691
https://git.kernel.org/stable/c/0ecb8919469e6d5c74eea24086b34ce1bda5aef7
https://git.kernel.org/stable/c/1a8ec63b2b6c91caec87d4e132b1f71b5df342be
https://git.kernel.org/stable/c/51a490a7f63cae0754120e7c04f4f47920bd48db
rh#2281196
CVE-2024-35822kernel-source-rt:Ignorelow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-35822
SMASH Issue 406441
bnc#1224739
https://git.kernel.org/stable/c/2a587a035214fa1b5ef598aea0b81848c5b72e5e
https://git.kernel.org/stable/c/2b002c308e184feeaeb72987bca3f1b11e5f70b8
https://git.kernel.org/stable/c/30511676eb54d480d014352bf784f02577a10252
https://git.kernel.org/stable/c/36177c2595df12225b95ce74eb1ac77b43d5a58c
https://git.kernel.org/stable/c/3e944ddc17c042945d983e006df7860687a8849a
https://git.kernel.org/stable/c/68d951880d0c52c7f13dcefb5501b69b8605ce8c
https://git.kernel.org/stable/c/99731076722eb7ed26b0c87c879da7bb71d24290
https://git.kernel.org/stable/c/df5cbb908f1687e8ab97e222a16b7890d5501acf
https://git.kernel.org/stable/c/f74c5e0b54b02706d9a862ac6cddade30ac86bcf
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
jsc#CAR-3648
rh#2281192
CVE-2024-35824kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35824
SMASH Issue 406438
bnc#1224609
https://git.kernel.org/stable/c/4154e767354140db7804207117e7238fb337b0e7
https://git.kernel.org/stable/c/997ca415384612c8df76d99d9a768e0b3f42b325
https://git.kernel.org/stable/c/ac3e0384073b2408d6cb0d972fee9fcc3776053d
https://git.kernel.org/stable/c/f6df761182fc953907b18aba5049fc2a044ecb45
rh#2281189
CVE-2024-35825kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35825
SMASH Issue 406397
bnc#1224681
https://git.kernel.org/stable/c/6b2c73111a252263807b7598682663dc33aa4b4c
https://git.kernel.org/stable/c/7664ee8bd80309b90d53488b619764f0a057f2b7
https://git.kernel.org/stable/c/92b051b87658df7649ffcdef522593f21a2b296b
https://git.kernel.org/stable/c/a0f77b5d6067285b8eca0ee3bd1e448a6258026f
https://git.kernel.org/stable/c/a766761d206e7c36d7526e0ae749949d17ca582c
https://git.kernel.org/stable/c/e2dbfea520e60d58e0c498ba41bde10452257779
https://git.kernel.org/stable/c/ef846cdbd100f7f9dc045e8bcd7fe4b3a3713c03
https://git.kernel.org/stable/c/f90ce1e04cbcc76639d6cba0fdbd820cd80b3c70
rh#2281187
CVE-2024-35826kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35826
SMASH Issue 406440
bnc#1224610
https://git.kernel.org/stable/c/242006996d15f5ca62e22f8c7de077d9c4a8f367
https://git.kernel.org/stable/c/38b43539d64b2fa020b3b9a752a986769f87f7a6
https://git.kernel.org/stable/c/7d3765550374f71248c55e6206ea1d6fd4537e65
https://git.kernel.org/stable/c/c9d3d2fbde9b8197bce88abcbe8ee8e713ffe7c2
https://git.kernel.org/stable/c/ecbd9ced84dd655a8f4cd49d2aad0e80dbf6bf35
rh#2281185
CVE-2024-35827kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35827
SMASH Issue 406447
bnc#1224606
https://git.kernel.org/stable/c/0c8c74bb59e7d77554016efc34c2d10376985e5e
https://git.kernel.org/stable/c/59a534690ecc3af72c6ab121aeac1237a4adae66
https://git.kernel.org/stable/c/868ec868616438df487b9e2baa5a99f8662cc47c
https://git.kernel.org/stable/c/8ede3db5061bb1fe28e2c9683329aafa89d2b1b4
https://git.kernel.org/stable/c/b6563ad0d599110bd5cf8f56c47d279c3ed796fe
rh#2281183
CVE-2024-35829kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35829
SMASH Issue 406378
bnc#1224707
https://git.kernel.org/stable/c/04ae3eb470e52a3c41babe85ff8cee195e4dcbea
https://git.kernel.org/stable/c/4ab14eccf5578af1dd5668a5f2d771df27683cab
https://git.kernel.org/stable/c/746606d37d662c70ae1379fc658ee9c65f06880f
https://git.kernel.org/stable/c/8e25c0ee5665e8a768b8e21445db1f86e9156eb7
https://git.kernel.org/stable/c/ec6bb037e4a35fcbb5cd7bc78242d034ed893fcd
https://git.kernel.org/stable/c/f2e80ac9344aebbff576453d5c0290b332e187ed
https://git.kernel.org/stable/c/f6d51a91b41704704e395de6839c667b0f810bbf
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281178
CVE-2024-35831kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35831
SMASH Issue 406380
bnc#1224698
https://git.kernel.org/stable/c/0b6f39c175ba5f0ef72bdb3b9d2a06ad78621d62
https://git.kernel.org/stable/c/4d376d7ad62b6a8e8dfff56b559d9d275e5b9b3a
https://git.kernel.org/stable/c/67d1189d1095d471ed7fa426c7e384a7140a5dd7
https://git.kernel.org/stable/c/712e2c8415f55a4a4ddaa98a430b87f624109f69
rh#2281173
CVE-2024-35832kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35832
SMASH Issue 406408
bnc#1224748
https://git.kernel.org/stable/c/369acf97d6fd5da620d053d0f1878ffe32eff555
https://git.kernel.org/stable/c/56590678791119b9a655202e49898edfb9307271
rh#2281171
CVE-2024-35834kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35834
SMASH Issue 406424
bnc#1224620
https://git.kernel.org/stable/c/269009893146c495f41e9572dd9319e787c2eba9
https://git.kernel.org/stable/c/7b4d93d31aade99210d41cd9d4cbd2957c98bc8c
https://git.kernel.org/stable/c/cce713664548284daf977739e7ff1cd59e84189c
rh#2281167
CVE-2024-35836kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35836
SMASH Issue 406407
bnc#1224633
https://git.kernel.org/stable/c/5050a5b9d8b4d3c6f7e376e07670e437db7ccf9c
https://git.kernel.org/stable/c/830ead5fb0c5855ce4d70ba2ed4a673b5f1e7d9b
rh#2281163
CVE-2024-35838kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35838
SMASH Issue 406432
bnc#1224613
https://git.kernel.org/stable/c/49aaeb8c539b1633b3bd7c2df131ec578aa1eae1
https://git.kernel.org/stable/c/587c5892976108674bbe61a8ff659de279318034
https://git.kernel.org/stable/c/b01a74b3ca6fd51b62c67733ba7c3280fa6c5d26
https://git.kernel.org/stable/c/e04bf59bdba0fa45d52160be676114e16be855a9
rh#2281157
CVE-2024-35840kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35840
SMASH Issue 406455
bnc#1224597
https://git.kernel.org/stable/c/413b913507326972135d2977975dbff8b7f2c453
https://git.kernel.org/stable/c/51e4cb032d49ce094605f27e45eabebc0408893c
https://git.kernel.org/stable/c/76e8de7273a22a00d27e9b8b7d4d043d6433416a
https://git.kernel.org/stable/c/ad3e8f5c3d5c53841046ef7a947c04ad45a20721
https://git.kernel.org/stable/c/be1d9d9d38da922bd4beeec5b6dd821ff5a1dfeb
rh#2281282
CVE-2024-35841kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35841
SMASH Issue 406399
bnc#1224687
https://git.kernel.org/stable/c/02e368eb1444a4af649b73cbe2edd51780511d86
https://git.kernel.org/stable/c/294e7ea85f34748f04e5f3f9dba6f6b911d31aa8
https://git.kernel.org/stable/c/dc9dfc8dc629e42f2234e3327b75324ffc752bc9
rh#2281280
CVE-2024-35842kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35842
SMASH Issue 406396
bnc#1224688
https://git.kernel.org/stable/c/b1d3db6740d0997ffc6e5a0d96ef7cbd62b35fdd
https://git.kernel.org/stable/c/cad471227a37c0c7c080bfc9ed01b53750e82afe
https://git.kernel.org/stable/c/cde6ca5872bf67744dffa875a7cb521ab007b7ef
https://git.kernel.org/stable/c/e3b3ec967a7d93b9010a5af9a2394c8b5c8f31ed
rh#2281278
CVE-2024-35843kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-35843
SMASH Issue 406382
bnc#1224751
https://git.kernel.org/stable/c/3d39238991e745c5df85785604f037f35d9d1b15
https://git.kernel.org/stable/c/def054b01a867822254e1dda13d587f5c7a99e2a
rh#2281276
CVE-2024-35844kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35844
OSS:2024/05/30/1
OSS:2024/05/30/2
OSS:2024/Q2/263
SMASH Issue 406456
bnc#1224594
https://git.kernel.org/stable/c/2f6d721e14b69d6e1251f69fa238b48e8374e25f
https://git.kernel.org/stable/c/569c198c9e2093fd29cc071856a4e548fda506bc
https://git.kernel.org/stable/c/889846dfc8ee2cf31148a44bfd2faeb2faadc685
https://git.kernel.org/stable/c/f0bf89e84c3afb79d7a3a9e4bc853ad6a3245c0a
https://git.kernel.org/stable/c/fa3ac8b1a227d9b470b87972494293348b5839ee
https://git.kernel.org/stable/c/fc0aed88afbf6f606205129a7466eebdf528e3f3
rh#2281274
CVE-2024-35845kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35845
SMASH Issue 406468
bnc#1224731
https://git.kernel.org/stable/c/71d4186d470e9cda7cd1a0921b4afda737c6f641
https://git.kernel.org/stable/c/783d413f332a3ebec916664b366c28f58147f82c
https://git.kernel.org/stable/c/96aa40761673da045a7774f874487cdb50c6a2f7
https://git.kernel.org/stable/c/c855a1a5b7e3de57e6b1b29563113d5e3bfdb89a
https://git.kernel.org/stable/c/ea1d166fae14e05d49ffb0ea9fcd4658f8d3dcea
https://git.kernel.org/stable/c/fabe2db7de32a881e437ee69db32e0de785a6209
https://git.kernel.org/stable/c/fec14d1cdd92f340b9ba2bd220abf96f9609f2a9
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281272
CVE-2024-35846kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35846
SMASH Issue 406451
bnc#1224595
https://git.kernel.org/stable/c/682886ec69d22363819a83ddddd5d66cb5c791e1
https://git.kernel.org/stable/c/b0fdabc908a7f81d12382c87ca9e46a9c2e14042
rh#2281270
CVE-2024-35850kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35850
SMASH Issue 406453
bnc#1224600
https://git.kernel.org/stable/c/67459f1a707aae6d590454de07956c2752e21ea4
https://git.kernel.org/stable/c/7ddb9de6af0f1c71147785b12fd7c8ec3f06cc86
https://git.kernel.org/stable/c/bec4d4c6fa5c6526409f582e4f31144e20c86c21
rh#2281261
CVE-2024-35851kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35851
SMASH Issue 406475
bnc#1224509
https://git.kernel.org/stable/c/52f9041deaca3fc5c40ef3b9cb943993ec7d2489
https://git.kernel.org/stable/c/6b47cdeb786c38e4174319218db3fa6d7b4bba88
https://git.kernel.org/stable/c/73e87c0a49fda31d7b589edccf4c72e924411371
https://git.kernel.org/stable/c/b64092d2f108f0cd1d7fd7e176f5fb2a67a2f189
https://git.kernel.org/stable/c/e60502b907be350c518819297b565007a94c706d
rh#2281259
CVE-2024-35856kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35856
SMASH Issue 406384
bnc#1224695
https://git.kernel.org/stable/c/18bdb386a1a30e7a3d7732a98e45e69cf6b5710d
https://git.kernel.org/stable/c/80dfef128cb9f1b1ef67c0fe8c8deb4ea7ad30c1
https://git.kernel.org/stable/c/e20093c741d8da9f6390dd45d75b779861547035
rh#2281249
CVE-2024-35857kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35857
SMASH Issue 406411
bnc#1224619
https://git.kernel.org/stable/c/23b7ee4a8d559bf38eac7ce5bb2f6ebf76f9c401
https://git.kernel.org/stable/c/3e2979bf080c40da4f7c93aff8575ab8bc62b767
https://git.kernel.org/stable/c/599c9ad5e1d43f5c12d869f5fd406ba5d8c55270
https://git.kernel.org/stable/c/c58e88d49097bd12dfcfef4f075b43f5d5830941
https://git.kernel.org/stable/c/d68dc711d84fdcf698e5d45308c3ddeede586350
rh#2281247
CVE-2024-35858kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35858
SMASH Issue 406412
bnc#1224625
https://git.kernel.org/stable/c/09040baf8779ad880e0e0d0ea10e57aa929ef3ab
https://git.kernel.org/stable/c/2389ad1990163d29cba5480d693b4c2e31cc545c
https://git.kernel.org/stable/c/9f898fc2c31fbf0ac5ecd289f528a716464cb005
rh#2281245
CVE-2024-35859kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35859
SMASH Issue 406459
bnc#1224593
https://git.kernel.org/stable/c/0e9327c67410b129bf85e5c3a5aaea518328636f
https://git.kernel.org/stable/c/9617cd6f24b294552a817f80f5225431ef67b540
rh#2281243
CVE-2024-35860kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35860
SMASH Issue 406549
bnc#1224531
https://git.kernel.org/stable/c/1a80dbcb2dbaf6e4c216e62e30fa7d3daa8001ce
https://git.kernel.org/stable/c/5d8d447777564b35f67000e7838e7ccb64d525c8
https://git.kernel.org/stable/c/876941f533e7b47fc69977fc4551c02f2d18af97
rh#2281790
CVE-2024-35861kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-35861
SMASH Issue 406550
bnc#1224766
bnc#1225312
https://git.kernel.org/stable/c/2cfff21732132e363b4cc275d63ea98f1af726c1
https://git.kernel.org/stable/c/7e8360ac8774e19b0b25f44fff84a105bb2417e4
https://git.kernel.org/stable/c/e0e50401cc3921c9eaf1b0e667db174519ea939f
https://git.kernel.org/stable/c/f9a96a7ad1e8d25dc6662bc7552e0752de74a20d
rh#2281786
CVE-2024-35867kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-35867
OSS:2024/05/29/2
OSS:2024/05/30/1
OSS:2024/05/30/2
OSS:2024/Q2/262
OSS:2024/Q2/263
SMASH Issue 406556
bnc#1224664
bnc#1225012
https://git.kernel.org/stable/c/0865ffefea197b437ba78b5dd8d8e256253efd65
https://git.kernel.org/stable/c/16b7d785775eb03929766819415055e367398f49
https://git.kernel.org/stable/c/1e12f0d5c66f07c934041621351973a116fa13c7
https://git.kernel.org/stable/c/c3cf8b74c57924c0985e49a1fdf02d3395111f39
rh#2281754
CVE-2024-35868kernel-source-rt:Analysismoderate ()CVE-2024-35868
SMASH Issue 406557
bnc#1224678
https://git.kernel.org/stable/c/5b5475ce69f02ecc1b13ea23106e5b89c690429b
https://git.kernel.org/stable/c/8fefd166fcb368c5fcf48238e3f7c8af829e0a72
https://git.kernel.org/stable/c/cf03020c56d3ed28c4942280957a007b5e9544f7
https://git.kernel.org/stable/c/d3da25c5ac84430f89875ca7485a3828150a7e0a
rh#2281745
CVE-2024-35869kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-35869
SMASH Issue 406558
bnc#1224679
bnc#1226328
https://git.kernel.org/stable/c/062a7f0ff46eb57aff526897bd2bebfdb1d3046a
https://git.kernel.org/stable/c/645f332c6b63499cc76197f9b6bffcc659ba64cc
https://git.kernel.org/stable/c/e1db9ae87b7148c021daee1fcc4bc71b2ac58a79
rh#2281742
CVE-2024-35870kernel-source-rt:Analysismoderate ()CVE-2024-35870
SMASH Issue 406559
bnc#1224672
https://git.kernel.org/stable/c/24a9799aa8efecd0eb55a75e35f9d8e6400063aa
https://git.kernel.org/stable/c/45f2beda1f1bc3d962ec07db1ccc3197c25499a5
https://git.kernel.org/stable/c/6202996a1c1887e83d0b3b0fcd86d0e5e6910ea0
rh#2281740
CVE-2024-35872kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35872
SMASH Issue 406561
bnc#1224530
https://git.kernel.org/stable/c/201e4aaf405dfd1308da54448654053004c579b5
https://git.kernel.org/stable/c/43fad1d0284de30159661d0badfc3cbaf7e6f8f8
https://git.kernel.org/stable/c/65291dcfcf8936e1b23cfd7718fdfde7cfaf7706
https://git.kernel.org/stable/c/6564b014af92b677c1f07c44d7f5b595d589cf6e
https://git.kernel.org/stable/c/9c2b4b657739ecda38e3b383354a29566955ac48
rh#2281736
CVE-2024-35873kernel-source-rt:Not affectedmoderate ()CVE-2024-35873
SMASH Issue 406562
bnc#1224529
https://git.kernel.org/stable/c/5b16d904e910183181b9d90efa957c787a8ac91b
https://git.kernel.org/stable/c/c27fa53b858b4ee6552a719aa599c250cf98a586
rh#2281734
CVE-2024-35874kernel-source-rt:Not affectedmoderate ()CVE-2024-35874
SMASH Issue 406563
bnc#1224527
https://git.kernel.org/stable/c/9678bcc6234d83759fe091c197f5017a32b468da
https://git.kernel.org/stable/c/caeb4b0a11b3393e43f7fa8e0a5a18462acc66bd
rh#2281731
CVE-2024-35875kernel-source-rt:Not affectedmoderate5.6 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N)CVE-2024-35875
SMASH Issue 406564
bnc#1224665
https://git.kernel.org/stable/c/08044b08b37528b82f70a87576c692b4e4b7716e
https://git.kernel.org/stable/c/22943e4fe4b3a2dcbadc3d38d5bf840bbdbfe374
https://git.kernel.org/stable/c/453b5f2dec276c1bb4ea078bf8c0da57ee4627e5
https://git.kernel.org/stable/c/99485c4c026f024e7cb82da84c7951dbe3deb584
rh#2281727
CVE-2024-35876kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-35876
SMASH Issue 406565
bnc#1224669
https://git.kernel.org/stable/c/20a915154ccb88da08986ab6c9fc4c1cf6259de2
https://git.kernel.org/stable/c/32223b0b60d53f49567fc501f91ca076ae96be6b
https://git.kernel.org/stable/c/3ddf944b32f88741c303f0b21459dbb3872b8bc5
https://git.kernel.org/stable/c/5a02df3e92470efd589712925b5c722e730276a0
https://git.kernel.org/stable/c/976b1b2680fb4c01aaf05a0623288d87619a6c93
https://git.kernel.org/stable/c/f5e65b782f3e07324b9a8fa3cdaee422f057c758
https://git.kernel.org/stable/c/f860595512ff5c05a29fa4d64169c3fd1186b8cf
rh#2281725
CVE-2024-35878kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35878
SMASH Issue 406567
bnc#1224671
https://git.kernel.org/stable/c/544561dc56f7e69a053c25e11e6170f48bb97898
https://git.kernel.org/stable/c/a1aa5390cc912934fee76ce80af5f940452fa987
https://git.kernel.org/stable/c/e4a449368a2ce6d57a775d0ead27fc07f5a86e5b
jsc#CAR-3646
rh#2281718
CVE-2024-35879kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35879
SMASH Issue 406568
bnc#1224524
https://git.kernel.org/stable/c/3127b2ee50c424a96eb3559fbb7b43cf0b111c7a
https://git.kernel.org/stable/c/3ee2424107546d882e1ddd75333ca9c32879908c
https://git.kernel.org/stable/c/7b6df050c45a1ea158fd50bc32a8e1447dd1e951
https://git.kernel.org/stable/c/801c8b8ec5bfb3519566dff16a5ecd48302fca82
https://git.kernel.org/stable/c/8917e7385346bd6584890ed362985c219fe6ae84
https://git.kernel.org/stable/c/ae6d76e4f06c37a623e357e79d49b17411db6f5c
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281716
CVE-2024-35880kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35880
SMASH Issue 406569
bnc#1224523
https://git.kernel.org/stable/c/561e4f9451d65fc2f7eef564e0064373e3019793
https://git.kernel.org/stable/c/5fd8e2359498043e0b5329a05f02d10a9eb91eb9
https://git.kernel.org/stable/c/65938e81df2197203bda4b9a0c477e7987218d66
rh#2281713
CVE-2024-35881kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-35881
SMASH Issue 406570
bnc#1224779
https://git.kernel.org/stable/c/0dab75b433ed2480d57ae4f8f725186a46223e42
https://git.kernel.org/stable/c/3a6a32b31a111f6e66526fb2d3cb13a876465076
https://git.kernel.org/stable/c/f341055b10bd8be55c3c995dff5f770b236b8ca9
rh#2281649
rh#2281710
CVE-2024-35882kernel-source-rt:Not affectedmoderate ()CVE-2024-35882
SMASH Issue 406571
bnc#1224522
https://git.kernel.org/stable/c/05258a0a69b3c5d2c003f818702c0a52b6fea861
https://git.kernel.org/stable/c/1ba1291172f935e6b6fe703161a948f3347400b8
https://git.kernel.org/stable/c/a2ebedf7bcd17a1194a0a18122c885eb578ee882
rh#2281708
CVE-2024-35883kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35883
SMASH Issue 406572
bnc#1224521
https://git.kernel.org/stable/c/1f886a7bfb3faf4c1021e73f045538008ce7634e
https://git.kernel.org/stable/c/4b31a226097cf8cc3c9de5e855d97757fdb2bf06
https://git.kernel.org/stable/c/95e5d9eb26705a9a76d2ef8bcba9ee2e195d653d
rh#2281706
CVE-2024-35884kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35884
SMASH Issue 406573
bnc#1224520
https://git.kernel.org/stable/c/3001e7aa43d6691db2a878b0745b854bf12ddd19
https://git.kernel.org/stable/c/3391b157780bbedf8ef9f202cbf10ee90bf6b0f8
https://git.kernel.org/stable/c/35fe0e0b5c00bef7dde74842a2564c43856fbce4
https://git.kernel.org/stable/c/3d010c8031e39f5fa1e8b13ada77e0321091011f
https://git.kernel.org/stable/c/d12245080cb259d82b34699f6cd4ec11bdb688bd
https://git.kernel.org/stable/c/d49ae15a5767d4e9ef8bbb79e42df1bfebc94670
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281704
CVE-2024-35885kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35885
SMASH Issue 406574
bnc#1224519
https://git.kernel.org/stable/c/09ba28e1cd3cf715daab1fca6e1623e22fd754a6
https://git.kernel.org/stable/c/36a1cb0371aa6f0698910ee70cb4ed3c349f4fa4
https://git.kernel.org/stable/c/63a10b530e22cc923008b5925821c26872f37971
https://git.kernel.org/stable/c/80247e0eca14ff177d565f58ecd3010f6b7910a4
https://git.kernel.org/stable/c/9783b3b0e71d704949214a8f76468f591a31f3f5
rh#2281700
CVE-2024-35889kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35889
SMASH Issue 406578
bnc#1224517
https://git.kernel.org/stable/c/b4d28f7fa4dd531cf503a4fe1ca7008960cc5832
https://git.kernel.org/stable/c/dd19e827d63ac60debf117676d1126bff884bdb8
rh#2281691
CVE-2024-35890kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35890
SMASH Issue 406579
bnc#1224516
https://git.kernel.org/stable/c/2eeab8c47c3c0276e0746bc382f405c9a236a5ad
https://git.kernel.org/stable/c/5b3b67f731296027cceb3efad881ae281213f86f
https://git.kernel.org/stable/c/d225b0ac96dc40d7e8ae2bc227eb2c56e130975f
https://git.kernel.org/stable/c/ed4cccef64c1d0d5b91e69f7a8a6697c3a865486
https://git.kernel.org/stable/c/fc126c1d51e9552eacd2d717b9ffe9262a8a4cd6
rh#2281689
CVE-2024-35891kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35891
SMASH Issue 406580
bnc#1224513
https://git.kernel.org/stable/c/10608161696c2768f53426642f78a42bcaaa53e8
https://git.kernel.org/stable/c/49767b0df276f12e3e7184601e09ee7430e252dc
https://git.kernel.org/stable/c/95c1016a2d92c4c28a9d1b6d09859c00b19c0ea4
https://git.kernel.org/stable/c/96c155943a703f0655c0c4cab540f67055960e91
rh#2281687
CVE-2024-35892kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35892
SMASH Issue 406581
bnc#1224515
https://git.kernel.org/stable/c/07696415526bee0607e495017369c7303a4792e1
https://git.kernel.org/stable/c/7eb322360b0266481e560d1807ee79e0cef5742b
https://git.kernel.org/stable/c/b7d1ce2cc7192e8a037faa3f5d3ba72c25976460
https://git.kernel.org/stable/c/c040b99461a5bfc14c2d0cbb1780fcc3a4706c7e
rh#2281684
CVE-2024-35894kernel-source-rt:Not affectedmoderate ()CVE-2024-35894
SMASH Issue 406583
bnc#1224514
https://git.kernel.org/stable/c/3ffb1ab698376f09cc33101c07c1be229389fe29
https://git.kernel.org/stable/c/fcf4692fa39e86a590c14a4af2de704e1d20a3b5
rh#2281679
CVE-2024-35895kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35895
SMASH Issue 406584
bnc#1224511
https://git.kernel.org/stable/c/668b3074aa14829e2ac2759799537a93b60fef86
https://git.kernel.org/stable/c/6af057ccdd8e7619960aca1f0428339f213b31cd
https://git.kernel.org/stable/c/a44770fed86515eedb5a7c00b787f847ebb134a5
https://git.kernel.org/stable/c/d1e73fb19a4c872d7a399ad3c66e8ca30e0875ec
https://git.kernel.org/stable/c/dd54b48db0c822ae7b520bc80751f0a0a173ef75
https://git.kernel.org/stable/c/f7990498b05ac41f7d6a190dc0418ef1d21bf058
https://git.kernel.org/stable/c/ff91059932401894e6c86341915615c5eb0eca48
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281677
CVE-2024-35896kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35896
SMASH Issue 406585
bnc#1224662
https://git.kernel.org/stable/c/0c83842df40f86e529db6842231154772c20edcc
https://git.kernel.org/stable/c/0f038242b77ddfc505bf4163d4904c1abd2e74d6
https://git.kernel.org/stable/c/18aae2cb87e5faa9c5bd865260ceadac60d5a6c5
https://git.kernel.org/stable/c/440e948cf0eff32cfe322dcbca3f2525354b159b
https://git.kernel.org/stable/c/58f2bfb789e6bd3bc24a2c9c1580f3c67aec3018
https://git.kernel.org/stable/c/81d51b9b7c95e791ba3c1a2dd77920a9d3b3f525
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281675
CVE-2024-35897kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35897
SMASH Issue 406586
bnc#1224510
https://git.kernel.org/stable/c/1bc83a019bbe268be3526406245ec28c2458a518
https://git.kernel.org/stable/c/2aeb805a1bcd5f27c8c0d1a9d4d653f16d1506f4
https://git.kernel.org/stable/c/6cbbe1ba76ee7e674a86abd43009b083a45838cb
https://git.kernel.org/stable/c/7f609f630951b624348373cef99991ce08831927
https://git.kernel.org/stable/c/9627fd0c6ea1c446741a33e67bc5709c59923827
https://git.kernel.org/stable/c/9a3b90904d8a072287480eed4c3ece4b99d64f78
https://git.kernel.org/stable/c/b58d0ac35f6d75ec1db8650a29dfd6f292c11362
https://git.kernel.org/stable/c/e75faf01e22ec7dc671640fa0e0968964fafd2fc
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281672
CVE-2024-35900kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35900
SMASH Issue 406589
bnc#1224497
https://git.kernel.org/stable/c/41bad13c0e8a5a2b47a7472cced922555372daab
https://git.kernel.org/stable/c/420132bee3d0136b7fba253a597b098fe15493a7
https://git.kernel.org/stable/c/6d12f21f8bbe23fde25b77c2bf5973c136b8bef8
https://git.kernel.org/stable/c/745cf6a843896cdac8766c74379300ed73c78830
https://git.kernel.org/stable/c/7b6fba6918714afee3e17796113ccab636255c7b
https://git.kernel.org/stable/c/8ba81dca416adf82fc5a2a23abc1a8cc02ad32fb
https://git.kernel.org/stable/c/994209ddf4f430946f6247616b2e33d179243769
https://git.kernel.org/stable/c/e95bb4cba94c018be24b11f017d1c55dd6cda31a
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281664
CVE-2024-35901kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35901
SMASH Issue 406590
bnc#1224495
https://git.kernel.org/stable/c/05cb7c41fa1a7a7b2c2a6b81bbe7c67f5c11932b
https://git.kernel.org/stable/c/c0de6ab920aafb56feab56058e46b688e694a246
https://git.kernel.org/stable/c/ca58927b00385005f488b6a9905ced7a4f719aad
rh#2281662
CVE-2024-35902kernel-source-rt:Not affectedmoderate ()CVE-2024-35902
SMASH Issue 406591
bnc#1224496
https://git.kernel.org/stable/c/62fc3357e079a07a22465b9b6ef71bb6ea75ee4b
https://git.kernel.org/stable/c/6794090c742008c53b344b35b021d4a3093dc50a
https://git.kernel.org/stable/c/92309bed3c5fbe2ccd4c45056efd42edbd06162d
https://git.kernel.org/stable/c/bcd46782e2ec3825d10c1552fcb674d491cc09f9
https://git.kernel.org/stable/c/cbaac2e5488ed54833897264a5ffb2a341a9f196
https://git.kernel.org/stable/c/cfb786b03b03c5ff38882bee38525eb9987e4d14
https://git.kernel.org/stable/c/d275de8ea7be3a453629fddae41d4156762e814c
https://git.kernel.org/stable/c/d49fac38479bfdaec52b3ea274d290c47a294029
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281660
CVE-2024-35903kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35903
SMASH Issue 406592
bnc#1224493
https://git.kernel.org/stable/c/3f9d57c771656bfd651e22edcfdb5f60e62542d4
https://git.kernel.org/stable/c/81166178cf0a0062a22b1b3b5368183d39577028
https://git.kernel.org/stable/c/9d98aa088386aee3db1b7b60b800c0fde0654a4a
rh#2281658
CVE-2024-35905kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-35905
SMASH Issue 406594
bnc#1224488
bnc#1226327
https://git.kernel.org/stable/c/203a68151e8eeb331d4a64ab78303f3a15faf103
https://git.kernel.org/stable/c/37dc1718dc0c4392dbfcb9adec22a776e745dd69
https://git.kernel.org/stable/c/3f0784b2f1eb9147973d8c43ba085c5fdf44ff69
https://git.kernel.org/stable/c/98cdac206b112bec63852e94802791e316acc2c1
https://git.kernel.org/stable/c/9970e059af471478455f9534e8c3db82f8c5496d
https://git.kernel.org/stable/c/ecc6a2101840177e57c925c102d2d29f260d37c8
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281651
CVE-2024-35906kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-35906
SMASH Issue 406595
bnc#1224780
https://git.kernel.org/stable/c/0dab75b433ed2480d57ae4f8f725186a46223e42
https://git.kernel.org/stable/c/f341055b10bd8be55c3c995dff5f770b236b8ca9
rh#2281649
CVE-2024-35907kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35907
SMASH Issue 406596
bnc#1224492
https://git.kernel.org/stable/c/24444af5ddf729376b90db0f135fa19973cb5dab
https://git.kernel.org/stable/c/867a2f598af6a645c865d1101b58c5e070c6dd9e
https://git.kernel.org/stable/c/8feb1652afe9c5d019059a55c90f70690dce0f52
https://git.kernel.org/stable/c/a583117668ddb86e98f2e11c7caa3db0e6df52a3
https://git.kernel.org/stable/c/f7442a634ac06b953fc1f7418f307b25acd4cfbc
rh#2281647
CVE-2024-35908kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35908
SMASH Issue 406597
bnc#1224490
https://git.kernel.org/stable/c/30fabe50a7ace3e9d57cf7f9288f33ea408491c8
https://git.kernel.org/stable/c/417e91e856099e9b8a42a2520e2255e6afe024be
https://git.kernel.org/stable/c/b565d294e3d5aa809566a4d819835da11997d8b3
https://git.kernel.org/stable/c/f1b7f14130d782433bc98c1e1e41ce6b4d4c3096
rh#2281645
CVE-2024-35909kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35909
SMASH Issue 406598
bnc#1224491
https://git.kernel.org/stable/c/2e22c9cb618716b8e557fe17c3d4958171288082
https://git.kernel.org/stable/c/7d5a7dd5a35876f0ecc286f3602a88887a788217
https://git.kernel.org/stable/c/b4fdb3c197e35f655b2d9b6759ce29440eacdfda
https://git.kernel.org/stable/c/beaf0e7996b79e06ccc2bdcb4442fbaeccc31200
rh#2281643
CVE-2024-35911kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35911
SMASH Issue 406600
bnc#1224486
https://git.kernel.org/stable/c/11ff8392943e08a35cb0aa19d638b02db745f170
https://git.kernel.org/stable/c/1cb7fdb1dfde1aab66780b4ba44dba6402172111
https://git.kernel.org/stable/c/e40a02f06ceb0e0b0183e0b973ac5dbf8f75edec
rh#2281639
CVE-2024-35912kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35912
SMASH Issue 406601
bnc#1224487
https://git.kernel.org/stable/c/06a093807eb7b5c5b29b6cff49f8174a4e702341
https://git.kernel.org/stable/c/28db0ae86cb91a4ab0e855cff779daead936b7d5
https://git.kernel.org/stable/c/99a75d75007421d8e08ba139e24f77395cd08f62
https://git.kernel.org/stable/c/c0a40f2f8eba07416f695ffe2011bf3f8b0b6dc8
https://git.kernel.org/stable/c/f7f0e784894dfcb265f0f9fa499103b0ca7eabde
rh#2281636
CVE-2024-35913kernel-source-rt:Not affectedmoderate ()CVE-2024-35913
SMASH Issue 406602
bnc#1224485
https://git.kernel.org/stable/c/222abd95f503e28c0404e596291fe472fe90929c
https://git.kernel.org/stable/c/bbe806c294c9c4cd1221140d96e5f367673e393a
rh#2281634
CVE-2024-35914kernel-source-rt:Already fixedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35914
SMASH Issue 406603
bnc#1224482
https://git.kernel.org/stable/c/331e125e02c08ffaecc1074af78a988a278039bd
https://git.kernel.org/stable/c/9fe6e9e7b58944037714442384075c17cfde1c56
rh#2281632
CVE-2024-35916kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35916
SMASH Issue 406605
bnc#1224480
https://git.kernel.org/stable/c/0336995512cdab0c65e99e4cdd47c4606debe14e
https://git.kernel.org/stable/c/156c226cbbdcf5f3bce7b2408a33b59fab7fae2c
https://git.kernel.org/stable/c/2295bd846765c766701e666ed2e4b35396be25e6
https://git.kernel.org/stable/c/eabf131cba1db12005a68378305f13b9090a7a6b
rh#2281628
CVE-2024-35917kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35917
SMASH Issue 406606
bnc#1224481
https://git.kernel.org/stable/c/7ded842b356d151ece8ac4985940438e6d3998bb
https://git.kernel.org/stable/c/c3062bdb859b6e2567e7f5c8cde20c0250bb130f
https://git.kernel.org/stable/c/d3d74e45a060d218fe4b0c9174f0a77517509d8e
rh#2281625
CVE-2024-35918kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35918
SMASH Issue 406608
bnc#1224478
https://git.kernel.org/stable/c/300a2b9c2b28282974ee300bb5d5025cbbb1f64c
https://git.kernel.org/stable/c/6be74b1e21f8de4c48af772c2f658b464bfe6145
https://git.kernel.org/stable/c/9c573cd313433f6c1f7236fe64b9b743500c1628
https://git.kernel.org/stable/c/dfb2ce952143de60dd756ed666901236c76cb3fa
https://git.kernel.org/stable/c/e80b4980af2688d8ff69c157ffa773dd1f1eb02c
rh#2281783
CVE-2024-35919kernel-source-rt:Not affectedmoderate ()CVE-2024-35919
SMASH Issue 406609
bnc#1224484
https://git.kernel.org/stable/c/41671f0c0182b2bae74ca7e3b0f155559e3e2fc5
https://git.kernel.org/stable/c/51c84a8aac6e3b59af2b0e92ba63cabe2e641a2d
https://git.kernel.org/stable/c/afaaf3a0f647a24a7bf6a2145d8ade37baaf75ad
rh#2281777
CVE-2024-35920kernel-source-rt:Not affectedmoderate ()CVE-2024-35920
SMASH Issue 406610
bnc#1224483
https://git.kernel.org/stable/c/0a2dc707aa42214f9c4827bd57e344e29a0841d6
https://git.kernel.org/stable/c/23aaf824121055ba81b55f75444355bd83c8eb38
https://git.kernel.org/stable/c/6467cda18c9f9b5f2f9a0aa1e2861c653e41f382
rh#2281775
CVE-2024-35921kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35921
SMASH Issue 406611
bnc#1224477
https://git.kernel.org/stable/c/521ce0ea7418298d754494fe53263c23c4c78a8e
https://git.kernel.org/stable/c/97c75ee5de060d271d80109b0c47cb6008439e5b
https://git.kernel.org/stable/c/ec25fc3c2c1e8958a51abcfed614f81446d918c4
rh#2281771
CVE-2024-35923kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-35923
SMASH Issue 406613
bnc#1224658
https://git.kernel.org/stable/c/21162ad2de7446438cbd6224b3794a375bcb24df
https://git.kernel.org/stable/c/5245a6da27ef79f8dba98dad5542ebe56d311837
https://git.kernel.org/stable/c/cb1cd176e0b431644653a7fa8691a1aaf7be98da
https://git.kernel.org/stable/c/e21e1c45e1fe2e31732f40256b49c04e76a17cee
rh#2281762
CVE-2024-35924kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2024-35924
SMASH Issue 406614
bnc#1224657
https://git.kernel.org/stable/c/0defcaa09d3b21e8387829ee3a652c43fa91e13f
https://git.kernel.org/stable/c/266f403ec47573046dee4bcebda82777ce702c40
https://git.kernel.org/stable/c/b3db266fb031fba88c423d4bb8983a73a3db6527
jsc#CAR-3519
rh#2281758
CVE-2024-35926kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2024-35926
SMASH Issue 406616
bnc#1224655
https://git.kernel.org/stable/c/262534ddc88dfea7474ed18adfecf856e4fbe054
https://git.kernel.org/stable/c/d994f7d77aaded05dc05af58a2720fd4f4b72a83
jsc#CAR-3517
rh#2281747
CVE-2024-35928kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35928
SMASH Issue 406618
bnc#1224653
https://git.kernel.org/stable/c/14ac934db851642ea8cd1bd4121c788a8899ef69
https://git.kernel.org/stable/c/aa665c3a2aca2ffe31b9645bda278e96dfc3b55c
https://git.kernel.org/stable/c/c5f9fe2c1e5023fa096189a8bfba6420aa035587
https://git.kernel.org/stable/c/eb4f139888f636614dab3bcce97ff61cefc4b3a7
rh#2281517
CVE-2024-35929kernel-source-rt:Not affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2024-35929
SMASH Issue 406619
bnc#1224656
https://git.kernel.org/stable/c/4d58c9fb45c70e62c19e8be3f3605889c47601bc
https://git.kernel.org/stable/c/927d1f4f77e4784ab3944a9df86ab14d1cd3185a
https://git.kernel.org/stable/c/dda98810b552fc6bf650f4270edeebdc2f28bd3f
jsc#CAR-3518
rh#2281514
CVE-2024-35931kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35931
SMASH Issue 406621
bnc#1224652
https://git.kernel.org/stable/c/395ca1031acf89d8ecb26127c544a71688d96f35
https://git.kernel.org/stable/c/601429cca96b4af3be44172c3b64e4228515dbe1
rh#2281523
CVE-2024-35932kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35932
SMASH Issue 406622
bnc#1224650
https://git.kernel.org/stable/c/48bfb4b03c5ff6e1fa1dc73fb915e150b0968c40
https://git.kernel.org/stable/c/5343f724c912c77541029123f47ecd3d2ea63bdd
https://git.kernel.org/stable/c/5ee0d47dcf33efd8950b347dcf4d20bab12a3fa9
https://git.kernel.org/stable/c/d6b2fe2db1d0927b2d7df5c763eba55d0e1def3c
rh#2281831
CVE-2024-35934kernel-source-rt:Not affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-35934
SMASH Issue 406624
bnc#1224641
https://git.kernel.org/stable/c/00af2aa93b76b1bade471ad0d0525d4d29ca5cc0
https://git.kernel.org/stable/c/6e920422e7104928f760fc0e12b6d65ab097a2e7
https://git.kernel.org/stable/c/a2e6bffc0388526ed10406040279a693d62b36ec
https://git.kernel.org/stable/c/b9117dc783c0ab0a3866812f70e07bf2ea071ac4
https://git.kernel.org/stable/c/bc4d1ebca11b4f194e262326bd45938e857c59d2
https://git.kernel.org/stable/c/d7ee3bf0caf599c14db0bf4af7aacd6206ef8a23
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281827
CVE-2024-35938kernel-source-rt:Not affectedlow2.5 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-35938
SMASH Issue 406628
bnc#1224643
https://git.kernel.org/stable/c/138fdeac75fb7512a7f9f1c3b236cd2e754af793
https://git.kernel.org/stable/c/1cca1bddf9ef080503c15378cecf4877f7510015
https://git.kernel.org/stable/c/6597a6687af54e2cb58371cf8f6ee4dd85c537de
https://git.kernel.org/stable/c/805a1cdde82fec00c7471a393f4bb437b2741559
https://git.kernel.org/stable/c/ae5876b3b7b2243d874e2afa099e7926122087a1
jsc#CAR-3512
rh#2281819
CVE-2024-35939kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2024-35939
SMASH Issue 406629
bnc#1224535
https://git.kernel.org/stable/c/4031b72ca747a1e6e9ae4fa729e765b43363d66a
https://git.kernel.org/stable/c/4e0cfb25d49da2e6261ad582f58ffa5b5dd8c8e9
https://git.kernel.org/stable/c/b57326c96b7bc7638aa8c44e12afa2defe0c934c
https://git.kernel.org/stable/c/b9fa16949d18e06bdf728a560f5c8af56d2bdcaf
rh#2281817
CVE-2024-35940kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-35940
SMASH Issue 406630
bnc#1224537
https://git.kernel.org/stable/c/0ff96ec22a84d80a18d7ae8ca7eb111c34ee33bb
https://git.kernel.org/stable/c/635594cca59f9d7a8e96187600c34facb8bc0682
https://git.kernel.org/stable/c/6f9f2e498eae7897ba5d3e33908917f68ff4abcc
https://git.kernel.org/stable/c/98bc7e26e14fbb26a6abf97603d59532475e97f8
https://git.kernel.org/stable/c/98e2b97acb875d65bdfc75fc408e67975cef3041
https://git.kernel.org/stable/c/ec7256887d072f98c42cdbef4dcc80ddf84c7a70
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281815
CVE-2024-35941kernel-source-rt:Ignorelow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-35941
SMASH Issue 406631
bnc#1224642
https://git.kernel.org/stable/c/1b2b26595bb09febf14c5444c873ac4ec90a5a77
https://git.kernel.org/stable/c/219eee9c0d16f1b754a8b85275854ab17df0850a
https://git.kernel.org/stable/c/8af60bb2b215f478b886f1d6d302fefa7f0b917d
https://git.kernel.org/stable/c/fff05b2b004d9a8a2416d08647f3dc9068e357c8
jsc#CAR-3528
rh#2281813
CVE-2024-35942kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-35942
SMASH Issue 406632
bnc#1224589
https://git.kernel.org/stable/c/697624ee8ad557ab5417f985d2c804241a7ad30d
https://git.kernel.org/stable/c/9d3f959b426635c4da50dfc7b1306afd84d23e7c
https://git.kernel.org/stable/c/b13c0d871cd878ff53d25507ca535f59ed1f6a2a
rh#2281811
CVE-2024-35943kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35943
SMASH Issue 406633
bnc#1224649
https://git.kernel.org/stable/c/04f23510daa40f9010fadf309507564a34ad956f
https://git.kernel.org/stable/c/5d7f58ee08434a33340f75ac7ac5071eea9673b3
https://git.kernel.org/stable/c/ce666cecc09c0f92d5f86d89d8068ecfcf723a7e
rh#2281809
CVE-2024-35946kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35946
SMASH Issue 406636
bnc#1224646
https://git.kernel.org/stable/c/4f11c741908dab7dd48fa5a986b210d4fc74ca8d
https://git.kernel.org/stable/c/7e11a2966f51695c0af0b1f976a32d64dee243b2
https://git.kernel.org/stable/c/b34d64e9aa5505e3c84570aed5c757f1839573e8
rh#2281833
CVE-2024-35947kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35947
SMASH Issue 406637
bnc#1224647
https://git.kernel.org/stable/c/00e7d3bea2ce7dac7bee1cf501fb071fd0ea8f6c
https://git.kernel.org/stable/c/343081c21e56bd6690d342e2f5ae8c00183bf081
https://git.kernel.org/stable/c/3c718bddddca9cbef177ac475b94c5c91147fb38
https://git.kernel.org/stable/c/41d8ac238ab1cab01a8c71798d61903304f4e79b
https://git.kernel.org/stable/c/529e1852785599160415e964ca322ee7add7aef0
https://git.kernel.org/stable/c/a66c869b17c4c4dcf81d273b02cb0efe88e127ab
https://git.kernel.org/stable/c/a69e1bdd777ce51061111dc419801e8a2fd241cc
https://git.kernel.org/stable/c/ba3c118cff7bcb0fe6aa84ae1f9080d50e31c561
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/
rh#2281510
CVE-2024-35948kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-35948
SMASH Issue 406677
bnc#1224702
https://git.kernel.org/stable/c/fcdbc1d7a4b638e5d5668de461f320386f3002aa
rh#2281947
CVE-2024-35949kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-35949
SMASH Issue 406678
bnc#1224700
https://git.kernel.org/stable/c/e03418abde871314e1a3a550f4c8afb7b89cb273
https://git.kernel.org/stable/c/ef3ba8ce8cf7075b716aa4afcefc3034215878ee
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/
rh#2281945
CVE-2024-35951kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35951
OSS:2024/05/30/1
OSS:2024/05/30/2
OSS:2024/Q2/263
SMASH Issue 406680
bnc#1224701
https://git.kernel.org/stable/c/1fc9af813b25e146d3607669247d0f970f5a87c3
https://git.kernel.org/stable/c/31806711e8a4b75e09b1c43652f2a6420e6e1002
https://git.kernel.org/stable/c/e18070c622c63f0cab170348e320454728c277aa
rh#2281940
CVE-2024-35952kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35952
SMASH Issue 406681
bnc#1224705
https://git.kernel.org/stable/c/35768baf0fdfc47ede42d899506bad78450e9294
https://git.kernel.org/stable/c/8a6fea3fcb577a543ef67683ca7105bde49a38fb
https://git.kernel.org/stable/c/a81b2acd43e24e419f65df97348c76a5a1496066
https://git.kernel.org/stable/c/bc004f5038220b1891ef4107134ccae44be55109
rh#2281938
CVE-2024-35953kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35953
SMASH Issue 406682
bnc#1224704
https://git.kernel.org/stable/c/d43e11d9c7fcb16f18bd46ab2556c2772ffc5775
https://git.kernel.org/stable/c/e6011411147209bc0cc14628cbc155356837e52a
https://git.kernel.org/stable/c/fd7726e75968b27fe98534ccbf47ccd6fef686f3
rh#2281935
CVE-2024-35954kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35954
SMASH Issue 406683
bnc#1224675
https://git.kernel.org/stable/c/27f58c04a8f438078583041468ec60597841284d
https://git.kernel.org/stable/c/46af9047523e2517712ae8e71d984286c626e022
https://git.kernel.org/stable/c/b0d1ebcc1a9560e494ea9b3ee808540db26c5086
rh#2281933
CVE-2024-35955kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35955
SMASH Issue 406684
bnc#1224676
https://git.kernel.org/stable/c/2df2dd27066cdba8041e46a64362325626bdfb2e
https://git.kernel.org/stable/c/325f3fb551f8cd672dbbfc4cf58b14f9ee3fc9e8
https://git.kernel.org/stable/c/36b57c7d2f8b7de224980f1a284432846ad71ca0
https://git.kernel.org/stable/c/5062d1f4f07facbdade0f402d9a04a788f52e26d
https://git.kernel.org/stable/c/62029bc9ff2c17a4e3a2478d83418ec575413808
https://git.kernel.org/stable/c/93eb31e7c3399e326259f2caa17be1e821f5a412
https://git.kernel.org/stable/c/b5808d40093403334d939e2c3c417144d12a6f33
https://git.kernel.org/stable/c/d15023fb407337028a654237d8968fefdcf87c2f
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281931
CVE-2024-35956kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35956
SMASH Issue 406685
bnc#1224674
https://git.kernel.org/stable/c/14431815a4ae4bcd7c7a68b6a64c66c7712d27c9
https://git.kernel.org/stable/c/6c95336f5d8eb9ab79cd7306d71b6d0477363f8c
https://git.kernel.org/stable/c/74e97958121aa1f5854da6effba70143f051b0cd
rh#2281929
CVE-2024-35957kernel-source-rt:Unsupportedmoderate ()CVE-2024-35957
SMASH Issue 406686
bnc#1224673
https://git.kernel.org/stable/c/89436f4f54125b1297aec1f466efd8acb4ec613d
https://git.kernel.org/stable/c/fba8ca3e6f608b92e54271fdbd3ce569361939fc
rh#2281927
CVE-2024-35958kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35958
SMASH Issue 406687
bnc#1224677
https://git.kernel.org/stable/c/19ff8fed3338898b70b2aad831386c78564912e1
https://git.kernel.org/stable/c/5c7f2240d9835a7823d87f7460d8eae9f4e504c7
https://git.kernel.org/stable/c/b26aa765f7437e1bbe8db4c1641b12bd5dd378f0
https://git.kernel.org/stable/c/bf02d9fe00632d22fa91d34749c7aacf397b6cde
https://git.kernel.org/stable/c/c31baa07f01307b7ae05f3ce32b89d8e2ba0cc1d
https://git.kernel.org/stable/c/fdfbf54d128ab6ab255db138488f9650485795a2
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281925
CVE-2024-35959kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35959
SMASH Issue 406688
bnc#1224666
https://git.kernel.org/stable/c/6bd77865fda662913dcb5722a66a773840370aa7
https://git.kernel.org/stable/c/ad26f26abd353113dea4e8d5ebadccdab9b61e76
https://git.kernel.org/stable/c/ecb829459a841198e142f72fadab56424ae96519
https://git.kernel.org/stable/c/f9ac93b6f3de34aa0bb983b9be4f69ca50fc70f3
rh#2281923
CVE-2024-35960kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35960
SMASH Issue 406689
bnc#1224588
https://git.kernel.org/stable/c/1263b0b26077b1183c3c45a0a2479573a351d423
https://git.kernel.org/stable/c/2e8dc5cffc844dacfa79f056dea88002312f253f
https://git.kernel.org/stable/c/3d90ca9145f6b97b38d0c2b6b30f6ca6af9c1801
https://git.kernel.org/stable/c/5cf5337ef701830f173b4eec00a4f984adeb57a0
https://git.kernel.org/stable/c/7aaee12b804c5e0374e7b132b6ec2158ff33dd64
https://git.kernel.org/stable/c/7c6782ad4911cbee874e85630226ed389ff2e453
https://git.kernel.org/stable/c/adf67a03af39095f05d82050f15813d6f700159d
https://git.kernel.org/stable/c/de0139719cdda82806a47580ca0df06fc85e0bd2
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281920
CVE-2024-35961kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35961
SMASH Issue 406690
bnc#1224585
https://git.kernel.org/stable/c/8c91c60858473731bcdaf04fda99fcbcf84420d4
https://git.kernel.org/stable/c/967caa3d37c078e5b95a32094657e6a4cad145f0
https://git.kernel.org/stable/c/c6e77aa9dd82bc18a89bf49418f8f7e961cfccc8
rh#2281918
CVE-2024-35962kernel-source-rt:Not affectedmoderate ()CVE-2024-35962
SMASH Issue 406691
bnc#1224583
https://git.kernel.org/stable/c/562b7245131f6e9f1d280c8b5a8750f03edfc05c
https://git.kernel.org/stable/c/65acf6e0501ac8880a4f73980d01b5d27648b956
https://git.kernel.org/stable/c/89242d9584c342cb83311b598d9e6b82572eadf8
https://git.kernel.org/stable/c/97dab36e57c64106e1c8ebd66cbf0d2d1e52d6b7
https://git.kernel.org/stable/c/c760089aa98289b4b88a7ff5a62dd92845adf223
https://git.kernel.org/stable/c/cf4bc359b76144a3dd55d7c09464ef4c5f2b2b05
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281916
CVE-2024-35963kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-35963
SMASH Issue 406692
bnc#1224582
https://git.kernel.org/stable/c/50173882bb187e70e37bac01385b9b114019bee2
https://git.kernel.org/stable/c/b2186061d6043d6345a97100460363e990af0d46
rh#2281914
CVE-2024-35964kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35964
SMASH Issue 406693
bnc#1224581
https://git.kernel.org/stable/c/0c4a89f4690478969729c7ba5f69d53d8516aa12
https://git.kernel.org/stable/c/9e8742cdfc4b0e65266bb4a901a19462bda9285e
rh#2281912
CVE-2024-35965kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35965
SMASH Issue 406694
bnc#1224579
https://git.kernel.org/stable/c/4f3951242ace5efc7131932e2e01e6ac6baed846
https://git.kernel.org/stable/c/8ee0c132a61df9723813c40e742dc5321824daa9
https://git.kernel.org/stable/c/9d42f373391211c7c8af66a3a316533a32b8a607
rh#2281909
CVE-2024-35966kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35966
SMASH Issue 406695
bnc#1224576
https://git.kernel.org/stable/c/a97de7bff13b1cc825c1b1344eaed8d6c2d3e695
https://git.kernel.org/stable/c/c3f787a3eafe519c93df9abbb0ca5145861c8d0f
rh#2281907
CVE-2024-35967kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35967
SMASH Issue 406696
bnc#1224587
https://git.kernel.org/stable/c/419a0ffca7010216f0fc265b08558d7394fa0ba7
https://git.kernel.org/stable/c/51eda36d33e43201e7a4fd35232e069b2c850b01
https://git.kernel.org/stable/c/72473db90900da970a16ee50ad23c2c38d107d8c
https://git.kernel.org/stable/c/7bc65d23ba20dcd7ecc094a12c181e594e5eb315
https://git.kernel.org/stable/c/b0e30c37695b614bee69187f86eaf250e36606ce
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281905
CVE-2024-35968kernel-source-rt:Not affectedmoderate ()CVE-2024-35968
SMASH Issue 406697
bnc#1224570
https://git.kernel.org/stable/c/38407914d48273d7f8ab765b9243658afe1c3ab6
https://git.kernel.org/stable/c/81665adf25d28a00a986533f1d3a5df76b79cad9
rh#2281903
CVE-2024-35969kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35969
SMASH Issue 406698
bnc#1224580
https://git.kernel.org/stable/c/01b11a0566670612bd464a932e5ac2eae53d8652
https://git.kernel.org/stable/c/3fb02ec57ead2891a2306af8c51a306bc5945e70
https://git.kernel.org/stable/c/4b19e9507c275de0cfe61c24db69179dc52cf9fb
https://git.kernel.org/stable/c/6cdb20c342cd0193d3e956e3d83981d0f438bb83
https://git.kernel.org/stable/c/7633c4da919ad51164acbf1aa322cc1a3ead6129
https://git.kernel.org/stable/c/b4b3b69a19016d4e7fbdbd1dbcc184915eb862e1
https://git.kernel.org/stable/c/cca606e14264098cba65efa82790825dbf69e903
https://git.kernel.org/stable/c/de76ae9ea1a6cf9e77fcec4f2df2904e26c23ceb
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281900
CVE-2024-35970kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35970
SMASH Issue 406699
bnc#1224584
https://git.kernel.org/stable/c/601a89ea24d05089debfa2dc896ea9f5937ac7a6
https://git.kernel.org/stable/c/698a95ade1a00e6494482046902b986dfffd1caf
https://git.kernel.org/stable/c/84a352b7eba1142a95441380058985ff19f25ec9
https://git.kernel.org/stable/c/b46f4eaa4f0ec38909fb0072eea3aeddb32f954e
https://git.kernel.org/stable/c/b4bc99d04c689b5652665394ae8d3e02fb754153
rh#2281897
CVE-2024-35971kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35971
OSS:2024/05/30/1
OSS:2024/05/30/2
OSS:2024/Q2/263
SMASH Issue 406700
bnc#1224578
https://git.kernel.org/stable/c/492337a4fbd1421b42df684ee9b34be2a2722540
https://git.kernel.org/stable/c/49d5d70538b6b8f2a3f8f1ac30c1f921d4a0929b
https://git.kernel.org/stable/c/be0384bf599cf1eb8d337517feeb732d71f75a6f
https://git.kernel.org/stable/c/cba376eb036c2c20077b41d47b317d8218fe754f
rh#2281895
CVE-2024-35972kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35972
SMASH Issue 406701
bnc#1224577
https://git.kernel.org/stable/c/10a9d6a7513f93d7faffcb341af0aa42be8218fe
https://git.kernel.org/stable/c/7ac10c7d728d75bc9daaa8fade3c7a3273b9a9ff
https://git.kernel.org/stable/c/c60ed825530b8c0cc2b524efd39b1d696ec54004
rh#2281893
CVE-2024-35973kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35973
SMASH Issue 406702
bnc#1224586
https://git.kernel.org/stable/c/10204df9beda4978bd1d0c2db0d8375bfb03b915
https://git.kernel.org/stable/c/190d9efa5773f26d6f334b1b8be282c4fa13fd5e
https://git.kernel.org/stable/c/357163fff3a6e48fe74745425a32071ec9caf852
https://git.kernel.org/stable/c/3c1ae6de74e3d2d6333d29a2d3e13e6094596c79
https://git.kernel.org/stable/c/43be590456e1f3566054ce78ae2dbb68cbe1a536
https://git.kernel.org/stable/c/4a1b65d1e55d53b397cb27014208be1e04172670
https://git.kernel.org/stable/c/d3adf11d7993518a39bd02b383cfe657ccc0023c
https://git.kernel.org/stable/c/d8a6213d70accb403b82924a1c229e733433a5ef
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281891
CVE-2024-35974kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35974
SMASH Issue 406703
bnc#1224573
https://git.kernel.org/stable/c/740ffad95ca8033bd6e080ed337655b13b4d38ac
https://git.kernel.org/stable/c/858c489d81d659af17a4d11cfaad2afb42e47a76
https://git.kernel.org/stable/c/8b8ace080319a866f5dfe9da8e665ae51d971c54
rh#2281889
CVE-2024-35975kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35975
SMASH Issue 406704
bnc#1224569
https://git.kernel.org/stable/c/7af5582ea67209a23e44be9a9612ba7897be1f47
https://git.kernel.org/stable/c/b34fe77a1b18654233e4e54b334fcaeddf487100
https://git.kernel.org/stable/c/bccb798e07f8bb8b91212fe8ed1e421685449076
rh#2281887
CVE-2024-35976kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35976
SMASH Issue 406705
bnc#1224575
https://git.kernel.org/stable/c/0b45c25d60e38f5c2cb6823f886773a34323306d
https://git.kernel.org/stable/c/237f3cf13b20db183d3706d997eedc3c49eacd44
https://git.kernel.org/stable/c/2a523f14a3f53b46ff0e1fafd215b0bc5f6783aa
https://git.kernel.org/stable/c/2eb979fbb2479bcd7e049f2f9978b6590dd8a0e6
https://git.kernel.org/stable/c/a82984b3c6a7e8c7937dba6e857ddf829d149417
https://git.kernel.org/stable/c/b143e19dc28c3211f050f7848d87d9b0a170e10c
https://git.kernel.org/stable/c/f0a068de65d5b7358e9aff792716afa9333f3922
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281884
CVE-2024-35977kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35977
SMASH Issue 406706
bnc#1224568
https://git.kernel.org/stable/c/5e700b384ec13f5bcac9855cb28fcc674f1d3593
https://git.kernel.org/stable/c/9e9bb74a93b7daa32313ccaefd0edc529d40daf8
https://git.kernel.org/stable/c/cfd758041d8b79aa8c3f811b6bd6105379f2f702
rh#2281882
CVE-2024-35978kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35978
SMASH Issue 406707
bnc#1224571
https://git.kernel.org/stable/c/45d355a926ab40f3ae7bc0b0a00cb0e3e8a5a810
https://git.kernel.org/stable/c/4beab84fbb50df3be1d8f8a976e6fe882ca65cb2
https://git.kernel.org/stable/c/66fab1e120b39f8f47a94186ddee36006fc02ca8
https://git.kernel.org/stable/c/75193678cce993aa959e7764b6df2f599886dd06
https://git.kernel.org/stable/c/8478394f76c748862ef179a16f651f752bdafaf0
https://git.kernel.org/stable/c/89a32741f4217856066c198a4a7267bcdd1edd67
https://git.kernel.org/stable/c/9ab5e44b9bac946bd49fd63264a08cd1ea494e76
https://git.kernel.org/stable/c/e4cb8382fff6706436b66eafd9c0ee857ff0a9f5
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281879
CVE-2024-35979kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35979
SMASH Issue 406708
bnc#1224572
https://git.kernel.org/stable/c/3f28d49a328fe20926995d5fbdc92da665596268
https://git.kernel.org/stable/c/f423f41b7679c09abb26d2bd54be5cbef23c9446
https://git.kernel.org/stable/c/fcf3f7e2fc8a53a6140beee46ec782a4c88e4744
rh#2281872
CVE-2024-35980kernel-source-rt:Not affectedmoderate ()CVE-2024-35980
SMASH Issue 406709
bnc#1224574
https://git.kernel.org/stable/c/944db7b536baaf49d7e576af36a94f4719552b07
https://git.kernel.org/stable/c/ac4ad513de4fba18b4ac0ace132777d0910e8cfa
https://git.kernel.org/stable/c/e3ba51ab24fddef79fc212f9840de54db8fd1685
rh#2281870
CVE-2024-35981kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35981
SMASH Issue 406710
bnc#1224565
https://git.kernel.org/stable/c/059a49aa2e25c58f90b50151f109dd3c4cdb3a47
https://git.kernel.org/stable/c/28e9a64638cd16bc1ecac9ff74ffeacb9fb652de
https://git.kernel.org/stable/c/43a71c1b4b3a6d4db857b1435d271540279fc7de
https://git.kernel.org/stable/c/539a2b995a4ed93125cb0efae0f793b00ab2158b
rh#2281868
CVE-2024-35982kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35982
SMASH Issue 406711
bnc#1224566
https://git.kernel.org/stable/c/04720ea2e6c64459a90ca28570ea78335eccd924
https://git.kernel.org/stable/c/3fe79b2c83461edbbf86ed8a6f3924820ff89259
https://git.kernel.org/stable/c/4ca2a5fb54ea2cc43edea614207fcede562d91c2
https://git.kernel.org/stable/c/70a8be9dc2fb65d67f8c1e0c88c587e08e2e575d
https://git.kernel.org/stable/c/87b6af1a7683e021710c08fc0551fc078346032f
https://git.kernel.org/stable/c/b1f532a3b1e6d2e5559c7ace49322922637a28aa
https://git.kernel.org/stable/c/b3ddf6904073990492454b1dd1c10a24be8c74c6
https://git.kernel.org/stable/c/ca54e2671548616ad34885f90d4f26f7adb088f0
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281866
CVE-2024-35983kernel-source-rt:Not affectedmoderate ()CVE-2024-35983
SMASH Issue 406712
bnc#1224564
https://git.kernel.org/stable/c/15aa09d6d84629eb5296de30ac0aa19a33512f16
https://git.kernel.org/stable/c/5af385f5f4cddf908f663974847a4083b2ff2c79
https://git.kernel.org/stable/c/66297b2ceda841f809637731d287bda3a93b49d8
https://git.kernel.org/stable/c/93ba36238db6a74a82feb3dc476e25ea424ad630
https://git.kernel.org/stable/c/9b7c5004d7c5ae062134052a85290869a015814c
https://git.kernel.org/stable/c/d34a516f2635090d36a306f84573e8de3d7374ce
https://git.kernel.org/stable/c/ebfe41889b762f1933c6762f6624b9724a25bee0
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281863
CVE-2024-35984kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35984
SMASH Issue 406713
bnc#1224567
https://git.kernel.org/stable/c/357c64ef1ef39b1e7cd91ab6bdd304d043702c83
https://git.kernel.org/stable/c/40f1d79f07b49c8a64a861706e5163f2db4bd95d
https://git.kernel.org/stable/c/4e75e222d397c6752b229ed72fc4644c8c36ecde
https://git.kernel.org/stable/c/5a09eae9a7db597fe0c1fc91636205b4a25d2620
https://git.kernel.org/stable/c/5fd72404587d7db4acb2d241fd8c387afb0a7aec
https://git.kernel.org/stable/c/91811a31b68d3765b3065f4bb6d7d6d84a7cfc9f
https://git.kernel.org/stable/c/ad3c3ac7a03be3697114f781193dd3e9d97e6e23
https://git.kernel.org/stable/c/e3425674ff68dc521c57c6eabad0cbd20a027d85
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281861
CVE-2024-35985kernel-source-rt:Not affectedmoderate ()CVE-2024-35985
SMASH Issue 406714
bnc#1224561
https://git.kernel.org/stable/c/06f27e6d7bf0abf54488259ef36bbf0e1fccb35c
https://git.kernel.org/stable/c/1560d1f6eb6b398bddd80c16676776c0325fe5fe
https://git.kernel.org/stable/c/470d347b14b0ecffa9b39cf8f644fa2351db3efb
rh#2281857
CVE-2024-35986kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35986
SMASH Issue 406715
bnc#1224562
https://git.kernel.org/stable/c/25b3498485ac281e5851700e33b97f12c9533fd8
https://git.kernel.org/stable/c/73224a5d2180066c7fe05b4656647601ba08d588
https://git.kernel.org/stable/c/9827caa5105fb16d1fae2e75c8d0e4662014b3ca
https://git.kernel.org/stable/c/bf6e4ee5c43690e4c5a8a057bbcd4ff986bed052
rh#2281855
CVE-2024-35987kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35987
SMASH Issue 406716
bnc#1224563
https://git.kernel.org/stable/c/aea702dde7e9876fb00571a2602f25130847bf0f
https://git.kernel.org/stable/c/b008e327fa570aca210f98c817757649bae56694
https://git.kernel.org/stable/c/ea6628e4e2353978af7e3b4ad4fdaab6149acf3d
rh#2281852
CVE-2024-35988kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35988
SMASH Issue 406717
bnc#1224554
https://git.kernel.org/stable/c/04bf2e5f95c1a52e28a7567a507f926efe31c3b6
https://git.kernel.org/stable/c/4201b8c8f2c32af321fb50867e68ac6c1cbed4be
https://git.kernel.org/stable/c/52e8a42b11078d2aad4b9ba96503d77c7299168b
https://git.kernel.org/stable/c/6065e736f82c817c9a597a31ee67f0ce4628e948
https://git.kernel.org/stable/c/a0f0dbbb1bc49fa0de18e92c36492ff6d804cdaa
https://git.kernel.org/stable/c/efdcfa554b6eb228943ef1dd4d023c606be647d2
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281850
CVE-2024-35989kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35989
SMASH Issue 406718
bnc#1224558
https://git.kernel.org/stable/c/023b6390a15a98f9c3aa5e7da78d485d5384a08e
https://git.kernel.org/stable/c/47533176fdcef17b114a6f688bc872901c1ec6bb
https://git.kernel.org/stable/c/9edd3aa34d50f27b97be30b2ba4a6af0945ff56b
https://git.kernel.org/stable/c/f221033f5c24659dc6ad7e5cf18fb1b075f4a8be
https://git.kernel.org/stable/c/f976eca36cdf94e32fa4f865db0e7c427c9aa33c
rh#2281847
CVE-2024-35990kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35990
SMASH Issue 406719
bnc#1224559
https://git.kernel.org/stable/c/0ccac964520a6f19e355652c8ca38af2a7f27076
https://git.kernel.org/stable/c/244296cc3a155199a8b080d19e645d7d49081a38
https://git.kernel.org/stable/c/8bf574183282d219cfa991f7df37aad491d74c11
https://git.kernel.org/stable/c/8e3c94767cad5150198e4337c8b91f3bb068e14b
https://git.kernel.org/stable/c/c660be571609e03e7d5972343536a736fcb31557
https://git.kernel.org/stable/c/fcdd5bb4a8c81c64c1334d7e0aba41a8829a24de
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281845
CVE-2024-35991kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35991
SMASH Issue 406720
bnc#1224553
https://git.kernel.org/stable/c/758071a35d9f3ffd84ff12169d081412a2f5f098
https://git.kernel.org/stable/c/c9b732a9f73eadc638abdcf0a6d39bc7a0c1af5f
https://git.kernel.org/stable/c/d5638de827cff0fce77007e426ec0ffdedf68a44
rh#2281843
CVE-2024-35992kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35992
SMASH Issue 406721
bnc#1224555
https://git.kernel.org/stable/c/40406dfbc060503d2e0a9e637e98493c54997b3d
https://git.kernel.org/stable/c/610f175d2e16fb2436ba7974b990563002c20d07
https://git.kernel.org/stable/c/976df695f579bbb2914114b4e9974fe4ed1eb813
https://git.kernel.org/stable/c/e4308bc22b9d46cf33165c9dfaeebcf29cd56f04
rh#2281841
CVE-2024-35993kernel-source-rt:Not affectedmoderate ()CVE-2024-35993
SMASH Issue 406722
bnc#1224560
https://git.kernel.org/stable/c/2431b5f2650dfc47ce782d1ca7b02d6b3916976f
https://git.kernel.org/stable/c/9fdcc5b6359dfdaa52a55033bf50e2cedd66eb32
https://git.kernel.org/stable/c/d99e3140a4d33e26066183ff727d8f02f56bec64
rh#2281838
CVE-2024-35994kernel-source-rt:Not affectedmoderate ()CVE-2024-35994
SMASH Issue 406723
bnc#1224556
https://git.kernel.org/stable/c/dd22b34fb53cb04b13b2f5eee5c9200bb091fc88
https://git.kernel.org/stable/c/ed09f81eeaa8f9265e1787282cb283f10285c259
rh#2281836
CVE-2024-35996kernel-source-rt:Not affectedmoderate ()CVE-2024-35996
SMASH Issue 406725
bnc#1224551
https://git.kernel.org/stable/c/36b32816fbab267611f073223f1b0b816ec5920f
https://git.kernel.org/stable/c/38f17d1fbb5bfb56ca1419e2d06376d57a9396f9
https://git.kernel.org/stable/c/8292f4f8dd1b005d0688d726261004f816ef730a
https://git.kernel.org/stable/c/af6d6a923b40bf6471e44067ac61cc5814b48e7f
https://git.kernel.org/stable/c/fd8547ebc187037cc69441a15c1441aeaab80f49
https://git.kernel.org/stable/c/fe42754b94a42d08cf9501790afc25c4f6a5f631
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281979
CVE-2024-35997kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35997
SMASH Issue 406726
bnc#1224552
https://git.kernel.org/stable/c/0561b65fbd53d3e788c5b0222d9112ca016fd6a1
https://git.kernel.org/stable/c/21bfca822cfc1e71796124e93b46e0d9fa584401
https://git.kernel.org/stable/c/29e94f295bad5be59cf4271a93e22cdcf5536722
https://git.kernel.org/stable/c/418c5575d56410c6e186ab727bf32ae32447d497
https://git.kernel.org/stable/c/5095b93021b899f54c9355bebf36d78854c33a22
https://git.kernel.org/stable/c/9c0f59e47a90c54d0153f8ddc0f80d7a36207d0e
https://git.kernel.org/stable/c/b65fb50e04a95eec34a9d1bc138454a98a5578d8
https://git.kernel.org/stable/c/c448a9fd50f77e8fb9156ff64848aa4295eb3003
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281977
CVE-2024-35998kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-35998
SMASH Issue 406727
bnc#1224549
https://git.kernel.org/stable/c/699f8958dece132709c0bff6a9700999a2a63b75
https://git.kernel.org/stable/c/8248224ab5b8ca7559b671917c224296a4d671fc
https://git.kernel.org/stable/c/8861fd5180476f45f9e8853db154600469a0284f
https://git.kernel.org/stable/c/c7a4bca289e50bb4b2650f845c41bb3e453f4c66
jsc#CAR-3514
rh#2281975
CVE-2024-35999kernel-source-rt:Ignoremoderate5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L)CVE-2024-35999
SMASH Issue 406728
bnc#1224550
https://git.kernel.org/stable/c/0fcf7e219448e937681216353c9a58abae6d3c2e
https://git.kernel.org/stable/c/60ab245292280905603bc0d3654f4cf8fceccb00
https://git.kernel.org/stable/c/8094a600245e9b28eb36a13036f202ad67c1f887
https://git.kernel.org/stable/c/98c7ed29cd754ae7475dc7cb3f33399fda902729
jsc#CAR-3515
rh#2281972
CVE-2024-36000kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36000
SMASH Issue 406729
bnc#1224548
https://git.kernel.org/stable/c/4c806333efea1000a2a9620926f560ad2e1ca7cc
https://git.kernel.org/stable/c/538faabf31e9c53d8c870d114846fda958a0de10
https://git.kernel.org/stable/c/b76b46902c2d0395488c8412e1116c2486cdfcb2
https://git.kernel.org/stable/c/f6c5d21db16a0910152ec8aa9d5a7aed72694505
rh#2281968
CVE-2024-36001kernel-source-rt:Not affectedmoderate ()CVE-2024-36001
SMASH Issue 406730
bnc#1224547
https://git.kernel.org/stable/c/5eaf23b2e81349f6614f88396dc468fda89fc0b9
https://git.kernel.org/stable/c/c97f59e276d4e93480f29a70accbd0d7273cf3f5
rh#2281964
CVE-2024-36002kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36002
SMASH Issue 406731
bnc#1224546
https://git.kernel.org/stable/c/38d7b94e81d068b8d8c8392f421cfd2c3bbfd1a6
https://git.kernel.org/stable/c/f3e1cf62d18220a3aa97e084e7a3552debece9fc
rh#2281961
CVE-2024-36003kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36003
SMASH Issue 406732
bnc#1224544
https://git.kernel.org/stable/c/740717774dc37338404d10726967d582414f638c
https://git.kernel.org/stable/c/96fdd1f6b4ed72a741fb0eb705c0e13049b8721f
https://git.kernel.org/stable/c/de8631d8c9df08440268630200e64b623a5f69e6
rh#2281958
CVE-2024-36004kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36004
SMASH Issue 406733
bnc#1224545
https://git.kernel.org/stable/c/09b54d29f05129b092f7c793a70b689ffb3c7b2c
https://git.kernel.org/stable/c/152ed360cf2d273f88fc99a518b7eb868aae2939
https://git.kernel.org/stable/c/1594dac8b1ed78f9e75c263327e198a2e5e25b0e
https://git.kernel.org/stable/c/2cc7d150550cc981aceedf008f5459193282425c
https://git.kernel.org/stable/c/546d0fe9d76e8229a67369f9cb61e961d99038bd
https://git.kernel.org/stable/c/8d6105f637883c8c09825e962308c06e977de4f0
https://git.kernel.org/stable/c/fbbb2404340dd6178e281bd427c271f7d5ec1d22
https://git.kernel.org/stable/c/ff7431f898dd00892a545b7d0ce7adf5b926944f
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281953
CVE-2024-36005kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36005
SMASH Issue 406734
bnc#1224539
https://git.kernel.org/stable/c/13ba94f6cc820fdea15efeaa17d4c722874eebf9
https://git.kernel.org/stable/c/5c45feb3c288cf44a529e2657b36c259d86497d2
https://git.kernel.org/stable/c/8260c980aee7d8d8a3db39faf19c391d2f898816
https://git.kernel.org/stable/c/8e30abc9ace4f0add4cd761dfdbfaebae5632dd2
https://git.kernel.org/stable/c/ca34c40d1c22c555fa7f4a21a1c807fea7290a0a
https://git.kernel.org/stable/c/e4bb6da24de336a7899033a65490ed2d892efa5b
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281949
CVE-2024-36006kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36006
SMASH Issue 406735
bnc#1224541
https://git.kernel.org/stable/c/09846c2309b150b8ce4e0ce96f058197598fc530
https://git.kernel.org/stable/c/0b2c13b670b168e324e1cf109e67056a20fd610a
https://git.kernel.org/stable/c/4526a56e02da3725db979358964df9cd9c567154
https://git.kernel.org/stable/c/64435b64e43d8ee60faa46c0cd04e323e8b2a7b0
https://git.kernel.org/stable/c/ab4ecfb627338e440ae11def004c524a00d93e40
https://git.kernel.org/stable/c/af8b593c3dd9df82cb199be65863af004b09fd97
https://git.kernel.org/stable/c/b377add0f0117409c418ddd6504bd682ebe0bf79
rh#2281989
CVE-2024-36007kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36007
SMASH Issue 406736
bnc#1224543
https://git.kernel.org/stable/c/039992b6d2df097c65f480dcf269de3d2656f573
https://git.kernel.org/stable/c/0b88631855026b55cad901ac28d081e0f358e596
https://git.kernel.org/stable/c/17e9e0bbae652b9b2049e51699e93dfa60b2988d
https://git.kernel.org/stable/c/1d76bd2a0034d0d08045c1c6adf2235d88982952
https://git.kernel.org/stable/c/743edc8547a92b6192aa1f1b6bb78233fa21dc9b
https://git.kernel.org/stable/c/751d352858108314efd33dddd5a9a2b6bf7d6916
https://git.kernel.org/stable/c/e890456051fe8c57944b911defb3e6de91315861
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281986
CVE-2024-36008kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36008
SMASH Issue 406737
bnc#1224540
https://git.kernel.org/stable/c/03b5a9b2b526862b21bcc31976e393a6e63785d1
https://git.kernel.org/stable/c/58a4c9b1e5a3e53c9148e80b90e1e43897ce77d1
https://git.kernel.org/stable/c/7a25bfd12733a8f38f8ca47c581f876c3d481ac0
https://git.kernel.org/stable/c/7da0f91681c4902bc5c210356fdd963b04d5d1d4
https://git.kernel.org/stable/c/8240c7308c941db4d9a0a91b54eca843c616a655
https://git.kernel.org/stable/c/c71ea3534ec0936fc57e6fb271c7cc6a2f68c295
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2281983
CVE-2024-36009kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36009
OSS:2024/05/30/1
OSS:2024/05/30/2
OSS:2024/Q2/263
SMASH Issue 406738
bnc#1224542
https://git.kernel.org/stable/c/0d14f104027e30720582448706c7d6b43065c851
https://git.kernel.org/stable/c/467324bcfe1a31ec65d0cf4aa59421d6b7a7d52b
https://git.kernel.org/stable/c/4fee8fa86a15d7790268eea458b1aec69c695530
https://git.kernel.org/stable/c/c42b073d9af4a5329b25b17390c63ab3847f30e8
rh#2281981
CVE-2024-36010kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36010
SMASH Issue 407385
bnc#1225594
https://git.kernel.org/stable/c/c56d055893cbe97848611855d1c97d0ab171eccc
rh#2282950
CVE-2024-36011kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36011
SMASH Issue 407500
bnc#1225579
https://git.kernel.org/stable/c/1f7ebb69c1d65732bcac2fda9d15421f76f01e81
https://git.kernel.org/stable/c/9f3be61f55d4eedc20eedc56c0f04a5ce2b4a55a
https://git.kernel.org/stable/c/d2706004a1b8b526592e823d7e52551b518a7941
rh#2282959
CVE-2024-36012kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2024-36012
SMASH Issue 407496
bnc#1225502
https://git.kernel.org/stable/c/10f9f426ac6e752c8d87bf4346930ba347aaabac
https://git.kernel.org/stable/c/4f1de02de07748da80a8178879bc7a1df37fdf56
https://git.kernel.org/stable/c/a85a60e62355e3bf4802dead7938966824b23940
https://git.kernel.org/stable/c/e3880b531b68f98d3941d83f2f6dd11cf4fd6b76
rh#2282955
CVE-2024-36013kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36013
OSS:2024/05/30/1
OSS:2024/05/30/2
OSS:2024/Q2/263
SMASH Issue 407495
bnc#1225578
https://git.kernel.org/stable/c/4d7b41c0e43995b0e992b9f8903109275744b658
https://git.kernel.org/stable/c/826af9d2f69567c646ff46d10393d47e30ad23c6
https://git.kernel.org/stable/c/cfe560c7050bfb37b0d2491bbe7cd8b59e77fdc5
rh#2282952
CVE-2024-36014kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36014
SMASH Issue 408045
bnc#1225593
https://git.kernel.org/stable/c/335cc45ef2b81b68be63c698b4f867a530bdf7a5
https://git.kernel.org/stable/c/3e54d4e95120641216dfe91a6c49f116a9f68490
https://git.kernel.org/stable/c/565d9ad7e5a18eb69ed8b66a9e9bb3f45346520c
https://git.kernel.org/stable/c/93f76ec1eddce60dbb5885cbc0d7df54adee4639
https://git.kernel.org/stable/c/a1f95aede6285dba6dd036d907196f35ae3a11ea
https://git.kernel.org/stable/c/a5fa5b40a278a3ca978fed64707bd27614adb1eb
https://git.kernel.org/stable/c/b6cc5dd06336ed8bb3a7a1fc5aaf7d5e88bc0818
https://git.kernel.org/stable/c/b77620730f614059db2470e8ebab3e725280fc6d
https://git.kernel.org/stable/c/e4b52d49383306ef73fd1bd9102538beebb0fe07
rh#2283785
CVE-2024-36015kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36015
SMASH Issue 408046
bnc#1225640
https://git.kernel.org/stable/c/5d5b24edad1107a2ffa99058f20f6aeeafeb5d39
https://git.kernel.org/stable/c/65cd017d43f4319a56747d38308b0a24cf57299e
https://git.kernel.org/stable/c/b65d0410b879af0295d22438a4a32012786d152a
https://git.kernel.org/stable/c/b8c6b83cc3adff3ddf403c8c7063fe6d08b2b9d9
https://git.kernel.org/stable/c/d32caf51379a4d71db03d3d4d7c22d27cdf7f68b
https://git.kernel.org/stable/c/df9329247dbbf00f6057e002139ab3fa529ad828
https://git.kernel.org/stable/c/ec3468221efec6660ff656e9ebe51ced3520fc57
https://git.kernel.org/stable/c/fbf740aeb86a4fe82ad158d26d711f2f3be79b3e
rh#2283786
CVE-2024-36018kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2024-36018
SMASH Issue 408146
bnc#1225694
https://git.kernel.org/stable/c/0c16020d2b69a602c8ae6a1dd2aac9a3023249d6
https://git.kernel.org/stable/c/692a51bebf4552bdf0a79ccd68d291182a26a569
https://git.kernel.org/stable/c/be141849ec00ef39935bf169c0f194ac70bf85ce
rh#2284404
CVE-2024-36019kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L)CVE-2024-36019
SMASH Issue 408147
bnc#1225695
https://git.kernel.org/stable/c/00bb549d7d63a21532e76e4a334d7807a54d9f31
https://git.kernel.org/stable/c/3af6c5ac72dc5b721058132a0a1d7779e443175e
https://git.kernel.org/stable/c/51c4440b9d3fd7c8234e6de9170a487c03506e53
rh#2284402
CVE-2024-36020kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36020
SMASH Issue 408148
bnc#1225698
https://git.kernel.org/stable/c/06df7618f591b2dc43c59967e294d7b9fc8675b6
https://git.kernel.org/stable/c/0dcf573f997732702917af1563aa2493dc772fc0
https://git.kernel.org/stable/c/3e89846283f3cf7c7a8e28b342576fd7c561d2ba
https://git.kernel.org/stable/c/951d2748a2a8242853abc3d0c153ce4bf8faad31
https://git.kernel.org/stable/c/9dcf0fcb80f6aeb01469e3c957f8d4c97365450a
https://git.kernel.org/stable/c/b8e82128b44fa40bf99a50b919488ef361e1683c
https://git.kernel.org/stable/c/cc9cd02dd9e8b7764ea9effb24f4f1dd73d1b23d
https://git.kernel.org/stable/c/f37c4eac99c258111d414d31b740437e1925b8e8
https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
rh#2284400
CVE-2024-36021kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36021
SMASH Issue 408150
bnc#1225699
https://git.kernel.org/stable/c/1b550dae55901c2cc9075d6a7155a71b4f516e86
https://git.kernel.org/stable/c/50b69054f455dcdb34bd6b22764c7579b270eef3
https://git.kernel.org/stable/c/7ca0f73e5e2da3c129935b97f3a0877cce8ebdf5
https://git.kernel.org/stable/c/93305b77ffcb042f1538ecc383505e87d95aa05a
rh#2284310
CVE-2024-36022kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36022
SMASH Issue 408151
bnc#1225700
https://git.kernel.org/stable/c/4f8154f775197d0021b690c2945d6a4d8094c8f6
https://git.kernel.org/stable/c/f679fd6057fbf5ab34aaee28d58b7f81af0cbf48
rh#2284427
CVE-2024-36023kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36023
SMASH Issue 408152
bnc#1225701
https://git.kernel.org/stable/c/214a6c4a28c11d67044e6cf3a0ab415050d9f03a
https://git.kernel.org/stable/c/2e2177f94c0e0bc41323d7b6975a5f4820ed347e
https://git.kernel.org/stable/c/9bf93dcfc453fae192fe5d7874b89699e8f800ac
https://git.kernel.org/stable/c/b972e8ac3f44f693127a2806031962d100dfc4d1
rh#2284425
CVE-2024-36024kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36024
SMASH Issue 408153
bnc#1225702
https://git.kernel.org/stable/c/2aac387445610d6dfd681f5214388e86f5677ef7
https://git.kernel.org/stable/c/6226a5aa77370329e01ee8abe50a95e60618ce97
rh#2284423
CVE-2024-36026kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36026
SMASH Issue 408141
bnc#1225705
https://git.kernel.org/stable/c/1e3b8874d55c0c28378beb9007494a7a9269a5f5
https://git.kernel.org/stable/c/31729e8c21ecfd671458e02b6511eb68c2225113
https://git.kernel.org/stable/c/7521329e54931ede9e042bbf5f4f812b5bc4a01d
https://git.kernel.org/stable/c/bd9b94055c3deb2398ee4490c1dfdf03f53efb8f
rh#2284419
CVE-2024-36027kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)CVE-2024-36027
SMASH Issue 408188
bnc#1225706
https://git.kernel.org/stable/c/68879386180c0efd5a11e800b0525a01068c9457
https://git.kernel.org/stable/c/f4b994fccbb6f294c4b31a6ca0114b09f7245043
rh#2284415
CVE-2024-36028kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36028
SMASH Issue 408179
bnc#1225707
https://git.kernel.org/stable/c/2effe407f7563add41750fd7e03da4ea44b98099
https://git.kernel.org/stable/c/52ccdde16b6540abe43b6f8d8e1e1ec90b0983af
https://git.kernel.org/stable/c/7e0a322877416e8c648819a8e441cf8c790b2cce
https://git.kernel.org/stable/c/9c9b32d46afab2d911897914181c488954012300
rh#2284413
CVE-2024-36030kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-36030
SMASH Issue 408218
bnc#1225712
bnc#1226326
https://git.kernel.org/stable/c/6e965eba43e9724f3e603d7b7cc83e53b23d155e
https://git.kernel.org/stable/c/f5aa87a2c0a72132ffc793fb0a5375b2a65d520a
rh#2284295
CVE-2024-36031kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2024-36031
SMASH Issue 408212
bnc#1225713
https://git.kernel.org/stable/c/25777f3f4e1f371d16a594925f31e37ce07b6ec7
https://git.kernel.org/stable/c/939a08bcd4334bad4b201e60bd0ae1f278d71d41
https://git.kernel.org/stable/c/9da27fb65a14c18efd4473e2e82b76b53ba60252
https://git.kernel.org/stable/c/ad2011ea787928b2accb5134f1e423b11fe80a8a
https://git.kernel.org/stable/c/cc219cb8afbc40ec100c0de941047bb29373126a
https://git.kernel.org/stable/c/e4519a016650e952ad9eb27937f8c447d5a4e06d
https://git.kernel.org/stable/c/ed79b93f725cd0da39a265dc23d77add1527b9be
rh#2284410
CVE-2024-36032kernel-source-rt:Not affectedlow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N)CVE-2024-36032
SMASH Issue 408173
bnc#1225720
https://git.kernel.org/stable/c/57062aa13e87b1a78a4a8f6cb5fab6ba24f5f488
https://git.kernel.org/stable/c/6b63e0ef4d3ce0080395e5091fba2023f246c45a
https://git.kernel.org/stable/c/a571044cc0a0c944e7c12237b6768aeedd7480e1
https://git.kernel.org/stable/c/cda0d6a198e2a7ec6f176c36173a57bdd8af7af2
rh#2284408
CVE-2024-36033kernel-source-rt:Not affectedlow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N)CVE-2024-36033
SMASH Issue 408216
bnc#1225721
https://git.kernel.org/stable/c/0adcf6be1445ed50bfd4a451a7a782568f270197
https://git.kernel.org/stable/c/ba307abed5e09759845c735ba036f8c12f55b209
https://git.kernel.org/stable/c/bcccdc947d2ca5972b1e92d0dea10803ddc08ceb
https://git.kernel.org/stable/c/f30c37cb4549baf8377434892d520fe7769bdba7
rh#2284406
CVE-2024-36281kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36281
SMASH Issue 411746
bnc#1226799
https://git.kernel.org/stable/c/16d66a4fa81da07bc4ed19f4e53b87263c2f8d38
https://git.kernel.org/stable/c/b0a15cde37a8388e57573686f650a17208ae1212
https://git.kernel.org/stable/c/cc9ac559f2e21894c21ac5b0c85fb24a5cab266c
rh#2293712
CVE-2024-36288kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36288
SMASH Issue 411778
bnc#1226834
https://git.kernel.org/stable/c/0a1cb0c6102bb4fd310243588d39461da49497ad
https://git.kernel.org/stable/c/4a77c3dead97339478c7422eb07bf4bf63577008
https://git.kernel.org/stable/c/4cefcd0af7458bdeff56a9d8dfc6868ce23d128a
https://git.kernel.org/stable/c/57ff6c0a175930856213b2aa39f8c845a53e5b1c
https://git.kernel.org/stable/c/6ed45d20d30005bed94c8c527ce51d5ad8121018
https://git.kernel.org/stable/c/af628d43a822b78ad8d4a58d8259f8bf8bc71115
https://git.kernel.org/stable/c/b4878ea99f2b40ef1925720b1b4ca7f4af1ba785
https://git.kernel.org/stable/c/f9977e4e0cd98a5f06f2492b4f3547db58deabf5
rh#2293645
CVE-2024-36477kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N)CVE-2024-36477
SMASH Issue 411781
bnc#1226840
https://git.kernel.org/stable/c/1547183852dcdfcc25878db7dd3620509217b0cd
https://git.kernel.org/stable/c/195aba96b854dd664768f382cd1db375d8181f88
https://git.kernel.org/stable/c/de13c56f99477b56980c7e00b09c776d16b7563d
rh#2293639
CVE-2024-36478kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36478
SMASH Issue 411748
bnc#1226841
https://git.kernel.org/stable/c/5d0495473ee4c1d041b5a917f10446a22c047f47
https://git.kernel.org/stable/c/a2db328b0839312c169eb42746ec46fc1ab53ed2
rh#2293710
CVE-2024-36481kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36481
SMASH Issue 411782
bnc#1226870
https://git.kernel.org/stable/c/4ed468edfeb54c7202e559eba74c25fac6a0dad0
https://git.kernel.org/stable/c/ad4b202da2c498fefb69e5d87f67b946e7fe1e6a
https://git.kernel.org/stable/c/e569eb34970281438e2b48a3ef11c87459fcfbcb
rh#2293640
CVE-2024-36484kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-36484
SMASH Issue 411749
bnc#1226872
https://git.kernel.org/stable/c/26afda78cda3da974fd4c287962c169e9462c495
https://git.kernel.org/stable/c/5f9a04a94fd1894d7009055ab8e5832a0242dba3
https://git.kernel.org/stable/c/87bdc9f6f58b4417362d6932b49b828e319f97dc
https://git.kernel.org/stable/c/c09ddc605893df542c6cf8dde6a57a93f7cf0adb
rh#2293690
CVE-2024-36489kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36489
SMASH Issue 411750
bnc#1226874
https://git.kernel.org/stable/c/2c260a24cf1c4d30ea3646124f766ee46169280b
https://git.kernel.org/stable/c/335c8f1566d8e44c384d16b450a18554896d4e8b
https://git.kernel.org/stable/c/91e61dd7a0af660408e87372d8330ceb218be302
https://git.kernel.org/stable/c/ab67c2fd3d070a21914d0c31319d3858ab4e199c
https://git.kernel.org/stable/c/d72e126e9a36d3d33889829df8fc90100bb0e071
https://git.kernel.org/stable/c/ef21007a7b581c7fe64d5a10c320880a033c837b
rh#2293687
CVE-2024-36881kernel-source-rt:Not affectedlow0 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N)CVE-2024-36881
SMASH Issue 408208
bnc#1225718
https://git.kernel.org/stable/c/377f3a9a3d032a52325a5b110379a25dd1ab1931
https://git.kernel.org/stable/c/8d8b68a5b0c9fb23d37df06bb273ead38fd5a29d
https://git.kernel.org/stable/c/c88033efe9a391e72ba6b5df4b01d6e628f4e734
rh#2284277
CVE-2024-36882kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36882
SMASH Issue 408168
bnc#1225723
https://git.kernel.org/stable/c/30153e4466647a17eebfced13eede5cbe4290e69
https://git.kernel.org/stable/c/468971c3f4b8187f25334503b68050a0e1370147
https://git.kernel.org/stable/c/7629ef6dda1564098aadeef38e5fbd11ee8627c4
https://git.kernel.org/stable/c/cf6a1d16c6df3c30b03f0c6a92a2ba7f86dffb45
rh#2284273
CVE-2024-36884kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36884
SMASH Issue 408222
bnc#1225727
https://git.kernel.org/stable/c/65ade5653f5ab5a21635e51d0c65e95f490f5b6f
https://git.kernel.org/stable/c/e83de8f05b998e227b48cdeea54cba4c9d66d3aa
rh#2284269
CVE-2024-36885kernel-source-rt:Not affectedlow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2024-36885
SMASH Issue 408185
bnc#1225728
https://git.kernel.org/stable/c/1a88c18da464db0ba8ea25196d0a06490f65322e
https://git.kernel.org/stable/c/52a6947bf576b97ff8e14bb0a31c5eaf2d0d96e2
https://git.kernel.org/stable/c/e05af009302893f39b072811a68fa4a196284c75
rh#2284265
CVE-2024-36887kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36887
SMASH Issue 408144
bnc#1225731
https://git.kernel.org/stable/c/387f295cb2150ed164905b648d76dfcbd3621778
https://git.kernel.org/stable/c/950d5226cd6bb83ba720961a8d4d5cf79e6afd57
https://git.kernel.org/stable/c/f8a139656c95db893a543159873c57a470d7376d
rh#2284576
CVE-2024-36888kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36888
SMASH Issue 408220
bnc#1225738
https://git.kernel.org/stable/c/57a01eafdcf78f6da34fad9ff075ed5dfdd9f420
https://git.kernel.org/stable/c/6d559e70b3eb6623935cbe7f94c1912c1099777b
https://git.kernel.org/stable/c/c57824d4fe07c2131f8c48687cbd5ee2be60c767
rh#2284573
CVE-2024-36889kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)CVE-2024-36889
SMASH Issue 408232
bnc#1225746
https://git.kernel.org/stable/c/39ca83ed73db9edcc6d70c0dc7a73085a4725012
https://git.kernel.org/stable/c/592f69b41766d366dbb8ff4ef5a67c4396527bbe
https://git.kernel.org/stable/c/99951b62bf20cec9247f633a3bea898338b9e5b4
https://git.kernel.org/stable/c/aa0c07c1f20e05b30019bff083ec43665536f06f
https://git.kernel.org/stable/c/dc941fec0719d0471a5902424d6b2a17df233193
https://git.kernel.org/stable/c/fb7a0d334894206ae35f023a82cad5a290fd7386
rh#2284571
CVE-2024-36890kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36890
SMASH Issue 408158
bnc#1225714
https://git.kernel.org/stable/c/79cbe0be6c0317b215ddd8bd3e32f0afdac48543
https://git.kernel.org/stable/c/9f6eb0ab4f95240589ee85fd9886a944cd3645b2
https://git.kernel.org/stable/c/ac6cf3ce9b7d12acb7b528248df5f87caa25fcdc
https://git.kernel.org/stable/c/cd7eb8f83fcf258f71e293f7fc52a70be8ed0128
rh#2284569
CVE-2024-36891kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36891
SMASH Issue 408239
bnc#1225710
https://git.kernel.org/stable/c/6c9c7c1e63b198a8b979ad963eb21410f10ccb00
https://git.kernel.org/stable/c/883e5d542bbdddbddeba60250cb482baf3ae2415
https://git.kernel.org/stable/c/955a923d2809803980ff574270f81510112be9cf
https://git.kernel.org/stable/c/f3956791cf526540addd3295e4c1e0f0442486cc
rh#2284567
CVE-2024-36892kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L)CVE-2024-36892
SMASH Issue 408167
bnc#1225716
https://git.kernel.org/stable/c/56900355485f6e82114b18c812edd57fd7970dcb
https://git.kernel.org/stable/c/8f828aa48812ced28aa39cb3cfe55ef2444d03dd
rh#2284565
CVE-2024-36893kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36893
SMASH Issue 408175
bnc#1225748
https://git.kernel.org/stable/c/789326cafbd1f67f424436b6bc8bdb887a364637
https://git.kernel.org/stable/c/ae11f04b452b5205536e1c02d31f8045eba249dd
https://git.kernel.org/stable/c/d56d2ca03cc22123fd7626967d096d8661324e57
https://git.kernel.org/stable/c/fc2b655cb6dd2b381f1f284989721002e39b6b77
rh#2284563
CVE-2024-36895kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-36895
SMASH Issue 408229
bnc#1225750
https://git.kernel.org/stable/c/650ae71c80749fc7cb8858c8049f532eaec64410
https://git.kernel.org/stable/c/7a54e5052bde582fd0e7677334fe7a5be92e242c
https://git.kernel.org/stable/c/a422089ce42ced73713e5032aad29a9a7cbe9528
rh#2284558
CVE-2024-36896kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36896
SMASH Issue 408230
bnc#1225734
https://git.kernel.org/stable/c/5f1d68ef5ddac27c6b997adccd1c339cef1e6848
https://git.kernel.org/stable/c/6119ef6517ce501fc548154691abdaf1f954a277
https://git.kernel.org/stable/c/63533549ff53d24daf47c443dbd43c308afc3434
https://git.kernel.org/stable/c/a4b46d450c49f32e9d4247b421e58083fde304ce
rh#2284556
CVE-2024-36897kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36897
SMASH Issue 408174
bnc#1225735
https://git.kernel.org/stable/c/02f5300f6827206f6e48a77f51e6264993695e5c
https://git.kernel.org/stable/c/3c7013a87124bab54216d9b99f77e8b6de6fbc1a
https://git.kernel.org/stable/c/7e3030774431eb093165a31baff040d35446fb8b
https://git.kernel.org/stable/c/9a35d205f466501dcfe5625ca313d944d0ac2d60
https://git.kernel.org/stable/c/c2797ec16d9072327e7578d09ee05bcab52fffd0
rh#2284553
CVE-2024-36898kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L)CVE-2024-36898
SMASH Issue 408181
bnc#1225736
https://git.kernel.org/stable/c/1a51e24404d77bb3307c1e39eee0d8e86febb1a5
https://git.kernel.org/stable/c/883e4bbf06eb5fb7482679e4edb201093e9f55a2
https://git.kernel.org/stable/c/bd7139a70ee8d8ea872b223e043730cf6f5e2b0e
https://git.kernel.org/stable/c/ee0166b637a5e376118e9659e5b4148080f1d27e
rh#2284551
CVE-2024-36899kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-36899
SMASH Issue 408191
bnc#1225737
bnc#1225739
https://git.kernel.org/stable/c/02f6b0e1ec7e0e7d059dddc893645816552039da
https://git.kernel.org/stable/c/95ca7c90eaf5ea8a8460536535101e3e81160e2a
https://git.kernel.org/stable/c/ca710b5f40b8b16fdcad50bebd47f50e4c62d239
rh#2284549
CVE-2024-36900kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36900
SMASH Issue 408226
bnc#1225726
https://git.kernel.org/stable/c/35d92abfbad88cf947c010baf34b075e40566095
https://git.kernel.org/stable/c/5c623fe0534806b627054da09b6f51b7b2f7b9cd
https://git.kernel.org/stable/c/72ede790f5a03c3957487400a1b72ebce293a2e7
https://git.kernel.org/stable/c/c98bc78ce0909ccc92005e2cb6609ec6c7942f69
rh#2284547
CVE-2024-36903kernel-source-rt:Not affectedmoderate5.6 (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)CVE-2024-36903
SMASH Issue 408201
bnc#1225741
https://git.kernel.org/stable/c/2367bf254f3a27ecc6e229afd7a8b0a1395f7be3
https://git.kernel.org/stable/c/4e13d3a9c25b7080f8a619f961e943fe08c2672c
https://git.kernel.org/stable/c/68c8ba16ab712eb709c6bab80ff151079d11d97a
rh#2284543
CVE-2024-36906kernel-source-rt:Not affectedlow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-36906
SMASH Issue 408189
bnc#1225715
https://git.kernel.org/stable/c/20ac71bee028ffbae4fc14ed679b23b4d3e95726
https://git.kernel.org/stable/c/ad702338fe423cb1e79745787090317256a98dab
https://git.kernel.org/stable/c/b26f353786d365e658cebc9a9ace88e04fc2325e
https://git.kernel.org/stable/c/c4238686f9093b98bd6245a348bcf059cdce23af
https://git.kernel.org/stable/c/ee0ce7573e5083031960faf602c9db693ab5b477
rh#2284537
CVE-2024-36907kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36907
SMASH Issue 408140
bnc#1225751
https://git.kernel.org/stable/c/024f7744bd09cb2a47a0a96b9c8ad08109de99cc
https://git.kernel.org/stable/c/8e088a20dbe33919695a8082c0b32deb62d23b4a
https://git.kernel.org/stable/c/9b332c72299f2ac284ab3d7c0301969b933e4ca1
rh#2284536
CVE-2024-36908kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36908
SMASH Issue 408224
bnc#1225743
https://git.kernel.org/stable/c/01bc4fda9ea0a6b52f12326486f07a4910666cf6
https://git.kernel.org/stable/c/14b3275f93d4a0d8ddc02195bc4e9869b7a3700e
https://git.kernel.org/stable/c/1c172ac7afe4442964f4153b2c78fe4e005d9d67
rh#2284632
CVE-2024-36912kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2024-36912
SMASH Issue 408209
bnc#1225752
https://git.kernel.org/stable/c/1999644d95194d4a58d3e80ad04ce19220a01a81
https://git.kernel.org/stable/c/211f514ebf1ef5de37b1cf6df9d28a56cfd242ca
https://git.kernel.org/stable/c/8e62341f5c45b27519b7d193bcc32ada416ad9d8
https://git.kernel.org/stable/c/bfae56be077ba14311509e70706a13458f87ea99
rh#2284529
CVE-2024-36913kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)CVE-2024-36913
SMASH Issue 408202
bnc#1225753
https://git.kernel.org/stable/c/03f5a999adba062456c8c818a683beb1b498983a
https://git.kernel.org/stable/c/6123a4e8e25bd40cf44db14694abac00e6b664e6
https://git.kernel.org/stable/c/e813a0fc2e597146e9cebea61ced9c796d4e308f
rh#2284527
CVE-2024-36915kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H)CVE-2024-36915
SMASH Issue 408165
bnc#1225758
https://git.kernel.org/stable/c/29dc0ea979d433dd3c26abc8fa971550bdc05107
https://git.kernel.org/stable/c/7a87441c9651ba37842f4809224aca13a554a26f
rh#2284523
CVE-2024-36916kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2024-36916
SMASH Issue 408217
bnc#1225759
https://git.kernel.org/stable/c/488dc6808cb8369685f18cee81e88e7052ac153b
https://git.kernel.org/stable/c/62accf6c1d7b433752cb3591bba8967b7a801ad5
https://git.kernel.org/stable/c/844fc023e9f14a4fb1de5ae1eaefafd6d69c5fa1
https://git.kernel.org/stable/c/beaa51b36012fad5a4d3c18b88a617aea7a9b96d
https://git.kernel.org/stable/c/ce0e99cae00e3131872936713b7f55eefd53ab86
https://git.kernel.org/stable/c/f6add0a6f78dc6360b822ca4b6f9f2f14174c8ca
rh#2284521
CVE-2024-36918kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36918
SMASH Issue 408193
bnc#1225766
https://git.kernel.org/stable/c/608e13706c8b6c658a0646f09ebced74ec367f7c
https://git.kernel.org/stable/c/a8d89feba7e54e691ca7c4efc2a6264fa83f3687
https://git.kernel.org/stable/c/c418afb9bf23e2f2b76cb819601e4a5d9dbab42d
https://git.kernel.org/stable/c/fa6995eeb62e74b5a1480c73fb7b420c270784d3
rh#2284517
CVE-2024-36920kernel-source-rt:Not affectedlow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-36920
SMASH Issue 408238
bnc#1225768
https://git.kernel.org/stable/c/429846b4b6ce9853e0d803a2357bb2e55083adf0
https://git.kernel.org/stable/c/4d2772324f43cf5674ac3dbe3f74a7e656396716
https://git.kernel.org/stable/c/5f0266044dc611563539705bff0b3e1545fbb6aa
https://git.kernel.org/stable/c/f09318244c6cafd10aca741b9c01e0a2c362d43a
rh#2284515
CVE-2024-36921kernel-source-rt:Not affectedimportant8 (CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)CVE-2024-36921
SMASH Issue 408215
bnc#1225769
bnc#1225850
https://git.kernel.org/stable/c/17f64517bf5c26af56b6c3566273aad6646c3c4f
https://git.kernel.org/stable/c/94f80a8ec15e238b78521f20f8afaed60521a294
https://git.kernel.org/stable/c/fab21d220017daa5fd8a3d788ff25ccfecfaae2f
rh#2284513
CVE-2024-36922kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36922
SMASH Issue 408221
bnc#1225805
https://git.kernel.org/stable/c/43d07103df670484cdd26f9588eabef80f69db89
https://git.kernel.org/stable/c/b83db8e756dec68a950ed2f056248b1704b3deaa
https://git.kernel.org/stable/c/c2ace6300600c634553657785dfe5ea0ed688ac2
rh#2284511
CVE-2024-36925kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36925
SMASH Issue 408241
bnc#1225816
https://git.kernel.org/stable/c/75961ffb5cb3e5196f19cae7683f35cc88b50800
https://git.kernel.org/stable/c/f2a6b3ed20f2dea4cb645abc6a73c4595662adca
https://git.kernel.org/stable/c/f62e0fefcdfe2c05ccb1aa80521a69524eea9c84
rh#2284504
CVE-2024-36926kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36926
SMASH Issue 408169
bnc#1225829
https://git.kernel.org/stable/c/2bed905a72485a2b79a001bd7e66c750942d2155
https://git.kernel.org/stable/c/49a940dbdc3107fecd5e6d3063dc07128177e058
https://git.kernel.org/stable/c/7fb5793c53f8c024e3eae9f0d44eb659aed833c4
https://git.kernel.org/stable/c/802b13b79ab1fef66c6852fc745cf197dca0cb15
rh#2284502
CVE-2024-36927kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36927
SMASH Issue 408240
bnc#1225813
https://git.kernel.org/stable/c/5db08343ddb1b239320612036c398e4e1bb52818
https://git.kernel.org/stable/c/f5c603ad4e6fcf42f84053e882ebe20184bb309e
https://git.kernel.org/stable/c/fc1092f51567277509563800a3c56732070b6aa4
rh#2284500
CVE-2024-36928kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36928
SMASH Issue 408195
bnc#1225775
https://git.kernel.org/stable/c/10cb803aff3b11fe0bd5f274fc1c231a43e88df6
https://git.kernel.org/stable/c/8792b557eb50b986f2496156d486d0c7c85a1524
https://git.kernel.org/stable/c/8a2e4d37afb8500b276e5ee903dee06f50ab0494
https://git.kernel.org/stable/c/e28dd1e1bf3ebb52cdb877fb359e8978a51576e3
https://git.kernel.org/stable/c/eae0aec245712c52a3ce9c05575b541a9eef5282
rh#2284498
CVE-2024-36929kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36929
SMASH Issue 408177
bnc#1225814
https://git.kernel.org/stable/c/989bf6fd1e1d058e73a364dce1a0c53d33373f62
https://git.kernel.org/stable/c/aea5e2669c2863fdd8679c40ee310b3bcaa85aec
https://git.kernel.org/stable/c/c7af99cc21923a9650533c9d77265c8dd683a533
https://git.kernel.org/stable/c/cfe34d86ef9765c388f145039006bb79b6c81ac6
https://git.kernel.org/stable/c/d091e579b864fa790dd6a0cd537a22c383126681
https://git.kernel.org/stable/c/faa83a7797f06cefed86731ba4baa3b4dfdc06c1
rh#2284496
CVE-2024-36930kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36930
SMASH Issue 408213
bnc#1225830
https://git.kernel.org/stable/c/2070d008cc08bff50a58f0f4d30f12d3ebf94c00
https://git.kernel.org/stable/c/4756fa529b2f12b7cb8f21fe229b0f6f47190829
https://git.kernel.org/stable/c/a30659f1576d2c8e62e7426232bb18b885fd951a
https://git.kernel.org/stable/c/e005d6754e3e440257006795b687c4ad8733b493
rh#2284494
CVE-2024-36931kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L)CVE-2024-36931
SMASH Issue 408211
bnc#1225747
https://git.kernel.org/stable/c/06759ebaf75c19c87b2453a5e130e9e61e9b5d65
https://git.kernel.org/stable/c/10452edd175fcc4fd0f5ac782ed2a002e3e5d65c
https://git.kernel.org/stable/c/84b38f48836662c4bfae646c014f4e981e16a2b2
https://git.kernel.org/stable/c/c9d48ce163305595ae20aee27774192476d5e6a5
https://git.kernel.org/stable/c/da7c622cddd4fe36be69ca61e8c42e43cde94784
rh#2284492
CVE-2024-36932kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2024-36932
SMASH Issue 408236
bnc#1225831
https://git.kernel.org/stable/c/c1279dee33369e2525f532364bb87207d23b9481
https://git.kernel.org/stable/c/d351eb0ab04c3e8109895fc33250cebbce9c11da
rh#2284490
CVE-2024-36935kernel-source-rt:Not affectedmoderate5.1 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L)CVE-2024-36935
SMASH Issue 408178
bnc#1225763
https://git.kernel.org/stable/c/5ff4de981983ed84f29b5d92b6550ec054e12a92
https://git.kernel.org/stable/c/666854ea9cad844f75a068f32812a2d78004914a
rh#2284484
CVE-2024-36936kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-36936
SMASH Issue 408187
bnc#1225773
https://git.kernel.org/stable/c/1c5a1627f48105cbab81d25ec2f72232bfaa8185
https://git.kernel.org/stable/c/781e34b736014188ba9e46a71535237313dcda81
CVE-2024-36937kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36937
SMASH Issue 408196
bnc#1225834
https://git.kernel.org/stable/c/12481f30128fbebc2eeb55eb2d56390fdfa30c5e
https://git.kernel.org/stable/c/272bfb019f3cc018f654b992115774e77b4f3ffc
https://git.kernel.org/stable/c/5bcf0dcbf9066348058b88a510c57f70f384c92c
https://git.kernel.org/stable/c/6fd81f9d333e7b3532036577b1beb74ba1323553
https://git.kernel.org/stable/c/e22e25820fa04ea5eaac4ef7ee200e9923f466a4
rh#2284481
CVE-2024-36939kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36939
SMASH Issue 408197
bnc#1225838
https://git.kernel.org/stable/c/24457f1be29f1e7042e50a7749f5c2dde8c433c8
https://git.kernel.org/stable/c/8a1f89c98dcc542dd6d287e573523714702e0f9c
https://git.kernel.org/stable/c/8ae63bd858691bee0e2a92571f2fbb36a4d86d65
https://git.kernel.org/stable/c/9909dde2e53a19585212c32fe3eda482b5faaaa3
https://git.kernel.org/stable/c/b33ca18c3a1190208dfd569c4fa8a2f93084709f
https://git.kernel.org/stable/c/d4891d817350c67392d4731536945f3809a2a0ba
https://git.kernel.org/stable/c/ea6ce93327bd2c8a0c6cf6f2f0e800f3b778f021
rh#2284628
CVE-2024-36942kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L)CVE-2024-36942
SMASH Issue 408203
bnc#1225843
https://git.kernel.org/stable/c/064688d70c33bb5b49dde6e972b9379a8b045d8a
https://git.kernel.org/stable/c/40d442f969fb1e871da6fca73d3f8aef1f888558
https://git.kernel.org/stable/c/580bcd6bf24f9975f97d81d5ef1b64cca9240df9
https://git.kernel.org/stable/c/7bcba557d5c37cd09ecd5abbe7d50deb86c36d3f
https://git.kernel.org/stable/c/d1f768214320852766a60a815a0be8f14fba0cc3
rh#2284472
CVE-2024-36943kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2024-36943
SMASH Issue 408166
bnc#1225844
https://git.kernel.org/stable/c/74b3d66f91d9f539f99faad74d796fa9a389a015
https://git.kernel.org/stable/c/c70dce4982ce1718bf978a35f8e26160b82081f4
rh#2284470
CVE-2024-36945kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36945
SMASH Issue 408237
bnc#1225823
https://git.kernel.org/stable/c/2ddc0dd7fec86ee53b8928a5cca5fbddd4fc7c06
https://git.kernel.org/stable/c/5df93c029a907b0ff5a4eeadd77ba06ff0a277d2
https://git.kernel.org/stable/c/d5a466ab6e78d6f2e0f64435f1e17246c8e941ff
https://git.kernel.org/stable/c/da91e447d06dc649fcf46e59122e7bf8f0b2e0db
rh#2284465
CVE-2024-36947kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2024-36947
SMASH Issue 408219
bnc#1225856
https://git.kernel.org/stable/c/02ee394a5d899d9bd2f0759382e9481cab6166f8
https://git.kernel.org/stable/c/24dd9b08df718f20ccf2dd1519909fefd8c233ee
https://git.kernel.org/stable/c/aa23317d0268b309bb3f0801ddd0d61813ff5afb
https://git.kernel.org/stable/c/bd8f78c71defbcb7a9ed331e7f287507df972b00
https://git.kernel.org/stable/c/db71ca93259dd1078bcfea3afafde2143cfc2da7
rh#2284461
CVE-2024-36948kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L)CVE-2024-36948
SMASH Issue 408225
bnc#1225845
https://git.kernel.org/stable/c/9cb46b31f3d08ed3fce86349e8c12f96d7c88717
https://git.kernel.org/stable/c/e23a904dfeb5a9e3d4ec527a365e962478cccf05
rh#2284458
CVE-2024-36954kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36954
SMASH Issue 408149
bnc#1225764
https://git.kernel.org/stable/c/01cd1b7b685751ee422d00d050292a3d277652d6
https://git.kernel.org/stable/c/2f87fd9476cf9725d774e6dcb7d17859c6a6d1ae
https://git.kernel.org/stable/c/3210d34fda4caff212cb53729e6bd46de604d565
https://git.kernel.org/stable/c/42c8471b0566c7539e7dd584b4d0ebd3cec8cb2c
https://git.kernel.org/stable/c/614c5a5ae45a921595952117b2e2bd4d4bf9b574
https://git.kernel.org/stable/c/97bf6f81b29a8efaf5d0983251a7450e5794370d
https://git.kernel.org/stable/c/adbce6d20da6254c86425a8d4359b221b5ccbccd
https://git.kernel.org/stable/c/d03a82f4f8144befdc10518e732e2a60b34c870e
rh#2284590
CVE-2024-36955kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-36955
SMASH Issue 408163
bnc#1225810
https://git.kernel.org/stable/c/722d33c442e66e4aabd3e778958d696ff3a2777e
https://git.kernel.org/stable/c/7db626d2730d3d80fd31638169054b1e507f07bf
https://git.kernel.org/stable/c/7ef6ecf98ce309b1f4e5a25cddd5965d01feea07
https://git.kernel.org/stable/c/bd2d9641a39e6b5244230c4b41c4aca83b54b377
https://git.kernel.org/stable/c/c158cf914713efc3bcdc25680c7156c48c12ef6a
rh#2284586
CVE-2024-36956kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-36956
SMASH Issue 408170
bnc#1225874
https://git.kernel.org/stable/c/72c1afffa4c645fe0e0f1c03e5f34395ed65b5f4
https://git.kernel.org/stable/c/f51564e4b3992b53df79460ed5781a5330b5b1d5
rh#2284583
CVE-2024-36957kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-36957
SMASH Issue 408183
bnc#1225762
https://git.kernel.org/stable/c/0a0285cee11c7dcc2657bcd456e469958a5009e7
https://git.kernel.org/stable/c/8f11fe3ea3fc261640cfc8a5addd838000407c67
https://git.kernel.org/stable/c/bcdac70adceb44373da204c3c297f2a98e13216e
https://git.kernel.org/stable/c/ec697fbd38cbe2eef0948b58673b146caa95402f
https://git.kernel.org/stable/c/f299ee709fb45036454ca11e90cb2810fe771878
https://git.kernel.org/stable/c/fc3e0076c1f82fe981d321e3a7bad4cbee542c19
rh#2284581
CVE-2024-36958kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36958
SMASH Issue 408194
bnc#1225873
https://git.kernel.org/stable/c/18180a4550d08be4eb0387fe83f02f703f92d4e7
https://git.kernel.org/stable/c/6a7b07689af6e4e023404bf69b1230f43b2a15bc
rh#2284579
CVE-2024-36959kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36959
SMASH Issue 408234
bnc#1225839
https://git.kernel.org/stable/c/026e24cf31733dbd97f41cc9bc5273ace428eeec
https://git.kernel.org/stable/c/06780473cb8a858d1d6cab2673e021b072a852d1
https://git.kernel.org/stable/c/35ab679e8bb5a81a4f922d3efbd43e32bce69274
https://git.kernel.org/stable/c/47d253c485491caaf70d8cd8c0248ae26e42581f
https://git.kernel.org/stable/c/518d5ddafeb084d6d9b1773ed85164300037d0e6
https://git.kernel.org/stable/c/76aa2440deb9a35507590f2c981a69a57ecd305d
https://git.kernel.org/stable/c/a0cedbcc8852d6c77b00634b81e41f17f29d9404
https://git.kernel.org/stable/c/c7e02ccc9fdc496fe51e440e3e66ac36509ca049
rh#2284636
CVE-2024-36961kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2024-36961
SMASH Issue 408457
bnc#1225857
https://git.kernel.org/stable/c/6c57bdd0505422d5ccd2df541d993aec978c842e
https://git.kernel.org/stable/c/c7f7c37271787a7f77d7eedc132b0b419a76b4c8
rh#2290407
CVE-2024-36962kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36962
SMASH Issue 408456
bnc#1225827
https://git.kernel.org/stable/c/7e2901a2a9195da76111f351584bf77552a038f0
https://git.kernel.org/stable/c/8a3ff43dcbab7c96f9e8cf2bd1049ab8d6e59545
https://git.kernel.org/stable/c/ae87f661f3c1a3134a7ed86ab69bf9f12af88993
https://git.kernel.org/stable/c/e0863634bf9f7cf36291ebb5bfa2d16632f79c49
rh#2290406
CVE-2024-36963kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)CVE-2024-36963
SMASH Issue 408448
bnc#1225836
https://git.kernel.org/stable/c/414fb08628143203d29ccd0264b5a83fb9523c03
https://git.kernel.org/stable/c/5f91fc82794d4a6e41cdcd02d00baa377d94ca78
https://git.kernel.org/stable/c/baa23a8d4360d981a49913841a726edede5cdd54
rh#2290405
CVE-2024-36965kernel-source-rt:Not affectedmoderate5.6 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H)CVE-2024-36965
SMASH Issue 409720
bnc#1226149
https://git.kernel.org/stable/c/00548ac6b14428719c970ef90adae2b3b48c0cdf
https://git.kernel.org/stable/c/1d9e2de24533daca36cbf09e8d8596bf72b526b2
https://git.kernel.org/stable/c/26c6d7dc8c6a9fde9d362ab2eef6390efeff145e
https://git.kernel.org/stable/c/331f91d86f71d0bb89a44217cc0b2a22810bbd42
https://git.kernel.org/stable/c/36c79eb4845551e9f6d28c663b38ce0ab03b84a9
https://git.kernel.org/stable/c/838b49e211d59fa827ff9df062d4020917cffbdf
rh#2292325
CVE-2024-36966kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2024-36966
SMASH Issue 409721
bnc#1226154
https://git.kernel.org/stable/c/7af2ae1b1531feab5d38ec9c8f472dc6cceb4606
https://git.kernel.org/stable/c/dcdd49701e429c55b3644fd70fc58d85745f8cfe
https://git.kernel.org/stable/c/f9b877a7ee312ec8ce17598a7ef85cb820d7c371
rh#2292330
CVE-2024-36967kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36967
SMASH Issue 409722
bnc#1226131
https://git.kernel.org/stable/c/189c768932d435045b1fae12bf63e53866f06a28
https://git.kernel.org/stable/c/1e6914fa8e7798bcf3ce4a5b96ea4ac1d5571cdf
https://git.kernel.org/stable/c/5d91238b590bd883c86ba7707c5c9096469c08b7
https://git.kernel.org/stable/c/cf26a92f560eed5d6ddc3d441cc645950cbabc56
https://git.kernel.org/stable/c/e62835264d0352be6086975f18fdfed2b5520b13
https://git.kernel.org/stable/c/ffcaa2172cc1a85ddb8b783de96d38ca8855e248
rh#2292329
CVE-2024-36969kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36969
SMASH Issue 409724
bnc#1226155
https://git.kernel.org/stable/c/130afc8a886183a94cf6eab7d24f300014ff87ba
https://git.kernel.org/stable/c/308de6be0c9c7ba36915c0d398e771725c0ea911
https://git.kernel.org/stable/c/7e4f50dfc98c49b3dc6875a35c3112522fb25639
https://git.kernel.org/stable/c/91402e0e5de9124a3108db7a14163fcf9a6d322f
https://git.kernel.org/stable/c/a32c8f951c8a456c1c251e1dcdf21787f8066445
https://git.kernel.org/stable/c/f187fcbbb8f8bf10c6687f0beae22509369f7563
rh#2292328
CVE-2024-36970kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36970
SMASH Issue 409725
bnc#1226127
https://git.kernel.org/stable/c/3d913719df14c28c4d3819e7e6d150760222bda4
https://git.kernel.org/stable/c/d20013259539e2fde2deeac85354851097afdf9e
rh#2292326
CVE-2024-36972kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36972
SMASH Issue 409921
bnc#1226163
https://git.kernel.org/stable/c/4708f49add84a57ce0ccc7bf9a6269845c631cc3
https://git.kernel.org/stable/c/4bf6964451c3cb411fbaa1ae8b214b3d97a59bf1
https://git.kernel.org/stable/c/518a994aa0b87d96f1bc6678a7035df5d1fcd7a1
https://git.kernel.org/stable/c/9841991a446c87f90f66f4b9fee6fe934c1336a2
https://git.kernel.org/stable/c/d59ae9314b97e01c76a4171472441e55721ba636
rh#2291269
CVE-2024-36973kernel-source-rt:Not affectedmoderate6.2 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36973
SMASH Issue 411127
bnc#1226457
https://git.kernel.org/stable/c/086c6cbcc563c81d55257f9b27e14faf1d0963d3
https://git.kernel.org/stable/c/1efe551982297924d05a367aa2b6ec3d275d5742
https://git.kernel.org/stable/c/34ae447b138680b5ed3660f7d935ff3faf88ba1a
https://git.kernel.org/stable/c/86c9713602f786f441630c4ee02891987f8618b9
rh#2292858
CVE-2024-36975kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36975
SMASH Issue 411235
bnc#1226520
https://git.kernel.org/stable/c/050bf3c793a07f96bd1e2fd62e1447f731ed733b
https://git.kernel.org/stable/c/1c652e1e10676f942149052d9329b8bf2703529a
https://git.kernel.org/stable/c/681935009fec3fc22af97ee312d4a24ccf3cf087
https://git.kernel.org/stable/c/96f650995c70237b061b497c66755e32908f8972
https://git.kernel.org/stable/c/d32c6e09f7c4bec3ebc4941323f0aa6366bc1487
https://git.kernel.org/stable/c/ff91cc12faf798f573dab2abc976c1d5b1862fea
rh#2293002
CVE-2024-36976kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36976
SMASH Issue 411238
bnc#1226511
https://git.kernel.org/stable/c/2e0ce54a9c5c7013b1257be044d99cbe7305e9f1
https://git.kernel.org/stable/c/eba63df7eb1f95df6bfb67722a35372b6994928d
rh#2293005
CVE-2024-36977kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-36977
SMASH Issue 411237
bnc#1226513
https://git.kernel.org/stable/c/1ba145f05b5c8f0b1a947a0633b5edff5dd1f1c5
https://git.kernel.org/stable/c/1d26ba0944d398f88aaf997bda3544646cf21945
https://git.kernel.org/stable/c/341eb08dbca9eae05308c442fbfab1813a44c97a
https://git.kernel.org/stable/c/4a387e032909c6dc2b479452c5bbe9a252057925
https://git.kernel.org/stable/c/ec96bcf5f96a7a5c556b0e881ac3e5c3924d542c
rh#2293000
CVE-2024-36979kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-36979
SMASH Issue 411399
bnc#1226604
https://git.kernel.org/stable/c/3a7c1661ae1383364cd6092d851f5e5da64d476b
https://git.kernel.org/stable/c/4488617e5e995a09abe4d81add5fb165674edb59
https://git.kernel.org/stable/c/8ca9a750fc711911ef616ceb627d07357b04545e
https://git.kernel.org/stable/c/a2b01e65d9ba8af2bb086d3b7288ca53a07249ac
https://git.kernel.org/stable/c/e43dd2b1ec746e105b7db5f9ad6ef14685a615a4
rh#2293194
rh#2293276
CVE-2024-37026kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-37026
SMASH Issue 411980
bnc#1226951
https://git.kernel.org/stable/c/92deed4a9bfd9ef187764225bba530116c49e15c
https://git.kernel.org/stable/c/c8ea2c31f5ea437199b239d76ad5db27343edb0c
rh#2294210
CVE-2024-38381kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2024-38381
SMASH Issue 411753
bnc#1226878
https://git.kernel.org/stable/c/017ff397624930fd7ac7f1761f3c9d6a7100f68c
https://git.kernel.org/stable/c/406cfac9debd4a6d3dc5d9258ee086372a8c08b6
https://git.kernel.org/stable/c/485ded868ed62ceb2acb3a459d7843fd71472619
https://git.kernel.org/stable/c/ad4d196d2008c7f413167f0a693feb4f0439d7fe
https://git.kernel.org/stable/c/e4a87abf588536d1cdfb128595e6e680af5cf3ed
https://git.kernel.org/stable/c/e53a7f8afcbd2886f2a94c5d56757328109730ea
https://git.kernel.org/stable/c/e8c8e0d0d214c877fbad555df5b3ed558cd9b0c3
https://git.kernel.org/stable/c/f80b786ab0550d0020191a59077b2c7e069db2d1
rh#2293683
CVE-2024-38384kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38384
SMASH Issue 411979
bnc#1226938
https://git.kernel.org/stable/c/714e59b5456e4d6e4295a9968c564abe193f461c
https://git.kernel.org/stable/c/785298ab6b802afa75089239266b6bbea590809c
https://git.kernel.org/stable/c/d0aac2363549e12cc79b8e285f13d5a9f42fd08e
rh#2294220
CVE-2024-38388kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-38388
SMASH Issue 411754
bnc#1226890
https://git.kernel.org/stable/c/172811e3a557d8681a5e2d0f871dc04a2d17eb13
https://git.kernel.org/stable/c/191dc1b2ff0fb35e7aff15a53224837637df8bff
https://git.kernel.org/stable/c/3291486af5636540980ea55bae985f3eaa5b0740
https://git.kernel.org/stable/c/6e359be4975006ff72818e79dad8fe48293f2eb2
rh#2293656
CVE-2024-38390kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38390
SMASH Issue 411755
bnc#1226891
https://git.kernel.org/stable/c/247849eeb3fd88f8990ed73e33af70d5c10f9aec
https://git.kernel.org/stable/c/46d4efcccc688cbacdd70a238bedca510acaa8e4
https://git.kernel.org/stable/c/617e3d1680504a3f9d88e1582892c68be155498f
https://git.kernel.org/stable/c/a1955a6df91355fef72a3a254700acd3cc1fec0d
rh#2293689
CVE-2024-38391kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-38391
SMASH Issue 411756
bnc#1226894
https://git.kernel.org/stable/c/1c987cf22d6b65ade46145c03eef13f0e3e81d83
https://git.kernel.org/stable/c/24b9362c9fa57f9291b380a3cc77b8b5c9fa27da
https://git.kernel.org/stable/c/eef8d414b07a1e85c1367324fb6c6a46b79269bd
rh#2293688
CVE-2024-38539kernel-source-rt:Not affectedlow2.3 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L)CVE-2024-38539
SMASH Issue 411402
bnc#1226608
https://git.kernel.org/stable/c/3eb127dc408bf7959a4920d04d16ce10e863686a
https://git.kernel.org/stable/c/6564fc1818404254d1c9f7d75b403b4941516d26
https://git.kernel.org/stable/c/9c0731832d3b7420cbadba6a7f334363bc8dfb15
https://git.kernel.org/stable/c/b3a7fb93afd888793ef226e9665fbda98a95c48e
rh#2293460
CVE-2024-38540kernel-source-rt:Ignoremoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38540
SMASH Issue 411403
bnc#1226582
https://git.kernel.org/stable/c/627493443f3a8458cb55cdae1da254a7001123bc
https://git.kernel.org/stable/c/78cfd17142ef70599d6409cbd709d94b3da58659
https://git.kernel.org/stable/c/8b799c00cea6fcfe5b501bbaeb228c8821acb753
https://git.kernel.org/stable/c/a658f011d89dd20cf2c7cb4760ffd79201700b98
rh#2293459
CVE-2024-38542kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2024-38542
SMASH Issue 411379
bnc#1226591
https://git.kernel.org/stable/c/168f6fbde0eabd71d1f4133df7d001a950b96977
https://git.kernel.org/stable/c/f12afddfb142587d786df9e3cc4862190d3e2ec8
https://git.kernel.org/stable/c/f79edef79b6a2161f4124112f9b0c46891bb0b74
rh#2293457
CVE-2024-38543kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38543
SMASH Issue 411438
bnc#1226594
https://git.kernel.org/stable/c/1a21fdeea502658e315bd939409b755974f4fb64
https://git.kernel.org/stable/c/3b20d18f475bd17309db640dbe7d7c7ebb5bc2bc
https://git.kernel.org/stable/c/65e528a69cb3ed4a286c45b4afba57461c8b5b33
https://git.kernel.org/stable/c/c2af060d1c18beaec56351cf9c9bcbbc5af341a3
https://git.kernel.org/stable/c/ce47e8ead9a72834cc68431d53f8092ce69bebb7
rh#2293456
CVE-2024-38550kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38550
SMASH Issue 411340
bnc#1226633
https://git.kernel.org/stable/c/1a7254525ca7a6f3e37d7882d7f7ad97f6235f7c
https://git.kernel.org/stable/c/5bf5154739cd676b6d0958079070557c8d96afb6
https://git.kernel.org/stable/c/802b49e39da669b54bd9b77dc3c649999a446bf6
https://git.kernel.org/stable/c/d48d0c5fd733bd6d8d3ddb2ed553777ab4724169
https://git.kernel.org/stable/c/de9987cec6fde1dd41dfcb971433e05945852489
https://git.kernel.org/stable/c/ea60ab95723f5738e7737b56dda95e6feefa5b50
rh#2293449
CVE-2024-38551kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38551
SMASH Issue 411436
bnc#1226761
https://git.kernel.org/stable/c/0c052b1c11d8119f3048b1f7b3c39a90500cacf9
https://git.kernel.org/stable/c/5f39231888c63f0a7708abc86b51b847476379d8
https://git.kernel.org/stable/c/87b8dca6e06f9b1681bc52bf7bfa85c663a11158
https://git.kernel.org/stable/c/cbbcabc7f0979f6542372cf88d7a9da7143a4226
rh#2293448
CVE-2024-38554kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38554
SMASH Issue 411348
bnc#1226742
https://git.kernel.org/stable/c/36e56b1b002bb26440403053f19f9e1a8bc075b2
https://git.kernel.org/stable/c/3ec437f9bbae68e9b38115c4c91de995f73f6bad
https://git.kernel.org/stable/c/8bad3a20a27be8d935f2aae08d3c6e743754944a
https://git.kernel.org/stable/c/965d940fb7414b310a22666503d2af69459c981b
https://git.kernel.org/stable/c/eef95df9b752699bddecefa851f64858247246e9
rh#2293445
CVE-2024-38555kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38555
SMASH Issue 411460
bnc#1226607
https://git.kernel.org/stable/c/1337ec94bc5a9eed250e33f5f5c89a28a6bfabdb
https://git.kernel.org/stable/c/1d5dce5e92a70274de67a59e1e674c3267f94cd7
https://git.kernel.org/stable/c/3cb92b0ad73d3f1734e812054e698d655e9581b0
https://git.kernel.org/stable/c/7ac4c69c34240c6de820492c0a28a0bd1494265a
https://git.kernel.org/stable/c/bf8aaf0ae01c27ae3c06aa8610caf91e50393396
https://git.kernel.org/stable/c/db9b31aa9bc56ff0d15b78f7e827d61c4a096e40
https://git.kernel.org/stable/c/f6fbb8535e990f844371086ab2c1221f71f993d3
rh#2293444
CVE-2024-38556kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38556
SMASH Issue 411390
bnc#1226774
https://git.kernel.org/stable/c/2d0962d05c93de391ce85f6e764df895f47c8918
https://git.kernel.org/stable/c/485d65e1357123a697c591a5aeb773994b247ad7
https://git.kernel.org/stable/c/4baae687a20ef2b82fde12de3c04461e6f2521d6
https://git.kernel.org/stable/c/94024332a129c6e4275569d85c0c1bfb2ae2d71b
https://git.kernel.org/stable/c/f9caccdd42e999b74303c9b0643300073ed5d319
rh#2293443
CVE-2024-38557kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38557
SMASH Issue 411420
bnc#1226781
https://git.kernel.org/stable/c/0f06228d4a2dcc1fca5b3ddb0eefa09c05b102c4
https://git.kernel.org/stable/c/0f320f28f54b1b269a755be2e3fb3695e0b80b07
https://git.kernel.org/stable/c/e93fc8d959e56092e2eca1e5511c2d2f0ad6807a
https://git.kernel.org/stable/c/f03c714a0fdd1f93101a929d0e727c28a66383fc
rh#2293442
CVE-2024-38561kernel-source-rt:Not affectedlow0 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N)CVE-2024-38561
SMASH Issue 411408
bnc#1226736
https://git.kernel.org/stable/c/1ec7ccb4cd4b6f72c2998b07880fa7aaf8dfe1d4
https://git.kernel.org/stable/c/1f2ebd3758e1cef6a1f998a1f7ea73310dcb1699
https://git.kernel.org/stable/c/8f5c841a559ccb700c8d27a3ca645b7a5f59b4f5
https://git.kernel.org/stable/c/b0b755cb5a5e0d7168c3ab1b3814b0d3cad9f017
https://git.kernel.org/stable/c/f8aa1b98ce40184521ed95ec26cc115a255183b2
rh#2293432
CVE-2024-38562kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38562
SMASH Issue 411451
bnc#1226788
https://git.kernel.org/stable/c/4e2a5566462b53db7d4c4722da86eedf0b8f546c
https://git.kernel.org/stable/c/838c7b8f1f278404d9d684c34a8cb26dc41aaaa1
https://git.kernel.org/stable/c/8fa4d56564ee7cc2ee348258d88efe191d70dd7f
https://git.kernel.org/stable/c/ed74398642fcb19f6ff385c35a7d512c6663e17b
rh#2293431
CVE-2024-38563kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38563
SMASH Issue 411394
bnc#1226743
https://git.kernel.org/stable/c/474b9412f33be87076b40a49756662594598a85e
https://git.kernel.org/stable/c/84e81f9b4818b8efe89beb12a246d5d510631939
https://git.kernel.org/stable/c/ef46dbb93fc9279fb7de883aac22abffe214e6b5
rh#2293430
CVE-2024-38564kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38564
SMASH Issue 411464
bnc#1226789
https://git.kernel.org/stable/c/543576ec15b17c0c93301ac8297333c7b6e84ac7
https://git.kernel.org/stable/c/6675c541f540a29487a802d3135280b69b9f568d
https://git.kernel.org/stable/c/67929e973f5a347f05fef064fea4ae79e7cdb5fd
https://git.kernel.org/stable/c/b34bbc76651065a5eafad8ddff1eb8d1f8473172
rh#2293429
CVE-2024-38566kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38566
SMASH Issue 411368
bnc#1226790
https://git.kernel.org/stable/c/0db63c0b86e981a1e97d2596d64ceceba1a5470e
https://git.kernel.org/stable/c/39f8a29330f433000e716eefc4b9abda05b71a82
https://git.kernel.org/stable/c/6f5ae91172a93abac9720ba94edf3ec8f4d7f24f
https://git.kernel.org/stable/c/c58ccdd2483a1d990748cdaf94206b5d5986a001
rh#2293427
CVE-2024-38567kernel-source-rt:Unsupportedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38567
SMASH Issue 411446
bnc#1226769
https://git.kernel.org/stable/c/03ddc74bdfd71b84a55c9f2185d8787f258422cd
https://git.kernel.org/stable/c/0fa08a55201ab9be72bacb8ea93cf752d338184f
https://git.kernel.org/stable/c/265c3cda471c26e0f25d0c755da94e1eb15d7a0c
https://git.kernel.org/stable/c/62eb07923f3693d55b0c2d9a5a4f1ad72cb6b8fd
https://git.kernel.org/stable/c/6a9892bf24c906b4d6b587f8759ca38bff672582
https://git.kernel.org/stable/c/8650725bb0a48b206d5a8ddad3a7488f9a5985b7
https://git.kernel.org/stable/c/ac3ed46a8741d464bc70ebdf7433c1d786cf329d
https://git.kernel.org/stable/c/b6dd09b3dac89b45d1ea3e3bd035a3859c0369a0
https://git.kernel.org/stable/c/eb0f2fc3ff5806cc572cd9055ce7c52a01e97645
jsc#CAR-3845
rh#2293426
CVE-2024-38568kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L)CVE-2024-38568
SMASH Issue 411398
bnc#1226771
https://git.kernel.org/stable/c/3669baf308308385a2ab391324abdde5682af5aa
https://git.kernel.org/stable/c/81bdd60a3d1d3b05e6cc6674845afb1694dd3a0e
https://git.kernel.org/stable/c/aa2d3d678895c8eedd003f1473f87d3f06fe6ec7
https://git.kernel.org/stable/c/b5120d322763c15c978bc47beb3b6dff45624304
https://git.kernel.org/stable/c/be1fa711e59c874d049f592aef1d4685bdd22bdf
rh#2293425
CVE-2024-38569kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L)CVE-2024-38569
SMASH Issue 411423
bnc#1226772
https://git.kernel.org/stable/c/3d1face00ebb7996842aee4214d7d0fb0c77b1e9
https://git.kernel.org/stable/c/567d34626c22b36579ec0abfdf5eda2949044220
https://git.kernel.org/stable/c/77fce82678ea5fd51442e62febec2004f79e041b
https://git.kernel.org/stable/c/8e9aab2492178f25372f1820bfd9289fbd74efd0
https://git.kernel.org/stable/c/ff48247144d13a3a0817127703724256008efa78
rh#2293424
CVE-2024-38571kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38571
SMASH Issue 411405
bnc#1226737
https://git.kernel.org/stable/c/06d17744b77bc6cb29a6c785f4fad8c4163ee653
https://git.kernel.org/stable/c/11c731386ed82053c2759b6fea1a82ae946e5e0f
https://git.kernel.org/stable/c/27600e0c5272a262b0903e35ae1df37d33c5c1ad
https://git.kernel.org/stable/c/2d5ca6e4a2872e92a32fdfd87e04dd7d3ced7278
https://git.kernel.org/stable/c/d998ddc86a27c92140b9f7984ff41e3d1d07a48f
https://git.kernel.org/stable/c/fcf5f1b5f308f2eb422f6aca55d295b25890906b
rh#2293422
CVE-2024-38572kernel-source-rt:Not affectedmoderate5.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)CVE-2024-38572
SMASH Issue 411343
bnc#1226776
https://git.kernel.org/stable/c/95575de7dede7b1ed3b9718dab9dda97914ea775
https://git.kernel.org/stable/c/a1abdb63628b04855a929850772de97435ed1555
https://git.kernel.org/stable/c/b48d40f5840c505b7af700594aa8379eec28e925
https://git.kernel.org/stable/c/e1bdff48a1bb4a4ac660c19c55a820968c48b3f2
rh#2293421
CVE-2024-38573kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38573
SMASH Issue 411449
bnc#1226739
https://git.kernel.org/stable/c/769c4f355b7962895205b86ad35617873feef9a5
https://git.kernel.org/stable/c/9a185cc5a79ba408e1c73375706630662304f618
https://git.kernel.org/stable/c/b18daa4ec727c0266de5bfc78e818d168cc4aedf
https://git.kernel.org/stable/c/cf7de25878a1f4508c69dc9f6819c21ba177dbfe
https://git.kernel.org/stable/c/dfec15222529d22b15e5b0d63572a9e39570cab4
https://git.kernel.org/stable/c/f84b9b25d045e67a7eee5e73f21278c8ab06713c
rh#2293420
CVE-2024-38574kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38574
SMASH Issue 411440
bnc#1226655
https://git.kernel.org/stable/c/1fd91360a75833b7110af9834ae26c977e1273e0
https://git.kernel.org/stable/c/9bf48fa19a4b1d186e08b20bf7e5de26a15644fb
https://git.kernel.org/stable/c/ef80b59acfa4dee4b5eaccb15572b69248831104
rh#2293419
CVE-2024-38575kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38575
SMASH Issue 411400
bnc#1226612
https://git.kernel.org/stable/c/0eb2c0528e232b3c32cde9d5e1c9f80ba2996e49
https://git.kernel.org/stable/c/316f790ebcf94bdf59f794b7cdea4068dc676d4c
https://git.kernel.org/stable/c/3729ca9e48d19a03ae049e2bde510e161c2f3720
https://git.kernel.org/stable/c/7c15eb344b0d4d3468c9b2a7591ad2b859b29b88
https://git.kernel.org/stable/c/c37466406f075476c2702ecc01917928af871f3b
rh#2293418
CVE-2024-38576kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2024-38576
SMASH Issue 411425
bnc#1226623
https://git.kernel.org/stable/c/3758f7d9917bd7ef0482c4184c0ad673b4c4e069
https://git.kernel.org/stable/c/4c3e2ef4d8ddd313c8ce3ac30505940bea8d6257
https://git.kernel.org/stable/c/9351e1338539cb7f319ffc1210fa9b2aa27384b5
https://git.kernel.org/stable/c/afb39909bfb5c08111f99e21bf5be7505f59ff1c
https://git.kernel.org/stable/c/e2228ed3fe7aa838fba87c79a76fb1ad9ea47138
rh#2293417
CVE-2024-38577kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2024-38577
SMASH Issue 411384
bnc#1226631
https://git.kernel.org/stable/c/08186d0c5fb64a1cc4b43e009314ee6b173ed222
https://git.kernel.org/stable/c/1a240e138071b25944ded0f5b3e357aa99fabcb7
https://git.kernel.org/stable/c/32d988f48ed287e676a29a15ac30701c35849aec
https://git.kernel.org/stable/c/6593d857ce5b5b802fb73d8091ac9c84b92c1697
https://git.kernel.org/stable/c/cc5645fddb0ce28492b15520306d092730dffa48
rh#2293416
CVE-2024-38581kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2024-38581
SMASH Issue 411426
bnc#1226657
https://git.kernel.org/stable/c/0f98c144c15c8fc0f3176c994bd4e727ef718a5c
https://git.kernel.org/stable/c/39cfce75168c11421d70b8c0c65f6133edccb82a
https://git.kernel.org/stable/c/70b1bf6d9edc8692d241f59a65f073aec6d501de
https://git.kernel.org/stable/c/948255282074d9367e01908b3f5dcf8c10fc9c3d
rh#2293408
CVE-2024-38582kernel-source-rt:Ignoremoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38582
SMASH Issue 411452
bnc#1226658
https://git.kernel.org/stable/c/06afce714d87c7cd1dcfccbcd800c5c5d2cf1cfd
https://git.kernel.org/stable/c/1c3844c5f4eac043954ebf6403fa9fd1f0e9c1c0
https://git.kernel.org/stable/c/6e5c8e8e024e147b834f56f2115aad241433679b
https://git.kernel.org/stable/c/911d38be151921a5d152bb55e81fd752384c6830
https://git.kernel.org/stable/c/a8799662fed1f8747edae87a1937549288baca6a
https://git.kernel.org/stable/c/bc9cee50a4a4ca23bdc49f75ea8242d8a2193b3b
https://git.kernel.org/stable/c/c516db6ab9eabbedbc430b4f93b0d8728e9b427f
https://git.kernel.org/stable/c/eb85dace897c5986bc2f36b3c783c6abb8a4292e
https://git.kernel.org/stable/c/eff7cdf890b02596b8d73e910bdbdd489175dbdb
jsc#CAR-3814
rh#2293407
CVE-2024-38583kernel-source-rt:Not affectedmoderate7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-38583
SMASH Issue 411429
bnc#1226777
https://git.kernel.org/stable/c/2f12b2c03c5dae1a0de0a9e5853177e3d6eee3c6
https://git.kernel.org/stable/c/67fa90d4a2ccd9ebb0e1e168c7d0b5d0cf3c7148
https://git.kernel.org/stable/c/68e738be5c518fc3c4e9146b66f67c8fee0135fb
https://git.kernel.org/stable/c/822ae5a8eac30478578a75f7e064f0584931bf2d
https://git.kernel.org/stable/c/82933c84f188dcfe89eb26b0b48ab5d1ca99d164
https://git.kernel.org/stable/c/86a30d6302deddb9fb97ba6fc4b04d0e870b582a
https://git.kernel.org/stable/c/e65ccf3a4de4f0c763d94789615b83e11f204438
https://git.kernel.org/stable/c/f5d4e04634c9cf68bdf23de08ada0bb92e8befe7
https://git.kernel.org/stable/c/f9186bba4ea282b07293c1c892441df3a5441cb0
jsc#CAR-3847
rh#2293406
CVE-2024-38584kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38584
SMASH Issue 411437
bnc#1226627
https://git.kernel.org/stable/c/1e1d5bd7f4682e6925dd960aba2a1aa1d93da53a
https://git.kernel.org/stable/c/5cd17f0e74cb99d209945b9f1f06d411aa667eb1
https://git.kernel.org/stable/c/b0a82ebabbdc4c307f781bb0e5cd617949a3900d
https://git.kernel.org/stable/c/b31c7e78086127a7fcaa761e8d336ee855a920c6
rh#2293405
CVE-2024-38585kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N)CVE-2024-38585
SMASH Issue 411434
bnc#1226778
https://git.kernel.org/stable/c/4e6f225aefeb712cdb870176b6621f02cf235b8c
https://git.kernel.org/stable/c/5996b2b2dac739f2a27da13de8eee5b85b2550b3
https://git.kernel.org/stable/c/791f4641142e2aced85de082e5783b4fb0b977c2
https://git.kernel.org/stable/c/8019d3dd921f39a237a9fab6d2ce716bfac0f983
https://git.kernel.org/stable/c/f678c3c336559cf3255a32153e9a17c1be4e7c15
rh#2293404
CVE-2024-38586kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38586
SMASH Issue 411450
bnc#1226750
https://git.kernel.org/stable/c/078d5b7500d70af2de6b38e226b03f0b932026a6
https://git.kernel.org/stable/c/0c48185a95309556725f818b82120bb74e9c627d
https://git.kernel.org/stable/c/54e7a0d111240c92c0f02ceba6eb8f26bf6d6479
https://git.kernel.org/stable/c/68222d7b4b72aa321135cd453dac37f00ec41fd1
https://git.kernel.org/stable/c/b6d21cf40de103d63ae78551098a7c06af8c98dd
https://git.kernel.org/stable/c/c71e3a5cffd5309d7f84444df03d5b72600cc417
rh#2293402
CVE-2024-38587kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L)CVE-2024-38587
SMASH Issue 411351
bnc#1226780
https://git.kernel.org/stable/c/008ab3c53bc4f0b2f20013c8f6c204a3203d0b8b
https://git.kernel.org/stable/c/07ef95cc7a579731198c93beed281e3a79a0e586
https://git.kernel.org/stable/c/3726f75a1ccc16cd335c0ccfad1d92ee08ecba5e
https://git.kernel.org/stable/c/42f0a3f67158ed6b2908d2b9ffbf7e96d23fd358
https://git.kernel.org/stable/c/504178fb7d9f6cdb0496d5491efb05f45597e535
https://git.kernel.org/stable/c/c6e1650cf5df1bd6638eeee231a683ef30c7d4eb
https://git.kernel.org/stable/c/cd7f3978c2ec741aedd1d860b2adb227314cf996
https://git.kernel.org/stable/c/d52c04474feac8e305814a5228e622afe481b2ef
https://git.kernel.org/stable/c/eb1ea64328d4cc7d7a912c563f8523d5259716ef
rh#2293401
CVE-2024-38590kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38590
SMASH Issue 411416
bnc#1226839
https://git.kernel.org/stable/c/06cf121346bbd3d83a5eea05bb87666c6b279990
https://git.kernel.org/stable/c/17f3741c65c4a042ae8ba094068b07a4b77e213c
https://git.kernel.org/stable/c/349e859952285ab9689779fb46de163f13f18f43
https://git.kernel.org/stable/c/45b31be4dd22827903df15c548b97b416790139b
https://git.kernel.org/stable/c/6f541a89ced8305da459e3ab0006e7528cf7da7b
https://git.kernel.org/stable/c/817a10a6df9354e67561922d2b7fce48dfbebc55
https://git.kernel.org/stable/c/cc699b7eb2bc963c12ffcd37f80f45330d2924bd
rh#2293388
CVE-2024-38592kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38592
SMASH Issue 411371
bnc#1226844
https://git.kernel.org/stable/c/01a2c5123e27b3c4685bf2fc4c2e879f6e0c7b33
https://git.kernel.org/stable/c/9fe2cc3fa44f7ad7ba5f29c1a68b2b924c17b9b1
https://git.kernel.org/stable/c/cf69d0af7db917b82aceaa44b7b1b9376609da22
rh#2293385
CVE-2024-38593kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38593
SMASH Issue 411376
bnc#1226726
https://git.kernel.org/stable/c/3ddf170e4a604f5d4d9459a36993f5e92b53e8b0
https://git.kernel.org/stable/c/3fd4282d5f25c3c97fef3ef0b89b82ef4e2bc975
https://git.kernel.org/stable/c/64a47cf634ae44e92be24ebc982410841093bd7b
https://git.kernel.org/stable/c/aea27a92a41dae14843f92c79e9e42d8f570105c
rh#2293380
CVE-2024-38594kernel-source-rt:Not affectedmoderate6.1 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H)CVE-2024-38594
SMASH Issue 411355
bnc#1226734
https://git.kernel.org/stable/c/36ac9e7f2e5786bd37c5cd91132e1f39c29b8197
https://git.kernel.org/stable/c/487f9030b1ef34bab123f2df2a4ccbe01ba84416
https://git.kernel.org/stable/c/6f476aff2d8da1a189621c4c16a76a6c534e4312
rh#2293376
CVE-2024-38595kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-38595
SMASH Issue 411415
bnc#1226741
https://git.kernel.org/stable/c/05d9d7b66836d87c914f8fdd4b062b78e373458d
https://git.kernel.org/stable/c/3c453e8cc672de1f9c662948dba43176bc68d7f0
https://git.kernel.org/stable/c/a0501201751034ebe7a22bd9483ed28fea1cd213
rh#2293374
CVE-2024-38598kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38598
SMASH Issue 411413
bnc#1226757
https://git.kernel.org/stable/c/3f5b73ef8fd6268cbc968b308d8eafe56fda97f3
https://git.kernel.org/stable/c/43771597feba89a839c5f893716df88ae5c237ce
https://git.kernel.org/stable/c/5817f43ae1a118855676f57ef7ab50e37eac7482
https://git.kernel.org/stable/c/69296914bfd508c85935bf5f711cad9b0fe78492
https://git.kernel.org/stable/c/71e8e4f288e74a896b6d9cd194f3bab12bd7a10f
https://git.kernel.org/stable/c/8bbc71315e0ae4bb7e37f8d43b915e1cb01a481b
https://git.kernel.org/stable/c/c9566b812c8f66160466cc1e29df6d3646add0b1
https://git.kernel.org/stable/c/d4b9c764d48fa41caa24cfb4275f3aa9fb4bd798
https://git.kernel.org/stable/c/f0e729af2eb6bee9eb58c4df1087f14ebaefe26b
rh#2293367
CVE-2024-38602kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38602
SMASH Issue 411401
bnc#1226613
https://git.kernel.org/stable/c/1ea02699c7557eeb35ccff2bd822de1b3e09d868
https://git.kernel.org/stable/c/38eb01edfdaa1562fa00429be2e33f45383b1b3a
https://git.kernel.org/stable/c/81d8240b0a243b3ddd8fa8aa172f1acc2f7cc8f3
https://git.kernel.org/stable/c/ae467750a3765dd1092eb29f58247950a2f9b60c
https://git.kernel.org/stable/c/b505e0319852b08a3a716b64620168eab21f4ced
rh#2293363
CVE-2024-38603kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38603
SMASH Issue 411404
bnc#1226842
https://git.kernel.org/stable/c/1491a01ef5a98149048b12e208f6ed8e86ad10b9
https://git.kernel.org/stable/c/2fcffaaf529d5fe3fdc6c0ee65a6f266b74de782
https://git.kernel.org/stable/c/582c1aeee0a9e73010cf1c4cef338709860deeb0
https://git.kernel.org/stable/c/a7678a16c25b6ece1667ac681e3e783ff3de7a6f
https://git.kernel.org/stable/c/b1e86f1ef8fa796f8935be392457639f3a907d91
rh#2293362
CVE-2024-38604kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38604
SMASH Issue 411433
bnc#1226866
https://git.kernel.org/stable/c/0c12028aec837f5a002009bbf68d179d506510e8
https://git.kernel.org/stable/c/10b723bcba8986537a484aa94dbfc9093fd776a1
https://git.kernel.org/stable/c/72c54e063c32aeb38d43a2bd897821e6e5a1757d
https://git.kernel.org/stable/c/910717920c8c3f9386277a44c44d448058a18084
rh#2293361
CVE-2024-38605kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38605
SMASH Issue 411350
bnc#1226740
https://git.kernel.org/stable/c/39381fe7394e5eafac76e7e9367e7351138a29c1
https://git.kernel.org/stable/c/6b8374ee2cabcf034faa34e69a855dc496a9ec12
https://git.kernel.org/stable/c/c935e72139e6d523defd60fe875c01eb1f9ea5c5
https://git.kernel.org/stable/c/d7ff29a429b56f04783152ad7bbd7233b740e434
https://git.kernel.org/stable/c/e007476725730c1a68387b54b7629486d8a8301e
https://git.kernel.org/stable/c/e644036a3e2b2c9b3eee3c61b5d31c2ca8b5ba92
https://git.kernel.org/stable/c/e7e0ca200772bdb2fdc6d43d32d341e87a36f811
rh#2293359
CVE-2024-38606kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38606
SMASH Issue 411362
bnc#1226871
https://git.kernel.org/stable/c/483fd65ce29317044d1d00757e3fd23503b6b04c
https://git.kernel.org/stable/c/9b284b915e2a5e63ca133353f8c456eff4446f82
https://git.kernel.org/stable/c/e57ed345e2e6043629fc74aa5be051415dcc4f77
rh#2293358
CVE-2024-38609kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38609
SMASH Issue 411456
bnc#1226751
https://git.kernel.org/stable/c/cb47c7be0e93dd5acda078163799401ac3a78e10
https://git.kernel.org/stable/c/e469218765b2781fb968778bd13595acec181a0e
rh#2293355
CVE-2024-38610kernel-source-rt:Not affectedimportant7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)CVE-2024-38610
SMASH Issue 411448
bnc#1226758
https://git.kernel.org/stable/c/2c8d6e24930b8ef7d4a81787627c559ae0e0d3bb
https://git.kernel.org/stable/c/3d6586008f7b638f91f3332602592caa8b00b559
https://git.kernel.org/stable/c/4c4ba3cf3a15ccfbaf787d0296fa42cdb00da9b4
https://git.kernel.org/stable/c/5c6705aa47b5b78d7ad36fea832bb69caa5bf49a
https://git.kernel.org/stable/c/afeb0e69627695f759fc73c39c1640dbf8649b32
https://git.kernel.org/stable/c/e873f36ec890bece26ecce850e969917bceebbb6
rh#2293354
CVE-2024-38613kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38613
SMASH Issue 411388
bnc#1226753
https://git.kernel.org/stable/c/0d9ae1253535f6e85a016e09c25ecbe6f7f59ef0
https://git.kernel.org/stable/c/2a8d1d95302c7d52c6ac8fa5cb4a6948ae0d3a14
https://git.kernel.org/stable/c/4eeffecc8e3cce25bb559502c2fd94a948bcde82
https://git.kernel.org/stable/c/5213cc01d0464c011fdc09f318705603ed3a746b
https://git.kernel.org/stable/c/77b2b67a0f8bce260c53907e5749d61466d90c87
https://git.kernel.org/stable/c/95f00caf767b5968c2c51083957b38be4748a78a
https://git.kernel.org/stable/c/da89ce46f02470ef08f0f580755d14d547da59ed
https://git.kernel.org/stable/c/f1d4274a84c069be0f6098ab10c3443fc1f7134c
https://git.kernel.org/stable/c/f3baf0f4f92af32943ebf27b960e0552c6c082fd
jsc#CAR-3840
rh#2293350
CVE-2024-38614kernel-source-rt:Not affectedmoderate4.1 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38614
SMASH Issue 411369
bnc#1226755
https://git.kernel.org/stable/c/075c0405b0d7d9fc490609e988a3af0069596538
https://git.kernel.org/stable/c/c0ed9a711e3392d73e857faa031d8d349c0d70db
https://git.kernel.org/stable/c/c88cfb5cea5f8f9868ef02cc9ce9183a26dcf20f
https://git.kernel.org/stable/c/cea9d0015c140af39477dd5eeb9b20233a45daa9
rh#2293349
CVE-2024-38616kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38616
SMASH Issue 411364
bnc#1226852
https://git.kernel.org/stable/c/042a39bb8e0812466327a5102606e88a5a4f8c02
https://git.kernel.org/stable/c/066afafc10c9476ee36c47c9062527a17e763901
https://git.kernel.org/stable/c/0c38c9c460bb8ce8d6f6cf316e0d71a70983ec83
https://git.kernel.org/stable/c/13857683126e8a6492af73c74d702835f7a2175b
https://git.kernel.org/stable/c/87586467098281f04fa93e59fe3a516b954bddc4
rh#2293347
CVE-2024-38617kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38617
SMASH Issue 411366
bnc#1226859
https://git.kernel.org/stable/c/03758d5a0932016b6d5f5bfbca580177e6bc937a
https://git.kernel.org/stable/c/42d21c9727028fe7ee392223ba127484b1b8677e
https://git.kernel.org/stable/c/7880dbf4eafe22a6a41a42e774f1122c814ed02d
https://git.kernel.org/stable/c/998b18072ceb0613629c256b409f4d299829c7ec
rh#2293197
rh#2293198
CVE-2024-38622kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38622
SMASH Issue 411758
bnc#1226856
https://git.kernel.org/stable/c/530f272053a5e72243a9cb07bb1296af6c346002
https://git.kernel.org/stable/c/873f67699114452c2a996c4e10faac8ff860c241
https://git.kernel.org/stable/c/9078630ed7f8f25d65d11823e7f2b11a8e2f4f0f
rh#2293705
CVE-2024-38623kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38623
SMASH Issue 411760
bnc#1226851
https://git.kernel.org/stable/c/1997cdc3e727526aa5d84b32f7cbb3f56459b7ef
https://git.kernel.org/stable/c/1fe1c9dc21ee52920629d2d9b9bd84358931a8d1
https://git.kernel.org/stable/c/3839a9b19a4b70eff6b6ad70446f639f7fd5a3d7
https://git.kernel.org/stable/c/a2de301d90b782ac5d7a5fe32995caaee9ab3a0f
https://git.kernel.org/stable/c/cceef44b34819c24bb6ed70dce5b524bd3e368d1
rh#2293704
CVE-2024-38624kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38624
SMASH Issue 411761
bnc#1226858
https://git.kernel.org/stable/c/109d85a98345ee52d47c650405dc51bdd2bc7d40
https://git.kernel.org/stable/c/2d1ad595d15f36a925480199bf1d9ad72614210b
https://git.kernel.org/stable/c/847db4049f6189427ddaefcfc967d4d235b73c57
https://git.kernel.org/stable/c/98db3155b54d3684ef0ab5bfa0b856d13f65843d
https://git.kernel.org/stable/c/e931f6b630ffb22d66caab202a52aa8cbb10c649
rh#2293703
CVE-2024-38625kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38625
SMASH Issue 411762
bnc#1226854
https://git.kernel.org/stable/c/1cd6c96219c429ebcfa8e79a865277376c563803
https://git.kernel.org/stable/c/6c8054d590668629bb2eb6fb4cbf22455d08ada8
https://git.kernel.org/stable/c/ff1068929459347f9e47f8d14c409dcf938c2641
rh#2293702
CVE-2024-38626kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38626
SMASH Issue 411763
bnc#1226853
https://git.kernel.org/stable/c/246014876d782bbf2e652267482cd2e799fb5fcd
https://git.kernel.org/stable/c/533070db659a9589310a743e9de14cf9d651ffaf
rh#2293701
CVE-2024-38628kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38628
SMASH Issue 411765
bnc#1226911
https://git.kernel.org/stable/c/1b739388aa3f8dfb63a9fca777e6dfa6912d0464
https://git.kernel.org/stable/c/453d3fa9266e53f85377b911c19b9a4563fa88c0
https://git.kernel.org/stable/c/89e66809684485590ea0b32c3178e42cba36ac09
https://git.kernel.org/stable/c/bea73b58ab67fe581037ad9cdb93c2557590c068
rh#2293699
CVE-2024-38629kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38629
SMASH Issue 411766
bnc#1226905
https://git.kernel.org/stable/c/15edb906211bf53e7b5574f7326ab734d6bff4f9
https://git.kernel.org/stable/c/76e43fa6a456787bad31b8d0daeabda27351a480
https://git.kernel.org/stable/c/9eb15f24a0b9b017b39cde8b8c07243676b63687
rh#2293698
CVE-2024-38631kernel-source-rt:Not affectedmoderate ()CVE-2024-38631
SMASH Issue 411768
bnc#1226862
https://git.kernel.org/stable/c/51fafb3cd7fcf4f4682693b4d2883e2a5bfffe33
https://git.kernel.org/stable/c/8dbcb3a8cfdf8ff5afce62dad50790278ff0d3b7
rh#2293937
CVE-2024-38632kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38632
SMASH Issue 411769
bnc#1226860
https://git.kernel.org/stable/c/0bd22a4966d55f1d2c127a53300d5c2b50152376
https://git.kernel.org/stable/c/35fef97c33f3d3ca0455f9a8e2a3f2c1f8cc9140
https://git.kernel.org/stable/c/82b951e6fbd31d85ae7f4feb5f00ddd4c5d256e2
rh#2293696
CVE-2024-38636kernel-source-rt:Not affectedlow3.3 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)CVE-2024-38636
SMASH Issue 411773
bnc#1226879
https://git.kernel.org/stable/c/1a9225fdd0ec95fcf32936bcea9ceef0cf1512dc
https://git.kernel.org/stable/c/2b2611a42462c6c685d40b5f3aedcd8d21c27065
https://git.kernel.org/stable/c/33e62cd7b4c281cd737c62e5d8c4f0e602a8c5c5
https://git.kernel.org/stable/c/e8b485e39b4d17afa9a2821fc778d5a67abfc03a
rh#2293692
CVE-2024-38661kernel-source-rt:Analysismoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38661
SMASH Issue 412087
bnc#1226996
https://git.kernel.org/stable/c/2062e3f1f2374102f8014d7ca286b9aa527bd558
https://git.kernel.org/stable/c/4c0bfb4e867c1ec6616a5049bd3618021e127056
https://git.kernel.org/stable/c/67011123453b91ec03671d40712fa213e94a01b9
https://git.kernel.org/stable/c/7360cef95aa1ea2b5efb7b5e2ed32e941664e1f0
https://git.kernel.org/stable/c/7c72af16abf2ec7520407098360bbba312289e05
https://git.kernel.org/stable/c/7dabe54a016defe11bb2a278cd9f1ff6db3feba6
https://git.kernel.org/stable/c/8c5f5911c1b13170d3404eb992c6a0deaa8d81ad
https://git.kernel.org/stable/c/d4f9d5a99a3fd1b1c691b7a1a6f8f3f25f4116c9
rh#2294277
CVE-2024-38663kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38663
SMASH Issue 411965
bnc#1226939
https://git.kernel.org/stable/c/6da6680632792709cecf2b006f2fe3ca7857e791
https://git.kernel.org/stable/c/89bb36c72e1951843f9e04dc84412e31fcc849a9
https://git.kernel.org/stable/c/d4a60298ac34f027a09f8f893fdbd9e06279bb24
rh#2294225
CVE-2024-38664kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-38664
SMASH Issue 411970
bnc#1226941
https://git.kernel.org/stable/c/603661357056b5e5ba6d86f505fbc936eff396ba
https://git.kernel.org/stable/c/6ead3eccf67bc8318b1ce95ed879b2cc05b4fce9
https://git.kernel.org/stable/c/be3f3042391d061cfca2bd22630e0d101acea5fc
rh#2294224
CVE-2024-38667kernel-source-rt:Not affectedmoderate6.4 (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)CVE-2024-38667
SMASH Issue 411972
bnc#1226952
https://git.kernel.org/stable/c/0c1f28c32a194303da630fca89481334b9547b80
https://git.kernel.org/stable/c/3090c06d50eaa91317f84bf3eac4c265e6cb8d44
https://git.kernel.org/stable/c/a638b0461b58aa3205cd9d5f14d6f703d795b4af
https://git.kernel.org/stable/c/ea22d4195cca13d5fdbc4d6555a2dfb8a7867a9e
rh#2294219
CVE-2024-39277kernel-source-rt:Not affectedmoderate6.6 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H)CVE-2024-39277
SMASH Issue 411777
bnc#1226909
https://git.kernel.org/stable/c/50ee21bfc005e69f183d6b4b454e33f0c2571e1f
https://git.kernel.org/stable/c/5a91116b003175302f2e6ad94b76fb9b5a141a41
https://git.kernel.org/stable/c/8e1ba9df9a35e8dc64f657a64e523c79ba01e464
https://git.kernel.org/stable/c/b41b0018e8ca06e985e87220a618ec633988fd13
https://git.kernel.org/stable/c/e64746e74f717961250a155e14c156616fcd981f
rh#2293647
CVE-2024-39291kernel-source-rt:Not affectedmoderate4.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-39291
SMASH Issue 411974
bnc#1226934
https://git.kernel.org/stable/c/19bd9537b6bc1c882df25206c15917214d8e9460
https://git.kernel.org/stable/c/acce6479e30f73ab0872e93a75aed1fb791d04ec
https://git.kernel.org/stable/c/f1b6a016dfa45cedc080d36fa5d6f22237d80e8b
rh#2294223
CVE-2024-39296kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-39296
SMASH Issue 412090
bnc#1226989
https://git.kernel.org/stable/c/a45835a0bb6ef7d5ddbc0714dd760de979cb6ece
https://git.kernel.org/stable/c/cf48aee81103ca06d09d73d33fb72f1191069aa6
https://git.kernel.org/stable/c/f07224c16678a8af54ddc059b3d2d51885d7f35e
rh#2294270
CVE-2024-39371kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-39371
SMASH Issue 412094
bnc#1226990
https://git.kernel.org/stable/c/43cfac7b88adedfb26c27834386992650f1642f3
https://git.kernel.org/stable/c/5fc16fa5f13b3c06fdb959ef262050bd810416a2
https://git.kernel.org/stable/c/65561b4c1c9e01443cb76387eb36a9109e7048ee
https://git.kernel.org/stable/c/c2844d5e58576c55d8e8d4a9f74902d3f7be8044
rh#2294243
CVE-2024-39467kernel-source-rt:Not affectedmoderate5.5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)CVE-2024-39467
SMASH Issue 412089
bnc#1226991
https://git.kernel.org/stable/c/1640dcf383cdba52be8b28d2a1a2aa7ef7a30c98
https://git.kernel.org/stable/c/20faaf30e55522bba2b56d9c46689233205d7717
https://git.kernel.org/stable/c/68e3cd4ecb8603936cccdc338929130045df2e57
https://git.kernel.org/stable/c/75c87e2ac6149abf44bdde0dd6d541763ddb0dff
https://git.kernel.org/stable/c/8c8aa473fe6eb46a4bf99f3ea2dbe52bf0c1a1f0
https://git.kernel.org/stable/c/be0155202e431f3007778568a72432c68f8946ba
https://git.kernel.org/stable/c/c559a8d840562fbfce9f318448dda2f7d3e6d8e8
rh#2294305
CVE-2024-39470kernel-source-rt:Not affectedmoderate4.4 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)CVE-2024-39470
SMASH Issue 412101
bnc#1226988
https://git.kernel.org/stable/c/5ade5fbdbbb1f023bb70730ba4d74146c8bc7eb9
https://git.kernel.org/stable/c/7a1b2d138189375ed1dcd7d0851118230221bd1d
https://git.kernel.org/stable/c/d4e9a968738bf66d3bb852dd5588d4c7afd6d7f4
rh#2294311
CVE-2024-4603openssl:Not affected, openssl-1_1:Not affectedmoderate5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)CVE-2024-4603
OSS:2024/05/16/2
OSS:2024/Q2/244
SMASH Issue 406062
bnc#1224388
https://github.com/openssl/openssl/commit/3559e868e58005d15c6013a0c1fd832e51c73397
https://github.com/openssl/openssl/commit/53ea06486d296b890d565fb971b2764fcd826e7e
https://github.com/openssl/openssl/commit/9c39b3858091c152f52513c066ff2c5a47969f0d
https://github.com/openssl/openssl/commit/da343d0605c826ef197aceedc67e8e04f065f740
https://security.netapp.com/advisory/ntap-20240621-0001/
https://www.openssl.org/news/secadv/20240516.txt
openssl.git:commit:85ccbab216da245cf9a6503dd327072f21950d9b
rh#2281029